Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 10:58
Static task
static1
Behavioral task
behavioral1
Sample
efa56b67953404334423e6f85e9782c6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efa56b67953404334423e6f85e9782c6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
efa56b67953404334423e6f85e9782c6_JaffaCakes118.html
-
Size
5KB
-
MD5
efa56b67953404334423e6f85e9782c6
-
SHA1
1507f0e076948383df106943858ff666a2d934ff
-
SHA256
29151a7fd6bcaba08d235cfa9e734574c8eb2b5da50ea69f92e0be2e68b53a98
-
SHA512
cfea200b2362f509db1bd6f424b83c89c3be50d4b5005388191f2eaf57bb69c0ceceb83b7f67f577253877add3aa8c403c7261d7cc8f20ca0f31f3224a3f9d46
-
SSDEEP
96:KZaKIifmrg5foctItPFf7s55wn3ZkunvuXCZDf+:KYKQg5fofK5+SkGgDf+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{724070C1-7808-11EF-9AA4-4E0B11BE40FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433078182" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000099bfc118ecad847a2ab18f2d3a8719c74a03205a6b54dd22122f7899757309f8000000000e80000000020000200000003501794a4e5d0159939d8547cbc187f2c0a9b3d42ba2b6af286407aae70847f720000000334f4e462ec0120a0dec7886f3b40bf0b795aade44a1f682e3123949c307faa8400000009f59f35bbc745acc146e5b8e9ed52acd3e0c87b80b9ad17e37913f13f0ef6a6df9dce81ccbd9e6a47179aead201f93375edc618b91fd6c7f8ee3567499058b48 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10a98649150cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2308 iexplore.exe 2308 iexplore.exe 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2456 2308 iexplore.exe 31 PID 2308 wrote to memory of 2456 2308 iexplore.exe 31 PID 2308 wrote to memory of 2456 2308 iexplore.exe 31 PID 2308 wrote to memory of 2456 2308 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\efa56b67953404334423e6f85e9782c6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552430ac57830b6776b7077dd808e1820
SHA169dc1fe68f507737fbd8ba870dcdc5dc50e740c7
SHA256546e01d0c669261d753e0aa4ffa6e3036f0e7ecd9bd5697dc2dad330889bc42d
SHA512dea94c998460e61d92969aba3f19bbb4446066678c5ae5d0cfd44770cedb1c94ffc638e3e82624e78eb085c9812e57552151af59aeea55905835dd9fb583b73f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eb8b4ce585e33c2218de0315f2cda9f
SHA1c89e76e37d2f22d13f030da838b23b261164e619
SHA25628cb4771f75b7f96139a1927f5890d559ae56dd15ca9f6d3bcb58b7c50617461
SHA51297df7a54fe16cba222277e74e7b3f1c793a94233a8c4f2ab5e3aefb5ab5084aaaf981329692960da19d39dfef04097a4d19805cc07a791a7436d39021370cf4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9cb6de06cf26532298fb8d048658d2a
SHA1f0b248de40371a9c1ab2675e537b7fea745a4c3b
SHA25621efd7c439f29ebdcb0291ff65b16b6c97ee523bed34b0cf156708e8a8c8ddb0
SHA5129b3d8aabc56f76b7a428052b8f4078cd32b9c7d92e05e20603e00ae3e63207dad43d8aa5aa29d8cbb627432ed0697049af84f2145ec094dca119b1ce4092dbf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9d2d43d9df3dffa37ae2b8b671fc5d9
SHA1b8b9cc2d51cf65b37ddaa90c0a41ba1b26153836
SHA256f503cd35fc41e4716800a3828b6fcdfe930626ad6bb0ecb9491b008facf2e0c4
SHA5126f23580e05165ffdccbf538fc99d7c2fbd88f4feca697beb53d70ab2ac62ad20989da69adab50df4dc47de22a7e885b711c1f411c908450fe41b8ec64d2114e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b8e4efefd11c12d888b5a6e39832d31
SHA155c1e21009e578b431b8e3c22e65849d3346b380
SHA2563ac1e0375f8cb46348800243a027027953038f88952c9a67910adfc36fd96fe6
SHA51288192bc1b85a9e4b58f641fed33a710f90768220cbffb59c2d2f0c34be3f6d10aa77935bedce5a1410dee7bb0369e12938d7954cd694145f2fd551cc0742d482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509a3d924334100c808f79192aa55b3b1
SHA15bf08bbaadc94656d6d9da8de325d1318627486c
SHA2561188a9fe957ff3a03f1a7f24578f5eb9849b4a86759a86a3592d31ea3f8c9260
SHA5120e6784f6f7055d8a3cce8ac2bf28561f50e7f252a9007617c689c52e2239c9ce7a31d7d85ad2b21775a0dc517002629c57d53cda8001cdc3130a3bf5288d9f4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4f9df3872d2547cec0d6c2ecb173897
SHA1331a5bf22740b59ab91dd43496bbb0ab0570b5bf
SHA256f7379f3704032eaf3374a7d27d7c93aea233ffd0985c0e27aed8882897abd8cb
SHA51267a4d71750975c503dd5d291831f5c1c5bda79e0024ac9edffa1bfa29ed1f5bb126bdb13f11d4da0a8f0666acee98db1586d0110c3a37346fe55342c9c467434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b02bb7e8b2d6f0943c80f66178d25e51
SHA1135322abcd15e3803beb8d389ce3ca8191abe1e4
SHA25615400a385cf8ee62d1c26b66578d98d2da71710a8980afbb243ceea2abb13c75
SHA5120f12d65efaeee08e22914f58e85722fbdaa9e3c21544a1ecb8385aab70ffb5dbc1e319d409a177f87ed8a49f78aa4633f0aebb3c7cf46ed2dab2271314535cc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590227aa8af0873252524174b1f5bf50b
SHA10f193337fed91d7d6986a9a7671d450de1e47b5d
SHA256efed67b9eac1836cae5ee37ff8040c8df5309a15e0ca72c5e200cf215a4ae85e
SHA51231dfff2dbae3054b1e506922ab8b31650cc056691cdf6d50768a4030cf99c92c5d09fd68cbd3cdb75da51ba427df8e90a75f43660b938321a37e37c1cd696327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51130d9d814294c384542d8d5bf55a424
SHA1930471d0d28388db433326184ffe7a972c1ae0fe
SHA256337945cb431522a82a5627294be6b010123500bb1bcb07866819f3d04007d2cd
SHA51258717c1fcf3c9e84ad4b4f6ced048655888b98b9e92a7e62520190e351b56e01dffb20df1887d14ec251068310d989fc2ede1b78ba5249a81f9391299714aadd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7b8c8817fcd5c7f9c7ef10c67cb08c7
SHA1c0ee5246da134462b51607ea7e51bdf80f2c12b7
SHA2569d97151060e17b1ebb3321890226985313bd2c4d8ae59553426bffff6f22800f
SHA512f3ef025f88f25962be63043fb9ebd93c5ff8d6fbcbe805a4f9b2485d8b3cbd5ab6384ea97cce106106b4c4f7b664948394e446555be101d701f1a239c8dc3813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d38669eff2bab7b01dcc50deb932781c
SHA1f11366dc7933a4725777a9e11fa04c1aa0a50041
SHA2560f2fa0a454f607b63b2bcd27629d1c7ea547cd809f5925873714b92fc570de2e
SHA51288dd37d99247ae61d1b31a9f63b771abd8c00665123bcc8d5e56aaa121ccb6e26a25a4bdb09f6edc0c01ffb8f5f6089672730b68cd99e6b6d56026a8112b15f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df1359025f33e1509160c3cc2cd25ae9
SHA1df1f0b5ea8471138baeeacb17820eeb88051bd7f
SHA25606f679cb2f9b6b5ce6b7199b8954c93fcd278646b33d7e2653650c10080aeb42
SHA5127c2b491285168c8a4e34b3f90d6b152db23cde63d56f555db4d8045c080ac82f7269193140831c2fc1ade3e076c3a2d2c94bc0efabf22acb789cfc249926907e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56261ecb7a67be09f41a470c9c446c0a1
SHA1a3833c6f05b84f3e5eb97783a0b3f542b342b928
SHA256e9411612cd19310598d420bf505d41ec5f8082af6818350552b1b5282a9e9d36
SHA51267cb19c9b7177fdfe5d4dbd82f3115b6ff1fafdcbede37f690fd90a17f62e1facc1b7f0f1fe20a78b18061fd836d31e3fa36a09ecae43e5c8fad048d45846aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2ef6c4495aef8b3a05f7127f7783d5b
SHA15168fbf0bf2ed94433a4c153a738435a79da5dde
SHA256f151754c8ee843c91c11a3cdd26e5270f8bb049906036827ce48a3369bbe42ce
SHA51293d77db976263124052d0506438741de7bb814edb19fe341c754cbae8741fc623accd6e45f9f706911b134262448d56300c35e3d686fb653136bf33a0e00f39a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5514e7081696cd6559235776d5dbc0f
SHA198269a026d07bcf33db293128493eee2208090b2
SHA256f7e947e7e412a64dbc8848b731cf798c6c47067ac1a1c10f3ef269b337b2fbeb
SHA51251cc2c344e7536dba2a85f369d6942c0d5b1b76dde4aa90bfd1625b6736c1804691d5fa996703b6d6b5231254802c91574369f5ab83fbaff17717753e100ef4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ab6273c3fec4d7354ac7160ed94aed3
SHA1c9c10293e83ff1f0a71bee7e6fc138b79d1e8b56
SHA256b83e268f3fdcc6754dd6b158c31b69a1dfba568b24356ac7e95214d17d196b57
SHA51212aa9c3dbc4e74efe992277bb0175602a9f1e08bced58f97108527ed466c7a150539b3f294f1256a4070a03025c5f3c200137e6894a6a8438c6aab24c4da6214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c76efa65827173f696db3754b0a638f
SHA1c943da89fd8ef42030aa863619f87baa244c591f
SHA256d64278e843ed835825ef822241b6e4e808d7f7528486aa18507cd1e4d20377fb
SHA512c3d0db0ec129d178612d3124658cdf3bbe893ebe2034a6620e6cace573262ce605c280be7a497d653312031454fa12d324a75a9195fe90759dd28bbae54adcc6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b