Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
e0187b34276e85a463f6619902e302d1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0187b34276e85a463f6619902e302d1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e0187b34276e85a463f6619902e302d1_JaffaCakes118.html
-
Size
1KB
-
MD5
e0187b34276e85a463f6619902e302d1
-
SHA1
5222566ac1535664c9ac08a9fabc0ea27e3abdc9
-
SHA256
f511793d457643f9b8f4ae70aa883c12df504c4ee02ccc481fdb4c92467dbbce
-
SHA512
0144226a92009ce22cc9975d837914a9c03cfcd252c91662bd7709eedeb9b7a22c5fcfeaed5225a75f75fe57fc81bee80afe921d7b7009d5b7b5a6b6ab9c4906
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{38D19831-728D-11EF-8EF2-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d02293109a06db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432475505" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000ba5ff35b7dd1b7a5434c1fddcdc230695481b7f1832479291bff2fa6c60ea9e6000000000e8000000002000020000000ab55c93ae7f51629f9128834628ac803c306686604b55df89c0bde61c8f8803620000000f91c2fd12a62c899ba186e8b11d4aebe58caf7fd18eb94fb70cbf7cd551f363640000000062cbbf6499d0f9a443431eca687edfc823c099ec25cd10e6d8b40b9cf4eadc13059399f6bd710f94663ba17d68cab9fab2b0e92e1b7e86370d328b2b8721145 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3064 iexplore.exe 3064 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2728 3064 iexplore.exe 30 PID 3064 wrote to memory of 2728 3064 iexplore.exe 30 PID 3064 wrote to memory of 2728 3064 iexplore.exe 30 PID 3064 wrote to memory of 2728 3064 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e0187b34276e85a463f6619902e302d1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa0518c5a161479c86c29b3021ecb0dd
SHA109b0cf3f4ad0ed6141b26c589af7e43c68731aba
SHA25677f19088fbe410ec68acb9ff5fdff1278e6f6faa41f3db7c4e2f79a9252dfb50
SHA512bae2b31f92c36a8cbd1630adbecb5c25bf8fe1543dc1c25843f03fbdd8beaa0a8f21297c3e352058ea9d5237fb11e628827977506769aae43d1d83494cbf0acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5993ebefd3b85601acca9912461c0b120
SHA1af44aaf1a3083fbbb21319ffb9d4216447620b43
SHA256e97ba74868532f1babf013b3bcb22d52d0c3f4e7e0b1bd03c07c0b56e2bbfe92
SHA512f936bff40e629f732758b96e2985931ea8659b4e6dffa565e1c2c959aeb0e858b38d2233793b70fc6bf8a9242a98e113503538ecdd23e155fa05c8af5dea0f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5082ef2e96277ad9fe77cb2df532a8f70
SHA16c377276dff3f47d497b93af1cf058431b8de1a9
SHA256a73136c5d62fb5423a232521714f6ea17f94807c9298c9230bb910d492128afe
SHA5129cf109e21e64545b804f665f36713c9072f15792ff42f7e8c7c696cad31017e71490b77f655995f388993e76f6ab93b8e9e21489db9e708257756049f23d3f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50de439412805f0c54c3fe1a210082de7
SHA193272bcc32384c86d788a442e7e4dde452d5f3ee
SHA25609b1c782b6e4ab06a59f421868b42ba315005cf872b4dbeecbaa21ffbc3e6a0e
SHA512c1d64b0e19c9506ab0278bcbe447d6446786a8b0e153869cdb0150240dbfab35ef5bd8d6211d6d0e199b11e0a1c04950cfb7f57d8748569b2b90f9708bba3321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65674956d76d203f3d4b7d796b1f6bc
SHA18b7f7d1263e4853b4b51213318927e3d879a45a9
SHA2566922da59f6a8cce77db20fe17c1150bdb40ced81a0595fd87cb657c4604c3397
SHA5121f2710ca010faa695cb652bdba0e3c794b549769678c80d7a4f400809d2ea1f3a1758b99eed0f9b34bdf46606ae4180e74606b2b5a565cf2198c88f4d9b62f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b3ed1635d804162be16dd0b1b74947d
SHA1d946aee9d2df30f2109636e35dedc38943291e27
SHA256211bfbe190ad6554ac732db5b4afca572d54a1ba7bc40b7835492fa38baf6517
SHA5129ac484af840ce86be32a3d1412974d84692b3d442b128dd709d0d4ee266269a2fefa87da8919510993aa8cf6a12c5182e3c54daf33560eb77462ba726a7af015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acd92e575016b315bfd5b819a2b844ac
SHA19456dfbbfebd5f71e089c35aa20fe91d26d2871f
SHA256128ec6109965a746bf15f52b5dd9f580aacb4657c1470a9f9dfb1ff11ed85a1c
SHA512f9955b991ece36ea2f195361e095f5e4508c0f09576fbbc12461d99b61bfed7b7d800597292c31cb5fa03267142be8171d00ac963b01d88dbb11046a2fec022c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beb78f8a326f8503fafeefd4fac5a106
SHA1fe4e59cc1d3a69a50a01cf8c71b9248613f6fba5
SHA2563a9d85585acaaf5804c01f7de693661dd47d60d343d20a86467ab3dc9d1f4513
SHA512bc26034c958b2ffaa2b0ab4afd7c1caf8b8dd8ad4d664bd9858200f3b414a20baa8bb70817e9740bfff2d2372d26b91c4648eb3aaa672ad9a28d395f05356423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c1188392c2d0070c8823c783410f0d6
SHA157c498052b07c60cb9563dc6f1da86e217d1e29f
SHA256a70005e47c553d4d81d570f305ae38ea673cf8a9e4ff07c33d9a57b36f79255c
SHA512a753237cec3d0e923cb121b672ff54c9e64e6d51b3e7ffd5a9adb90ff4b1da562e2a7dc2556cc8890fa74f801537774429dbdf4920373c26e51e6611ea5bcea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d527836c9b552302a4a3e171609ca00c
SHA1ab9feedf10233eebbb257998a62f7195b66033be
SHA256a8c5c22813fd6936902cac64c76f83b5d88c0574c41a0d54e509c8b187ee08a8
SHA51272da55c1c4d2b26bf38b7fef24e241d815eb2a4c1e0477094c8fac48550412ecd720b21f9abed325a8bfdd004d2565ab65a7fb3e93ea2aaef6dd959aee0fa869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5675d1cb09f33a6dd08700af08ed73ffe
SHA14a822bfb2b455d63e1903bf885125fba4957e8f0
SHA256fac5fe0b5e635d3d56f5a2a17a2b125e6e48dffec20e96d3da6b1f761ad82819
SHA5124bba2463ba1035a38e3b923db200412bff62d36897ec1fd4c282653f8a1ca49f5bb2ec8b8b274b6bc08654231f46c1ed2096b248b0cb5af3d452d827cfd9dad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7ea2c727248a971fb6a9cfe36b4c3fe
SHA1fb23237454800c68d7c950de44cb7f66fa4d1d78
SHA25615e2c71866032e25c08e1b70e07baf7134a947434d0cb2459944d0e9b3e34c60
SHA5127018e6e3ccb4355a1a0650630e43575c94ccace5da25978f7dcad0e4cc400ebb0a19412939ede03dbb540ac5d9612bebc867c09fdbd2f43cb757c299fc414f5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555538b0a98fa72fbfc94cd25bf41caca
SHA10c3e8e9a698ea99e774d88ecfcb53fd5e5364a8d
SHA2566756ea4c988f313420b6be1b84a669c6209086c20ef4e78d9e834c96a662166a
SHA5126be23184c9f244204172ed19cc6fa73123d48ace6a7ef960d4159455ca28b67c0b8b262a41ffebde3422163a09d3be4f3b8e57bb873a87c1d484beff14c91375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5806f95f35e0dcbe25d459f1ffa6230b3
SHA1f5b3b3454ca0c6f27ce1696d5a33f89fd6677497
SHA2561a0eb6515211ecc0b1444931209114f6e92a4741d212e05d4adaa8a1f20cfc8f
SHA512685ea331efffe418795316244a84df1b1fa972e736996f5b79c0c43713fe55ed4cb06168920e7a7ba182158f0e9677d277cbe15c39e768014488dc606586ba98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ddd62e5a34a8b5f9bb27ff2f46e9aa7
SHA1c40dd74927c016f0ac861dc1684f849916accbff
SHA256130e81abdbcae2a38c486d4d7b6cfd90cd66851854ab8dceb365cc9c47f884e7
SHA512caa87401eb3edba52929ccc045bc6bdf514a4a2866bc00fc1f03692ca588e6104bea96189f219d0d9e81425031f360238a09a8611a7d00b257947c80ec2c92a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b43106e4f3cb809b34c644da7d20f58
SHA1a2538e6a705cb8e56947770b2b84628fbf7b21d4
SHA256bf7d54829cde75e1ebbc9f12a47cd84d1d36c8c180736efdf8872eb86b66cf4e
SHA512419fbe5fc95834e5ce657f68174f5d87c2e9dc18905f964cbc2c202c3e6907705dec833747495f85204726ff08e029b69611b6f2394e0877d6c70bf540ccb246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546696ab9a533178f9b6c091048228d7b
SHA1e78c10104b965016b15af9427adc4525ff6c70fa
SHA25690263e6a181e7519bad93760ed35c94b4fc5da98e0c4df12fc6fe9edd58c5d26
SHA512985c85a6449c4dfb2ad92fc8add7dea3415abbc4011e6cb3015802c49c6ff5dca048d23b4508233b600e25ee3be552a47c8e19fcbcd22141df5bcc07842c4963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c50262a293248173ea6db79dee716eb1
SHA1219b7a987a550d57a30c4db791c0514e84ac8455
SHA256c57c47f529d99f896094542ffa700759c87e2a944a6834f349c5c1bf5a62c606
SHA51256709a1cd75ed7633e6214b61075fe93df3878f9b2826de1fedec2823004446e55ca727c010de19cf7bccdb154e21a5ca0e774a861c6f6ca1291e814007e8754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547f5449fe0512b1eb2cc3c0a64b30a3f
SHA10119fa39260734cfc1e8d759f47a630183e31bbc
SHA256ba9714a7907ab0db3e4e746c57ca6cc6bbbb7e44b83ea07435c31ddbbefe88d5
SHA5126f65f87e25f378fefe347b97c88f035d577fae803b097fa40c04906f832bd457f9ff0376a84d169e40628a20b6d942fde1faae30b0effc2a595b02bf9abd6b0a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b