Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 08:07
Static task
static1
Behavioral task
behavioral1
Sample
de0511f671e2fe6739b3278f20ee2625_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de0511f671e2fe6739b3278f20ee2625_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de0511f671e2fe6739b3278f20ee2625_JaffaCakes118.html
-
Size
460KB
-
MD5
de0511f671e2fe6739b3278f20ee2625
-
SHA1
2cc01ad15a25025f09dc6aa58853170fc2fbfb80
-
SHA256
0499cc50512793ceefa7bf871c82d6a6dceaa43fee5f735577b0a8d5ac2c1b19
-
SHA512
2d2437ebbde847464dcfd657949dbf6f613f01aa1dd4af46553f8937a5cf9f4a640adf572d94c706f09a0a2b8c3b310054ba9a70aa2fbfb1f525071b376a26aa
-
SSDEEP
6144:SBsMYod+X3oI+Y+sMYod+X3oI+YbsMYod+X3oI+YLsMYod+X3oI+YQ:C5d+X3+5d+X3J5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000001e63f9ae0b73c392c15e492e5cff3e9c23f9dc4a5205e7f00e72de9269cbfcf6000000000e8000000002000020000000d37a54cea71619554568519b6f8256494e980c2f7ecbef4c55a3efe2266f2cb82000000042320072651748b60d2c4ff8c9984b69b4f4f82e3e8251eddf724c535627865540000000c2f74d0df7b9b9513ed56e51af0a397ac0dc39f2db884eba98a84d341b4f082bbe41aa9e9360b045f1c4e122fffdfe0efdf778dd1e476d844ba1a38f84fd7f2a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9057380db405db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{331F4091-71A7-11EF-809B-F2DF7204BD4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432376708" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2176 2148 iexplore.exe 30 PID 2148 wrote to memory of 2176 2148 iexplore.exe 30 PID 2148 wrote to memory of 2176 2148 iexplore.exe 30 PID 2148 wrote to memory of 2176 2148 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de0511f671e2fe6739b3278f20ee2625_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f95bd96652e98995f4c8c662eee84d9
SHA10c8fe98a449edb8030977df785bbfbf6548121a6
SHA25692ee155c44f124d7d4ee6cc303c0a60f3d761de189ca7fce99c7f1e0e9682e34
SHA5126c1c35b0490e1c41072da49ed13f33025481f0877f543f585a2b248ef6de4fb1535de84d91c9edfc9b2defae488cb163a0c996c8ebdfa6b731685cde33198712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59567df188ff7015bd6412ff74da1d75b
SHA1b730b982cdc87796ae38e8e5c719ba484e90b4b8
SHA256c67d809b029c17cdad9ce53b27d9e3a952d4a6e2ddbb523deafcd58faa1e26ae
SHA512b17bc2ce9b3caa9162a9a22b343d42a293c253efafbc0bff41a8550651552d6b29d826d6638fd207debc99f3b92fa40ddeb8bce133be91b0bb81fe335aaf6e87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c84b0f66b90ebbdd6b893a8d574567f8
SHA1e4535020c2bfd53d1a4e78c230e151d6480efbf0
SHA256b023c18eaab376e9a0411de92e25460c67c64a21f23ab32ffed29500fda2520b
SHA5128be94d3b095a6890d242d9b8b57af21eb0aae0fbac9e92d46be914282b5ca3b1f300d31b801efb948ef6ec6e894ba80f342b464c2671f3516f12fde13ad4496c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c649b246f6b5b4610c34de615f0b0211
SHA176517ee0b07ae4e6a53f4a0b9ad836c2160a1de2
SHA25605e4df5fb7ee3db854c281cdd08854fb65e2277ae2cbbd51117a838a3e3a2c5d
SHA5124dd9d61c87244063276974318df2dc9181a3c89c219debb2ee00ccb3c3debaae88d3a5b52dae0678e4e2ead6c85f7cafc22a4a08efd1f620aa6a6d5904d56d1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5804b36f31fbbf9fd76b65d44468380fd
SHA1bc3d3415992a0012f62d9bc69493e0a7007fff24
SHA256c40e64b812926b672562b4f99b6478687976f4b64273ac0473650e517b9fd0ba
SHA5127127afa3860c620cdffb6fa1573e83a92f02d11b5fc4798adbb546d2bb4300bc8fc754e79d7066ec982d74fc1535fef0da1cc023187ef4b09990d38c82c35133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f1ca08787c53c78d04475b9967d4c6e
SHA145f8a6d4eea3273641bb262650c0a03dc57b8fb3
SHA2560bcfafa27cc8454e03b1a3d30db739e8eb757275c0808eefe420dcfec082441e
SHA5127eff2cd25fe200bd7f293c323993fc754e2dafa9e3935a6ecc92999ff1d51b4cc50ebfdf634b75db75107b211dcfae0f0189480ef39347aab413ab6a7624079e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7b6d36cec9c8a96e41e83f08df2bc18
SHA104279a4dc12bd205e57d813bbc339b262df1c7a7
SHA2564cf1b0ae946b49a280ee4aa269b0a678798c0bb34344858623c29546eafb4294
SHA512e09443d7808ac620b99dade621fb8a681e5057f9921f5a3cf44a635c18c6a378c1c77c025d36b63d6615b6c2268bd9dd8ce5b1e2678d9a67e92660a671a49014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bc953e6000c863216bbb8ac3a81524b
SHA12625dd3dfd363d5f3da980d535454425c8f07974
SHA2568e911e9564dc647ff69585efa4a2be4362054e2ceb32c2bdf93f2bcffad0b7c0
SHA512d489761a56697cf031720f8dbff22c0e20454753d6c0e3854ca44b713378dfcebc560e6e4cded36d1c70dec49f4a4a56b982bc6cc18e61ab9096f8b48a53ee0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd14c2492f90c53d5f349188e97dc5d5
SHA184940074545f01f6a4b37490e7cb77294bc9d4b1
SHA2561a2d327ee6a0aae9ed6145c0d981e5b5ccfa9360620b400d533c62a13ddf2fbe
SHA512affc9d98585d64388ae32692ac1b585e610a2af16d7050f1ac46194e3ce231006ae052839e018f60540f131a1dea08237ea4bd3a5aadfd2c2131396282c20d78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52105a87277fd10d60782a2e24b6cd677
SHA17115a3c79e6542ac11f7caabb1d7056730228fc2
SHA256a6bb73964f1c0275b9c2e35186852030007aef6d5810ef353e887b4c5d541bcf
SHA5126b83b52b94740ebb5dff927fe59306b87d54bf8235c263a73d848602a416a481ebd83e6f427a78e393374382988aefa5f654fe9283b7fc3653b807d4d9d5fb3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd2539aa5a3dba4bf9c18d6468b70dbc
SHA116e783c65656b13148a8479a180c2b00b3b83e66
SHA256017362c4bf906921cacfca28b6944ef8c59ed30996139989f52b9738fdfd05af
SHA5128ddc91a57e00baae37e6f50a6ed84fe5e33293867e18e7edfb1e611e3e5ab8d1b59e59e8714c36cef56cc0c48eb36d152a44fa01855e6ec027f6291199591937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d555c3bef8b61bcaca1b5e4bcafdaf32
SHA1ed88d954b5f43d406177f07bb792b39c675c3e92
SHA2569db4d0076235ab992d88ab9263f716642e770174825ff19f59ae6f73809304de
SHA512a4566bfb3e50526bce083207e528e004777ebade16619719b09c39817146c3a67cfdfb957632bbeb1e975da69c9200682ea5e63e30ee1fa5f430b03bf1ea714d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510f8f8a28450d08beee9782759d1be7d
SHA1c9562216329e1d13f14d22aae610f03ae162cd3c
SHA25667ef15811aa07a10e8d26613a36c054bacb102c8f38d322ecbfff6079eb80100
SHA51209cb4259b7be1fdd49a3d2939282f308bab9ecc2431cd2ef53809d0165b434a9c1000d59c5f5f9cd079a863aa137beb9d7c3ab77f949e253164fc6bbb818e4c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9846856d2085f28fd72d1a0df1daa61
SHA1adfa78f3cd0d43876d37bc233599a90cc7f885ec
SHA256d73f752c42c6a9111f54ec4a02d3a81c81b3726f74ec57c02e2a6fb6c4577699
SHA51224246234216641f4d529f01b3fe7b58f43f4caf15b52fbd5498c3ef484a914aa521c7d06fd559fb71b953d0f38984400b80576e7b19a2a3b40c13d198b31d374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b2e9754ec359ddc3578a1186a587c1c
SHA1bb837b4639aeb215fd4b799f675d22547b3030a4
SHA25648f521981ef14ac7eac01f5fdc125c99c9445609e764e942c8daeb00e24c77e0
SHA512f03f0eb6b48dc88f5b1b846a0df37c4267b084edddbf25ab6862bb23e47b3247c915983ce8dc81e8605f46ce3850938e7d2faa23dc878445c5b6c3a299248a45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575bb072568c04c57ca86a55a90697d2f
SHA1f8cccef1a8094340f6cf3144b362fdbf51575a3f
SHA25653ec9142cf9f81d933336cbb741b57bab5ceb02b56d223ea96e257cb6ec57bf1
SHA5128849b9339d5f5092a6b95469a2506a648b08146f64a9cd06efaef241a74ecb97b950aa8193a0f815a314195c014f1aa7e7478a147a1d12f4bf65896769a14d62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5710f8d6bff69d13988bf7eaa67cc16c9
SHA1e4928e716bb4f8852cc1df24b2961e5cd1930db3
SHA256de24570dd0aecef4c0b23db7196fe6b6e8a920c5a6a627fef6c36bbff6c87571
SHA512d25bc3bfeda3fc25634f1311e308d65fd4d5d8a4e3d3dd6f36c4db9e0f33e7afa8225dc811c8bbc9c6100a4848c47f3a805a23c68bb57412e92e9e4e5916d02f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2834b3c05c2a50ba5a067a576190c5c
SHA100b4e8ef981892e842762b313c12e0a6343f3e40
SHA256f73840ed55f62d015e196e258b15ba57daf84a376d6b8a5b12992d6b1e607c04
SHA512ce135fef44aa763841c9128ed965b36ec29b26890ffd7c20037f87af51221f2e80b19af55c8463b107c55dcedcd996d23f3ddcd66d13c09c56b848ac0259b831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee804c577e0067586be4615128821266
SHA1ff67818c904e02dd9bc5af0e69b5bdfe09729a03
SHA256213686eafcd35d62ec50879cafa913e5941960520160698b537e2ca9ffd30224
SHA51296443e27f463cb0bc277e8676d0990d355c63b04700ce0d98cb604366140cf7c14903a378bb711427b853c3bf89c13639da2fc28683166061a3c074dbad7f2f1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b