Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 16:49
Static task
static1
Behavioral task
behavioral1
Sample
f03a08f6869e36c82438a0b2d2fc31e3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f03a08f6869e36c82438a0b2d2fc31e3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f03a08f6869e36c82438a0b2d2fc31e3_JaffaCakes118.html
-
Size
2KB
-
MD5
f03a08f6869e36c82438a0b2d2fc31e3
-
SHA1
3bdea40211274972da5dc498a0328484c63f6e3f
-
SHA256
dfd97aecf805ff4bf46549f3241c688f297a19c50a1ad1baec33357636650915
-
SHA512
0ff7f3755e6a7b6a74a1c2528a36b5d66c05f03fe756c5d955470ca6069d959501bd52b9d31b334a319c7b06fcad432d4a0470de1f7d8b2d9831370a936d1ca8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433099263" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000415058d8e9d3a4da3b59ce620ca462e294b4ca99719094d3e27c9c6252026702000000000e8000000002000020000000329216f828cd0ee297c231c9ad9cb35d497910327523b5972b93f5e411075e9320000000bd272d9f5331d810b39769af8e8ba9f47e9a8eb7a8aff1575efd8e563a4e0db640000000ef8a4865871666936d7ee3567674265b6e6a4bdf58533ca95780a52ad38b899e3830da477670d9422e8324627e9e203b9b0ad225f54e28065dbed5dbe6dbfde2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8812E781-7839-11EF-9527-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9095e45c460cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2936 2248 iexplore.exe 30 PID 2248 wrote to memory of 2936 2248 iexplore.exe 30 PID 2248 wrote to memory of 2936 2248 iexplore.exe 30 PID 2248 wrote to memory of 2936 2248 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f03a08f6869e36c82438a0b2d2fc31e3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541cdf85f5e0a48b608586f6cb51f81f9
SHA1ad61212bd3f49e2808cd837c4cef5ae5cf56a123
SHA2567aee9937375dab44ec39a45bb06e14851fedff4787792137dab44b4f3887c7e2
SHA5124a0e8d024e838dae0310a54c66c01de810375ca3dcd7cb077254cbd02b5806eabb60c51b0249127df037e4e1435c9aa1f33044328af39b055ba614b57d57c0ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed21279f539a0bee5fca5e0daac24cec
SHA166a442f3f27452afa86ce5a66e98ca877e9c4a44
SHA256d6310dac47b6abe965c91b66926e566350fb6c8caa342be7505e4e18fd18464e
SHA512b9023b2655bc2c4f364c9b65ea17d74c3e77814b0b65dc49cb7eb5fbe7f44f41ba9696ef60533db2db15da0246d217040d89653a462841b1c7335537d68601b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9f78dafc38e7f526e3eef49d2ff5cc8
SHA17d6d8aaf03f6a1d5bec3238d5b199c1e1ee2ccde
SHA2562675e3ad4451138af015ecf124872cf706017430c33d45430e7632bd895088fa
SHA5127ffafa88ae11583e3810bbef514ac07105af1f1bab4662275aadd20044422e302701cd113858e493dc4b3ec6f1d95d222c8f0135faf172d861eca5c639ccb9a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577b7e4dd1ed1c3c5966c02b1d647ec0e
SHA1da26ba2d8ee42f663c7d816cd35e1a3bfd710799
SHA2565c93311f5d695a73e996c80124a804457c873feeb49d347369721ad147d9b817
SHA512fdcc5215c0789ac2d6d59205f620588c486adf83ed4f673022aa0a027b15d933f18029825d85d71922f775004f82abacf9a679497587b09035b10915ff7ac7d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54704f8c48a54a80052aea548f1e131c8
SHA14f6bd4131eab436ddfe62ce42fe6f9e252f19d4f
SHA25693a0895923a6d8f51e379ba9906eb1c8162e0f3a72118884ed8361fb9b3d36f7
SHA5123573936470ab56524b3f8cdfd3735da78e17b12b735428009d1a59dc52553cb87b3ee3b32ecb1ef543276870946fe52e042c8e05083079bbb7e691f3ee405094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aaf38e355ac611ea6fc92b4c7350329
SHA13e66a2d136491b4bb0822f1073b0794e9fa8486b
SHA256a2a30d11138400b69b56f823b029cbed05de0d91960f69f8ed5d5a9a8667da07
SHA512a4870b24a2f6514ca93268f19771d82ebef967e65b77d73b0fad8e78e34fc5c03dc88d7bac6b93f135bad4ec995cf5f1573c5836c9f73b2643e841f2edc64aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53255c5d78bf2f87cf4689e838553c4a5
SHA1ad94e941b256439a8adf45081ec14164fbc0b412
SHA256448051493ebe4d9696e36248f2f9efb4fd83d7b60fbc6242953e003e716afa35
SHA51219a1c9680ee1f30c16a57c5c7aaf9f7a5a0e59fe4902926c1108523b71d3cf1e0ccd9b8c25b8035654cc63fb41b8b263dc58ea8b71c53b6e0788decbb7169b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb401161c3bf9d3c1372a20c23102ad8
SHA1290dcc1f30cb6782797e3794c7ed9f58459e1dc9
SHA2560c30c8d3ba9309a543a09ae474b0fd84aafbabfe7150597ebd1947622a58d897
SHA512c477739ecab9155f80a4ce5caf07546576cf87e4f8fcf14d65ed8b39353fcaa90ddadcb2ac6f6bbf84e733435e451bbefd728379fbce217f5a007961cd360cd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5074d9c270a7591e0dc8643a0db45da6b
SHA1959f36ac62f3e055523dd41dc281c9433fa665ed
SHA2562a0ae0d19cee6df9d8f81284f8bce66ba9ac8c47b4b68f0ac660f0078cc69e29
SHA512f486582d8ba8676b7de36453aef3f1cd7ab6372b975004009b4619ad7129e1cd7e774026e67322024ab4e65273d657f49a5ca2b9ccb26740e3653324d18c0524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55be5ac8342a1e95ff992d56472bb3acb
SHA1027ce79746b8fbc65c795c0139ee75642844b2b2
SHA256a83ab230c05ecc547708361690292ad1335465adeaf02b440da19a295423682d
SHA5122a371d8c93a075815593d4c0595272787f4b5200f95e4c76ac0f091815d3e56284912a955655483ba8cdfda030b1aebf4e8f96716b5f8a1fba1fc48d88c8386b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55163e3d65c80641d81271ac7c556d9ba
SHA1c4e9ccd4cbf0489c6911e93d6daee6499d80c79d
SHA256fba001422d1350e0e79044b1e7fe14cb73c3cc99ff5b82d7b15684fc50d385f3
SHA512bf95aca61d6892c8f2c56aff2c98a0db64cfae7c7cf9f10e3a928991fe08fae62840d36cf0c2039cbfbd82178becb74b21796b2d84909b769d5d6f11e135d39e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598b743e619f1ec2293ece4cad631d2df
SHA1abd13d1482ebfaef445a78f4131539696bf47947
SHA256fa588056f15b1af2aa7900140db4a5e5ec1fec4a45697eb9e9a61a3df5729a2e
SHA5122c50af9e6ee253633a64d716f2eeacdbf6b87a91acb6ac6579ad3c1708d7f226278297dd25d671c821333ea82baa18568349db2bf3aa21dc30de89c07eb65a50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513910ca306cc7f676c1a079b1430db84
SHA125fb968ad0a5a23985ae33b535c6ea9c4fb351b2
SHA25615550259a0bbd3518580524af16242bc10e9226c3745a4e1892ed5a5a0847cc8
SHA512e2ffacfcd933ccf080359e6cf9eae4af8ab6765bae8a269840358714f8a0b233c6c5776049c884186c9feff3bfa9b33d18e6351065f121f3d4eae06186e2a683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57211f43c2daa2d50da66af36a18e3701
SHA1fcef8accb471c677e4adc007dced68db1aa3944b
SHA25624bacd917c9ccd1cb4b6bd7c2753691072a9b15f4ad130c7ccc3d4b686a828cc
SHA512c79ade01723bba34a5e4d42699f0575a5fc89fa978b181e00e2247b88f7493eeb02d094fc87d92fff8508d8ea275afc4c7e6464ebebfd4a38e21df4cfd9ccc34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544126ff8f711aabff8d4146a3ff98506
SHA19cf66f09e2e8cfa5a3d072f126840c6b34afd8dc
SHA2563af84390d2d321d8546a75db50ca3216ec9f1531a9acc4fba09218fe6b1b0161
SHA512aaa82db2990e7ada892952af2a3405808fed763957eeae99228411ada836f658878c9ad2364eb99ac381ae379ca9b130ae2f25ec7fee12fb325aa90417825176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2d43cb3bfd3c4ac38328560b08507c7
SHA12c9952ebb5ec27dd7572a672115192374db85b93
SHA25613b7ec192ece113c2399fc1e8270c8d5c2fba74ad4fd7f867cf6882b91651b04
SHA5126d8ab8ac339c4f068161589e59b54901389626a28df699b2cbcb35a9855771af4e77d1453c263eb79334f8f40120a8590a966762c261a469946b159a5c6ecaa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543d72b9cdb4eaecad5dbfcfac814f3ac
SHA13f1ce967a4affe69066e9b822f1fa77d199e4b59
SHA25601b60b3383d0e89513639ecfca24eba1be2b00b1bb72c80ab94296d74f400e36
SHA512b232f95e1af22da7a583df2c4513a606fe46bd3ffee8ae915a84e1564ad0175339ca007ca77078b9edc0b7e8dfd86f0072c09fbc2f2c37f632ceeadba7a8a2cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56085a316a5c5954a43cd94d636b5cb95
SHA12e02519c4f19f75889f4df47894f8e674a81e7c5
SHA256b707a501efc75a7af54abbde745cdf3e2f77c648090a85b4df82d0aa78efe275
SHA512ac1c2c163358023763bad08f17849ceef347e49fb63a94b5118fc508f1ee16cf799ad20600a60c8bbff46748d9c7e0f0e9f5665361212b47615e10a94d85f9db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a42d77b562d9dbdc8b505709c4eaf47
SHA1663a6e3c67ebebf033e11b6ddd7d373f718fd5d1
SHA256f06b015afb7734667fd85963c01ca62ee0d5d328b0e3625d1b5d425c2b9c85c3
SHA51266506c410f12c8975468d0df71b76092256cbedeadef656de9b80b9f34e720c8c7f906ace868ffb3ac842f501e7055f6ecdb9904760e1e969ccfb4c3e7a3d0a3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b