Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
f0d2770834767697d2b324b957c13448_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0d2770834767697d2b324b957c13448_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f0d2770834767697d2b324b957c13448_JaffaCakes118.html
-
Size
461KB
-
MD5
f0d2770834767697d2b324b957c13448
-
SHA1
c3bfcb278ad2413d7c297a60577d86cea7048446
-
SHA256
407f912133e9666b87afeb00a9fb10a46a3b6faacef2c74e5bb1de999924d18f
-
SHA512
9db13d7cf2c714db29ce8dcc7af6644aaae15d44b36f0e8a8c8c8b29b91bb10917cc7affe08eebcf17e4ecf4453794f6347b878e094fafc60352e7886f1eb366
-
SSDEEP
6144:SLsMYod+X3oI+Y8wQHsMYod+X3oI+Y6sMYod+X3oI+YLsMYod+X3oI+YQ:e5d+X36r5d+X3a5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433122996" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000000525561118fd1903af86481d67a4c80097bb1fd2564e680e44a555e3d263ffca000000000e8000000002000020000000801f0c78082cde7f5c795cea41c9a647582f79b921159b73a21d81fa16e70144200000006d7f896aba5bccd3b9af6eccc2d55ed3280fcc89e2f96c11331174330727491f40000000336b03c328bad8a7e470abea790d8414f900e3f363ead4292650200848af8eadcec18a4fa3cc2f4b7b140bc7960b1793b82722571e2cd9ed03900a3c7064ab8b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 000e1ea47d0cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA05C221-7870-11EF-9C13-E699F793024F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2032 iexplore.exe 2032 iexplore.exe 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2516 2032 iexplore.exe 30 PID 2032 wrote to memory of 2516 2032 iexplore.exe 30 PID 2032 wrote to memory of 2516 2032 iexplore.exe 30 PID 2032 wrote to memory of 2516 2032 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f0d2770834767697d2b324b957c13448_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c8b2d13ac2af6c7cf41abfae78a0751
SHA1b5a46040b723d91a80e4bc2a39b35de21f0e0692
SHA256b19ac40ae11114bd93178e7adbdb76f1dcc94fb158e423159df556eb0664ed97
SHA51232d896f4c0681b29966fa5e79585f7c8e113b594c001a82e64375b77a628b2513a9cf2635ceb145628112622c6750615d72680929bd2ca10409acff9e913cd82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d790f660a6d815982a5d92fb52f1de2c
SHA14947b0213efd01f1d3cfa0fe93d6345ba1480833
SHA25678b8ca15c0e24ede598b6d6b57b57661ab0fd5b40ed35978c0849713bb2cfa34
SHA5122d737258e28498f6ee2bd6723c074d003be617ccd20d2befaa8fdea2ca71074c1bc20a8ba74fefdbae0200f8eedefcf9f0e90d741b128d4aafa060c604102ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d6284074bce3cb6eaef469746e07cb2
SHA1b237e5bae234fd4c370c35ea521189904c966bcd
SHA25678c587041c9bc9f13b134f4fbf3ec797b418c46dd6e3dda92730c897abccdf71
SHA51276dc4266e14808f6e103cf78a203915e66368b20b6dfc1b49da2f025683570b42fb6b2907b4dd63553ed6272ddc7f6f0b6499713a8d2d2bec4f78ac4b3b573b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7fcf68ce3b0c51af703aed715fb6d8b
SHA123f06e7c1f355c9b523065b0c00be12d0c21cd61
SHA2567963ef85179aa628a7d6f16156c6ad829e891ef735a46022771474eb2beda862
SHA512b09768c8332e044514586eb35c2f4a871fd77a43f0e8924737660d16314b11ef8bcb914fa52225c1a0bc17b14b58ca1938391da32088890b5aea42746923fe81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c468ecf99d9895b4ee712c64e35bfa57
SHA1957735c173ef1a6bb5655665918a8014496868a2
SHA256eac485ef877f19b1e7d758dda6b92488bf0d600c980bd88dc6e2008a4f05ff05
SHA512b7bfde4c64debbf1b33f3d6f6318fd87d22cc8908d9f8be0cd84635530cb8ee4daa6c8218c6e67f690ba3a8eea12fb9c4b0883a9b192dbfcc58d77572ae78cf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a2778e71460fa2b97825468304f24a7
SHA193b9f3bf027985600f15591c36f5c56e7a4d1871
SHA256bd23cdab750d2dc9d484278a1435d9a37174e274bf883e778357e8de16f91c56
SHA512466735147a649dc5291516b470b82886a85d06e39d2fa4f5295638927a15c5b0f80bc618fb23d893366085993325d7d11d2727ea5a8bb04f5b4bab87c74a7311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca6e896b3dc7f06343b82c793edef936
SHA1bf2627332d778c6329c5407ae8741bd86144874e
SHA256e48fc7e904ec6b2a06b96a8fdb69d4053988ad6f8f3501e3e74bf50024988aed
SHA5127d5a65d84b32b5f08ab22c0f6e7cbbb56bf87544a687ac51092c10297680b544459a827c899994f1b8bb85e7e0dda5ab0e00540e57042beb4c279eaa2ad9e6e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3020737bb5ca2eff5ccd3acd940b210
SHA1e4e4dc2c20923c90c8e3c4a98a335a2d0aa48947
SHA256e1a3800009eb14a6afdf1b3a2ac8ce6e3cc78198c18292732286f87bb8117e1b
SHA5127966c6250808af28a5677e6d467d5f3a565354fb4fef55c1e9630b6ed5691ee6ea272fcdcb547314f865a5306bac9a998a21f4d611d2911d368a50b8a3fdf23d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578ccf142a8d84e8896e0ee8a3021e2f4
SHA18b7f3768b779b398119f1374162994ab0d68edae
SHA256c0dad7ee5487599f2683befa11927801ab67a408e4f482aeb3f2b8de6409b12a
SHA51249c1c9c5efa5adb36cf2fa2da136c62037e565bf87b90cf57ef29330f5a3d8f9702cb6c54af8aa2490ea0d32941ca380409a4b45694495272945110d09a83a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5723c48b7271dedb97ad3cdd8e9a63e2c
SHA1ec80e3503fe138a68d3a5414b9197ad742bc8603
SHA25624c9524d7400c39cb95e0867fd424f8d492d44b614da50f8ffd23672363887b9
SHA512843073e48087d78b838230d97776fd3a817fdd8a739ae780ed8d75e353b5930eaf2577e4be2ff4188381075a7d74309401da7d89f768111299d9df7dd74f75c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd367be9e948b83de1af49df4cfed987
SHA1372053359d96f25af77b417f4e2e4c309e087afa
SHA256e097c5879a9eeb7a2fb3da907789110597223ebde7de0f4648409c6beea3cea6
SHA5123d405334a82850fd3952459d57810e0c38f5d8b58aafda1d963e47332419669518a186f11193b33c2363072770d63fd7ba71246062c96604102e26d6c3e8b5f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb00df0559f5ac1dac5404d91796a7f4
SHA1eec385089473ca2b71b15ad731ac1159df116c76
SHA25613ffc100b11b78bd1d5ea34e3d0158523f4610bb4b738020a5115d78efed5b98
SHA51298d1fa0d21ff6adc5f911abe5e5f3bcc1c834295779a013bafdddeaf2cb507e6b3b288dc81b18e33a16f6933c0d4a76c19f8a7dd9538f295f548d2ac91cf62be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561fa536b7ca4d519b51f6fe6d8e2a84f
SHA144bb7959ef6134eb3c4c398126f792ceba193cf2
SHA256814b802e2ae1d0e84089cd537ff8073a0745dad82faa2fef83a371481a49e808
SHA51263608feea1c5300e35fbf0ff95cc3313c8f7b0d1f58c71c37cc1acf713193a9bd25f6c48fb2889a2433c1c1ec765638b7d6ea5553999ee9fb98324d25b57c0a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2a4fb12aac9c932123b776a2f61c941
SHA1f2e7723500ec3d97a0de6deda3be3bdd400b625c
SHA25634c3ba3be885a44d0c2e356ce18a6947d93b8d070a257dcd0a83073a96696b96
SHA512458ddf5f5773d526eaa4e5d8fef3e0acaf36029d1e9e01943a914eefe725960189dbda431b9af3572a6253ddc17b26887f703b52334ec61cc5bf55231f6dc0f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543eba8be71a8cde7fc73893cd44bf7f5
SHA123308665822090e477f3c77a8e991910434ffa25
SHA256a9a0c2f5b8bb079c712cc876088fea3d5601bd3612701de74975476651c49a7e
SHA51291048036151504b256588bc482bf4d0d721b791046c67df307c16cd4b1496fa34dc0111d0895c1ba1d21a618009f1ecd9fd0eed571b3c05a4c536ee03852b759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574b88d3edd5ce066400a596aa5faf2e9
SHA1b39bd11102615725a7b04653cdf622388b5cd24e
SHA25634d37a55e1971b97b5d375471af66108334f365a4d7677ef338fdc23bd06ee85
SHA512aec8e36c9f180ae5142c91fd23c47ce63ab0ce0514e80be08df3ba7106a6a1edbcf844bf821cff7af64d96b261565cc35f90f41bafb0e8bc9ea753fe4cf4a8c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d51f651c00fbf1ea55c7eeaf61152e89
SHA149a326b38ceae9a25803cacaba6a0453b05e0702
SHA25675f5bef44efe3cc3de491c8d4e11a33bf46d9730298bb0aa87db599c0fccd8ca
SHA512c39461571a60ff6c9aad20b160e66fdf674df249224556df81412105b8b6d7d556fa8847a06c4310233522bde6197428f76f12f32161ac4378ee59c8f2c008b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593505a87f61edb1b3130a023825d4bb3
SHA1614eade30341732b358ae1450f6c12ebf0ee8a6c
SHA256093a4e68a3b08246cb1b1be9aba4ae8c7a986413f385fbace9f30680d4ff0bfe
SHA51234adbfdc268015d63b6584816dee3ed5757b8141e2a29443b30dc49b398915af23b3e424703f589fd9914ab7bd788d358386fea6c608ff60531929447b26cb5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546841461a9d207298c2d087c36c8c3bc
SHA1d5781e8c256a19727648e8f70c29561c89ca0ee5
SHA25666ad266d3c431bdff0870fa2ee06ee5349bef86aa0b650f5b8e0d0294a421df8
SHA51288b38cc3eae371943fd6f0569cac74d9794f65a3a8ed4cce516bc9359afb03261aeb2af343aef6c0008e6990ac474c936d473828cc274e2c361076f94fb8c52b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b