Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 05:57
Static task
static1
Behavioral task
behavioral1
Sample
eab65c64d0e9eda4906f11e0c5711982_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab65c64d0e9eda4906f11e0c5711982_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab65c64d0e9eda4906f11e0c5711982_JaffaCakes118.html
-
Size
843B
-
MD5
eab65c64d0e9eda4906f11e0c5711982
-
SHA1
72549e5fb8b734cff665d36fe7c619ad5d4df3b3
-
SHA256
016b165bfbe03b55b9fd325fb6c895095af9a1a4073b7c167eecca70be358a48
-
SHA512
19b7f4ce1bf2d3c762deb2515711234397e0b47fad101e5283e5f7202bb0fd5d383d4bd0c842f5dddc7b6c9b6d0ccad157992040acdd45aa3c5921aeaf404f8c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887312" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000bca065053d5206d12458fd6d8431ff7760903fdfe47bfef22964b93b4f552e4f000000000e8000000002000020000000ca3c8a473a7d3c443f29224a6cb44154c3483716d7068978a147dce77b66c49e20000000267bb162ef9dd370da81ce5b32babb4eb854f782b59b8e0d83582e228aeb89064000000096d6eb98d237a01ec7fcdcd3f0206d9e4e657c08f4374652c19ce784df3e9bda789d5395f601d5ddfe7f8cade0f35178150a3cf52fdc391a1e70240c48ddff8c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6083f9ce580adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B73C031-764C-11EF-A742-6E295C7D81A3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1876 iexplore.exe 1876 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2812 1876 iexplore.exe 30 PID 1876 wrote to memory of 2812 1876 iexplore.exe 30 PID 1876 wrote to memory of 2812 1876 iexplore.exe 30 PID 1876 wrote to memory of 2812 1876 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab65c64d0e9eda4906f11e0c5711982_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a25d2fcb6ff69d705e175431ee651792
SHA19318bc068aa96f03c0d9c3d93acc3bd89a375565
SHA256efc5d2f2d7bc56944b51a8c5012d6878e1c07c0a33c4960d6f2d5cdacfa915f8
SHA512f649c118f504b55e09e39cb3ca50c8f7719b7f50e725ed69095ca3ddc171fafe0596e61d4bc2bc736b5b273f2b6dcd59eb24abae0432e38f1f658cb9440e5063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5521f8545e1d0bf385aa0a2ebd963d9e8
SHA19d241144390734a536e1cbd3da4e17a786678cc4
SHA25621d2b38cb0dccffde6074a7981e3cd5353d2b7742ca4f66d395aa736487e4262
SHA512c53405bc65191e8cd8e489637430560d1599f783418cc12c053d60e84e3aa9ec058581857ba40a3e22514f71e0fbe03039bdee2da56118f9cd3bb2fd3913cfc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517674daebbb47e4485792a2e73aeae97
SHA141577c7525b8230cf76cb8e6115f369d011c84d0
SHA256c6d5fd5bf5218ff55e09d521d48990ff8bd6c59d79e4bb2e25b74889a5215792
SHA512a637de8143a670ea2ef07172b3f9d1788f1d33af9731d62656cce3dd0b7d45d3fb155cf019160be15b5874c85435c26897def5305ee1159576176bbf6dc539be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50225eb221a1c7cb0f93161a38ad1f866
SHA1c6301f39c9457c7d5a0bb4f466db79148b614fee
SHA256492585f124539cc5c2acfa260ec7f34320ee0948d3960b53810816f13fc3eca0
SHA512006b64dfcf0df10f60e25e41b4e314a2882ded2a26120ac1f45932cab1b790f902ea3246d22c96ff45ef5f11c688a03d5a8067dc70c0e13415eaf16d14cd52e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576535c708d6225ed4d8974396f3e62ad
SHA1d3fc79cc8f0c63d57c2dee40fe03119c38a7f7d4
SHA256eac90bd9fcd48decefac6aee87e7786dcfa6eb3f160e61400d1d36d740412549
SHA5125e4fc52aa1ef2e07dcb7cfd5017bae3914af10682e5bd030b215b24a52f9caa8c3e91ebad4b07c25b46d460d588b356f9afedca502ae86db7f57dd8311763267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55200040da965902f2d36ec5f98db84a6
SHA19e66b0c771f6a78f47663851ff1edc79a6954dae
SHA2562d4ca1321fb9f2ccb6902c2dd91dde22bb440dc17fb092339f65df2f2d3973c8
SHA5120921be6f4274324037ee4007690824805910ba1d54e4cfa79fd57f48ea2bdd8c197b02149d3589be2dd022d2641905bf1c49ac2a600face7034530d444232af8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b063120485a2233d63636cff92a2a784
SHA1b104b3d4ea3bbcbe2d302efc03823cdfd7dc752e
SHA256882d43c688b414ed993eca872e2d9efdf6382644931a1a1c28787ecd0d856ea0
SHA51231f6aa5802c2e134eba8604aaa2cb5b74c0014e8bfcc7ddae698d6dd817da30fd46f012215b6993c90209acd25cb4180a6d5142dd1b6502286f23e2332f0a680
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55deed925896d9273c2e6670cd8f40d05
SHA1f47daf7b27abc5c6c0ec66361c7ac39c0521ff21
SHA25682b8e6eb8d8711251d6ec8ff288c07b4a343b634441643718d7577ecdab5db09
SHA512c17860add12c982bd19499470d28edfdf692b9f86f5e1c014954443e42c4cf02707860dbbdc0cc361120199b0083553d00f44477bd1e7b587e80b9f5f73e2e36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ac0248279cab3aba15a3261c55fc7fb
SHA11852aac66b228be1a5cc12745247fda4b7e21705
SHA256a7cf5c4edfb9d5cd1705ad36d98f1848f2895085f607db9196f808aa1d84d094
SHA512c0f11ae129a7e3749cb09eadf1a112a5e077b53ec0bdb3646d3c0575c9dd09399159159991050c4f5843d6fafbf789496296e77465f1791e7ba91bc75abcd8b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad8ab1170eefebbf1d582abb5ba264b4
SHA16e71ddc8caa39dcc0079c6bdfd3f8420eeab54d5
SHA2563066061c94d81c3ac841c57494b17a2a77df473e224433efa6daebf98100baf1
SHA5125cf70298b7ec966556ea0eea599a9a3ee6019f7596f85d27e792d6be1c0b575d536005a8b941ea8380574a561717632cef1a0305dca84608331eae5d648726e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb32d706b277f1e74aa64b201d102b06
SHA1478e534676f0da87b2f15be22d422b5287884af2
SHA25668978954902173113a3019d11edc79035ef8cd2bc0901ff74fb18b34cafb670c
SHA5127badf94a8418680157cb5124f58e45b7416490743dc55cb5802d2b2b74b928e0b72df00c1811511c0a9b827d24e6bbba33ea6b6881dfb08360c8ef6e428d37a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d91b3747428cf96ad50b775feea50cc
SHA114660493dbc3a040bfaf93140e3788c570dda06b
SHA25640bdd56a91c50114910e4028531d2c44ddda239dd3daac3aa1b5e222e6f307b0
SHA51289e9657311697009091c93bb329f8591e3ae3acb644a2bb7dc2c1f59d5dd7f6c32f4fc235bcb8db24d2b8c5815773158cfe29aa395e00ba4dd3e2cc47c47cede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59611168ab76153c81e8daae33fd5df49
SHA1cbb627f370ccc212a196423fb77d2424c0d9fddb
SHA256cf63b26232027e0a930bd3a5681d6286c679d87dcd51f592789b3aaff3020b1e
SHA512186d7928a38a4da2f2ec613351931f58215d524a2dc36888277a6811e25ccf201dbcf29eb24eebc5062b38798f85de9c79ffb03e31c8ed2052b4491b31c20e1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae02ebeb587823be9f4cc6eb91771050
SHA138f67d4332ed8efbf719fb0de995d3ea43d9543a
SHA256b8c7ae7dd20f9421c55252a0857ebfb86b46b7204945c6ad3ee93d92fc8b28bb
SHA512666430077b0d04749a45ebfc8dc71d476d6995fba6e872b311a52bb8fd9c00f9f7018e8e34477605c216c2a56aa834010b4d78c9d235ea1d1b5417d8d2ad323c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab984f980638b911bad6785e54df6b56
SHA1ba9fba09069b8dfee6623af1eb1aab3bd6d533b5
SHA2568f444fad2e29943d373211f9177207f893e67b768f1f9d46ce5b817f2feda292
SHA512ce8e56ed3155e81da802d070d6d527abd40b66aa4d668af61d5bd851b637a7f60cc2328324d8a0c4e8e9c31a9d2d48619c3a8820ceeeea97e71ceb66361bba73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd63a1f530e2c99c5af791e35e117ef8
SHA1ab1f3db25d4882030852f171c66e3a26fa55ca79
SHA256862266d947f5e6c3c89e0931fccdba4b0da117abaf5e95d26bb092bbe65f56d6
SHA512807682b1f231ae0c63b333a8e4320f61cbcf93fe2d7b15673c02efe971e2a703ffdf7f15ecac99905d48f2e336cff8113c9ce37f714c3825fc9d4b6539f7538c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b9020b6e151d84df2e442d16c6a7d95
SHA18d917c0491388f934349483dd46dbc454a678c28
SHA256a86570cf4ec3e35980b29f0c9fe114d04cf2e2c41969ea1fce2eef1c665d3085
SHA5127a99c01fe2ec3ce7900eb4f91600b2ba8754d094d90bd48a28c31563674d2c2a6d3adc91886d4b6543bcd4a439ad75e2218be6f4fc5daaecd3b044331d25361f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec7c273bbdd8647ffa0b98b7e85af804
SHA13e3ea3111e08244995768da351f9505114619f80
SHA2566a5676eb9d180d74c9d9af8d692b0c14698e32ff4fe9f0e6bee45515ef9acd3b
SHA5122e9a1fd04fdb851030d264c5dbbd0aebe0d529dee70a2bacd01c828ad41b4ce76e31035104192bfd837097033482d8c2ecc6bc74ca8190f3b64ea06cc112909f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbbd5630c222e75a0722d70bd2d5aa08
SHA106b20a4af9e219c20a1db1848131e3eb453601e6
SHA2564e78a11df35763bef1fd695be4086821bbe76d9c898a6fe140e7b7c2b3c83b1f
SHA5120a7660f1f6a3b41ebf966ab5e4c9e6c409a6ec6775fd6e3163ca52bf5d65153ed55e6912465a41c5dd96f3d3f2ba6949bcaf899474b4ca1e94090a3b76135e57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd723f2752f14e95a718ef600dbcc307
SHA1af6693405a09f4e3968bef99a0cd17787d661874
SHA25663471fbc976d0657372c721d2fe0ac73fb3eee9be9e8e80e40a244d6e3a8fd6d
SHA5122a6df8039bc5df158a6e9520749be9a3a6f92a69a47483476f2da286f0d862a9a4ebd288f0f71191e448442ada026f79c85fc56b0138fdfba2197c45376fad19
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b