Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
dca2ee892acc98af58bd3bd4f5081f26_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dca2ee892acc98af58bd3bd4f5081f26_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dca2ee892acc98af58bd3bd4f5081f26_JaffaCakes118.html
-
Size
3KB
-
MD5
dca2ee892acc98af58bd3bd4f5081f26
-
SHA1
9490b35d9477a6c9b17a73fd6995dc5ca24544f2
-
SHA256
214fb4975577a473e423dabfb9aa5c12f1fd073ad5f21533fe539e35d69cd651
-
SHA512
5aeec877a5bbdcb0040500820ed3dc15fb2abe6aab3d266f6a01ce20b090ea6e5221fa456191fa60f51ca1a02afd70db1e3e3a714330bf0afab8661e1351d16b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432321357" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000040030d44a866274c8edd5b9ad09e8ee912437914f68a68a5919a88be2292c1b1000000000e80000000020000200000002bd127035340d542b338d91a6cd53ba0b33792d1ee310d532828cd1f9ada3057200000003a7952276cbfea17f111b2509b2fd125da7101b97e9a901b4e3f0e5b868ba1ae40000000ef2d426fda8b8b5ae40ca85826271906fb5c88e89dcddda3bfc92a51f1a6f7202600cd7dd8c29f099fb965012021c6e225b4a8b82dc419ef5fe018551793449c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5357C661-7126-11EF-93A0-E2BC28E7E786} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80a19f293305db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3004 iexplore.exe 3004 iexplore.exe 1240 IEXPLORE.EXE 1240 IEXPLORE.EXE 1240 IEXPLORE.EXE 1240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3004 wrote to memory of 1240 3004 iexplore.exe 31 PID 3004 wrote to memory of 1240 3004 iexplore.exe 31 PID 3004 wrote to memory of 1240 3004 iexplore.exe 31 PID 3004 wrote to memory of 1240 3004 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dca2ee892acc98af58bd3bd4f5081f26_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3004 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509ea3fc880f3092bf149beb871aa8dd9
SHA13ae8064ea18402af7178a3a42bc73db1445d3701
SHA25671b7c9ec34f24e9ed404b641f5774d802c1dc5bef9ef7a324cfae2438eed268b
SHA512e0cbb8941c92caabf645a2fc00aca5cdf42ffaf7390ed4d7f351a4ccbd0765629dbd46e31ea5b1b23b53d2b2bbadc8d9c6c65f7b75387b7408dde24be5b92792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bea2360a6498788f39e8535a2be2584
SHA1437c3b774987886cdd4bfedf1e8df5e5737e6908
SHA25673243c29f9f6c831fd5a4cf1593d51015c6f1284a869a053a44f0b78c37d5a06
SHA512e9ef96c49079c3983b7554a20189e0f8debc506d1fc4648c5ad7311a1f0bc26465cb6d3ea32bce0d4dd69ed87101f78300d556823a811566bebcf6c35301d885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b44f71c204ce343554f0898bb5d42be
SHA1bd45e0c6a41c819ef17a91f0d07f82394a86974f
SHA2564b080c39c078c3ba5cdec0e257e0d16c7de91fea3ed66ee8b1a1c8a01fabfd5b
SHA5123654613b1ed4e7460a7a5e69610de1a731319c5e0cef4819baa370c81bd2cecabb151497bb9ac00e8d9ebb4803c6c46ddb803d63e7be9a2c51a1170e87f1a91b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c268090e848382b71a95853698a65743
SHA10115c0bda50a0b9958ba73201e4f2d2468fe80a3
SHA256eaf8130e16952bb52f8dd4c507a6b6d832b358108a8c9b4a63160c047af0a7a5
SHA512d6fdebc040d82451f9574b0c46ac4839e5995adfb1bba6294993f93e70482bd8be4294d78123a31d34d4f256993f4b839904f6bcf86f752caf5b31bfbe527027
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea84ae97c7a636108ffd5439d2e8b43e
SHA1e6ed4434310cdc3b3d04fabc69c843e68a37c1e4
SHA256b91ce8bac270b95d54ae428f500e0d0bcb497a075b3e8f5b77304d80386cc00e
SHA5122c6386e0fe4bd0876997b46743bf705307486e0eded363d4d14ae15271e0bdf50cd763072888687405e7b101eea0fb9d42ab74eaa7e9b17349c1ed07426e4e42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b7bf3af0f766ed64fe73733e1f97932
SHA1eb8e619752eb320d8172309789821414922b8e32
SHA256cf20a79c004a132411ee8aa6e99983bf0508f48a32b296bcfd1b5440c07298a5
SHA512fd86c587e61d70b16e377db3284c89514359a78485d1a7122be800bdf5c7c8a94be576d80d397fa8d1b23918bae43033fc6bcc3a0cf1f751ae5e6e574b9f0b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5323ee30c0465589de2d925edbb21cbe7
SHA1fedf9050f8c14f740605a25eb0edb23fb522a5e4
SHA256b1f6b4e0870d5c57485faeb4aabaa88e882508370e8102c9246ba0f1855e2000
SHA5125cfcd0c2f3aa1e2d632da79f79e15f0a8409e8d64ea89ea9c962caee39a8ce28de7e5876fff51b362ea12e08362138fbed62f6a88c784b509eca199fde989c43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f9089a8f38a528b3510900812634545
SHA19f6aa70d791808be985e01f55797179292a5af7d
SHA256c78610fa06eb32a7268e65d7cbb3c17f4493c415aa261605d74b17214e8109ab
SHA51219d0ef590fbd539c2b12939312af2bdf4a93b5eeed19ffbe92e30f83020463ddd8747d9eaeb840dcad55f54b6513ecb814255a5f883778750ab692bcfc37b68d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544a6db1fc039df5aefdc5e33682c50c1
SHA17063875cd07d3e0e4f504cc28c5da064ace5c419
SHA2568f18537f45adc255db18a6251bc753a5bf917149c68d887fa1250cfa10bde547
SHA512bb43359649869d7cb5689bf68eb173b9576032d759d16ad5955581c3afa33a093775c2cc1af48f56aff61015e05350b78bdddb092cabe2fb5c86d403c5097dd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59258c39ff1c7b605ce19d9b0d63993f5
SHA1c1a340a214c8a23ca564e065ca033b54da2c7cbc
SHA256e21122e7a6590d3a3046190f63b21770d39763d3ba2aa2db84f0cef4070dfb1e
SHA5124908360e0169f73e57643ca429cee903867df998565517f082feda322db9cb9872e859994ff79bc1de2ce3a8ec920497a8d46d4c4755f7f9d92cc23cd23e309e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501466b9044134bf700aa80d0d962753d
SHA1070206d367db37e8cc6d26ba9422d590f07c0fda
SHA2568977c02c0a5f48f88cf720f2f9f3055b017787166d0c9652f5e75fcf2918bbe3
SHA5124aa7089620c2dab9bdefece70a02ef0926f31d850d280f4d99bb725d148af5262fd688e38be4d7db2ad40ce87df6dd6d26f7337b186ecffdc885f76ce64ee9d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f01a0e3482d2c3ac90b3c3d67c6d557a
SHA1a8e5cd03a4912570424479a552cdd24da701268a
SHA256abf59ddddc57b2df147b2f4784e4df51045b8cec0e6ea1553674c0afaa506f10
SHA51222183d8d1f64823678fcbcd51603e941eb1fa46e0f9f48993900194479277ecd0081baa3cec274e2873f8c20065379412d2bd606168da9c1c21923eee546db43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585d2edfbeae783835dae62a3a8d10093
SHA10d94a8f4f871cc66f3eea5d10b04ffea75a023ae
SHA256c04697b1ecb48e5386c50e3b8b4d83305d449c735e758d32d42351f064889ea3
SHA5122b53f69e72b7bc4c9b0400888cd99331de244576647f932d3fd0343f88451f8f307b013bc27160693a5e8576cb0ac3250472f146e0200c30ea3db6df0eb686d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557ba6c532b7f84d9aec42fea769b9d33
SHA16d3ffdd49ebd4aeafc5583d0a9f455917e3bdb86
SHA256ca6158a6c3fb7728e0c40516ebbf119996c416a01f50e07c51be226924c81a45
SHA5126029bc2ed542e71f6207f37f99dd2b384b9c59ef75cae8366d3696f09bc304a891dd46d371cf8a1f66f78ea7b0e5dacd9aba4265afff03a5df2ad4d6da26bef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500f507da881a206057ff2c3939fb71e1
SHA1c72b08c21240c18e4ecb66b537c4e5bcde350d7c
SHA2569c52e5ce28531266fc08f3dca2d69094604f00ca15a6ed1e4536d40c29159459
SHA512ec7ad4ec2355d0ee38454672ddf69f628d1023f7cffae213c2ea281cb07a1abbf44d09bdd7076eae122cf933481607c36ac4e912a0d5fecba1d169f61f827db7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545ee0cc4de00d34457264859c5dd08e9
SHA184db7c82e834cc8c27cc0ee08151a725596a650d
SHA256c7a3585d2e887d2d6c1f11a8f0b3f2a0dae1e80fab1f7bed0a4f4dcc10632170
SHA512fd13737e6d2c576d3eacb8ef4a8f4bd573ca5f225241d067497b1550093636ba0c9c4dbbde86eb80bb80ce2dea11e98e105acf3180c5eeed227d76bf932ecb6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3070ea6cf739f2a32ae9c25d845d8ec
SHA18a303ca50cb95515e2ee961bc719817de3d1dd55
SHA256e13f8f109c81feac59cc85d22be074a62dce4bb4de52438776af4c3c60444346
SHA5121dea6269226ed3ca785e4540bdc2b8315352931298172072a6a9ddabba37dc82235e57b4b0737b895bf6bb98c8f07598317ac31c4b548882aaa75b922dc4e32f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521f08049b1d827146fe99dbcdd346ffd
SHA14e5d162f6f30fb33949efd83bb5b8e78581efef9
SHA2563909130da91997dd8185671815f09456911e0267ecf0e4e7e5113310bf9807b0
SHA5120350726c2828e86d1e444d5abd80345423e805c0000358110090acfb99d63ec961a7990142ac583947772b42adfa30ebaaf9386289327e81124f8c10a162a7fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514d6bfff5fa9301ef7b45d46479a54e6
SHA13aefe6feca700b975f239b75b1d6169bab8102da
SHA256160d312d2183356dead5749fc58f879d34b7b89ab2ca5e40ef917aafafed159f
SHA512991091fb4aee5d2474f291ced68b42d5e76f6f7ee9c44a9df306965ef521f0330fb2d12251cb8a1053cdd03abd71a1113e2dfeb4c5b60637df548c95da28ccde
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b