Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
db99e7254ffcc9224e4288eed2aebd27_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db99e7254ffcc9224e4288eed2aebd27_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db99e7254ffcc9224e4288eed2aebd27_JaffaCakes118.html
-
Size
31KB
-
MD5
db99e7254ffcc9224e4288eed2aebd27
-
SHA1
40d8e4e4b711f6348976c56166306d01ce46c676
-
SHA256
f067458963e02cb9d249fac9c85f4ab9f05ce50daa5862a6a641156583eeb2f1
-
SHA512
32d31e6f3966a3ba5f20a9f99fed9c572c04ee784452dbd2d533070357d0623151f2b7da2361af32005c363850375e504d5b6146f42af5e95647623429fc0e12
-
SSDEEP
384:AEr8PV6Nc1XBf1cX/DUXiPJM+pP32Pfa8CUI+EisGoGDeUoMFDSwawIwTve4bdbT:AEr8PVz1cbR2PC8CUI+EyedMF59qg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432267466" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2061beb0b504db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000000c835b8e94fdd640c0c486b686430841016d7953d7d6cbd221af831151d7bc81000000000e8000000002000020000000045bb81e8be3fb5d0bef6c31adce647f1952d06ee201be454e4ddc443091832920000000d36123aeb173146f097fa3dd405668a5bc27bf134eaf5e8e8c43c77ba59f798240000000a7d6781d8bd4386b4912af3464eecf2b298d5fff4c657e988ca07b98c56515fccc1f32873557baa1f38f243f60567fc6cda664ec01475610cf99b026d7f60dc7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D9D442F1-70A8-11EF-B12A-E61828AB23DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1956 iexplore.exe 1956 iexplore.exe 496 IEXPLORE.EXE 496 IEXPLORE.EXE 496 IEXPLORE.EXE 496 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 496 1956 iexplore.exe 30 PID 1956 wrote to memory of 496 1956 iexplore.exe 30 PID 1956 wrote to memory of 496 1956 iexplore.exe 30 PID 1956 wrote to memory of 496 1956 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db99e7254ffcc9224e4288eed2aebd27_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57228c66e2935f3c1019db7571ce29878
SHA110a3efa08317767ab05ed720e1677ea56935dcba
SHA2561684eeccc404596882eb81fcf6133212e1c04ef4ee5b9a3e19b500ec5a42e2ed
SHA512b3eb56222aa9e6501fbaffeb053e89f0295783b9ba68bafbf65386d8d98063941b8fcdec748c1207fae29d6e8bba9d01d8f7aef3966ec419d33d92a432dbb6cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54105646c284f7459680ef4b9cfde0f62
SHA1c526c2ef3aa87d15876ef4243f4b841f0632d376
SHA256304666919647a5302157f8289527ca26c20cfc8664424290ddf93a9b33649329
SHA512db9ec4fc0aead2ad961542278ced36d9ab414941ac98fe50409e2c1a1ea5feef583adb1b59b1532f38b4d19a720b07a9d337e329a0feae19fb414429b01e8104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e349644f47bff27a51e3c03203d825c
SHA1157fa3a939096b5475738b39d8b6aa2bfa4fbecb
SHA256715ba1a66f05a9b997bed9174265e441da16a54847b46374c39607f9006e35c5
SHA5124e8201c715dd4c27fd9b47fe8258959cc1ad1ef37a50e3eed355a588e96e14b8aa09751ad20b541396262d38b93815f50ea9b60f21df012429d1efa1104422f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5346ddfeb8dfa072e74af402fc955b785
SHA1cc937cde5033d4b31006724e1ff7f66b7e6935f0
SHA2562c9637fec24b31c1d3bc6b9077f86d38651e55853f414af31ba5431d1590393e
SHA51279601aa7f084b869db0a4533feafecd9453341f8b8ca3f6406bf89b3e54c7037ebb5ed3d1fa839201de64c4e5d5c22f78e63f92b6f88fc7c7670d275c7a214f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57abb877961ae3c86eef51d2cd4740edd
SHA1cb327b5d57dc493183a0d54732a771a92816b4a5
SHA25605e9f29972388acfb07971761478777e8a644efb957a00c867a003c87179cc05
SHA512ec8b1341b0ffb015b9073a6b29124df337e66ed064fb80e6a9fffb8bb280810f4ca1bc32650de20c9292a37e7c7b034250165da7080eb3d716310fe569b3166b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54786cc4a5d2a115a54c4f49f19892c85
SHA1aefbabc633f2469a413885f0a58bfcf0780ba367
SHA2564bcb5856bb4129ed3fe522b5c9edbb1e56dd7a3f8cf746af422d915f5f9694d8
SHA5126d425cf74eb2f5be259801445862f91675e3503d143243508cd3e9cfb2f89b5942fcf5ef0f573a4591b48227113cb8c73783f6e7205fd5f0bd62a0bb81e3b10b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d1d7dac14bc3578cbcb776ab76699ed
SHA1d2bb90c5bda50eb5edcbc9915cad754061d5dfbb
SHA2560198a01f97a9cfeb78bffaafe08e5bda99a430a7bcfbcab0c10deea7263b5591
SHA512e389aaeb0193de5c4681fe68a6e5df68897738c07ec071dd26c4ffd2e91f3abdbecc95c73f6e49ceaf6e6a835fa510423f3041883a51ffb725e2598bc334ef21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b26eade9a62326c788b8b2daa5da8502
SHA11b92542eb86195c1502989d93f66b8f8edebca0d
SHA2563f423a71f475648a734a4a8a1c3518d24e3ed55cbb78b9e83bbfeb36dc370a6f
SHA51213b66e6f3a749aaf750e14e15570d61162f812a96d2be3859b0f162ca4419136fedb46deaf22cbfe7dfe7888d19f1d63335698fe6b1994a7b39995601f686e6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511fa65ec092b0cb8bc5d360f2a5e0ebf
SHA1bfb1582998859992525ad286232426710c5e0d62
SHA256111c4d128a4e38b6bad7acb0d06b568b2f5e9e3cee6df51e70dc847dfbbf93c4
SHA5129770dbd56295eb736e96970a59a23451e2b2e59057730438972fa899062ba27c3538d835c6c7ba237644cac6312e848470600536b3fc4f7c58aa8bb6c837f31f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0207240cda791e4b9043c4cc5bc8d6a
SHA10fbf24488c98abf297a612b8d5398aaa44995a29
SHA2568682413cd62eea00daceb0d6942f12f0d70963899e75fc6786265c9f983316d1
SHA5120b6481b8752633b1bc15dea8392f19a525f00b455d9e53663ca143cb8a10f19612bc008ac7f79fa4c0b2eed25015304e8726506df821bf067a21de3012251993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2e7a7089a01865600b832986e669069
SHA110466b9b086ee2a35878a760812190e58a44afea
SHA256477ef8fdb43fc6f603e6c09f034c4ae50d9fc95f300ec5fbdd21fb2764e7c471
SHA5129c5a58401b3e3ecb14f696dcb35fc382fd44a2b62e94c844d907f409ddace87ad045cc875cf9100d3fc25f5baee66b586f9cba643db9f764418a810b94a8eaa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4911520508d6bf172de55f74db46b4a
SHA16822a0c4ced460f5a8658c935731ec4f0bf77a19
SHA2567c2c0038b65115a106c6523f0e4ba7c9834e31bf7dff973a890623c12766ddbf
SHA512a67dfdb1a653b2cb10a51bc214622db294dcb0c723a99f1a5d7226414494a8f3b43b1edd53f866b1e1eedb38f261de6cc29e64d7261955965c1f86167d679db4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba090fc4e082a3dd990e5810aa4d12c8
SHA1e7b0e18bbc205cc2ccd0dc2a628ce00c0c7b58fd
SHA2563e8948fe155cef5f1c2a2be4bcfb9d4ef601011ec3469c50d2bd37d3fe999d73
SHA5120b4ef87ca5a48cbe2e10381589d33ba41970e07a5b6d92b7f5564fb4c97db0d597960795bfe027c0ba58dff741654569d6f4f60853b0ac3db1cb6644c1792dcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5699f8323eb48229d253a6a91eef6a1ed
SHA1744b2629e5739670181df01ed19dc9e05057e8db
SHA2567ac583758d6f5f80d8d723ac0bdefaf67abbfc8564b4ef83f02edd76db0a0d4d
SHA5126c3f5bf0defc43535b244a08b949ba186a2d8c82dfbe490d26f857481ac215fd62f75f7f69ccec22efeb099b952e62a79a1483141bad21fe9b0aae324d38a472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5504713c8a2efaebd659de156f81b8ca1
SHA11dad9865fa509e8f0e511de3e36d2a0d8e6b8749
SHA256fe4ad666bb53dc63f7219abf08364b1a92827d7ff8c33e07127ad0adb88cede8
SHA5127ef81ae77a4a0e5f3b76c64d28a3b03008ee53a25d9377dec075a135f4df9c47231f0afefe76e6a117f770d00a3e584d8d063a8d6b19b5321bbca736f09d7f51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53af38be0ae57f8b092fcc66b17f975aa
SHA192ec1f94b7774327a3ed1b945be7bd3cb6897309
SHA256526c28b5c5b2a156e0610bd6322778b2229ac63d1ac8d7398963d0bd0591ca4c
SHA51219123bb1cb9e1edd5f718037357e87236ea31f1730a41518033f9968f91379ccac3fca411b24add4253cfba4f8ff75f869a4a6326513a26152f1fb7563c5bead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6f3c50ea58eaa02ff44f858c738badb
SHA157c66d36eac2cbf7e82d391f1b62b7b29873f053
SHA2561aad709066727270a6904d9afc3fe5df2d18711f68b5f14bf28e76897293e95a
SHA512173840a389f632bd501233432385e2aee37c2e4243cd32055808d6baabfb0228d39a65614cc0d7572561c7cadaef5746870d841f4e70b4dae24bef9524a7041a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2eeedd1d5eaa2f5a0bbe47f6b666a86
SHA18c62f53d2b04346730653c744c2e58fabb3f67c4
SHA256fdf941ac90858561a7af2845a8f553b507f91c893533fe85eed398c59fd0caf2
SHA5127f634e27e9febdc3c543c8d5747c1561597885f9fbc973e9b440fa825d88f1757b5c15896912579aa8901e64508dec1d3036f0a4c948259ca4cbe018ba4fa1fa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b