Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 08:48
Static task
static1
Behavioral task
behavioral1
Sample
d9fce7bb9b570a072471914e482290f0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9fce7bb9b570a072471914e482290f0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d9fce7bb9b570a072471914e482290f0_JaffaCakes118.html
-
Size
69KB
-
MD5
d9fce7bb9b570a072471914e482290f0
-
SHA1
a66f5efa3ecf39082efa3e3dc8150fc80b257bb6
-
SHA256
b09c20bb07750ebac85fd3e36c5e5f175cb9aec67b7a2c943d781c80c9fe3d1c
-
SHA512
72117b01d43b9438c3c39685dc5503343fadccde9e7297a02e058deafc422f6520305046a6e23d46a1e7ad13ba90c3fc2042eeab68ea80ec1a6cb638853cac70
-
SSDEEP
1536:SJ1gDUjmED4sPvsSdGPAcd9t9cJMDIOrFuAnXnV:SJ1gDUjmED4sPvsSdyAcsJgnXnV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432206388" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000f1df95f368ab854fb655b06f1cd3d38b7330879f9bcfa1d3b86b97236c2c67c9000000000e800000000200002000000010fe20d45688d7987bded328b7dcb198bf36ea0fbedf012d78e8fc9269caec3820000000da6d86938ef63cb7362f7d0a5446409deb42c9f9a0371f13b59cfb7f39e373924000000054ae3d62775dbcce1c700b6cc56616aaa058dbf70ad6474832cd4517328ec064f88a7a4bf4e725a284a57b8ca47919e4b3d32f8537c9983f462350844749278b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00ad5e822704db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A37A90D1-701A-11EF-A7B7-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2488 iexplore.exe 2488 iexplore.exe 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 1628 2488 iexplore.exe 30 PID 2488 wrote to memory of 1628 2488 iexplore.exe 30 PID 2488 wrote to memory of 1628 2488 iexplore.exe 30 PID 2488 wrote to memory of 1628 2488 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d9fce7bb9b570a072471914e482290f0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58047501007d1a29f513ff89cacc12134
SHA15df042b82db1171ae12f63d49dc0776f6e7c056c
SHA256ed8d3386d898b3fc1f1a159ef6b3d8d39db3a2f052e6abd25cf2ed05b8319065
SHA512f82986716741c2ab1310990eab241016234502189e81a3c3250aafa66d1eca640b9b151b4d148deeeb1c86c8b152966d5d4c49cc47bf8bd71412ea6456514514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a97fee001b730bbbe9a4d988e732d0c
SHA196279351ecbe06cee326d15a6b66382aa0c0fc84
SHA256a5250b1299df260138a6870b095a776c3dec29d42d942675a17d9d6779f2cc19
SHA5126cec3bc7950f5e2966de2bd3e8c05aaca466495936f568d91acfb32a2012470eb0498752a9fe9b11ea1f1cd046e37691fb58854f891a30546530dbc579cdef0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554239f499be8e8694ddd366238ec69ee
SHA16fa784a180ce2d2c3a3d3bac12703658cd2731b2
SHA2564aafd3217722609e8b69b85cf415066920d68aa6f1b0e919cfa258168e638c2c
SHA512dc933719828d82e423c71204cfffbe6555e97f3fc57f851421b8d1e16238a0ff1afc4f0642c1824c059733859622c14544fee820ba442335e89450c8a7f37cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a00e11c484252410efa5d0ba89b34501
SHA1b91c0da4ac874ef6575bb8007445fece7ab5d720
SHA256fbd199775d7a21edf391d1ef90383b136addb62cb3d989c4f24e12b6a9a066b3
SHA512f477986cbc1e334de788d4bbedcec18fe7a63b57778b9d9fb7f3c8b001d9c607aa490e66b412c6873c2fd24eee857528259b7b83cebebf6186b86e66f6b1f71b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db406b43eac4b3ad12baaa7c77c89d8a
SHA13412d17fce4c4707edff7de18b1d443b773d29eb
SHA256a07f6dd4004c1622b86c26e45902d287dd15b0657462c98db5c076115473b673
SHA512b8b32ba0d4ec8b3b85d53b9e4ec7f9d57e30dce3836e6466de5173c19808e3a8e49df36424c156d2660bb87779f58dc4b33d0e94d9ef620e781233b8139ee054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b87fe50835b66d995d95851979ef04b
SHA1acc205836af879eb888827ef60d85462ad0ee31d
SHA2566e207f7c37f335d5621d426b0e77e60e1a3c405dce78b321241bea53ccc38a92
SHA5121b1c735374ab5ded83db4bd19b6d2543c11881e40530b0d0f4fce0880b12420ef040f9ab2bb59e999407b450c357102bf8bbd0b2199831d084467701a64a6c4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adc9f8176feb77f4ef482524f153d2b0
SHA11e496b427fa3d529cf779b3d04cc54e4d1b8b4e2
SHA256719d54c5cda47bac070cb43f3713bb6a074dd67f6e6dc04ff134774479d35c6e
SHA51254812276c967b654aa9f1824ba3704bdb6ccdef12846bb1a7236efdbdba277a6788140c8bcadf7126ed93d232c14b3f0a233c7d8645dd7c0581d8ade6b9efdc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf56c2b72b67a1b68b6d10b7217bbd1d
SHA141a07d6428d6818c9c5669f473c93975a02a4797
SHA25692da1db4396e22b935dbc867c5a5afb841faac04c03119351ce3b9b1159ce215
SHA51274ab97d7a8ae1df739b3d3ba2a0e050c0ce0446c3c739429d9067eb18c5ad3773d6c152d52a52a19d491c1979254cd4eff1377e3e1234b6b7b8a740ee21097a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f3d5440b1b204cffe0b2c36ade70628
SHA113112eefc6722a4cc9735c8ee73168fc54a64b26
SHA256c3ce2c25c7389c32569e45aa1203d35480db2ebe62a302158040730af01166d4
SHA512ddebd621192155405491c35f41b9f4eac10cc538a4f40d8a08428ac77bc328e992a2ba44834c8bea2c3d2b94e229792b9efd8d29cdcf048ee011896cedfe0a24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575215f1d6cc50c2127a74194f7f1dc3b
SHA10520e963682d4d9aed9fa03f42db3cc416da97ed
SHA25606a2b9886d9463ed680290d3f17035a42c204cd0c5904da48ac0c4fe37738521
SHA51204ea3c5cf23a35e46a62f4e516c07c8946f41af61444eacc34f6a999eb0bfa26d7eb1a0b76f7216f3ed94c213706ef8c01d4197f65850c21fd7228eed62cd2b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e9c5a1e5fc8c835758c5b6886c05ee7
SHA16b0b4713b29f02d4c296d7fec2ab114b2c729ff5
SHA256f870e98a6e419aeb8719ab3c8498f5dd87ac93f6f6d08004ec84ff7275d353fe
SHA512559894f44c56cc1f0d353df5c272bfc9d996e88eb0ac71b8804205e3c7818bb25518c5d11db3b3e69d4e604e9122619b3f16f6ff3a1329acad07fa0d30047896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56779dcc2159e2b0bbc77deba8171ebf6
SHA1b1308ecf0989daa30ca680ce90c9e36c4160c996
SHA25693b13dcb3c986684676015baaa172e7330fb4f5237ff5f7a5c2a0c63ba54f5d0
SHA512edb4c0a89b1dc3930cc8564210406b313b3d20223a6b0222a118d0bc39e7975e1213669bc18a24126a237901a05fae12664ef3983f29f22030994e5e50a1b76f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9db859b97b0a06cb7ac54ed2881349f
SHA1e1ced9dd2d852046ae64bf8754caacaa054248d9
SHA256b273c64744f8c0f7ed0bf008307e13e3602707eb5c21b335c1213736787ce66e
SHA5124d1fe36c018f51d90ad5263f9e953b1fd8448a404d2be9be6daba11df781ab178d1898a29494c1d28fe31f84aae55768cfdfc32930f65ca94462addcf2c36b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1c835baac622b3047362c7943e24c8c
SHA13fe05d9874234aa74b9bb6deadef0e408ba40bc6
SHA2560f83cfd26fa1cd0a032c098f3ebc003f5c0adaca719bd18ecd2651abec24d1a1
SHA512510cc308e4f71c37aa26ecabd1de8d435593eb849a87f94b3878e10f79f827b2e6d2801ec5b32287a7da8e35c9d6dfa815a4526a24cb7e59d063c7621fe48f4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d358de6b3041a66f111ae7b42670676
SHA157fdfb4b4623f6b516a5d4530ef6fe53e06d98f8
SHA25617724cb27f0ff1cd7afb47faba4ebfadf6bc074dce74574f84fd0731f42cb4e9
SHA51223b39866cff67db2e8876f7636555cf3b0080a9bda84f1620d58dde2562b9cc914299f0faf6ddedff7aed89763edbcf8832fed1988fd024347b47e69aca76fcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598e1a7d80db9fe4b601415d86046b4b6
SHA1867eaeca0b7f9ca6e159186adedace55b7267e87
SHA2562a512b011b8582345d774b45256a5ad9bfca34c233e398f0bf23baa5b79b6906
SHA512738b6ae88dd3c091693e7b0d42770a823e2c2501daa9599a7d3c97c594c764d204ffd299175119712c8245f8f1e5de9a39f9c43c84b60690e60ad07f720b97c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582fcbb4854dd816789205aad2b62341b
SHA1af5868c042a41be9c0ec5bc4e9b3d26400c253a8
SHA256ff055dccc4b932330890f9aac098466e3caede5cc2f53f24c0bb1d3b12a5f99d
SHA51244c9f6380da817cd6b741e1d11ee23914c869f1448d6c01dff6f6a56e1579ba4cc981366a0ec1b6113ff00a278e93753d4f9e5b335bff32fc7b01e9ae04f7aea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffca6cf5417ec4f9eea086b933a3955b
SHA1d058231ce8c5e1583c3360a7f9ce91de05ee2940
SHA256d53d7ad8725ae708b715faaaace6010d03c8991614361575ee9bc7767da31c7b
SHA512576b29b0d4553525f572d298e15c8b40be63614f3e1645e2cec790d9e8162133d6ca14d49ac5727c7c2ee85a658f71d2d9658ec5656266ac02495463fd872786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502e41f7f3b795c8a9f8a82312ba47eb8
SHA1a8c4e917ebe6fa465b8b588b1a2c4db7bc491974
SHA2563baefa18fc18a318a7d54d5eed96411a1d779bff3caed31e540b5a6933c80502
SHA512682cc67c63b46aff5590c992400120306eb1f158b67fd59bb0de6ea7993e9d2de45bd512ac6e133cce3bc7ed4c335412344e04d1ccf2876feecc479795b56cf3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b