Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 20:46
Static task
static1
Behavioral task
behavioral1
Sample
f0952b0759752e3b1bc624324f6d95cd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0952b0759752e3b1bc624324f6d95cd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f0952b0759752e3b1bc624324f6d95cd_JaffaCakes118.html
-
Size
20KB
-
MD5
f0952b0759752e3b1bc624324f6d95cd
-
SHA1
add312b274ee0d88db3e0c0fba9b8d4fa8f1ccd1
-
SHA256
5f7d75323cc54975b7a56bd572987dde8abd31f71ce881a7b71ff3c64b8ff38f
-
SHA512
bffb225231a03def22c789b0ba776d9206a41f429d03491d3b60e6f79d80cbed85cf69e33389d771aff65539defc6470a40ab09b304824c531e94a75bee0d5d9
-
SSDEEP
384:WfEdwI+hvPCIfp2JQQqli5NZNllAs3PEHYKtw+k/:Wf7PXajlAsfEHYKZk/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000002dd3d203ffe773f6f0cc5dd079bca880c3f3fafe3f110633a25d3000953da19a000000000e8000000002000020000000f1a70358febfeeed9536c72411b2adf57937a1c2a388ec9406af38cb681157c6200000008ad8c18b805866d031e499e3d6fb78262aeca2862c0fc25a2c8e7be3a4132d1940000000a109dc70eba5ce7a67ce653d5d9a824b6ceeff94911dbc9f9badc775cbd2880b2ff1956ca4d5a6bbe0c1a8c9886bb2f0d015527ee50d318d0ec1cd1e244ecab4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433113482" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1887881-785A-11EF-9D09-F245C6AC432F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0809d76670cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2756 iexplore.exe 2756 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2680 2756 iexplore.exe 30 PID 2756 wrote to memory of 2680 2756 iexplore.exe 30 PID 2756 wrote to memory of 2680 2756 iexplore.exe 30 PID 2756 wrote to memory of 2680 2756 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f0952b0759752e3b1bc624324f6d95cd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f37b2137714a90279512dd036e23243
SHA14065f1c2298f65e8c9a300b189c05fa890412c88
SHA2567e649008aee0ed342bcb5c2b703c19463b6262b6b6fa8b6091dfd37acd043025
SHA5121690c675d07a8ce44cd610d17ca674e48957c42a247960c0508e3c23673d5da16a04de44d842d29ce775281a9ac9c32eae15a0b0cd4e97fe5940eea9cd546e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0800cba9c06fd6b81a92212a946fe9c
SHA10466df53b5fe5809107d1fcfb6e9e678f9275d3d
SHA256515751a8b422d60121000bac54cd0962492a0257525457f616870b686f33919c
SHA512f24c0bc6fe20a4632045c8ea8052324ad86a63fcecbfadbce645fca39c5a33036abab39c2f0ed76e830c19d9a3693d8b9973edec3aef48b1f188950f763f7095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0d9db00cb6b1bbc3bebcb9c7ca72805
SHA1c49e8c6e3777f21ac2745f224ee217bb6e3050a6
SHA2564f0d9abe5b35d8eeb02d7bbe7dec4079da6d1cc241448994aff718e2e6e7b28c
SHA5121f57372a959890c7e612013e94ea603fb46d8dcb8200f0df9aaf22b484888b904aed3f95fc8650651e61ba0c450812993cd1e1a7190968994c12d26fb7dd6804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dc95c3552dbd8167b411695a9451497
SHA11b091c84a2d931b94110dcd146722d2a54972820
SHA2567bf4e5eca4f68c84307b340d3891b494c709cf6a50cc426a0d960b4cbd3987a1
SHA5129e10d5116ff1766be8b452b9a3d8c9224523a6ec9e06d7a684783394dca4eeb75bf4b36849fc453bc3fb322838b8f09a4de1b4f5fca08eb7b1c26b4887f46258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9a2be9efb946170415658116f93a5f0
SHA1032e1e711ebfa62f38c0651835229c239f824bc0
SHA256c4f5fc3ed57133b1f821a1b6ee285eb4fb95fd4b42242351e0e610cc9ba505c3
SHA51241dc78df79ced0b5c4bf24696782f44208e5a431da875e5dfaf0b51322c6a5c800b1e8589cf19da752540dfb6ac39f624cc53b1d2057865d3a6db4c266b0e913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d74c8f92fc83f85090222d9e8e2e6c0
SHA1cb5d2a79dd1b30d834ef2bf71d5537158799c60d
SHA25674d2c757bc8b2c8622b2916b127b66ec6155115248e81696ba5b861507f0fde8
SHA5123500da3893a2ea6bee8025437355bdbdec9c273d7fb36f669ea5d74df286f01b4a6ed7c4a81522eebbd2197cf79d63bab5edc58c3f6cf926f6c942c1815a49de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e81cb87db7b5162e8530ba1ab5d13e3c
SHA1c9651412c66ce8112fa07c300d60db26cd57cc1c
SHA256c239a5b6bfe092ff3a1c9410b9b775e63941e687fb9eaaf80d2e34aefcd08dd7
SHA5126f0e4c62e39b46231b17bee296b97bd43ec83513aa69e9f9a07d8760bb2ce91cf6302b4ea2b8eee80dbcc4b5a74283ecf0be88b0575fa14d97000b66c2ffc9d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528382c05a8bab823a0fe331f2848c00b
SHA1e7a9bbba0847acea3a2066c81c1203baa90fca0f
SHA25694a6db70b1a5148db9bdf26acc57fc3a8329503c9d892cd5cc92a0affff7201e
SHA512945b494f47d237f0b2c3ae3e62d0f7c4ccc42bde26d92e87d6f884c3abad90ac0e423ba5c80d7e520a6985cc51565108be568cb0cbc2af95a524995bc9991a67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5792f091c978152df4e01fc8c54f19133
SHA1dd33db8c7278a62f2e81bd43d0356fea76581844
SHA2562d8fb1a5493d5a3662182c0163a7c86b94b790b91f5c7ffa29b91df02a4bbf38
SHA51297f01d04839bca5caf596d0004321b9d0420e2cf986c339f16bde0d41a75d16b2ff1c69b5d1da4ebb8f91fb0591f3c02bcf2931b9745fd3d9dd62f31b93a5b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50007bc49d9dcca77ada129c07beba6db
SHA1cc0b512ca9a281d6b8aedb477b5124ecec9a427c
SHA256c247ae354073d1566d3d1e5613cfd44af1395e4e10127ecbd8a800cf6231090a
SHA5126e37c4c1edda1503c498235be242ad511ce32fb62498dd58fa735b5229c64c94a57bc32eaa25ca5846797566b3589f512f4fa7791c52af04cbf506bbf0291e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ec34058dc7ccf8c348af1dfc013057d
SHA149aa237aae8d07881b7b65d1f71095bcddfb45d4
SHA256ec29575009d3487024a020bf2ead129abadeb759e5df3171c44e3e9ddd6b1b6f
SHA51264975c7952697fc70792bfea7583b1ac2ba8f787bd5f3fd99876b62033fd407e630a1571063d666725b03dcf16476a90618d699d4ee304916a3cac6cba4bc429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5319134498e19c2a5eac543aee986269c
SHA19324a203af315e32fbc3349f3dcbd155ed0f9745
SHA2562d4544b683a4b41547853941a9fd53dadab1cdbd25c6f4c8fdf49287008213ce
SHA512055bc5842febd2a63e543fae5946018ba971ba087085facc2ee7cee036970d2188493194204b2e6a737e6418cbcdf271b32b6958a29461bbe24a351262cdd1e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538378971a388bdc5373c03873734678c
SHA10dc198fac0995f6eb34824ec44c3fa7b3c017e45
SHA256d1d9f6da4a0777d798d4e1ba9ec80703be367d04dd966c5d6dac98fb84c446f6
SHA512cbf3668a84d43d3a4f56ae6d7fbf0aa5c4bbd019191fade60286a66eea99376c51caac93812ea59f8b5061f31859451aaf672be1bebf3b6fa280b734f9cb8f37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e930c205a253df9b3579b01faea2db2
SHA1374346e9acd3fd2cfcf6b47cf69d1ebeadf17a01
SHA2565f54839859ad512bd2032589a596edbf56db6f946968cfa5f5aa4665021e7c0a
SHA512c3a9063d676dc2784f21493ef0391a543b3340b8b5c2937af13ca9c871a76208db8e6a8460cd13d3b1ce191d8faac11c227598fee2fba00309659827e0b24556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5050361d05abdb26967c24ce5080298b4
SHA1a021c95f913b20bce80149726ad378ca1d97fd2a
SHA2560418bbed38d55227b915ccc4775f44675693ee0dd65d069a36edf8e9fb90b1c8
SHA51244c1c97525627328ba5b10dd570bd754477ce379651d45786229c05a05507d629cb9d545f8dd79e4b9c5ad70808f3c793bd333598e841153d8491bda45db86bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c27df4cfb8d229a97a1210ebcf5bc2b
SHA16aec9638f7b0f116ad48f5cc4186700ed99bbfbd
SHA256b052562a9eaf6c10c74778c4feb49dda2309f7c87d0c37bce0a19acbbb9738a9
SHA51287fc21da7872dbb4e91065ca9379db8c3eed5fce8efea229fa97388bd97b44719436b001ed5ea2c2080fc76d4bd54038415364bec69bc07a3c04b0e5e8a55a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b3f91558b3e72f89463e69f151b1d9c
SHA1083877c7847c065d3ee3a2bd8cc4dbaad975bc6e
SHA2564cd719b8679afffb51ed05f4ea13e6d9f236a3017aac6670e9c91abaaf9ae8a6
SHA5121a2cd2bb4856591e65a5490c88e3a5d9867b95cd1f587382600baad916aa65872eb55546f23c91fdf0d2db614135d616df0cae1e456e7b38f6f14eca85bdfcdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7026325d40f607c6e76d714a659764a
SHA17148b507b1bb62433b5bbaaf2e992b5705ec2d88
SHA256d2110f2899258cacc387b5021aedbe9a75fe2bf398371387dfbf660dd2e0ae20
SHA512862cab8f1ce0a947d755c7a36edf4a67043ff3d8db2bb434db8c09d928ee2989ec7228030dd54e37d7e0651f5ff0f5141f7fa394f19e745eb6e1ba01bc773c15
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b