Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 21:36
Static task
static1
Behavioral task
behavioral1
Sample
db423d81e5ec79afd63f956d132cf6e4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
db423d81e5ec79afd63f956d132cf6e4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db423d81e5ec79afd63f956d132cf6e4_JaffaCakes118.html
-
Size
461KB
-
MD5
db423d81e5ec79afd63f956d132cf6e4
-
SHA1
2f7e0825b8f0e6e6f685d02f6964e3c0c3a90ba6
-
SHA256
21a87b77815cd90c92bdd7cfb4c7168cd7e9e4ba68cce41b1750b64938e44580
-
SHA512
ee8776713096df16e46fd1614ce1c5e399542d6ecb4afc8a73a31cc3913b9ec5c2b888e66858af0c6d2fdef44ba51da61e09cc2652c9c55269de65b2a19ccd4e
-
SSDEEP
6144:SxsMYod+X3oI+YLQIsMYod+X3oI+YxsMYod+X3oI+YLsMYod+X3oI+YQ:65d+X3F5d+X3n5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000000d9d5d2d0a4647bff92cf0c10f7500f93a91c96b0bbd2fec795aff7f3da6851b000000000e8000000002000020000000ee6c63a5587a60d43b9dee0dd35d9051c092069a2f8b4b4b69cc2bf05a48e217200000001178a14a2f6fcfbc6025f78ab6c9f1aa0eed0f953d2230825c06763f7b51309a40000000dbd725d34e3c1c8c8d7584cdb29e4f699a52e17849a7306aa547cde42ba25cb8f02b2be3ff28efb26fa8eace1c5ca79bafbe7ae62362b0f9fec1061f90019a8d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01f88be9204db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432252454" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E430A811-7085-11EF-85B7-D6CBE06212A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3036 iexplore.exe 3036 iexplore.exe 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2416 3036 iexplore.exe 30 PID 3036 wrote to memory of 2416 3036 iexplore.exe 30 PID 3036 wrote to memory of 2416 3036 iexplore.exe 30 PID 3036 wrote to memory of 2416 3036 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db423d81e5ec79afd63f956d132cf6e4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55be02031687654440e0a5a8ebed76bc4
SHA1ca59ff7f023052d4638e11919e45a6c9d39ed10a
SHA2562af853fcb225cd26d00ab52e1687e88a4d146b71515a41687b5ecf2b5b1bf2a1
SHA51237923e4a4ff631905d23fdad687ed6f2395433429f9383521198577ab0ae0d63c2e35d627f6acc0d88937a6f38662828311c9b87240a93cb68529da22b2d55d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee134c568a7a9609eaf9b07839bf30a1
SHA193fc354b0a3cb6dcb2097254c1544ecce35f64fd
SHA25618052b1b337fe1e87c0e54800dfd9ab7435f35d7dfc27e57896b79600dafb7d7
SHA512af37088a4b74262607b7f2997058b55cda76985a9fcbbad38410553ae5b603207888b21b90fe1465419d1ceb80f91c2047d148f0a70013e64d313d7d83499d54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584ef248bdaa83e094fc74021f70836a7
SHA1d440909155af7625b10c1ee4f879a6553ab98b49
SHA256657c37c2bb501494162a1acfc9767ed7c385c86af60a0e63ad8c2702e93a607f
SHA51237486a4b390a7b5178be6d2216e6b5f160a7b3a66a682ab392e2611d6ff7a7e4fe9cd5ef1b55a78836187588e946c4ecd482358b1260eafe5f4c0952b6df4056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d3520664f17a9a03999e6c686c6c088
SHA18ecd198ce8e0572aa751fb06060303382981046f
SHA256023cbd08b75d5bd82097046de6fd16cc727f1a48d27e59981e2a4a2eb1318848
SHA512a91c2abf27f1357ade49dc979a110736af8cec0c20cd53c85b1af35d7f3189ab43117d55090ff4d6d49e4eebf3da35e14e5e561249e8601f54e503b08525f1de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540057d4d834026a5902a70690f35b6c3
SHA10925ef2e9ce0322ab95259f35ca3c0adc94e13ba
SHA2566cfa9b1c1e8aa034e158af927bb66017d71acce1af713ffc3ee1d87bd29f74ee
SHA512d9c4073034a13c131ea226817e7adfec701638597614c33cc08dd1215b350016b8a252f986cbd767cb630a1fc7a96da8722e181aa2d9aa59cd8248a0de43239d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5120a07d38918923c0ddb943a65f00c75
SHA16fbafc1b923efa60fcffea4e6fb8685c75b41de3
SHA25678b51cde46bee499229626a09e44e9dca224a2dd85f61332337b7fb6a344a645
SHA512223b0967dc8ebdc99b5fa94aa3167ea4cae40a90dcb0b791896f91a0f42d83be1ac8aa205342beedcff0f9559c5c47521ede0d39eaffab90e20ac24d19d05278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b01aa71cb949ca0b0e7210e20a99cb1a
SHA1ce625f2615bed29552d4f9ecfdda5378c881f9a4
SHA25651e42f081a7b1f71831340304f1adc313b9c3a72bdf57c2a94814a449619b57e
SHA512a361c18fd32277e5211a55d9086046c74fc96152c31b608cdc1e65045a53fe9c5d617f36a3ac63183796e16f0e99442ebb871262b1ce44a351593590017fcf11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caa56e72963d4a9eaac2681b4dd6bce2
SHA17c89a2b48a039c32b3486759d5ea28fcaf0c9fdf
SHA256009ef70fb64b41c2b672a1471b38e2c1c9e4bc6e96916648776d03e3f810d106
SHA512418107e2fc0d0a5c20fdf1bda17929d70a4b982f7cae2c1ecdbc4d86842dbbba3cf864a269b8d17fd9db315fe71ef375c5d6376752463654d34912b495b47b1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575ba10afa9eb8c8e428f298ca49e0022
SHA1585f53c69407c4d7579cfb06f129b401a8f0b49b
SHA25607fe51fed6502506670c9ecd12077e056f8563224ab9a841e061410670a1cdfe
SHA512e42ae3fabb5876cdc08286dccf291d5ef318a1bbc8ab9fed7dcb3bc21fbd24149acdcbcbfdb3a27ce7b1334a2199cbe6867851f6ab71628ba0077dd049145672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568e4bc43c996a849b17e01c9f18c6c4c
SHA19b6802aede737c14882741ee28d22d6fe1e9c6e1
SHA256248699f85d3291b4f1254264181476939e1aa5d84a148acfe65618305bca5d52
SHA5123fd517ea288d9a20edd5c071fdfdb06e939b50f525980066b35812c43074eeb9a91bf66a7558d5dfa2d2ffa62919daca959eaa3587d63cb360b176abb99acba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5fc93c41190b9531fab3c2dc07a3a3f
SHA1240163e51856988ff75ab633b4384cb18cb19786
SHA256ee1a46d13c9aedb79bc6b3e9eda563edd7148daf2b7be64090c524b27aea6b25
SHA5121d2b12cc27551cc1b2e7b2bc8a6dc214f5ae1f51bab9fe3c9d6dd9b25f824e83a7f02c784db6dec2b1a9035045940ad52a0e8fbf57420eaefb74e13896043cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c247c61dad86cca5238b71bd31055f7
SHA1a74deeb78d813f3a885fb1e65a41c367cc741203
SHA256abf361066f46dee4b13e7b75a8c87e316ecf120d9f181d478bfa70efb79472c0
SHA512a65ca6ef68a473b02f50e8cf38ae3db0191120cd62f570bd7fcf336a9f5f2e2fd12f412f5c2206d924f2b943b0cd232aa1c3db38fd9e79cbf5906d3cc03901d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5835ef6c4505986e8ba510acafb083466
SHA1da6752d4db840cbc5e514de2c8dba3c65a02fe63
SHA2561233429558c86fdfe9456d245885d4d3617c73c2cd0d2493639704f5e2590b7d
SHA512f8da1d3b426ac9def9e6605fa84ab7bb875e6129368ee0b3256e3475b3b1050e7c81f821a811fb53b780c0735d95aa21fd7da7bb7437e3088fc08c1e8bf8c943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf3a3de5dea199e4a9ea4d3cdf97e519
SHA139446fac737646253e59a60060b63147e2828bdf
SHA256c98c5c3f0cd5085ab6a8761d19641acbd71907f026d673d2d59b84de56a131d3
SHA5129671c479451695c929c1d9109517ffaaef0f66e7f772db2195fd5232136c0a491b42eac114bfda3e998abf79a1ea1cc4722764f5e37a94240efa13025be58347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f7baa3c16247b7fe7e75e2cae397422
SHA173d36f4caa8390ddb12ebbde1bad1daf25f242cb
SHA25676d9a21bd9005f6c8b43c74fb8070043834f13589fa273cc1640037ab8621bad
SHA512ca8b337f5b396a56815e7233cea576ab3264a9df07222f4ee9c12079ed576afa7de0e88cc407594e179fc53148049525dd1519569f8ac70f8d3c348fab834b52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d22d996af4c471d66438b6b60db27eb7
SHA170bf684c36cc8fa1ef61fe46a5149785d9c4ca73
SHA256a167a9fbeddb1b29762e5ae636ab4556eb6bfd55af8d2e693b7197dc3d2ffb2e
SHA512f34d29b7b0096be1968db80bcdcdf5d85fd3aad240736c8ea7b470409c25a099fca29fe69123e107bac54f3a56d9721d8b4fdf39fb45ab7d1275cc30011cba1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a529e1f9ceca7ccc0471169f8b2622f
SHA196b88009198be08ec8fda6b632e925b35d9322bb
SHA256bc9362288d3a3f33e0d98438b34aecbf3aed1e687c2649c19fc638d0926e3a06
SHA51212dbb64953eca29a9a0b934b655bfe9ff887894ebfedf00283a94860a70d723579a5b9e4788ccbd47cb6d368c8540fc09d76190198fe9576a1b0e858b5b17b7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5150bd011eee56aca09579b48f4516a35
SHA1e9f2cf28aef2acb605dd07cc00be8329284a2238
SHA2562fbcd52067f819570dd2e48bede4b75f31cc796186eade43a08bcc84f3be0bf9
SHA512772547b79ed71e9cfa6235863405952cfa399863e2b786c924c4dbbd0ef695b1c5498f79ec524a60d566e4fab822d5eb255877aabf1913b56bfaef78fc097c8f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b