Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
deed2f50576c18fda5a165511d9430cd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
deed2f50576c18fda5a165511d9430cd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
deed2f50576c18fda5a165511d9430cd_JaffaCakes118.html
-
Size
27KB
-
MD5
deed2f50576c18fda5a165511d9430cd
-
SHA1
f5bcd8da90183b2861fd1423cce9016813f72d98
-
SHA256
76084ae869a25be56ac35c0aa6253480743ad9706ecfff2bd08cc58b65bc5dca
-
SHA512
7d90020bb09a01be5ca7607627c2038006ca61711c2a952fcaee6f8405f04e211842cdd81d5e8e5141028cf308d94a635002e10b323c6135652ce42d86489677
-
SSDEEP
192:uwafBYncb5nOenQjxn5Q/dnQieV6NnxnnQOkEntrjPnQTbnxnQ9eycm60e51ympX:TQ//HEaYpSqlv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A449B6A1-7216-11EF-BE3F-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000003fb4da6db121ddd6b8227e1d069655da75ecc24fe4c6733d30cf191f9d61003a000000000e800000000200002000000043451c7fc3bf0bd3ad0799de3176f38facc37ecb4ebf140eb938835f2ca4a445200000003fb500ca2a064e4e5f9b4b96111d5a155bce8f5754b4ab1ece28b37a3a53071040000000f7b0adfe6939d49d0d872a278e48b2c481a1d01b69b78b1a160175ee3428ea574f4e2d7cd4d8cd12d017bc3f256f12556904cda14e6615b7559a02c1bac3a6fc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e088ea782306db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432424571" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2876 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2640 iexplore.exe 2640 iexplore.exe 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2876 2640 iexplore.exe 30 PID 2640 wrote to memory of 2876 2640 iexplore.exe 30 PID 2640 wrote to memory of 2876 2640 iexplore.exe 30 PID 2640 wrote to memory of 2876 2640 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\deed2f50576c18fda5a165511d9430cd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2640 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4ef78c2252f85e1ff1405eb85413d63
SHA1cf3f92c6758f403ac29660d57c5ee15e90a78bc4
SHA256a7b9722213ee72a311a776c508a96b893fcf5c26fc2ac1ce1d34a0cd217f7987
SHA512763548847c5064ea14165680de8fc1d45f2082193434c626b4f883f6891b3349d012fc79684006e7a9132afe8b672e08d9a6b4cfce5b602bd4d38a8d6063c887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57328dca2367dc5bc766ee2ef3d3abeb7
SHA1c33e405691789894257c38cdf0583ad7fb499e5a
SHA256e89baf202d622afb7dfa1d5549ffd3716f34aec3e62defed825425c7164841df
SHA512dcfa8440054e1709b7ae2a446f3ea2907e81a1547d11176e5058e8067da97ff6ba0eefb0668af8643207076b3008614e70d72d4f2c371a37166267e0d5420bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575994c61292124759fb6639d8e11d7c4
SHA1b3b22fa4e06542ee3dc16aad362b26968ba33316
SHA256fc650db23c0abd3268ce09715c18d64659f73e340b2ce683ce878ffe1d1abd16
SHA5128dcd871161f1b470b381d467e827ec01ef1fa4d7ffa46a0712be8bb39c610425760e5be67921d9e1af7b85cda056b083acef620fdddf33588304037208b592c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d3e57ad62b11605875aadcabb6214ff
SHA1930849f42ee388d96b513f5bf1863e4b02e80410
SHA256b913108bf4f013aebc3d57df8fd357a24183786bc3c7a4af2eaa23db390dfdf5
SHA5129e53b029c9901089a231c8e26e05d9a6075e100724bfad37723a8955f9fc318acd018b271a9c8bae973638d618e841834f7aee348a13b61c818b4dfb5546dd02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7fa2220318e09c48efed059dd710f7e
SHA105f23f948493ecc851ad3757da454aa20332192c
SHA25687d9f5f4f741cc0e7d5a65aabef5e4236d816740174bad1b49abdff7d12812b8
SHA5121d6a81c31d0770e597e332b3cd157b2f7657079d77bac0f42c711d462b9b89888689e043bca5ef2b8f778e4dc271ae8d3518863a93c44b58b99d0f67ec830216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5459c94de9b42513b27a94a22e6212f7a
SHA134b78762731297e3829278c76b990ae7b5bfcf93
SHA25630db6683ed689f2894289eac33fb9ec0abe05c48e09c1db0d5140f14479dbcea
SHA5120b422382803427831461e304e0187b6cb07cd076e94960a041b5760b92103734adb3f13a49bc37276a370351cb5bdd9881cd9c953b02b48756086ff9936b7998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ea8dc8d6b32279a2d40bd590eab28d0
SHA1e228c6b1a4d894d0c3739db118bb644f05b803e9
SHA256cc5800b420bcbeb0232933156cf375e0160bff0901023be673c4a7a89aa7ca8d
SHA51290e06368d8646ccecacead926977d1fb7bbca237cd8566fe33b4c866274450220ca72fc2ef6f74dcdaf38e9d8daa2c081639dfc50a79021ca7b50390a3d17e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505e82aed9f91ad57c58bea553b9a5f0a
SHA1c4f5a39ba241dbab8042036ba344cbb4ba65cd00
SHA256ea7c0b124610e2c556a6b20deb0ce47a7d382b773afe826e8b65159cc78cdc9e
SHA512b4d227478904a115a14f6706ce60f04339310cf1a15a0595b0bc326f294788d396a6b66a39b22a59e56be84b78bbc1a9d0396604640e9d57d85555b05f73ee9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac47f2d33f0178556d39174da1061c96
SHA193f1946da4b39e28e97d996dae872b9980919692
SHA256e2e46e7ab1e04cdb8e11b7180c87ec5379b478c64775456faf2548038937796d
SHA512366b52358c92c927c9b6c590e0ab044ff0b50e139a1bc959032bbd000bf60911902df52a19f22b2e926d4005b6420bca14e7fa3a53c22b507eafe94db7e0794b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a24a8ccdeae3928c221b83ec94690de4
SHA11132f187e570e8ddce42891369b63d62fab3b187
SHA256748be3d10086b48f29b4ab373ef9d1f0bc3303fd7f85691c926fffd4e38e1377
SHA51285df8d036570186a7826e5d47fe27d329721952670232620e7413e8f07003d80d39036045258eabbeca7962778b52ab9a1ad5c21149dc00a8dc63522aff9ad64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544ae5d7cacc2fcb02c5b9acde4571a06
SHA1db76dea695d5dcaab4aa6777f20097f0da569aef
SHA256ca92dbe128a872143d9c01eb96907597103783fcb19863a6ee3f262bbc8de4a5
SHA5126dcce60f5b8bac1fc84a7a79021b86ecd402389345412dc141e50192784bf55e2a11a2dc87b6409e1b3e01e232c094f62175ee529bbba3d800dc030692a7cf09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5151ee86d13bb5442fa3c557f49ca5338
SHA1c9b3fd400b06cd4876814dfbede25244e249c19d
SHA256a0de36d7e1c6cf9498ad452ccbedfe3c64509b282c7b19e78828e9fe9c11c7df
SHA51290b3434f3517f9d28f2e5344800789954ca0b3c3a22628661b9582309e53f293fdb2e069f8dc939ee5834a14f1ba284849a50c4ab696ef10248208e6326391f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5515c17789d640f1813c6de6050f95175
SHA151248dc92b84794ac5f0d09370bd1db711dfe6ec
SHA256682ef33d1d008bba594c9e9979920c13c725e9b624065b6bc21eee74da51337e
SHA5127c83e5984e09ecb6e54fa24ed3fe14ee2ab1424c318840b7b5d1b454382f705b3f8bcfcbd623b5989aab9b51b585fc8e1ceee6da0cb22164084b4268d4172a38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc7fdad24b9f4d90640683d436986dd1
SHA10fff554718ad4539ab2ef7088ef2869216275028
SHA256f9bf324005f3512a7f981983a4c750dd6c9c4cb4f70f7431ebcaed320309b107
SHA512cb91169b41c98b8ef0dd1b6e3e5dae203ea358d03c57ffaf786764718eabbae2353e508146fa1b4305a7feb6251cec871a97bb88a68da771d999fd358e684282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5171ad82f7bb7ee8d0a04742ac2580589
SHA170f34df6fdc93d718d778cad3449ece60352da97
SHA256447214e49206e3f62d402c36d2f8e50701cc38f5437cb5d6d6ba7d3e0923f71d
SHA512a15bf614441ed743a5e4ac56c5ac831d0f7071753e698e97ca55a861b7d0b581096070b1892b5a88780dc0e7aa0e5d1102cb86551b9cf5e53c95908e522bb33a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569ded596c6a3ec2a2deaccfd7838d967
SHA1d9e109f390f486103240b73b7fb0ff6cdadfdef3
SHA256408f5af38b023e3026b5c39cf77fcad57cd5af20b82c9d6e14d2b9452d233b01
SHA512c83cfd8073371d0256e0f54c7772c453cf1968c63de29c4d77c1d662d90e821074dda58e26ce91d688256f8ecfee14c6c56822331d518fb7f643744eca668e75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555f70566e72bae70204b7ff415914a34
SHA17b559c51571b359650ef4a719a14f89a2aea610a
SHA256ffe1da4586c20ab2a64064c53f2aabc363632e5447babda44c365d256bb291fd
SHA51205925f1a17e7a770cbea6435aaf3122c904e736e90013b424158a82e20f0321a86188b9377bca579eccfd18aeaecded31b37c80b176f5014c970ff57fa6f7e95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaa7d63beda9d27a3d528d16f895a2c9
SHA10e66aab611c4f1b57fc7db4d32a0e10d0fe65b44
SHA25641208094da5022d521cf2ac371a60a351cfc9506be600487e3b54499faecd4cb
SHA512b606e9f60dcbbfb6bd01433ee34d54a49177c55365aafb10877cb139ef0b29b7303001971da80947ec56446a434026c0ded3165aba1b13965943b2ebf9387859
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b