Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
df1cc79449601acbbfeeb1f07b2fcffb_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
df1cc79449601acbbfeeb1f07b2fcffb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df1cc79449601acbbfeeb1f07b2fcffb_JaffaCakes118.html
-
Size
11KB
-
MD5
df1cc79449601acbbfeeb1f07b2fcffb
-
SHA1
10add8355a90c7e7599fa1e3080e3da8ea8145c6
-
SHA256
c2fce0a106097d8616d1f062022f7d4d653d4612866b3fd2461b47b2a17a5ce0
-
SHA512
982221c84500c87ff5b57bfdebf6b55cb7e1b5b49a1d3dc42e95f7a0be3d771f83701b1bb8cde4b502ab12a99674e82ec3987dccfb11230417fe46b90be17dae
-
SSDEEP
192:f5OWt99ETNI6GgDSmmLzzuhWV9Knr9nz0GVcSfe9tKNWTaoRJHWR8hSlDlblflFR:f4C9ynGqmL37VMnrF7VcSfeXvaoRJHW7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a1b12f3706db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5B119AC1-722A-11EF-B4E2-F64010A3169C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432433039" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000e1821c81057f8cd7d4b432cb82e81384178a263c26d608fad52e1534211eaaa1000000000e8000000002000020000000375dbba3bf075913a9286cde3724fca28cb9731d603028f3a4ced05e8155e0a62000000070bea1fcd40f8d7a12ea6f3716f8b94f0b932b54e8ae9f16736c04ab53f00d6a400000002440ddb66748ddba1b48afc9f0e1b5bbca84f6330be5a4ea14ef422ba445c5f0bf106ac3a05f9e8070eea6e71d655dcd3f3eded3eee2d9c84fdfa70b5f794e60 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2676 2860 iexplore.exe 31 PID 2860 wrote to memory of 2676 2860 iexplore.exe 31 PID 2860 wrote to memory of 2676 2860 iexplore.exe 31 PID 2860 wrote to memory of 2676 2860 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df1cc79449601acbbfeeb1f07b2fcffb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db3a1509ad987f68baa6d41881f66fba
SHA1e3b06a76a760fc989d714c74fd77d43c9d8a2788
SHA2564bc1ea639035ac5a70983845a9a6821d1b365fffe0688228b1fc3f3a807b313f
SHA512649dea052b411f8b2dbc447d42c0d742725f9fa549720ad504ffb3134ead29c3b42be3f9b4ebc14d022d0203c920b87cd57f061830fbfd09a8382f16ff2d8b5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adc1bce0dee40b7cce182dc4b921c073
SHA119e2bdbb29e4ead8bb98dc7f392cf23501545bc3
SHA2561472fb9eda71952402c8112c9bdb7159508bd832c5fa78708e9ad59426aced0f
SHA512a0454c6fafb69ac41068270c5e04093a4cb4c0f81ab74d5e46779441a871f458bb6358f0bfbfe634717b037c7066dd9801e10f9fde9201ead34d96caaa55c6bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59705cd02742073a6c88c6db12983898b
SHA1b91513580bb9bacc668dd9c46034213882a36dff
SHA256708670f412e316ec13c4ed7ecc16fee4601eda5925edf4f656b7ddffc110c92b
SHA5127d0c0a227a76fb0f09be5347288c66afcc4b0aa746ac90bd38f11be160de80663be5bdbb5cd46f18111598998dd687e2cadbb64589f49290f48e112e4e9d3168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f84af5b22939577bbcc16a24ad56ae1
SHA186bff976b3fb9ea1f8f4dd9b9d3895b3fe204f23
SHA2562d77c11290a490acb105ed3ee57244af8455258a6c60e023afd8c0b47afa2a62
SHA512f6a7b8522fea9a0ee745001eb09b7149a691648f997eb32fd6bcba3f5273a45ec11ad092346e8ef3e1b13c76d3bca6e49dd7a581c7fa6f20d2c8ef4b8b97a97c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e4b40c5bb00629bbfe826545698ed27
SHA13b776153dfedcfda6886b253c4fb04d4462a0634
SHA256779086721d8033350140f4583a2d46ff891627b8ad112a1b6bc92310ffc55cf6
SHA512062c601c1eaa7ab11a1a8de637595e6a45263ceb901390158a16c3ffc8ad55e8e5d44da1334a48703e9c48b9bb6ba32ae4450f3d67586819a27f907120bf7910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59007d6a8e146cc1dfdd2b9a6c9253b88
SHA1b5fdd68539b57dbea2b92c19172ae34fa5509c53
SHA256011f0be18130d80f81166808b55f065ad30288f08fdc6cf75196dd660965b377
SHA512dfadb4b579e6739227bc2e7f9991d838faf36e8c9c4321831e37db45bc3ea867e6606337fd4c160a05192e3b939cc6a261a91bb7024a0280baae122f31e881e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a875be1ef1a8d7d0b2b1edf8a2e4415
SHA1372a440572a3bb72e4826db1fa45407a60561db4
SHA2561e5b36285d5c6527b0c2b04ff2dd119579ce884d4d291e1f3cf16c8fdbfa6fa8
SHA5129e3990674d01f66b9e2d59b9702fe171dc88893bd9c262b8fbfe801b62719ffc1d5d87d62350a7d2e2ce293d22f03ca97a9926d72b881d52f6474ad6a3ebcb8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f198ba9bc0d2db0359cb845eaf48b59
SHA1d646732bfaf0fc04ea7538c834cbc7891e9297d1
SHA256289eb165eeb01f95f29ffa411f6e104e57d032f65dfc61ea6ba401529358a194
SHA512c27beace608f990ab72ba7dc94aaaad6ac1d167b84a9b9c52a8e44449897210099f3c96f164ce18120e748ada84d6e012ef88f0fb6039f2695c9cf6bdd0910cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a1022f72d4d954f1b902f3a1262309d
SHA1a691c8eae88185fcbdcc8ae45a8198f41b305ead
SHA256b1d0130244f036376b1f966e182a1141ef939d0384b21883971a6ff1d5ca44b8
SHA51245a71177dcf91e1332dbc44e0c76bbd99be32a2a6d438198f33d34d8ca9bfc7f371fb141144b92e031993cd3066bab0a197602126b1daeb52c1c7ec33e6f676a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556419faf5c29a248ed791cba1efc1816
SHA17b87c4ac08646339482fe0247e0698eca9fb290c
SHA2564ce52fe615cd697ba6d510cdc7c83624b5929f287b99340c15fadbc3880d5b36
SHA512830aafeb9758a4b322abc624efc8d3677cbf55981cf99943760030d6a30bdc25a3f23d44945ce2dc7362a8108d124c12d3a5001187b243796cce07b557aa407a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f18d559f13b05c3eb51487460dd4c28
SHA13af6019fc9aa42cfed847864d8cc5e621882685c
SHA256c7c1047a5cc051b45d202f943607d8f960f03f7073898be5d0df98bb71c136ef
SHA5123f7ff4ceec5cfca5de952e22917c1a0e66975a91cf1711c4d7c69a5424755d4cb4bfa2fe349a2a19d88923e27fedeb2e05fd4180ff94bc90bc0c31190d7788e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535d583535babb78f7ff58f90591e67f1
SHA1431ac1c79d833a082714c86b5b3e6ab4dfb449c9
SHA2561cc8492eff9302658a629be46f16b67abd5ade65ca5b9b8025b24bb871c1c35d
SHA51285253058e554671edda1a505f214c1cf79f9ef0e2de17be83237ce1cb4a363d7adcef621f3bb9e7fa3e189510fe92d1ab921316a4bd8f5699bed9ebef9f591fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3a4048a001c3d253b5afe6d2300aef6
SHA195b9535700a204187092d22fdd090f970296144b
SHA25641f45f373d20ce232bf2e0b0369e964bd52c8dae229e5d6caa76de8033d9d2da
SHA512a196d0e72b9e5070a19d7876190b38ffce5d4df5a506c83a4dac10418b62540c7cc1da1cb7ef3a49489b6d33c641a0ef96cf80c146f5cafbaae426f4ad73368b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5053d1494e7baad9455a4920f78fe01c4
SHA1a260200e0da48d58150fbf882a766eb4ddd72145
SHA256fb62b9c6cb17d00016388bbd4ca4deb20cc46bd4008369525b4c007219d10c02
SHA512999702fefe069043b2b406c8ceb700744acc80f461044781f3c40f8e7232678121d629c10d6f3a54f7d7d58d56675c7aceb2d9ea5402084cde5d9e83804382a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59def0e68bdf04592456761b83295b39a
SHA1cca1004ec3b18a98d2917aa06faeeb4735fe0949
SHA2560dc5f15548230fd4307c91eb77bae1fb042fa2f544ec7e1f23c7841ba3870b9b
SHA512aac71efeec8ff4db3c3fb1100bfe6b54d3db40d3050866ac7c14442db7e27dbfc874d42af2e8993843b29a1e966e0070a9476be7c0b84ff83661bc52274ad1af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8784cf8da372b47947b7cab752f6d2a
SHA12795157686501eb2c8c177f917e244cdd26fa3c7
SHA256b92d01083f5bdcbea5dee39fec4990027bc293267f2037df7e48318e52c08d5b
SHA5127b6586b56460141f8462262b9fd57b1676a58b5806031992c21a9905bac9c35232d3225ee21207763142408b1a4276bcc9cea697429ece66732a5c1e2bd2f518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e9bc412a42d91cd38791edbd08ba726
SHA19ce8396a6ce33123753062954d4c573f90a7b7dd
SHA2569ca9b7ee17b9418a405e74feaf59bc7df5ebc603cb5f3ee21fc4061e345d9aaa
SHA512f3fedd945ca6424e06aed4830ffed92683f0e951adc85c44e8dc689609ddde187882cb5fa2e56138aaab5e6f2b16f1851c8c21804fc2a78459f61861114101ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5196f4f9d6d26816826940b5aa9d8c941
SHA137d3eba8e0ac08199f5653a3f37e85436c107a0d
SHA256eb73d90736dae348c2449fb2224c1230f47131e9477e7f9cf65feb1291359338
SHA512d22d3e5bcce2392aaa2149c500d61dbef3be0bd22cb76a15938adc798f28af3499fc1bfb330b03840f23f0886333e2f53fd982e887d200481e9192a91cb9e35b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b22db16d97256ee3050c243d1e0678ef
SHA1d8d8788a03761b8bda61680124a552fc64ac5477
SHA256135dc4a7095be7f8e3dd0a4f66a382b8a777b2616e6a494ff7a41e327362b489
SHA51231a5717227c99753229ffaef3fcf195201c553e9f85eb1ffe84be26c3d0a01078d2c636cdf7305dd16f5bf1cc32fcca7cc939f1f7c8922bd1ab1d80c82540f0a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b