Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
ddfe547e893c764b2e99f45b27dc56f1_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ddfe547e893c764b2e99f45b27dc56f1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ddfe547e893c764b2e99f45b27dc56f1_JaffaCakes118.html
-
Size
461KB
-
MD5
ddfe547e893c764b2e99f45b27dc56f1
-
SHA1
049ea01d8a5b91592f0ffc8b86981638638508c6
-
SHA256
89a033e9c286468e83f0ed489f05f993c29ea688b9d7746de42c118e849a4792
-
SHA512
92017b73f1ff70e2bc0756206c2bff9a8e85c39f60003fd2058f4ca963d73b57bf73b824c783acbb781ca956ea81f1c5152591619ea356bcaaa04d0b90c378b4
-
SSDEEP
6144:S0sMYod+X3oI+YvDQ0sMYod+X3oI+YNWsMYod+X3oI+YLsMYod+X3oI+YQ:15d+X3hf5d+X3Q5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{04A17781-71A5-11EF-9BF6-6AE4CEDF004B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0b34fddb105db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000062d28b73ec7f15c0a08080b2a1a107a4d7ae4777283497de56ac0a76e5a8b2b8000000000e80000000020000200000008fe4a9942cc23b7f0463bd3425ca3c338118e8e73e5b9742a7702887392b808b20000000f147f0bbcce0976cff5a5cb1aab8a26d1581f095eb52a8e6a589f5501fc6b04840000000ba79a8ea19fdf7acad9faa796be193d482adfed977255d0d975902397a91b507dfd709c0ac7fcbbc1a6b4465202a4697831d0265cbb3f4abb6a7aa720b2e930c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432375771" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2372 2644 iexplore.exe 30 PID 2644 wrote to memory of 2372 2644 iexplore.exe 30 PID 2644 wrote to memory of 2372 2644 iexplore.exe 30 PID 2644 wrote to memory of 2372 2644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ddfe547e893c764b2e99f45b27dc56f1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539e01e30589a4fb4812c6fb06a03fb19
SHA1e94ae605facb050e2bea22c2641a4eea519f2082
SHA2562157a5903e074f71c7f4184e346058ee800b2e696bd5924463a55dbefbde5c9d
SHA512b99c5d3c3f510858b65c307dedbe28d7453d70e15d055662f44569cb22f029a2b3a00154ae90f04af0d8616ade5a671d487805310bcc06af5722b3770b618e7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d5bd7d6bf13fbe44feb387d9a924371
SHA15a674a1d2df7cc99a376f31600204ba8acd99c4b
SHA2568d7fddf0a246db1df1e079dbd920b507f8156591ee6343ee04cf1f24f1d08806
SHA512c06424be76c3983a2d516179e7d36efc7973274f8b1380ca5032402aa61bbf5fb65934925c8e723a00b11d450302fe221c4679dc372fc6e23ed0dc95bf933377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598455b80876eb9ad1d49cf0d230909f6
SHA117b128d4cad6bafc999ff85b2713ff21b676a590
SHA2567f900a28cfb175aa3e7ec581d1a850bb71e7dacb0d1bede6d3d5fe39bc7d9d63
SHA5128d278ac8961aedcab997a49a658b37b436e2e9bf70f0cc61d2317851f23a43c1bafe2422c2d8d415d7f55ab066c861242c7150d549bf8b9fd129544be0fac33b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a6bac71ded895655456c62c0c65bf7b
SHA1224f8f258be1a15277375eb362acc7a718bcfad5
SHA2563b9da7aa0bf51162d27660fa9a910872bf61d3011bee048fc88aa9cd44bdfb9d
SHA512239617b9a31889b82951a8ee56bf06e53fec7b844901ca8146ea0ea3b0f1f521920dc6a825f1ace032475422d8c64e5c85566ec4884ed21fc050568e8b7b9a0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5271c3ca417ce603200ba2194d779cca3
SHA1768c55c0137c245b49ea31f29bd76920dfa5431f
SHA2569fe40caff6be91cacd6f2f8c714b059f21d42e7d08ae94c82a2c4a6f6b4dd271
SHA5120e66611cf4262e894000fe5ed038e2e1b577df529d4c990153228978a1527bbaf32061eca3b69966556a9cff820969d5ae00a1219f576cdb096ad2013d8206e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545c875dc14fef595f2bbee228305e7ee
SHA1d68e56413cc35ab01aeb36e738a19208b19edbb5
SHA2563fa3ffd69af9eef599ebe8e20f1d665648a74176d3b41d41d10abba43d38f500
SHA5126d41d9e59e02d31e9729ecc8e8463eaae4f17eb131c094630be1142bb7116fb268529aad94e6a9859d03fb5d0e8ab4775d4f44fb3138bf65ddefbdf9b17ce1e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56722745e48197ae641f5e988539a29bb
SHA1ecc1d75e126236b39f98c59a5a400095cef887cf
SHA256684bfbfccdad0b9efe91ea335ae3d28bf2ad6c7dbe74dea0d03ec5822790478a
SHA5125c66b056a8a64e11d4f100673e559b3c952adec02d4cf07ce010b31cfa141f4f568bd5cc99b721188ffd5a9900f6fa2c26eda474f33fe4448052f58b039602b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5162fca653daf4c745246d5d9e26cf457
SHA1fe784bf110a5ac475c041ead10c915c45be9190f
SHA256ae40fb8812d6a84b88f964bfb67437b9bbdc73e65fefbb189c91bc304f35b71c
SHA5120cd6d10be90ed9feaec39820b6cef739d3afae7fe9712bfd7fc271c480671a315df086abc6fcebc241ebc119ba58cbeeb30aaf87c0748fdf919a0bc507689b94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5351f5b0518de5efc14bd47ed14ba32b9
SHA1de1d8462df52aad962294b149678c3114e7b1c96
SHA2566be3f19156cbef00ddb929805b6e4729f4427e46fa9da43e076084779b9d1296
SHA5125c8e7f9a0cdd5df0af743300565cba3edc54c6c567be069bc77a6e7ca02607872e3db868c3cbe9a6c2a2d3ca93c911ff806279fedbf8688ee85f824ec1413e73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fe2f18c7ae9f46160fa541feeccfab7
SHA1feb0d5d6b2dede9fde20c5a9abf9c194cad3d18a
SHA256810ae33e6c457f0ba6d850914ead90e2dc796eb467b71bdb03849bd1c0989144
SHA5126fd9e73cb543ee035b052bad4a4cf33826e4899e70232361dc69d9acf8ea08f093d56c5b48d609e1a12524d3e2f2d233c97e4eab4f12600982c7b8218c893945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2451ab1de904f0d45d6e55e24a25481
SHA129e851f2e9b0959a489fb57f5da6fef9b03b56fa
SHA25617a15bdedeb7420b451d607e5dacf2171d8c0697e7ad39e7452d3a72b91969a6
SHA512ca4d6c141e49ae98c38448aeab3ca56183efd525082b8f01a4ab8a0738fb222164d1107f80d1281708b8d3f31981d11b64ee141f60d3f8b13893a917bd08a304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdcc8f311fddaec30c9ac386dd12e7d5
SHA1b2df7be2d545b9890e07d7f3653d5b8179806713
SHA2569fc77db88bd562e1707386187736f357410e5a1bcfc594d1a306655e2ccefa82
SHA5123015f408e6d34f856c801a1ceea64dfb68725799254a5d106ddfac631baef7e2a9790bed67fd6f69816f27f33020a3a33bd433620245986139dfea6331b93fb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b84f8cb27e624f0323acba79c2cf2a6
SHA1126c8e49415465211b5b4a39ffa6d6460bb6555c
SHA2567d9016b6b96c2517b9fbb004088df70bbf5876a5d82acd3adb65b0809ac8d908
SHA512942e7d1a213ab7a5d01b6e624b45e2536845955f940870d33442ec7aaaa2659bffd83cf89a16737cbc7b60d1ca6c96718a39816afdca4febd8f597d1d8f6dd1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572ed12f009ee9ce172c4e84e146db1cc
SHA1869b68233be65e538e2920598e5fb02b13f31332
SHA256e89e9884d2342fbf6b2ce59f9f8a4fd192cf55dfd97d7afd3622b47a5f32620a
SHA512ca95995c2d0a239f309bdfb2303ac124fb652d5bf27392327a6ce8a4723ab1c249040a882616bc05c3ce4bdc379ee6b07ecf97f4e358d108268b3914a5976b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f48ae747b992e645894aa6099c75639f
SHA1ed721e2ab7faa91b674cb6c8c709b41d24ca4ca6
SHA2566d65a67c03a6dc03999faf2a83c20e09f58c8918d913760ef6b8cd5d02e80e21
SHA512907765d4fca73789a8f9ec0adbb5741cf9b1ab8a408b501f90851d63e9dbdf1a9f7a1bbf9aeb68283ccca9dfa6ec12aa5cc245e0d1b1656007a92029efeabc41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b508d0d6676a352e55379bae7047b37
SHA131b318edb1df42dfa359658dadabb1ec8a6e5797
SHA256930f5d579dc4c3cfb4bab28f5f3cbd43c1ebf444be44ac7d34cac6187e8bef80
SHA5120783b7f0fd4cde3a8326d7f63951fd3a2cc1da7021d6c4fc74a711182b5986aabb17ecb289b8e1328a68589dac4d69d4d2f827af82d0c8ae6ec4b72d75923c2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5981ff727e60934b2e0dffa45694d4116
SHA12c2681b993f6faf9f9ea70ab6690af9d3ba2a419
SHA256abba3c89030ff4b103acfb3aa98dae5e2a8f70bf77d025e807eec4a8426d43c2
SHA512fa3d41a7fcf79acfe22028b55a9a5bbaff44a547d542d0ebc591bc0dc28e4a78db4b6051c13a3e1bd8c92be445d10098cf24aafa347ba0d664ca94e462c4abc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5285e672107cd0f6909b2eb7b38845f2b
SHA13dc3be6082766cc03efd5f1dc8e6d89e9b9f454e
SHA2568821b9258ef77740829440bf21143deda8f7a21802daed94462d37fec1d645c2
SHA512bb36b384717a6bb98704ec9bdc1556cc513c5427c637628032385662d831a6bfda425cc1b93f7f3dee624b4d4939e013dee21ea19bbb590c2c41b2a2b9b1ceb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521ac69f23cec3a134de1b0414011ba33
SHA191c4dffca6d369f5e6c82df3ebdefa36bd341532
SHA2569c93e8469bb75e7d5e5446c0847ed45fd32a85d8e3e4b9bfb0288bdd5f61a65d
SHA512149b3d445390541579731a19c3b148b133e9a565d7c1e828d10cf32c041e9db28ef1b4d00e0b993696684f84fb15b2dd99a01be4460ab11ec6ac62ebc27f0e89
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b