Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 05:47
Static task
static1
Behavioral task
behavioral1
Sample
eab2a7cd0a5f88e010dee73b891fbdc4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab2a7cd0a5f88e010dee73b891fbdc4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab2a7cd0a5f88e010dee73b891fbdc4_JaffaCakes118.html
-
Size
32KB
-
MD5
eab2a7cd0a5f88e010dee73b891fbdc4
-
SHA1
6910129e55ed251d89c1c0996872a003f7f1aed1
-
SHA256
5deb67a55f455f4e793957d2c1d98b90648cc5e88076ec3e397ffbe8409a8525
-
SHA512
d9bf35f9577622950a6103fa328de1f9bbd95724acad93d3c59bf0592c4cc1092a1d9edc3581f9555f87170808cf46acf9b2d2c4e3e9d50d3582561de90a7e7b
-
SSDEEP
768:pqvvrbl0209D4xqUNNxBqPgIGBNcLQzRd4OPo9DCXOXfRe1:pqvvrbl0Np4xqUNNxwPglBNcLidto9D8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432886691" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4027956f570adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{99480C61-764A-11EF-91D0-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000003c04b66937b7a35e4a8d4e803b0bb1e7e821369a749bb9defd2b5b0189fe306f000000000e800000000200002000000051184c4d7b769182997f4f7069574267649a9b2b7429b89790ff507995cd051020000000e1ddbf424cb12b0b11b44755093627a2171e78c9f7e875949bc4c0c35e8ecf2e400000000d9ae0661a4fd78562988c3310670b6457c19cc52f0dc9d46da191cf4a1e74a1b19ca70b07354e6b352d4dc30631e81a714021e0ace147380b71d05a14e8fe2e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1636 iexplore.exe 1636 iexplore.exe 1880 IEXPLORE.EXE 1880 IEXPLORE.EXE 1880 IEXPLORE.EXE 1880 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1880 1636 iexplore.exe 28 PID 1636 wrote to memory of 1880 1636 iexplore.exe 28 PID 1636 wrote to memory of 1880 1636 iexplore.exe 28 PID 1636 wrote to memory of 1880 1636 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab2a7cd0a5f88e010dee73b891fbdc4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1636 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54437aa5a6d30bdf578fe77d2169d99bd
SHA126bec63b18120f340b0875ae6c9d1d091e823c31
SHA256b09a2a2c7a98a398c366b9824480e137f725c5a2d02235c99ae7d74441445aa2
SHA5123c2731142c47cc2079bad37362f3e1fb25fb6992eb9e8cc15448cb59753e5b03256f120b773cf2ca76f52dd6783ade348eba806a4908cccfe9a9a8a8f2b97bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b555a6c142589adf14fc8482500c8974
SHA1c47abb6627b63db50594f845b5d383dd034c0b6e
SHA25602d52e2b516eba96924f17a2fffcd94ae5103c2df9605f9a30c91fd84197302e
SHA512db884d02855ecda11affe4d9fc8554d41a5cd5b1a05eb5e83af2133d953939aef4287d656adadfc628c507133054347d058711457ab13ad5e4549deb2d1c08c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4a332a024a2a0366d4f82d5164d1a0d
SHA13a01989e1566ba05ec09331dcffee668eb52fecc
SHA25647bdedbe5d6e7dd07cfbab826263dad3a91b279dd41f72997603d99205b915ff
SHA512ea8d6e264b0b3b77e2926e65c819d92c544da82ae85594932cfd65c43913c1e0b2a567de48a4c15cbf3a611d426c17b8c4e699766b35ad103af5fac489fa703f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d1e94dec08b7dff2690768598e90084
SHA197a7b381d8d60a61853d49167ea0066a10a86ee0
SHA25687fcfec0ac21042b58fdf792e9613345d31164cfacdecd251bc920464f64344d
SHA51273c23171f3ced51eb8ec4c53d3290d3745d4392d049e19c576446a34b7a6976cbbd541c8c01048bdd4b9783118978d807b2ef645ceeac5ae288f11034cc20ed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5887bfb294d7913ef8391249cdce09f7f
SHA1ec51ed264d0a17871646792b29f2c97f8340d522
SHA25697875656d040e69abec26151fbff7c99748f245de8bac6f10dc87564b3e0c9e5
SHA51239f3cccc00bcdb694baa57d2eadade38ecef618535bc9a9754d8fa963fa8b5877b35947d550fc4ff555ac74d4cb26d69d35a321d7fa8b6e858b297082d06f5c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cecb5b771c499b20b00c2330feaa7bf
SHA113b11d18f2112d679ea599e2be70a8b766d5b8d8
SHA256b0e31d72f798a345feb0ea1a04d2160852d3b796af1188b68caf07581d5acf0f
SHA512864a878de52c0c7e84b6ca7c7cab58893ed54304a7e3b2dc3176022fd39498328efddc65278056402190d55d7dcfb77ce8c6f1e9f41ada198f406969a20b81d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa2d1e3806b80a84c5b6395e9c94e3f4
SHA1fc02368b1729c9966a5b5fdf62c0136e62f0460e
SHA2567c9ec22d45e2fa4ca03e5aa76f72408e6c45888f89c768ca840fb63b46a3fd90
SHA51243d406401055ff47e3a43db1c57db9975274604292b416b2a85f67597285ce7de412d3d554ad4a5062b64989953ba8f98621eef05dacef962a8588aa31c2f703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5488924a438cc831d00ef917788dcbc54
SHA16a673cd6c01eff4ff4bc4ce39805edf297b25852
SHA256e206296c8fc2f756ec9b903d59d4035cffbe7264936dc8aaffd70c5ae0ba01fc
SHA512b93db6e4290ff41cb15c684bdbe563a722ab8669389487ac9e87d542feb80896aca34d9cadf069c80a6da391ddf9ac2c8a1d3ad21baf148c8bdcd423830c7149
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5c163994205ed4bafe1adaef63e5969
SHA19e96335a6f8122dcca9b569a59d343bcc13566cf
SHA2563460a6f55a7e62cff70a1dfe8c504e32032865834e99223029f8a047e063f2c7
SHA512976cb587fb6cf2073d383a3bac410d3c246e56a29da755f0424426430acda730bd39be84997059b1a8e55955318710decdfdad7321bcca2d5dfcaaf409ed73e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c1f6ef92ca6440018ada87e90699e5f
SHA11ae77d48b03b433e28b25a93089af9126b1e47ef
SHA25613b25975737b629c2c0455683b26122afd37bda4a0deaf6a395bbf46ba0498cd
SHA512e5dc9862463afd3703b33f98986c4579da4d24a12b9526de13885443e2523229c70b4dd8d3b7d2331a9dcc31bb8c8aad4058856f98c35efe6817523a5258fe54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556d1592b4af9ab50b9745dbe6fae78d0
SHA1bdda4ebdfdbd5ea8ae459890561599fe63c22640
SHA2566eea54d54ad0f5ca1de61259fc5c23a7f8e21c3b28167c1f0b736b6b7d39f2fb
SHA512f0405b8e1715e1753712926218329beacd50c3d03018da47933e8b2f5ac2d8a1eced0460b4083c4be1eacd00cd2b335e8c79d89c518e52bb4041c9a16c2d9127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506ccf6386d4ee0a81bdf7ba0e5bcfe3c
SHA145b5b20f9a30b80086213708d2f6f94971b7637e
SHA2568f2b3be691148ba5d1db08520afac3d7d7288dadd3432c429dfca55997600116
SHA512ee526be05b2b4f8d827e43383f92c5d27a4cecdc1945afe057fb383cb2384b260c50f7279b77e9e2b0b79e2b6c8973819a80e8dbea5b766fb8ded2b968750f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a40747ce63d915b4af5eb91678dae9c
SHA187401e0dece11a365287365919c4d6ba60f40fc6
SHA256c4bff4c83cadd23bf7fb7da057a975ff89b4a22fa3dd4b87feae7d3eb5caf7b5
SHA51214ec11667c5e1f7b6a576016ea67f1cbe7e8d72d35fb2df62dd995e8710bf57b8a9dc86d871b7dc796233f2e9d70bab58efb5cc8dbeab84e71893bc204972f39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4e1286d947eb6a59e7af8f8506abd18
SHA108d3a4c72f33ad456b07871db99c4a7fbb9e234d
SHA25663ae86d45ff13ff131f269f1d081d8226d77073378729e593f94c68f165267f2
SHA51282e5f63b8060c68bed44866182cc092e9c7472fbef5ce8e621bdca076b60ad0acb925ecb6808afb9b2e72e8e1fcadee061df6175f3b6be6d8a9a59f2ac4b0326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af7b6515c7ebfd4b4d4584cb59d0d249
SHA1669afe64da86d020bdf2457a5afaf82342c914a1
SHA256350bdaa5681c31642712848386d3376940181f0719ff05af7f91b20f2b177f42
SHA512a55d21d725bd8f4bd124f9735e02a53d3ed68020a7f97615aefb7498033784b4b0649705a0d68b3ce49d8cb93b164ea3e1fde79b78246d503e34e610266792b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ef610efc8b12f7c5bd38e58accd1ad1
SHA1bd9e9e87b4175894d6d5eac5fb68cab83cafe5af
SHA256059730aba77b65dc36859ad400bd43d740f8b0d4dd269f2d45f087fd556f1f78
SHA5125db9869aa692997994185954c3cb1d6ae8af674c89c8901afa9f18b3925b6d2ece680dc96ff89d693c0f0d7537c04828e14f3f0ee4ca4d2268cb7997159f5aea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503232230291c16a84fda831848e2b685
SHA14780dbf934c2ed73f17835e2e1d87535afa66217
SHA256fca1d296e83d5c7ce266e438627234d2304eb5d84da7683c1e3cf5399537353b
SHA512130e1cad5e82f8413d7331247f7618ca1b4c1017799453177f136f06cb076906b19248e4b3a41355940da0ca30e8339b22db1bd1af0e79c55b7ccb2006d60f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5572bcff0b2e39810ddd954952249d9a5
SHA18ce29a0591a3b8a95c93c75c557517efb1519965
SHA25611297505a633df656865bf6dd359632edc4560886519fffacd2ee9cbf2a271c1
SHA512a87953f12824ea98e93f0d241da68e748c242d4e9988f633577d1716a38cd428c14d6bf93df4fd91f372e276bdad3eea72893e56a0521a73ea03393c2d61c08d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53026d25d7d85c3029f79aeaadc121240
SHA16eaae5dcbfad46e5e655f3a36168a765f01be972
SHA256b324be13dd151b9ce61d89a75e378ad958cfbb1267af4a4f383df422aa0ce82d
SHA5124f24d010431edbdf6bad6c834006a398249e21ab64a4cf2b1cb30af9334d585eb41756765c6c4a444447dcdbdeb56e0e2cc1df5b1552c146d58df9aad727e284
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b