Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 05:25
Static task
static1
Behavioral task
behavioral1
Sample
f54832b80c0df2780dd58f2625e85072_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f54832b80c0df2780dd58f2625e85072_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f54832b80c0df2780dd58f2625e85072_JaffaCakes118.html
-
Size
50KB
-
MD5
f54832b80c0df2780dd58f2625e85072
-
SHA1
7080401e42e9754da7308c1ff08cf293a6842998
-
SHA256
c516d11986ffafa90535703fbe53b660e58534b9f0d3d1f0a3faf8d34dc847a7
-
SHA512
b725bc4203aef4b8476fe4e777ab01ed927d082321b1858c7b5a3960bfe18c82f0030869ad1623495cd318221ae6c10cf388425dc93e6c980ca282284df90d6d
-
SSDEEP
1536:HpxwHVhdikqBuubQG8m/KSIn9/iBZuYIHOXS7K:JaHnokqBZQGt/Wn9aB0Th7K
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{83CC8011-7AFE-11EF-81B8-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b09236580b0fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000d7fca996b0a3541148b0312ef04ab261db3df114d7869118717cc5c346a3a0ff000000000e80000000020000200000002af53d057b6b4b56e25f6677d5d357016bf7b9ec58700e2286053bb90b18d6c520000000944c2197cccd5c0efb1580a7a2cbbd8b7db96b795abf591e1c68946f7d42a3204000000059e7b120c0537d70299eca1a696356dbfdab4dfc3e9f10540539452c792777c139406c69f8d0d3e5f8e5a7a37ccffe6e6cbcd67e9db94f580e81eb1a46410f32 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433403769" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2700 iexplore.exe 2700 iexplore.exe 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 1568 2700 iexplore.exe 30 PID 2700 wrote to memory of 1568 2700 iexplore.exe 30 PID 2700 wrote to memory of 1568 2700 iexplore.exe 30 PID 2700 wrote to memory of 1568 2700 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f54832b80c0df2780dd58f2625e85072_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519a97f6b05d87ab512bad44edb2944bf
SHA1ad0fbebebe2a74e5fab83672c6858e788e10967d
SHA2566bb7e4fe2fad0a63a9e2b544f32ec3f13f54432a4a76c022c9743c0fc375b61e
SHA5121bb6e411f01289572c18f1c9ce4561b55d03545c0ddf57ced496d7e2fa2e339284ab225754aa485578b694e82e53417aba85f33911b69ab384f0cc84f0f55670
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c84cc70deddf1016f4452ba4cf179113
SHA1f059729d78dbde7559b57675716a0395006137cf
SHA25688221139c41380d42a072a9b9d45242e1e812900b688535663b40779216e6c5b
SHA51271e83ab7d09972bd7f8b1047d86f78bf9b11582a55db9bc72424fef8f94ca59d6340f151d18027d5bcfbba7833824258585bd9542d1af14c1e594c81e0a03cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcc9c45d92a0fe640318148a08eee4fe
SHA1bc7cc78b04c6268aba3114c83aaf8955fcd1a51c
SHA256f33e64685f1632b81038e66ade978712f16d51c28bdea715878d6f2131a97391
SHA512432db7f285dc0b96b6bb26ad0de7f66887246678c97de04808483b8d0f2eaf1fdc1bd8ca12b860656ee2edca66392d6c0a7f36382089327a9d85e3938b0dc242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cf1a32e57b868e7bd23dfeb61e679fb
SHA171570e04a84a6d206f026174c5c4863bced3bd11
SHA2568c4e3c2a234d171de8979bd785c64fb631b448a51dae06dc291a7aca11caad40
SHA5128cb5b8e91413c37531c4edef9c17c0036a92e46f7852d4a195f2f834931f6d1ab04659a32a14d01df7f32f775f1813a724466c2bfd8e75d08b52abb0af466dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4da9f28f99668796cfebe40398e182c
SHA1a2698e2c9aa725f32b4b0d7084ec2b86abedbde5
SHA256a67b66caa7a6f3def36e5114df8dadf2ac41753efc8b04266594a0c4ae6617c8
SHA51256a9b708beb29bf8fd2b838fe6ed5f715889c6b494aa679c426f95985bd8b5ac725b3084e1d1d893b1c32463b36fad25cb11ca8ee89640db37fac18d8433a517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549bded5a1c70f071250648cb1d2dc63c
SHA1a1f4f85f9a2302ea05d463c51817fd2ab10422eb
SHA256ef9ec9422347d7ef7821eae9e4fd367ff8fc2114bad51d5be8ba8a9ac11c3730
SHA51285ebd80e71217db80773de95c51e18d0a076aa02fe4963a675db40a926cb116881fa8c9a8bb276296aa3c812bdb21bd29f09affc0d66dc6365ff52cd7c78f562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1ff12e887af5a1d3fa2a7febe1165a1
SHA11c183e6207a9e7e37b7056f513f51eadddeeca5c
SHA2564901eecd5a392980cfd726af93f5f31fd3640b860d1675eb26f018ad95c30b6b
SHA5122fa4963f7cffeb4fb0e0a637d3aa657500bc4a4e8acb87e4aa2442c586af9a394e1bd4ad9df81366179f005530924f0b836964f7fa546c25c4e0739d10fcd380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51794f3c0643e7e8c4f05f6c37d61ca87
SHA13eb611616311f00329b627e77d47ca11c67db5ef
SHA25612299e5206b112c77fa7008b75f5ebfd48f281c741bbc6bc1f6ac8efbcf3aa2e
SHA512d0eee9228c75a631db8d0da10ae87d1cf94274598ff76e5122aa4254806d0e27b03bfb2fcdd27cb6c195835dd3f2ef3a437b3ab7a8a34c3ea9e55bf02894c223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b86e2661c6a22610b372826adceea529
SHA1303390c840ebd559a0262552b7042165cf19a327
SHA2565465e9673021d5f274f1b29e630913261f2fd8066fe8ac53e6dba6378cf30c03
SHA5122d4d8efba6a3149ab0fe2e215dbec5aa43977cbc0ae62777f59096962196e142b676173de810fc07f4eb1ee42bf487a97b2ee935fc71b1328bc79ef37c7b3ea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c251ec2f096a483669d49ec62f600ebe
SHA1f6b34f74d7e14003826f47a7e02c3be41a88a2cf
SHA25682606b2ec995932d8e937a35807403d58d454ae512bdfd4af2f683008b0c9e7c
SHA512efc92a53a6291ba13a24894c2faa076c6acf757836da87928c1be0b4418c60ce8d35bef91f1daaceecfdc7e447b0835f3b02f67edcdd2b11d096bb87bc779372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b97ada9f9a6833596ee0e30224db174
SHA18df6c0e4c86cff4ed9fa9bfd5a1ac14ed5d53bc6
SHA2567b24f51403f514f75c1569d755593395209b11910eddefd3329561fef1d5f20d
SHA512268fbf3107d65ddf5796a54a0b2449c47f6d2d97e4579db5f265577fc12df0767f3e13c18affd2abe410f4c61375c40538b64f0b39621d215951291639967660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2649cd0f267d4b1168b397780d9dcea
SHA12525e7f666328166d9d9b08b99ce619736451cff
SHA2561ee8fb5d86c6d5e87f2834dcd732fbf05c660431e167f8fdf8f5f734ef5135e4
SHA512ab5b0ca6194bb0d29e4df990e29eccd35361e620ef19ac70651ccd0b2f7178f11d6cf1b6db83401da794bcd2ff5eaa984f87572bac46a9dc76b23edfa039bff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50741e343cea7fb8e3ba3f590e0f28201
SHA1960b2eafb500b90035ca294c179d3d113a0c31d5
SHA25672763a988c84d24ccbe5919fa12b0da3a8a1b33770851c49fd885bc2d9b5e37c
SHA51282cecc5a67b28d3bea743c795b60e6e437c2e0533774f215f1b63ef8aa308a0d51189f0a67b5b90a07ff598545bb6f72eebc81fa3de4ca208e37c970b5c4aa1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3d4c05c285cadb467599cbf68afda60
SHA1def635b76aeb56849486f98adb2ef692681a7cb1
SHA2565a683c010205590e5ab846db0468b5cabb66d5c2c0288c782752c1f834eea033
SHA5120f82386f06b653fac05d32c6c5e74bc99de0b22db849c5dbbc1097142ee1a3500ebabe6d64bd55296e43bad246a445e69346e7fe6b369da9f167afe66a09d3da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5681c2c72b1b47dc97e77c2365d967219
SHA1eb7e6725ab740aaa5e039d64ba9f685074c4b657
SHA2569465e7b963f837556cd359df7217c169dcc9d2bca6fcdebfac54efac955db1a2
SHA512502b54c92f03e39e05d1b81c026f5497387d396e855b8038052b83922ac0afc3bd1b2c2db8156f46047320dc6183535cf772155d3f30171ef515014234723eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afd9df68ea6cddb0b7b6ff0c96f9840c
SHA1d4151699fffb2cddae2bd82ea682ff090cf0f8a5
SHA256891f920466cd253a803585d1c498a31c83980ceb3c3e33e7bbc7ff4647cca595
SHA512a09733836a55728007cc7c279476365bded99a825a69422583ab32fcfbcd1c61c721284d9d2faf1ff87b340c706e889b156f915db7d43e343f584df93927c619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553bc4767ef28335deec1ee874123c2a2
SHA1a3eba5591e57eb4b6495de6c671b071ad3b2da14
SHA25665a9cb81a7846d038ea86a460580a554ec742c49899fbe4e6e2fe3ad8a0517b5
SHA5125697c6d225b1dbe4ecc692b23b905ccc8a218f49f888335ac1f31a12bb94688e2ff1b0e996e3ed370aa79c69dc060c49c7a78e6d5ab092445cc197e350d1d09b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac0a6827d58d46dd6debc6ff3c35a6ad
SHA1a5440641381798d7eaf503dc0b1cabf40c94962e
SHA256e3897472d5f99508dc40ecd237e685f69d9d2c2a1a700db0b0003c981e11ba04
SHA512bb83c9d1ce6118483fef18f2be54f2a7c8664ee0a043e8af089ed919c900dc0bdbc4613b4696b747b65e42f15f4be20138c3065e324e9320cedb0fb11d355df3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570e3462ccd40b5ac397481ec56554b7c
SHA18b30914643306704a7ddd18fdba40d1b7329e723
SHA25646f07a970f1b079f7b5a75778447ebe6faaed5139df0a31a558bed008c8c35d8
SHA512e14f91e13fcd280ffd483a76ddeba168059104235dd4d48a4c02bc4b4e5e48954581033aa3fe01f9ec20d98d1b2271301b67dfa00f8c9d941e83d7cbfc155557
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b