Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 08:40
Static task
static1
Behavioral task
behavioral1
Sample
eaf69c8f99232c22cfe3a00ef14ba517_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaf69c8f99232c22cfe3a00ef14ba517_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaf69c8f99232c22cfe3a00ef14ba517_JaffaCakes118.html
-
Size
7KB
-
MD5
eaf69c8f99232c22cfe3a00ef14ba517
-
SHA1
4f41e3991870c7267bb527c312b4cd70058f0214
-
SHA256
bd97aa79544ab69056ce10d31530fefd6214c66137d440388b6e90d148bd5571
-
SHA512
25adda0d268376f2698a33ccf74665a4d76caf99bcdfd4543c0d786e5c36224b35028e4387c799c916c57bdb715bebe598dbfa91d71f2290f08a39979d9fb816
-
SSDEEP
192:Qx8BFw/0AVXLnVFdfb4YpU4bMBsALO8+qLAyKlf4bkOHn:Qx8BFw/ltLnVFdfkYpUxLLOTqLAyKlfI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000009f13b6d87ed1630636a21753e088a929eef53ee288bf62a736a3859e77575189000000000e800000000200002000000090ac86e188755804547cc8ff51bf6e8530046960ee67801aa757094bc7c55de620000000e2f4fea219a4ebb1c95b8a1ee5b9bc52313311c52ecfebbaffd673bb9fc18d49400000004d4993de231a7e34783941e823ff42ac6ab27069bba23580a8f93bc44ef6ae7bc19b9f5695c7bd72d5cac4baa8f13d5ea58133be2c7b6d6bdaffdb51a6c578b2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50011dc26f0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432897109" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DA41E981-7662-11EF-A0E9-C60424AAF5E1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2244 2096 iexplore.exe 31 PID 2096 wrote to memory of 2244 2096 iexplore.exe 31 PID 2096 wrote to memory of 2244 2096 iexplore.exe 31 PID 2096 wrote to memory of 2244 2096 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaf69c8f99232c22cfe3a00ef14ba517_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576027d191f47f83d5ebc27450c83de19
SHA1ba3e61b746458396940ccfa86314771eabc471fe
SHA2563217ce30df75c241eaa3f4a405f68f6c51f2176915e210bccb0fde3ba0dadc3c
SHA512a128a9a39d8d84df499d7f87f6a69e7ec177df88628dcb0dbb847698ba21f1236c94c80c1811b8c96327527ec7d0e34a27176a4e88fedb47c5de28e8f0ee30ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbf131c0c937db54af926ed062245f8b
SHA177006ecb2f6da6bec05954f637c8918074d4e30d
SHA256f54c1ab819b29539debe2fc0a2c06f9077d1168b5e25726e7fa21efa3dc1c6c3
SHA512c5b5afee5ade42f2f2c6ecd56d354976b5a98c4ef2c08733404ebebf2f79bcdd51e48a470d7a4cb0d92b24cd4221570812cdd0b9955e6afb4d7ddd57a6e0aca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd12d20b69469f2c03f7136355ca139a
SHA1cb8d3ab4a1d8d5649d72f763ef6b74198619d387
SHA256df1cf4ae363dc66171c27f419f6ddfb76e61659642f7ab44b7c1232b242e3f99
SHA512cab1bb9fcf5367974b926e0a8d168167da999adf0db4feddc3ad31d13f4ff6d4642de3e1a06b3ac1bdafb28a4e5fe6891b2cd4dc33318cc11b1dd69b82219ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ee0e5d1813b0ac183ccda2a47a64351
SHA15fe20dd344af6ed1a16bc2f95fa1904aee1600b0
SHA256c58b1cf9f4116954c0b08fb84e66ea28eba883981beeb8300cc868b59f1b9426
SHA512b2ac81c3ff678bc8bd118aab9ef9197a9870cd216813ec87b11fc90baabfb75f945f6b4a021ca11279904ebc81ee5ff9a26ac93d368aa3fbf383d35af18e6574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a8a15be15fc51da767982d57b0689ae
SHA15a0ba2c6f88f2058b3dc77e99fb002eb699efb58
SHA25639aa8b3afe300f7870324c2de065a67327c7c9548c8698aae7b7fe2ddb4666f3
SHA5128c7c7d98dcdf691a552e3134591b85bfe2ba482fa1d61baf7e159dc92fa185a27913b96331d4e54796b8a03fd89d53a159a562140af38f94990d2db1f9dfe5fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd132be6058706780421d9ffa9df3a24
SHA1da58ad478213a2d74f219220e190e75a3e35ad6f
SHA2565b9d99513976f1c6ec5c91cada49a534a8fb1829f624b3f43b424dbb8169a79a
SHA5128c6bcb27027f6ff85723c17af6cc530e9aa10834ca24e28514b31ea200a1833ef4d83079a4eb7aed788fbaff8885717cb4105428b2ffcd1b04c5183eb07a3bcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5923f90d99c20fe0656469398f710ac10
SHA1defd48689caf694e0ceb62fc7a32fa65101921b3
SHA25614108cffdec90985400cce1764b3ea62360fb257432a4073b1601c6a8e729bd7
SHA512aec980f4213b3c7312c52ac820454533baf9c0331002b7e437e2c136188e76b31d71d91221451adbd660daccc7e01c7943676541f121b1a91eebd7c91d7897fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5396583528d641db392ef50872f0ae8e1
SHA1fde7f86cac7987fadc61008a0937ec186e610718
SHA25615cb3885ce365db86c96ff6dce1387e8de497991f08645548728ede866c1fd5f
SHA512fd8b1631a58453971c73823217917207e04074dad6664914484d1cf832427944e7e5a8560669f7265328cd723a1d021503ab446d52f250e285c8c54f5447c953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2bbeec706de491191327810a4a761e7
SHA10710114fa6c87c7d7971ca7aee6d3bef90b6c543
SHA256867be140f51f2919361d9df74dc25bc0385b5d8039ceda7475f447a9f187caf4
SHA512e225320ec49d3c25067b2774febbb883bd7a9029f4fda801f72a7a8ad995e066313f454b33f86ed9206ae427fe19443c9617bef5ba920965d50646e88d3c30d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52694344b306585ec2286d21067a1881f
SHA1903e285f284994dd6f66ac8d81d6a060a501198b
SHA256d48d0e73ef94def6032c84e36a19df3d38d805bfcc1c1f376e1a222ed5233a50
SHA512641323d3cc6586dd73908da73ac8c8d07d9632e50965c77fb30f26453941c46c6d01cb7c520d7fa82fa76f43de88627c13a93d4e09b52441d37a8e0897fc56c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535b21cf399a383b5dfc5dd1504c70c92
SHA123297dd611775eef2caf9b735879b15092e9dfbd
SHA256e15473ddb825b4af4d0f2f9ec69ae566dc54cf3853503efc57eae08568798edd
SHA51232c43872d5f32f93576d1368615b87dac827bed8f26a0fea2242192549d3ec5c1393618f1feb45e9d2f94249572e58b441303a7b21b478d4713d17e4bd0f5307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cba95f5f6ca7d289d5960f4a637f664a
SHA18f468801529eb32b7696743fc645846f705673ee
SHA256d234666014bc62bcace8e0ed94eccc46c641c29ff8989c0e7350e1f948cf8d69
SHA51288f0b3b9d6518edb819c0573f3c6b920e289fd749b378038c254d38c85b50f8ea9b3afd1fc0c3baf29db6036b3a2cf0eb4c636a3bbd8678f47ef81222a7b62bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c94984c47211361b46a788bbe667167
SHA1134e44a741c18f2957ee93cbab69c71735610e94
SHA256f2b4560852d02b2ee8aecb2e6e6935dc6ed200ee214e422ad08c3887968e94e9
SHA51274af523794590446da5a6c8cb892585bf4fc3744a18f9ae961a52b2ad555b01d4304fbb7a364d18aa5d1820ef0a2f924a4fa019a28d7ac1eb5e3b82a51a7f994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5551a7e3f3bb5b5f6f390bbb60f2cd1ae
SHA18ff5eb5759fc3e242e5ef231be838bc089120439
SHA256e638f3a1b75d7af5ec674c1f68bd15641d0b6c01a7b25373102144b2b4008305
SHA51250cf6b7efe45a587fa9687f928632ca0259583ec1a346e70acfcdbc4979d5a3036a2a4c0bc461af5b1ad80193eda40bacc43e36f4227aa97bca4c30c3f5fb7a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee55fd57355c232604ef8bc4718f339a
SHA1332823228029c26b69510bf56a13c1e5f06fffc7
SHA2561595455e22100ca589274299979ea00c65312cd96cb4d64d1468fa9527c02c3e
SHA512595dc1fd3752c27f5e450aaf8b55765dd0ad6d4984efa648ea586f2c7015b0b7c91285c391e7d6cc921a5eeffbd555fd55eeb5d82b2bd46ccdc84279dde047a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a814d48166117ea1e0f8155376958982
SHA18e233547588c99100abf7fdd01153b4659eddf78
SHA2566e5275968e3cec67156b4918963f80e9d648f10164926cbf5048681053e694a4
SHA512e42eaa80950d3c4b90bd18bcd997bab5d58a1ecaadd651cdcb0d9f24d2f4e101ec6b733016fc7aa8c655132c2dfa9f979e21175633845da87b7d970aea6a7104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551f758ded91f681233ca6a81b7899593
SHA1fe7e8c02e1572b9aedc1b7a2e0d6fef22004318c
SHA256362930f2023ea841207ce1eed8b34290b487982c0020c10e1e860e0f04d4d04d
SHA51229183c29518d070044093ddfb20a176bf0b3f78697a45eb5afdb877e2f211916dfd175d08e80966bfb8cf5ae52304dc33e57ec901a5aac1c46371bb111f079d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dfa7545e363d89ae789ec2c687b6927
SHA1712db22c9aca4e479f2721ecfb35e01498f99926
SHA25615edd3a6235c67f50b809613876cc303d22cd29ac0a2c295af294c474be74e32
SHA512c293cd6b7ffc9ae1b9afd1e2fa9ebe170eaad474a819805c28239c680eec365127ba0eaab1031251ca8f1904dd4bcdeacaf02bd64b3f06bbe80124d810365f8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c65d612979a4dd82459ec01eaabc7d2
SHA1bc4a2d1841ebaf621fedeaf23f8b8b20b3557a1c
SHA25600b5f6acc54d8ea9a9069c1e2921e0ea9f90a3f19370abf9e182b0b7b5678093
SHA512527f865b7e463618fd19c37cff08982d5f78d199719066fa9d2ba284e4ec58bbdf344a04befcbc20786624e1258f0259915a7ec947a31137b1f275ecb45ad1dc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b