Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 05:29
Static task
static1
Behavioral task
behavioral1
Sample
df9429865a57cc62d290efe98b044e6d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df9429865a57cc62d290efe98b044e6d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df9429865a57cc62d290efe98b044e6d_JaffaCakes118.html
-
Size
461KB
-
MD5
df9429865a57cc62d290efe98b044e6d
-
SHA1
c7aec33c547d33c1eda4e9cceb4d304fd7b48018
-
SHA256
79050dbfc30b619a8298a518fde7dae63a141a20702dfd12b04c14bc521b814e
-
SHA512
480ac5650d931aab6c8e14c87570bfd1a616d0e13df8018f667600d9c288c7e26759c56de0df40fc1d6593c307f3a954a67d1a889fd7f94547458305b22f1500
-
SSDEEP
6144:SrsMYod+X3oI+YysMYod+X3oI+YCsMYod+X3oI+YLsMYod+X3oI+YQ:25d+X3e5d+X3W5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432453658" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000008c7ffd1c04e137010b3fc56ffba17dab0cd781d600f8fdcb82cce161cb2a346b000000000e8000000002000020000000798bcff2883578d06b5c8a046e116ba109125e28be8c6d133b1430642c74b432200000000beb77035b31e501df96c7df7cb15a5e2cf6144e1a33e1adf481496c7b30a42c400000002cf89f1b46ced87b7d44a2efa279b93878e03d0769613333e4373b66f6c2d52fa20b8614c3f2b0f8d56493e2909a81691fb3d07a1a45a8d35920226a9d3de8e7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 204679356706db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5CE12201-725A-11EF-A528-527E38F5B48B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2484 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2484 iexplore.exe 2484 iexplore.exe 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2888 2484 iexplore.exe 30 PID 2484 wrote to memory of 2888 2484 iexplore.exe 30 PID 2484 wrote to memory of 2888 2484 iexplore.exe 30 PID 2484 wrote to memory of 2888 2484 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df9429865a57cc62d290efe98b044e6d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d51ac8ae77ae758389c18d6d466d75f
SHA10b8fd239453429d231d11aebe63f34aa251f744e
SHA256a5850550d5afe516ee82c2e1d906c6a5d95b0b7185785f881117300753b78122
SHA512cb16890ed722558086d591786bdc8861a371149068817e49f4d9aa0828b243d02e3f097a1eb428de40981c32a566c64c7ff9229086eac458cc5f168822489f54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e001dfbb0ce883adb2c885ed91fce36
SHA116c965083efde89f99341dc4226d0abb534febdd
SHA25619d60381a81530e702d88a9c9ca01dc0279869d9051185f81da158181868498d
SHA512384a5c818f8d8480b46f1588f9dd8570d1b7fc6438bf229d1986666571b2ca22745ed1b2230d7f9783ee8ec8d8523d4f6c1101ea6f3fc5340d14a49738aa6b8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59499d82c83ef1611d2ae32fa0e4dab3b
SHA16e90548cb5e718dc92768e45b20605218a26e271
SHA25639dc63bec402bb1bad61f94015a1d8d3772f694bcaab18a2afb69990c5cf117a
SHA5121a604e1f9c04028297d129fce4b603941738db002ccb71d309eece185ceb2f9ee55ae0f2e263c34a49032f9e8c16153edd768875a20e1964534754977a38bba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c6edfb6b5ffb7798614b0396f334c87
SHA11b636971b8ed3d5d219f796dd482162c17f740d3
SHA256682049b2a97720df03f8e12a64d1040b9c4a557279c07b77187d1a138a2658d7
SHA51259d330893863857043372e4a361d2c792b38d2a4163206e01d4c37cf796a580143a7fb27b49c8fd5386544df8e779f658976828862d2d1646d1e6c550fd233d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5139731d130600b8b7e29fc3aab903815
SHA18a0e283b4a9cbe8363dc45d6df822cef1b09f93c
SHA256b7ff1ac0c0e435f4ecb08dde8d3679f0f71c41fb8236d12ce8bd860a96adbecc
SHA512b0260822e41bd18c1cba7fd0800790bd4b68f011544c88a2308039571f9298316eef292ff449bd03fc52dc831c620cd7f85d316533ee536d22e4a3c881825d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b718ed3fc3de3bcfea5257e29c1a651
SHA1df3ab47b5c18934eb9a5729f31f8d09a7c51a4b9
SHA2567051ca56429487bebfc9ce218d86f1cdfa8af9b60a6868a9e6d4a73f8146dc95
SHA5129496c4d17cb9179da2d9dad41cd76e32f59ad24ea1901c7559b1dd4fbbb27552f8983f5eecb1ddd62d8a51bf27fc5a051c4187508e34e86a141c79b030f527ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acd5a816aad00f0c4da0df56b7010eb5
SHA17a2ab964af3f34568dffff5fe1ef3ad832260577
SHA256c312dd5baf14151aa089a62d4e6947e4c67b7b4bc38d87df75c7e71c5215593c
SHA512d4ae2550de496ac03716cad41a190758ebe4e20548d23b0ac47aa202e578adb9a0801fc35867c7572854b1dd46730a630db0366f230b62ac63c2757c9aa69306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a543feae7062349fd919dcc68c99081d
SHA1daa5718d03168762cec62902f1f0ddd72581c35e
SHA2568a268eedbea36bc772a9ce4ce6d4aa9733fc358196faedfcdb3f6dc2db54c169
SHA512766e566af93f7b1ae129673fc31bf0052ab69954419f9ebb482563c87b31e5b13641656ad106a02046452982d20064b03f65c4470f059ed358bad73600aaad4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe3c72f0ca2721a83fa59410b805b847
SHA1cbfae01b737ba04bb946cb42ba0da2e89073fdc9
SHA256ecd83a21eea3533f622ebcaf40a4c576b53b5f2cfb7f4bd99c918d205e9902a4
SHA512f4dc8df39914bda37c3f64e1046a4341e18be86eb358acfe35ecd426c41cc3a8b81d4c7e5c0755856caf23857c0c337553feb33a4d9f395a8c1d92a6a9a588b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0298fbae80cbd32e887c67a8745d61d
SHA1a376b7c4de1c7ad19e42c8c3811976c5e447e2a5
SHA256456c0cfe29b07d2789efd52cd0aeb658cdd5f22c0b358f9d2caace8d6f4975f6
SHA5121da2b12305f1c61b9b1bfb2978411d288041e185c9917edb1c3e9e7152a7f68a7aa6c4e2911b247a2f66c1590356413191aa826b9ef66f5168ba6f92c70bcba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ce94530770aebcd1eb191105c6bee54
SHA13656a59093f86bf5675a5815ea14ad0d380a6066
SHA25693e9e562faea61d86cd8047ce0a770974517562cb982ff705c2b764eea071d1e
SHA5123f775cc7a98b335f5e269c2a72af4a3d186b3915c951a96c57e9c38ea701af811080835f4e28148c5f285cbb0bc8400ed0b2d54d3dbc5f690e8cc6bdebe3e554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f366004eba58bca406688c5900cace7
SHA1608b38bc36194dba76d9451228a5182e2303b918
SHA2566a9cadbfe81977373a1c21cc8d6503c3d6972d912d71c01b6d228e1c1e2549f5
SHA512129afcbd2cbb98ca05d788aca81cef3001646116fc08093baca29e23751b61e55da5a3406ffb2a2e1a79986e98005632318cf05ee0fc089f04e799ced0b009bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5906871899f3761ee931969f9d8f0f458
SHA10f0416040c00b2fb8f80a53dd0b532f768a9928e
SHA2567af606ad9b413ecad8d2ea7514ad32b3c27647ba50d23f7e01c7f0933787390a
SHA51278c39aa57c8aa2412c2062abfd89f7b835e1820c915abdf7a631cb90ee8e40ebdf6baaa1f358f438a246b89a369008dcbf6fe16672c0f5debe4724b92db64f7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af637c17b90c364b725609a277b5aebc
SHA195f49099cd6b054edb6ca6e187f8ab903748d7a2
SHA2568bfa5499d0513b018e9f57199361954cfa2cc64f61468364e9968dee1158747d
SHA512be3db6d1a704c3e645a1bd579f1655f6101d7ec1a4226d11941a3c323296e8131911dead7586fb0465553fb35cd95d4d961842bf8545a4a005df536834ccfbc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb043a0d50196a7ecfff30ca60d5808a
SHA1f74819170275d41baf581f69c35d7dcd8f4e1451
SHA256f64d9e14c8cb0a6f27ccc1a4d7a2d2c3f83f4848383a502aaec77ad6a09de6fa
SHA512a2724af9a909d3ec64734cf389c09b9c9156bb90867b9e804982dcd004fd3cb2204988fd658d9e0a5b4df377003e9bc4c542e56a5b6080f786e90a5ec9609390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53456e01643805fb4c87feca9c279dd17
SHA1fa5b1b6af79ab2ad25ffad774ff04a4dfd079dc2
SHA256a5231d7a7bf885cc1472c96762d9ef68e0ab57afc0e71ad82369f5896ee183b0
SHA51252e6998f4779c6eb29ef0a722efb5a2335e40e28ffc0eef1a7a45bde68e8e6b1d371088700c135a1a97a44ec2f3b8e92bd0e9d5ba17784208fc4f20235f07b08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f23328747b458f2cfeb82c49f66916cc
SHA18a1c321de24878f5947fe08c91ce9fe6dcf98078
SHA25676bd4705fa92832930022e9474f2f66adece0616e04bef826fbbc91726f74bd4
SHA5122bd51491df2399d1778bd4f0bb1dde77f63d87ca7ee511c6aa3e9d0a8fa4e110c703d2fb2c602d7814958bf4de8dbbe960ff760af6d599f440d493a7bf4f5d64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1ab495fca413dd0eb7b2f85b098dbd1
SHA1d8fec4e3cae0c72e39e58d991502e41a28c74ba8
SHA2562978e5a3e4205e8b8b375ea53b25405ef193a582d4051f3f2150a4e6f173d275
SHA5120cd8b600f4f7768c12c35138ba1883ed8ded23a3317b1ca2055b3f909ae88deb2ce3ba4c1d69075a88f5544144855fe9de8e9bc52863673e8f1a344c471ff114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d72bfe254be689b6f8ddb18e08a87545
SHA1398d2bb87992377d38ed29c60db7094b21eeb572
SHA25691e6ac0b83658486d98b8b480f123b08456bf9d83cd181af8161ae42df71d0f2
SHA512eab85a872cc37829f1b8145e94f9606d9e47ae8da4eaf061b5cef144a33d5d280e9d334b64beec47a401df5672bc239325c07386e3fdee8fb26aa562f9c1735d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b