Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 18:20
Static task
static1
Behavioral task
behavioral1
Sample
daf4fc212d8d34560f56d1b5333a40c2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
daf4fc212d8d34560f56d1b5333a40c2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
daf4fc212d8d34560f56d1b5333a40c2_JaffaCakes118.html
-
Size
87B
-
MD5
daf4fc212d8d34560f56d1b5333a40c2
-
SHA1
b80589bbdf48e19aa7f83273b001669b38bea515
-
SHA256
8d8ef4a7c5a025668be427b1e6f1f0713887e627f46b52c31c80ee148adbeb39
-
SHA512
d914a23e78675ba40dcaa026870c2fff7d45031e422d2d7aa78c026887d68daca955e10ad217004e9d5660a24c4f3a7ad05412652d52e9092b19452647333eb5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2063206d7704db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432240733" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000009d34bb3a7cc3a00dd0a81fcc9ae42305aa5a948dff5d28343c52c3832dba647b000000000e80000000020000200000003d884fa624c83ca0dcb2a12c06f15b336cd0d444f6877b4ea39467ffffc12328200000008b404b898226407a303dab9932a62144e5e8880b58a007070c1751246e0fb0ca4000000056d0113c7b5e906e06a8f61dc34768e2f50b9ef116a6f7781241065c20aabbe8dfea54bd0be4ff30eebf8626fb40e7e4cb33a8c91b7edd1ea62940533b5df7e4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{98BA6761-706A-11EF-856C-4E0B11BE40FD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2188 2904 iexplore.exe 30 PID 2904 wrote to memory of 2188 2904 iexplore.exe 30 PID 2904 wrote to memory of 2188 2904 iexplore.exe 30 PID 2904 wrote to memory of 2188 2904 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\daf4fc212d8d34560f56d1b5333a40c2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5383ba3dc0cd51ebd16db0f33d2463592
SHA1f149286fedaf85f7c12697bd86d267df09727ff0
SHA2560133b395b08e1ab9efdfdaf533572036e6ab3e99b3275358f13a337ee28acd87
SHA5121f13831895234d811fb094d55a92cefb7778b5c32791008225ea608a0d4fed6f76c63205d6549e97e55c87b50a92c31b6359960929e274cf64f0e61071fc95f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5264e63772555ab36b03fc6f2a8ecc778
SHA1de9c2a85694a42a6aa29556806077440305800ee
SHA25682a8ce05a78143e5f47b15738631413f58433cf4913f414ab4b9dfad505b4c76
SHA512900cd68cdbf24983ea3a9f6cfe505b82bf993231800e6acc6396d3904bd7d822f779153c0889a90c60bbde35faf50d09df32b4c014680ec74abb0097be4c89ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4ca7eac921c1f06cb68c772a7f3ca55
SHA19fb2c71fe97a59c5d89b30cf1e93c42879a30fd0
SHA25633a014f144d4c1f836d9e9a70c97eb714569a074461a664b3371c4215da393de
SHA5120d43280a7e5d66e5a2257e0372324992197c44aab136d25fd54f7ec8bb6b79deb615950367948fc5826c0dca96e5ef42d6465c90f1e4c27792cfbf38dfaf0be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1d31335e6ad6914c74947246892b034
SHA12036a17ceee17a7e1798bbe49628b03245a6d116
SHA2562fc72d71c88587d3ded6404bd464f490c3e657c96cb80a281baaad84f0a4ecc2
SHA512c18502e96c85a420dff6b029e687a4f8049b64711209093b4e24bfdc5ef2d4338779677124c3d48b5a2829cd79c0456e96f5e35cfe8bf327179e6f44c3bc98a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55758901ec33e1251d6b46a127c8e9f50
SHA127c874785852962f2c1358332acb14976fae60f9
SHA25632710e90f340c3e3dcae10448f9e5c82516c96de1ec344f6dab4b05ef6f12f89
SHA512cc0792286f45de225254c70f8d0c7608ce3f2cf67700d42fcfce8fd155a9c30d890cef7b8d0aded4ad80fade80647211185ab62907f954581561c5e4cc0ceb75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efdfd3a4e564cb5bf704557bbab09d63
SHA12d539e564965285060c9869605b29fdfa0574913
SHA256c167a65639747ec84a1a114eecdb0eaddecae6e3706268aa4ef6d8e1a394f147
SHA512673c5ce38c249094dd09921264c9267d536c5ce902a1cd13a728c9b2d034510ab3ca62b2ae6be699c79dd45cb3ba32b75a2463b419a4e98e24e6e0d742fa5be4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5889af950a618fa97e483522c6bac6f72
SHA157bed086d091db02629c51aab4bb6c39b6b0a349
SHA2569bd910651929b19199ffff6eceb9091fed7ed4b54c2eafdd51fb6d7536875911
SHA5126103f4acb42bb1a3cad173ca45d763e25f64b563dfe4333bb1cee9d155e12ad26c8fb6200fa4f287a7ff18e29cbf84ea201df36c1bc6997cd8548f339af6ad86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576b0022de8fe722683e6a0a25d6ef694
SHA1733541cb5f19d9859b1c0d1df70c878411f81404
SHA2568b08039544016cf691f351ed506526f174b9b911e73b9791c30102d1dfbd02d4
SHA512895fddd1bd34b53864730aa9a4fcfe611d6eec0f91eb733a4336373c49f501d097acb11724152473229fb86de1d07d4a1d0a7e3e7826f5663c6fcb6e7f4fd4e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f570949d0e24f99933ba01f4e403297
SHA1d2c697f08d3c0ecd07babca84b2b4873e044b73f
SHA25661e20ed4f5ca20595a5e728414ba897a32e4465a9549ce3b2e893721a5930c75
SHA512a84a29adffb8a12c6eb3103631fb88c28a30caf1782a9414890321c7a792dde7f922c5d5227f3d6a79eab8e477d834217b584b090a739e069937302b7873a220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f87ea10b32d23d8d6d4bbf32b2cdb833
SHA1e6ae1f8e781c7ff0252a19f31995eeed76d248d6
SHA25615871c20df1157702499838b71128f09af14ed477807415e03a24cc53fa7e658
SHA51213349abe154a17274024c3cc7f2b8d50c60ab8ebf83f4f0064bda1c66fdddd52da7548be48028b829672f420415538576e45eff7441653e17a537d6a1513b87e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59288f54fd1f5f9d5d83af0b43a5d722d
SHA1bfb18c19a7f3eb14015214c22eba49ce1d224441
SHA256cc277f8a59cb83a7a2b875ab9131d941a23d354cd339048297c53d88af884d19
SHA51207bca7ba7f2d7c6bb5c060c1d1373c1d83f8263b97aff1fad7db434a0b4e21e15e0d69ea8c42c9612b306f4d9258ed39b7d5098a2b0d4841c56b41add7d4f1bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fd885add2069e59dc2b82266ef655ba
SHA12d160afa4ce5f5e751d630d386f4f3e53dcdd1d7
SHA2569eedf549e1758d1038f1887d37284c76382189b3d6e4965040c5611cb4ccd917
SHA51214e4563db0ba5624f9f6e3cefc481ef7e04e0dff4bee604cf60f839e9c57b7ac8657ada5194240382b1d59c800165a940efb2d6ccc828754dad4200b8724d112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5424f69aece1be4f4aaea1fc3b8d91e4d
SHA1de364905fa6c1d664370f3f6cee6518a44e07da7
SHA25649685d87e53e12288d3a286d4df9d63fe3df98cb03ec3f3aeecc5e29f20333d9
SHA512e0196d8cb889ff5681e7e1a8d6715bd79d5f26b09fe1108d2920d0ef127cb1220d996c7cac20b5ca1a23faa22eb17a5a17cfa7eed8b6c58f77fd13e77d5fa587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569023df729cbf36fc750166fd9a4af83
SHA125a0aad7e9162c11e01fd88cd3af69b5d6ebd39d
SHA25665a822db9e6d15f27076376bbba6071ea3b2e7ace2fd9775597cf3a8c06e4097
SHA512ba3a09a3a91f84e3a92fb5c341247a0dcd5d92674496de4f355d2695f755ec647cc43316c67cec4444926c9f3453b2f2171c69c0df97158ec1873669568795b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539ae1a734e51b43b48143d668e3ef99e
SHA1ea60705027ee5342e83930bfb03c7c241d68593c
SHA2568115a8984425663ea70a9f6b4993b88e6e67b364d0b93009ac1db5294aeccf46
SHA5126da48c3946b934a6070438c539454d29593bb00cc36387d962acd1a74cafa910cac4410e7532f52b7f38e5b12fc649c7dc561574757ab83afa8d25ce97bcf3a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6d4ace62087ce7511ce109b7e8dc588
SHA19ff20dbb3fc828db21272b369240a953c04b3246
SHA2564736fe48e898508b1528729e414b2d5015d3efad62159f67172f53ce9d857061
SHA5128a1850f252b9928c675dafba36449adf98e05d99c1ddce7d8c4218500fee5abbe93982453d2bbacd5c52a75ef66a01f5e6593fdf147976497050b4fc6672cb6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e547b11515981eac87d7d2e23d5e23e7
SHA150b8017a1fbae81386814537036b96e2dc7ee0b0
SHA2569800c1b27365b21be998029530bc54ff5566c0af8588c05c9cb2fffa2a76f373
SHA512d52023a6f6ce181465143a03e2ed8e12faf61c39bd15ca06d0895bb3a5d6aed31f565584df74a3e6e95517d04021c575c7562e487bef58af4f19ce31af4121ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5571dc3f1edb5d4fd2af925ef7920981f
SHA1e653d8efbb780864bc007424cf137776e93f7d18
SHA256e53bc15c1954ba19f70b68862fa1ac5eda63bdf4af91bf1c5b201dc04c621935
SHA512d97b9d1e6a0fb4083e3651941d708aa016aeee5a8990aae9ce59c6bfc5f0fe01097da52d5a6fea1e02b88ccf7ff86ea3079aa464408db67c1a2f4a7484309615
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b