Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 05:40
Static task
static1
Behavioral task
behavioral1
Sample
df97eec915037a736e844e4c7634f531_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
df97eec915037a736e844e4c7634f531_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df97eec915037a736e844e4c7634f531_JaffaCakes118.html
-
Size
12KB
-
MD5
df97eec915037a736e844e4c7634f531
-
SHA1
6a2b473f37ba17531fd479575cd3904fed7d52bd
-
SHA256
2fa02340b0bb66e6255c0d3eb6e897f4eb926e85aaf8a2147515a49daa30b85a
-
SHA512
395c45b98b33735cf8f2062042149ac499e20c33ddd18395b4966a34e1b741ee6ab948593fc355da54f41ed24ab1590071b25e4716e4154d6b9f092872f614e1
-
SSDEEP
384:3Pu9zO3q5t27gtmO3q5t2OO3q5t2l4toOfTePo0lwG3+XyZ:CROdbGoq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000095949d0fd07b63c5c1c7e012b29d2405f4851f2fba89e1f639f9658c59f67e93000000000e8000000002000020000000922bed094cbe8ecf6d4fda3ce668e8e1a70d9fda0270e4239c981699cdc32b4320000000ba1ffd02b50706349a1bf93733cacdf79e7a0f31550d4c8779f6635ec870401e40000000c22301042d3f9bcc08d65bde50d82e461b02d0edabb8ca98d66106577279d170fb0739c6d672ecda33516bf4a7803f17c180bedb5395294924409457700ff240 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DCBFF221-725B-11EF-A567-DA9ECB958399} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40eea0a36806db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432454302" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1892 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1892 iexplore.exe 1892 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1892 wrote to memory of 2776 1892 iexplore.exe 30 PID 1892 wrote to memory of 2776 1892 iexplore.exe 30 PID 1892 wrote to memory of 2776 1892 iexplore.exe 30 PID 1892 wrote to memory of 2776 1892 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df97eec915037a736e844e4c7634f531_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1892 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6845ac624275f2446b7aa65e3d28c32
SHA16478e1c9aeeac983a764c5155042cfc0df0c8778
SHA256415215bedb39cb3f29232a738dc00c97a65328d2fb074d83bc523211875972c9
SHA51222b72047fbdb279d13e3ffaebf17986347d8ab28e94a577f4c44a4364a07b71a7ad1f652e7446ee4a105fefe128f4213e062626347228d05bb5f5af93def3f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e07f808ec72ee0a08a42c00c76356ca2
SHA190045161a690e8eabbc8251f9d8859a380bd5eb3
SHA25679654e8906126083bc46b8392b7cf3b81f2670c09928ca3449b5fd4d13ef6aa8
SHA5121b0bd5caa1724f273981e62ec4feea909584b95d69cbfa9c18d4a45fb6cfeb44966347d67fd18c31e1b047a13e525adc92b37355e310756e4fd2544aa91c442a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573dab47f1c2199c321409578e6eaf231
SHA1d13ccae0d40bff236aec04bff3359d7e16e9a752
SHA2564b7a35344ec3bd5972f08eb5595f542658499cab3a55f6083799e045b2d1428c
SHA512bdbcd9deedac2a9c94a8ac5604a9927831a7888cecae638f606f3b54a82f1281d115e3ef9c8bdaee1714e82497818a6a6c1349ba4c8b2e6548da8c782985a147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cd21152ce47a0261563131208b65e85
SHA1cc87fb9f4452f9e081b172ad952a1b5192018183
SHA2569a7e7bfe0969628b0179b64ff4e9b7130538896a06c2f2166df53dad1890ccc7
SHA51221c3a7fa7b07cf32e94ad71366cfcab908dfce806dfb25b8701f500d3f71e5aa5b9a8f56e5c9545c6ef023241ed8ca4bbb0928af66e068982a7deb5bbe76784f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536c65873ff584d1216496dbf1bc716e7
SHA10880f409bfbcd589f23d10a0b9081efb380221a2
SHA256f05a8116934447286ba144fbc1a8ef44af7d2c99deb5b5c8cee586c240d1a8b7
SHA51267dfaa07dff2e7f3c0bbfee9f1e33e37c49f8a835f2051ee04a96729f333b8fe03674c0925ffd91037b2fbfbaa02a6b0bc3eb68b0bb2a34d39b2db382a931373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d73ff551b2adc4e6f8bab4e360766b6
SHA1088c4f6d1f29d59386dcafd2ca788cfb1ede7c64
SHA2568d21116824cc9f879085915e654bc84f0614f4c270776deeea3a5a4fc46fd53f
SHA512534d63b0a91e46d3665f97d8c54f8812a49627964cd003ebead1de1382376ebff1fd730c336a719d0ecb19a6c1a8086f43d23852410a26c1fa0a5edccd1bd053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5744b474963151452d91e3e66b8edc844
SHA1b61d1f86edd4f345799f7613af9cd38d884bd257
SHA256397c0a3c16e799e6e5f2d47f43f95a83edef2f650085042d76c8ec9b065b6e2d
SHA5120fb159f1991308d93fe0c4cad0bf8dd108084b0d2b037010230be900bc81ea3068f6710e3bc28c8b7124721799999c2a5cb25be8fa3dd807665e79d0293ca961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522faef44a9c94bc72de024cfb24b16a2
SHA10d68d8e28f701e45f0fe0109d76946eea778ca0e
SHA256294a84bc4260494c2b9f0b0236a7df07bd3a2d0672242a186438e71c6ad5ffd5
SHA512912a9d1953bfe9d34e3bb7b09a997287acd7953e9db15e9b1922ffdf69263d95b4068ac231c718a9f893475bbf5dd34ffe41e44bc7c039e9cdb718a8d1346c0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a3aa6f2e8d68d043d07d470e3ee53f5
SHA146a090cbe9ed46341980eace4cae3472466fac97
SHA2560a8aa633e8f461533f2f9ecd4a463292ebbd3edfd1c7109a682f64b3f1cd9c2e
SHA512f57232c79eaeab4bb3fb4a28b0e38c3ec87bef5dd08ea41289e9f4c77ff55ec2c2e4d5dfd70d503e065a9e80278f4ef4a4a1444b187a78e956bc3a7708db01bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ead0f5f971cebe083e7e61809faa4b3
SHA1ce693136694b9f454ac7e577675eae6202c2ecca
SHA2562721ec2255fe8091c4a0fadff5f1ea88856fb6637a3b15edf68cabcc0d38d30d
SHA512af2eaa6158a425193b0a74afcf4c4a29c0d4179c22e45facc7ead23b55b91d98d4700ed5c8dc28d671e74ba7fdcba4ed9269da00bdc35b11c312719e6bec7461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1181b64252a5607f713d52365c73274
SHA13b6e4c28a4fbfe7c9ad2db2ab8dfca28bbb8fb9b
SHA25666fa18c056d10a04310883425f41074c7171000e4d1e0d68a5d8f43a95829c05
SHA512e7e7c99fdb71b8d18917c4e288eb97dbb46df8ec4cf155e7ab78271350724a6e35f672e74de0f980b298d0d14988feb984e07d4f222db8bb871e329444d631bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568178d014f1b99dc1092b44461eb23e2
SHA1f1436cebaeb2cc29024bc3f1761feb5a00644b44
SHA25626219d4c6133d557e536e5fb342b4b0691181b46a85f63db35fef3e0513af6fe
SHA51268c73e916d9d86d25a7d41657cd0fe3871fad7a8dedd032520ee0fd5d89deeaad96691012a93a6cd5fe0192921c5908caaebf87e525a45664ccb6c4343e642c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f068b0583758741c945410419c6d1af5
SHA1ef2514aba3ba27150f4a47dd62470802249bb708
SHA256bf724b689669f384d379a07db0158f36712a75f6e186b7d1d4d91d27abdf0b2f
SHA5124892ad1721a2731f8245a23906eb950cb3049e4803ab01b65e79d1aace5655dd28abfeeb58987d1733fb08f2a81bab42bcdeee4327795e65713bc5bd0ab7168f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547efe322f4a40f355e48a45a5041acdf
SHA1b12dc39fd32785c4fac88e7a904d071e7d43b207
SHA256eb49bbb5e30e8f40da23bdb123fad98bc2864626b6b9a242571145e6c52a9d14
SHA512c190c6daf164a49f15919bf989e25287a8c02da7cedcac86538de1fe12adce035a092691d74e57543e1fe70499432c3e528ce057678bec07df52220dba3e431e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e742a6875e77d76075536502c13f6df
SHA178a7c0cf9656aa753ccb8c3395adfb2672b67f80
SHA256b27a6eabd7a4904421f6c2818c9361ae08ecea5518ca1ec70cd55681add13e88
SHA512c1c6f7537dccb2115def04675b2b5e289cf81a00b39672d06629156255b2950ccd192c5cc246b98e4a0599161f13de8021e1e0c1ae09bc79eef0589477528665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bf40c2cc95ba77ad7de8935c93ec5bb
SHA1ef2c8717d90000fc206199560506234976f2b902
SHA256a91bb7457a5d86163a99ce5ce9a73eb656e9cbdeae6f37c4ec3736ad1d7b4cb9
SHA5124971b82123099492baf0013a994e54c5664d26bbc8df6c973aed1e6a0756396078177365741b6d3a9ac50d086809d660789190377aca84af8b37c9808b4ffc50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ebfc6d24ab9e7310d014e1f8b167b59
SHA10743b340f4afe3e3b779e2d8d3a50afcf9a9b1e4
SHA2563c961f2635a18db1479e73e2737de69f2d3c5176b7e5777e407c5450ebf0c147
SHA512c7c01a62f027f0e5120851d99b801b38797edd2e83c7e09b76ff533802e94a8699dcee3a92496acf084d9f3f32eb63f4ae395f86bada3ca99f209ec37c008f1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b93da1dcb3751b111a8417dc0448830
SHA145637119e335b9309a4a429a7c1d589ebbaf4a51
SHA256502703b81b5ed98044ba3f5dd79ec3761c2bc68c515192549447779bd1e1cf9c
SHA51215e9a4a463280d837ecce851183924b1b5ca8ecf65a8866de617db61a4a00e33516eeec26a1abfda2f33a5915678ac2a60d9ed3765c38598a25c4243570fd8d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59daa719ceefc2bbfce98a59b4e4e5e2a
SHA1d870dd7418d96053a90aea3b01b34ef3134749e4
SHA256dd238c60baac0554a65bbf0b465ff8f6e89c214c0cce9f940e0598c1bc653be8
SHA5124c1335b3faada5b8a33b9a586e4756d9be1fa90f93f41b0a3c46d0cfc68643d2a13abf1816aed9f02c561b6f5ef141630351eaa914b0d7911900f96ae1d88a2d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b