Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 18:40
Static task
static1
Behavioral task
behavioral1
Sample
f06ae50dbd0f7765af1d501cfa959f22_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f06ae50dbd0f7765af1d501cfa959f22_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
f06ae50dbd0f7765af1d501cfa959f22_JaffaCakes118.html
-
Size
17KB
-
MD5
f06ae50dbd0f7765af1d501cfa959f22
-
SHA1
a66b8082ba24bd408682ad559d3b0a97f00cec40
-
SHA256
6fe23d2f77aedf363927046f9d91ac7a01aa1cb478e389341d3cb3cc3de1c935
-
SHA512
b9acbb2b2689128c0c06d34518a780e33dda73bdd23deb63ce176cefab010a11161bbc737a5a24d9c3da20b298b52a0c7dd994dd87bf04a570762ab59e29e324
-
SSDEEP
384:Rf7R7sHbGDYwWNQmss/VwRgpxVwVCkVyEV3VzVfVy8V+oE2Vy77+IWZnORCcUaj9:RDlAZs6zHuPrFhtlVfEse+I9dgO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433105903" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 502356d4550cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FDD463E1-7848-11EF-8BB8-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000008b479d623c3d379b57c16f76404275e51b071cdf61981bf910a95f31db4eadc000000000e8000000002000020000000f4320bd7f7230f0461ba5a6af9454695e803646dae10456267b7f38ebc377bd1200000004e198f2edf87ab013c0d9f0600cb3f81aa1e0bb6f29b84b571a0d43069d5ba494000000032c8ec084a1fae5bd34d6df2ef9593545cd3c4432696bf2a9907e0ae11333c4cb02516dcf91a9d7ac3bd6e768beae149f904be9f88a18e86ca911441b057b713 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2304 iexplore.exe 2304 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2556 2304 iexplore.exe 30 PID 2304 wrote to memory of 2556 2304 iexplore.exe 30 PID 2304 wrote to memory of 2556 2304 iexplore.exe 30 PID 2304 wrote to memory of 2556 2304 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f06ae50dbd0f7765af1d501cfa959f22_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2304 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8e16cd98467df1eea8edf9be7089e67
SHA11a667d85800a0fbb7ef385cf58726249793daf7a
SHA2565e1280649c520d91b84d50a5894425f88d1165ec3b0af8cc1fa457d529e7d2e5
SHA512721a69b3ca872a9a0e7b6ff96d6cfd233e9ee0cef0df99673e98d3c1e32556be01b8346e04ab48dbb84b9c654b90f8547d6ff46763fc5041eaee35308f30b40a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfcb6bf8051344035d976f72a5c99d7a
SHA10383c698b8f3ab0b420e9269fd96fbaff128d904
SHA2561013bcedb322b47756e63350895dbbe016cb965499c1598d65563cbcef586c9c
SHA512d49cd05dd34041443dba9c616f75a0956a21e0fa5207f77b128fe672d9992570cae6e0b32a6f80d75c82609cdb98d22f9232f801a86599f68fdd79847684cc98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fe7f71bb8f49cac6b3d52a3e5c0c1eb
SHA17ebda292ead9b6f2bb1127264513566890ebc2a0
SHA25648d78e04454174fd48bfdd4157453a65774aa338183a690c70b658e95976899a
SHA5125b71cc119e72ee987a9958439bf1db88aaade8fc9b4bd116edbfa03f3088e0cf0db7cc5e30897ddbb91214f83d0169d1601e041912ed003060832afd02e8b5c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5171695b46884372ddba5c0c9fc2ba1f0
SHA15545409b26ee935a17641ee48df134268f3f4183
SHA256df58e022278819e68053253c3c79ece10492eff47356c6b71c07bcdc258c8ca5
SHA512ee218960d2d2b72a83772e889c940f24e0b947fec738d0b068533245f54d43d41d98900f0a894b0189152c33f418b559f30449f76d2dcb5665a1d80c0f60e4c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e47f5c4fd9fa57dceb3c8f1c4dc0b319
SHA14f70438b83e5e6f2ff49f2eb281cfe6d2d3dfeba
SHA256deaf852330c7547854bb4cb9971e49d9714dea30c0f2b8bcffa69a6ac431ad30
SHA51286a963496142fb9f57fbd2c51461c3949a2e7d0669e9095724affc7886b39a31adb867a126bcad99d680d535728da1c7dd7835108312f054213fdda0951c9a4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df540744f49f8998f5891d66a1f9d864
SHA19c3a7cc2971ffaa753cec5a5e3dfb74cac7d9601
SHA25610c2051a6461edbe03fa8ca9141396ad055f7a20ff7ef34eb6a74430d2a047c5
SHA512d49f49ff2accb9bb9f0d49868d1fe03aceec64eeea94374ed968002e26a70ab47162bb0671b200c60e33ff7f82663f5307ccf74af7e5fb2eef5302fff931d814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cd7547c9392acf55ae99eecfec9de41
SHA1f69c10098d9d393e54fd5bb36445358667ba9650
SHA2569f029665c436a656236f790a819f367005b01eb9ddbc75ddb369fdd8a044d3e4
SHA51203837e24ac01b56f155d72bbece4b54e6cd0c75e84b5d35f03b01e6bddaf0709319553f010e3e3699bc94514c6d99368932a926d6f095d2e7ff90e9008e46a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5453415465ff144a50f064d936e8f3489
SHA121e3804b45165fa08b3b5b7c323cd25c15a501ba
SHA25626980dbd1c1894eab811312bb431460ffa3803b3d51d34c750e682d26683ec1e
SHA5125a3abe359696a1c7f6437cb8246c87a583ba571528ced4c450b9f9bbd0bc66d3b1219c82f433e5a8238f6fe24382a49768e6ba35f9a0e4759e3fc18fa96e276c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59237a5f8f051dba108f8f871a1a18bbd
SHA144537e47908ee400a9672407ea2694a06e0c5671
SHA25681a774eeba1f5822fd2fb193885fb66168ff79039372d6909a6118920ec1732a
SHA5126aada2ebf19d47dac321bfde03ce8572894c26c90d43b3fe6f9b12dbadb165bfbd22bab8d80becf84c51d6efa6e65449020bc813fbc67021a9e2797a62269dd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b5c3d1e7690881a55de7c4969151ede
SHA15eb6bf88a307f893ae4ae416b616fbe6cff12907
SHA25615a1049b85c0cb0213ece8dd5c19e851af81cb45f9a39e97c1689b6ff4f21469
SHA5127ab4cac121f81cc0a39633bd77d1a23a57236c1ed35dfed74e98f72a469ef02fab7883c1d880d737eb9882b87f9253fcb7ad687a9af49ad51af5a53039404ae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7109fb3306dd98085e0a9da9ecdb013
SHA1fe2f70766dd99ff42fc9513662471677507e8da2
SHA25691f72739f53937b1855d3b72937cabbec62dfaec910bc1c3cf959b05562d1eed
SHA5123bfd0a1d8663644aced140475d6953878282fef2962ecbedeb9d7bf8c561d5ffb38b9382729942e0f3d851b21ffed0fd306432ea5a0fb891b2bcbb1ec8d4e6e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5353f6678d803c71ac0444fcde0b3f592
SHA14d3ade304cb5d7bee54a32d66b2117cd75bcd59c
SHA256aa7f8d286ce26996d523c8f5582ccd1bc7e584c0d160738de55b236315b34ab9
SHA51281b2ab31c59666834e613e8f382d369bedfecc16cda5bef23804eba53e4909eba6875494a3f5e6442b5aaab9f8ad237fa02c067d783b23a257525cc3e78988ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59757830d7985d5db22b98f8ef080538b
SHA1645a4e2839ff74a1842ee85adb399c6f028ef916
SHA25646fef21c66b8fde50f5200dddd78d53bf0b9483fa29bea9075925215555de519
SHA512877709553c4ff6b8c2807ef8efe0bb27c7d81343b3bb8e6ee4470b434eff7d539a29707145cc858f26f66c7f470551d322e25423c6b0d589bf6400c330f8943a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531014d61b55d787f2dacc80e4f3b88be
SHA109eedc1363173459d48842245813e025acff9021
SHA2567e27f4780fa65c3cf59ae7c405483c8b6c03763e5a4f4d065bdc9361af4391dd
SHA5127aabd00e0055091ff958434622c25be43a6287734800a7d306d95339276a2b8288b4afc07129a71d56fe46bf2e07d2c7dedeca804d5795cca6a3d36200307feb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50958a25472bcc3abb0824ca4d3f0cd2f
SHA16f39672b3a9c4cc7b72d4d17930b47bb297519bf
SHA256ad14e895e1a66fa0f8d7a63edf940dd304c291c68d54659c06cf2b8cc451c952
SHA5125bb90d3f92385edae516cf7b4d38fabb9358d1a4865f6afe616ffe19db6a5a0b13323f8dedeff9808f588c02422a2e67a05cf49466b57a7dd3d13d8472502702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7c3bc36bd1acc6a23c2dfa4eb0da96c
SHA1c124403455fc9583d37ba1b84cb2a13429fd432b
SHA2563dc9670f72413b98adf4bf6cdba2385ead32d7f39d9cd5e5dfccb6395b7020b6
SHA512c1d73e36e9f544ab267e6ddb4a312b96d62227917127cff9422f9c9b94eb5762bfbef4c5c146cc16d1e690c78abeee5f15b7760465872afab5b46bdcaeb831d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6da96a30a5d340bf953ae75527cc160
SHA1970516da719144e64c7500a8254897ef6e728dfa
SHA2565b246b775340d9a1c82e26b525e233bca935cab185ef067bb6f0abf2219bfc61
SHA512e17e427fc3745a4bad98a0cd8e789df77413ac9be2e89b44eac555192d5b877a9023c489cb1ec3c9dc627a61c39197977b1f808df5b97a970eb7c1ba0f7ce0ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf666473fd009bcf54704662aa8b3940
SHA166ff03cb530e44151743fd100ea6f94804ff616b
SHA256997f5a0e03a92792a13fe32ef3dbe4f576a4e4225807319a0d1519ade77fc593
SHA512642cbe52d995ced25e98c975f814aa7797dfc1ed9062b75fc3bc87b2d8a64e0ea55d5e94adcbe3a9e3915278d8ce0842f3bc1515025fe14ec59298253cd81ba5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b