Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 20:14
Static task
static1
Behavioral task
behavioral1
Sample
db246fd7e200554ba0b6b5f077cef311_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db246fd7e200554ba0b6b5f077cef311_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db246fd7e200554ba0b6b5f077cef311_JaffaCakes118.html
-
Size
460KB
-
MD5
db246fd7e200554ba0b6b5f077cef311
-
SHA1
5b2a7ad12ba5da4a85eb9fdff0c2bda508244026
-
SHA256
b72a45ac46cfdf38c3149b0573bcbf1d8d908d355ba23f3048a0c2714ff3dc6f
-
SHA512
5ba42e57c525ec8c1991a51ef274a2e6bb7e470b8fb77b478e33d6acf59efa38296e434f739cf3df3b1364cbb5648dbc1bd32d08954deabf963376dd9719b3d1
-
SSDEEP
6144:SKsMYod+X3oI+Yt3sMYod+X3oI+YrsMYod+X3oI+YLsMYod+X3oI+YQ:n5d+X335d+X3l5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432247535" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000008c10af5a2666f226d467f691fe01e54e23f68afd3b68c2839087137e07c9cc0c000000000e80000000020000200000002b2511e4767851a3b7cef9e23a8e74c1f88b8ffabceb719ea48d4dba29c3d30e20000000b10d5c1c238ca3c8bdeccc5faa70d9e77fb1df1f1153833b5256c74e91d8d65b400000009d9bc543d0a699ed95eef9877f8665241c184fbe728aa29adb781e4d9542c312bc6f5946901867b9b9ab8e292c4472f60a011107d40db89c0ee338a6eead99f8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{729FFF81-707A-11EF-999E-E67A421F41DB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5012444b8704db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3040 iexplore.exe 3040 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2772 3040 iexplore.exe 31 PID 3040 wrote to memory of 2772 3040 iexplore.exe 31 PID 3040 wrote to memory of 2772 3040 iexplore.exe 31 PID 3040 wrote to memory of 2772 3040 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db246fd7e200554ba0b6b5f077cef311_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52709bde32e93c8d539c8476dfbd76493
SHA1d06286849412cca8d4d0d72fc51f81fc7838d6af
SHA256ace6f172d54bc649c089ccb6aecfd9853793c6240ccc8b8ad53aaa45e107ef4f
SHA512e29b1c9c018d89227edfb4de11d10f8e0e008bbe9064f12092269bf058fd7870856f8fbf649a1874bdf6b8ad22f3ab1a6bdc131ff52f54877c259b7e4d8d4e89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e10ca7f7ceaea5df9771ae8d0e31b54f
SHA17e3ae540d3a192c31fc8f8a666294720067091ae
SHA2563cf46efd0e4c1b9492bc7ddce3b9d0a544589a71fce3ccf4988c46e1852cb312
SHA512bb2a7ad86760623d523aa973121de6b107674131d74f42a7f7c8653e227535d3e9b4acc7e6c7aad83caa0f13a3c6b89abfdcfe837fb3f76784e485e0574ff062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc4c26bc1c23c0ef2303e9c076c9fd17
SHA1042873a276799f00935682b6217bc0810b913100
SHA256076d81a35dbf55466faa5a33dd48102725cbf92517ed016410e5027a55c4adc9
SHA5127a2d06c2c8ea7745514565640ab86a260df83212d12bc480d290bcae60911f8301b3a404a6d664f296bfca19ceaef0c1263a61430947a483d111f6ee64d87f42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530e864fcdbb635085adfb3f36cb5f57e
SHA176183261dcce584a709268d1260d407faf56688b
SHA256e26cf7300562d22f77a5b2cdb76c783e882f75fcf1cb7e0c5e9ab20e9f5f7a67
SHA512f933e382843a948ce4aef4c10a1eed28d17718235c439a543538bc424cb3debee0cf57dbdfe9e4d4278b2e9f7c5dea206d7b24be4a9f4c6766524a685dc4af5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a6798875b1d666badb63d7df17c774e
SHA11aef3f91fa6b984d1fcec3018d8a8610c1e7431a
SHA25611b431cb53d48967a68a0e2130d1ea95b79092576f289438eb3fdfa81f016c93
SHA51219fbc3f8d2a35f10cb65fd8974830ff7da54827c53ff3c50ec73300960079f31142f34703c7e98b3c0eaaa5113a48794efef6a83d3148d6d3cad6f2d839aedec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edab222f53576fb914d2205e4f70aa32
SHA16d2950a8f938408f3dd25776d8c25e1ced14d7cf
SHA256e3907ce6d290df2dcf2162cd2ec48caa6737fb180b27dcd14faf7b8f027a2cc8
SHA5128d1f97f7ffd97e88a3003764ba664d91a440c2dbd1c84423a4cc3ca05e7a178253d9ab684cb856c4a125e853d5abc12317aa5cb378f74d45a6918b14057f2599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534bb19a478998b9f598bfd9562e466a6
SHA1a5ef3451358d3fef0eabe252f8b5ebc48ab6911a
SHA2560cbebf2c8def26a0a377c6425bef0de0bc00244b7e6c27ab129611f56c81f72e
SHA5122e66bc5c4bb86f49be4d9414a5da625dde4f8c5f93956e0e58104c259276a840ac8a89526cd6455f3f452235628b184269d47a336db174cba5cf571f3c31220b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59501c7047d164b73548d428e55a438d3
SHA106b7938ff1bdff81ce9076194cfd954a21b8b512
SHA256c6f3a452cdb4bce6d7a88437373c187e731638cc40164264b7cb14dda90e84aa
SHA5128c4c3ee1a939b2cfd67a0e657b264c46e28b4f676aee28558ff4a4f0702580863b911c9a7fea32a0898d568534f926e9ad683999f67d704bb7dc60440e2998d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5758e233502d0d6c1074d4480042b28e5
SHA12464b185d9a1a93a0662cbbf4ade2b70917a842b
SHA256f3535c5fa2000250f83efe67218c944910854a274a12f5016ec053e1ac24b2b9
SHA5124ed2e13ec2173da85b6134341235db25f9b3d3cea618e188e0a8e50308df751717334c552222afadb7791f2bb3dfebf55467607e59eb5e502fc061880c6e3843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c73ecb50d4ce47166acd7dedc1aa6d8
SHA1dfa31b20d2270a0b427e83d10e72a6a7905431f0
SHA256bab42739df2adeceb4d6b92be9b2920fdd482414810df2a8ea7b10ea948a6188
SHA51294fddcdb73fe68888d780b1026175410fcd2e7b101c1e0b23560b97924133da1f96dd5162e4f319812eb2bb3b159fb95b86eb745197f7d3e8fa5bc8afc7fd274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fa484a80aa0c1be08d78cf124301e92
SHA1c98fff63f24a443dfdb08703764b5f8dd515eaf1
SHA25654da02febc39424504a99fd7c517d7d1efc7b5e3c4552b2bf4888841334a4a18
SHA51233ba72a287d234a3e2f69d64dc37b6a065da24777d3eeba2b71df4f71f576bc108fabe37a44f9be4d03da9a9a68402524c187dbff7a992a8a27cd777021eeaa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf9af185f3224cfb5d637b892ce0123d
SHA1c863d80a129e3fae499b6802f0339e18ec1ae91b
SHA256d6fc74ff3b4d8b357d9d6d7744268fb27fc4a6d1f6b0ab0539380aa1ab261852
SHA512fad70c5e35fb19828200223251015aa26d1202e7cad18bc30e6b3339e3da710a998afcc9d5a6f9b94e33738534c0fc6a6f1f7acc3ec4ff8840c6ea67f550adc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503f8a45fa81ebc49b60f5784eb49f68a
SHA1c22f943503af76a034668e218f99cd343679c34a
SHA25669aa990ec8b821d9bb3aca43b57417e917b7219c7b23d866473a385a26c63897
SHA5126bebeeeb2a4f98bf5a5a140008205ea18fa0e407dc617d749ac5adf40a06b88ebbc0e288221af862d2b7fc68bfae69d7b9a929e257223420b2d7c154b11c2e7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dce5979f2d7fe83476c1dfb925dd17a
SHA1f1116d113f495f318f99987421c80a36d8d2f801
SHA256696d9a7f968361d98a711e15c02cf041b0c71db3293e8851ab564e6e8b5f044f
SHA512b025f366a5a2ea27270db355df0c98566b28a5acd1c3f6bfd69c45b1a9d8c96acefc2a1952c2eb3fef6f9beed8bc8fe7b75af47eefa4757cd425bb400a5bc322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544c3ecf50e1d2f6846ecfaf1118e0b5c
SHA10dff1deaa2ca8844a367374b117789b79299b905
SHA25677e55dca7c7ee6c514c1881f73039fdff18f7358e2157addf96cb36c266db163
SHA512a01e3baa02adab15169caf7af70864368e0c9b7fedf5c922c37f99519ecb69374e5ad55c78cadbbad3ec716411e03f76b5b421bad93d4719648e3206948fa83e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8ab761795727d945541612e4a736e53
SHA1211f465df64c994500fe171df85f79d731a0bfac
SHA2569fcde82aa8701c7c4dd3ebfc8ea804d45ea1eff8664000a34d177df5ec47f77c
SHA5127c9887b9a581cdbb6e353bbbb43271f567bbc3a1f1c47a4678e751874bd3783b49e4c946353a71e8477fcb9a0ff98b18cf2f7214c0d9202b81a417b50083e997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c25d60387310a34cbe4ab74bfab4c0c4
SHA1fba19349226f87a04fce853abd8ef3c2d85f699c
SHA256f801bc4e9f116f7bd5d174812453a43d26e883bb949468a4b8eb2cffc10b64d8
SHA5128dd8bb206a399ef5340a04fef45ffb1e306d73377ef776c5541c8b542f800ef5d28dd7cbc39c908bf2ba73673e115f21b194270075a6eb0b6c3b0a0450ebd1c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9503e41d0bedc51e74f1075901e1815
SHA1b0a1d9c142098bdd04d15a5c37b41812721f46eb
SHA256160942b8cbddd33e7479861c1a5cfef25d98524c44ec44f83321ba01ea609c88
SHA512b5424518b5e758a17f0e86a93a207cfb4a41999f90a0e393200d70cc3c44c657b41942dcd67b793e4f7ffa22d723fe388a7cdeec12cd0dd713c8c921c6e2e723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510f887e5a2417a3b6bf9f17ed46da32a
SHA1a72d8aa939be4c1cd5dad2cc51a28bba4a9d7bbb
SHA2561de4cde435a17a9f62d63d7cf27ef5d21c3aa849510d1d93e41c97ef1083cfea
SHA512d886883d9efa71af7beef4371b4ef5807f9c00f5de155db7722c6ffa0ae1b6de97c045d7790cdbca5a3483a30d9e228577782579be7eaa959d8464b64be98915
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b