Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 07:59
Static task
static1
Behavioral task
behavioral1
Sample
f58c91a0991d1f679a7ff1834f8db0e4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f58c91a0991d1f679a7ff1834f8db0e4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f58c91a0991d1f679a7ff1834f8db0e4_JaffaCakes118.html
-
Size
990B
-
MD5
f58c91a0991d1f679a7ff1834f8db0e4
-
SHA1
47a4ae91147e9209627e754c98b290d95c6a5b96
-
SHA256
05fa7a0c92c014490c74e407fac31dde5b115720fb5a64819689ee22a1a1966b
-
SHA512
e0697ad51290ff9da4831ecdb3db2a810bf91196e3d948f8f62276f280a42512d462139f6d8a8f461ea760e2d30d9eb4044d58da1193d68fcac86a5d3cd4ab2e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 608bbcf0200fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C1E31F1-7B14-11EF-B44F-526249468C57} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000a54bfa9405120743d43ef00093901fc5e3fc72a4360227d63a1ec66cefeaa5a9000000000e8000000002000020000000bbb4c0a45d81ec1c443dee67b28820d6d8c0143e593394acf5455fdf01a40703200000009319b450cfe71a309e297aeb97f378cc82be016f0762d8914e13c591808dad8a40000000f50b52e9b1dc0c1b5b8c8dc4db3fc27f025faa9551f27643d128ef6a6678dd18ca831fefccc1b60b40edb6fdb06fc0e389b217f8d1ed0af2522706202ab9408a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433413045" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2556 2520 iexplore.exe 30 PID 2520 wrote to memory of 2556 2520 iexplore.exe 30 PID 2520 wrote to memory of 2556 2520 iexplore.exe 30 PID 2520 wrote to memory of 2556 2520 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f58c91a0991d1f679a7ff1834f8db0e4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b78049fbcd3abd2228a4966e66293c1b
SHA1623c2f7fa1021f7a78a5ff5dd08b85e004add5b2
SHA2565d11169d2b92a58e1c8a1904d5926a9805dac8cc6f512614d703c63ead3c0a14
SHA512a53e3296e55ac16c5942d75c900dcdfdfe16c5110d0b3f602f849e88cb7ee570f2ed799ee8a76451ba3bb269a92b0b724d8496e94e7bcbec2e6654fbdcb64c95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdcf64c56980ae33caed98886dcaa395
SHA18f66c05dbf9d2664847b7fe5f25149f14b5fccc6
SHA256bee36765d6bab00dee98dad9773e4869e65f83b5bfd28e5a94160d70e9ffdece
SHA51272d613350280e8ef11cb7a53da6ceaf23d196a6901eb8dc0117af9bfe938673dc223d61c24a40f7ff2a94c13a64c3f6cd6ad18de21872b38f725da08fd6df181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5714244729c957a8186af569c5e796022
SHA14d444137f9fdac2b28583c1350205ea3c25c1c57
SHA256bc9ae611990903df79fba2509e5d36f8cc0308d6347b1a227221d32f3cb7e639
SHA51265cc6b75e8d628249de0fc9a94674d9793f22ad33855b997281aa6eca717d8567c705498dc5f956da7285a84040527bd76f79d87cb40f913d8d3600b61d38968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55699238b5a20d4c63be6ea696476bd79
SHA17506e3e3b3e83941e64cba71ede3ee62f721fec5
SHA2561e2b89a387f00623e5572c6fc72a19066f2047a276d15ae0a3de42a038001ef4
SHA5123bd729c52d28a4866c6e25cf58e1c7b060329f6416088481528c2b734011cfc6e17e79e7a07d2d40134ba8ef95ec7e95c65ce9ccbdc09b3cfb04d8a4d874b955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a434c86315de3b6141da0f4c506ef48f
SHA1337aeea8868889666d4ecd1250662947af21e628
SHA256590a9a351db2125af7bfbdb377d0a37778e3c148a8469b784dc7a47121a46138
SHA512dea0e0c2b299a8fd545bdcb9315f3e4f0a6aef365b3f0d98e1a675e7391ab8251932b2c5ac565318c00b7b02a4a18f889d1b387add174384edb7bbdafee5dedb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c07ec92dddac03b85457511b05645f2a
SHA1f37fbc7b294a7a066ec19ac0cbd2ad319ffa85e5
SHA25614bb5d73f828b304d2527c6f2b5dbcfdfaf3a2267a15cc93984ab09c4604d880
SHA512a02ac3a68ac0862619c3eeb78052867f594045f73993aa67579b2fd0048543e94017d5bdc38f32de396ae3366b6306a82e624563e8231f2d413a76fb949c6273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2433933e27bb47ecc75892651486ef9
SHA16e9f3fdef44ae01d6bb71ea80ce6b35931df30b1
SHA2569a139cce824ea010688f7d18ac6b657b21472d821b4824a35f98cf74fee976d3
SHA51282320072586b97d05ae76636746627b6f199aa82c511124e91a5e0d7fc2dcd01514b5f2a5b162db8e2f6671742c3b9619080a74d9a4deacbcabed86c427c6cad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d68a3022a76b416d33f6dcbf71656e00
SHA117d16e284494f4821f473952ae662c359c054002
SHA256e9c0f7fed59c73bcd55fec661b7b883b65346b657cfef0f4a7285fc6c0600c57
SHA512a18f5a0b69c539c5140c2772dd7d035c92730aca4e2edccff0cec37d8140610c3e09fb3f0ded061d6ccbeae77b22eae94ade4792db9395a3f0d17ee8f441fc74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef5788c9f535f101b71c0480d038caa6
SHA167d142358d95bb3fb3b2375a072c6245e0d48094
SHA2563b5a3ca634a6fa78f3be443c967a63d961d7951a26abbde94ee891b929a2cc42
SHA5126cd99e9c615f578d37c3ab0e1f7962b0f26dd11af48cb4a16722675a8251b0aef83a81e551c76d006dd530d47f94ec5c3751a1eb4ac5aed7092464a0ff987d7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc519f0cd9614d80f4ec9cbe96477c8c
SHA17d400090350cf0b9cd0e604b6bb6fc0f680c3e99
SHA2562b805ad2e1dacb24ef110f14732d39634d781490f929c6a9a4dffe05eb0231ec
SHA512039414ea589b3c75d7e7caae6003f199ba17a6bac55860047ec13c408ca0458694795153fa39d3ff49d39a25b0da71160614d6a8d769c5ae81fe58f9b40d2383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5048e875408bc603ee07cb6f4a7f47057
SHA1b29f99216e8c9d8524cb952361341ca8d9aa125d
SHA2567b1fbeb3d0ea798c3352f6f9a4ae1a889d038d231e434d919dd45dcd870e9e2b
SHA51270a7af8b7f88975928b37398ec16713a4b0af4c62c647830e7b676290310781776c1e95ed3fd2c35684f9fc062a68437a4992d93dcc5cfacf1f29fd677683911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516848714cadb4312c7f90a7648fdfa56
SHA145a90637708a74473191a80ad79a24762f055e86
SHA256de405fb1b83b5d568c5b222de29ea20f9d9fbb44e2e4a96056f10053f64f3216
SHA512c5bbd5cd80709d5dfe4a9581db45845c04e94afef75841ff393c34ff22a5415cab879086684c6959cfd247d95e246b34f9546784d0075807be32cb195162101a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525157761f728ccc639ba263160e71abd
SHA1909285a754ee68a60a4e9370f4bb0c72154ff640
SHA256b802d566dd98546d9bbb3a0521bac09fde167feb6d2bed74e1acfaa607a643c1
SHA51293f18ccf910a725080b0a63b36106bcf7fb3afef619ed9d23ec7c7e2ebd849d15f0036e5d5fdb7d4dc3c75915ab964db1bfdbeb475ed9d21f5619f775a07b879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e2631e9a05bb653849ec10885f8fd6b
SHA1e3f03e77d2bf1bd25e2ac36cb46fff5bc26afbf6
SHA256f8ea411726f19ab1fd70b51a5097f66340ba685253988f962a32f7242c8e8da2
SHA512b5f0520c9f4099f1a932fbe575fd0f0bfe2af3efe39dfa03187c7d83f5a88188c5df796845515731fb921f945fdb0a11ca01a2cb1fbdc42cabff34fb279c91df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf80c70e0dff400c8cc1e4fe5b6dcd6a
SHA12d0948852100a5bdd56312d89ba2eb070f453db7
SHA256a7c303b1571ef67acbab2284ccc937331d38205b54220daa0003bf218f69cb0b
SHA512ec329aba02ccfca76d72a05a4df7f81df5775290667aa58c087ac8c6f3290c061b09eb861367c21c070f3ffb3aca8cfe8f3eba92183b8eba7d66b4942d99b66d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffaa083b7cf01f086f5742decbc08d3e
SHA11590c14656cdef1746ed522dba6e095811c5d1fa
SHA256fe3dc73a38b2ce86307d4dbd32df0b71a182ddcc57a5679733c5dcee8d5a16db
SHA5122401048c171984e2227068f1b52115a0e480700ceca56aa77da90f399ea3780d124170b11965e084809835ec58e72e18cd8dfba5f032b0ee19e3a67d1c2af61e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f2c8d799b3155f9906940413aaf2d79
SHA1f65efeeae533c75344b9dfe3887514b53bd70ede
SHA256e11c0fdcbf8c2b31cc15fb91d49ce61c83ddaab104e45a65d37d0f0ceb9ef228
SHA5126bc7e85885c1acee2e6974fcb7f50228a3d4620804cedb783d96bda94d954d33b2937002e80dbc98903b6ee78a876464142d53b48c4dfffad5a57bd1f117a630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f93fab63f2036a2512fb3c619fc252b1
SHA102a8da85fe7e166722041ee8227eaa30bffe7bce
SHA25608ce8e49371879e8d7cd37878f6fe19a607c75eca50f42da4da4a4f3c57e4aaa
SHA5125ede763b37b236458bfc2f06be375a5f47886b6eb5b153e99070cbed4bcf0d9c10b0a0ca5ea6a23c7998c83b6376f78a19b4eb44fafd3816f10f622f659bfad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573cdb6fa4c238b7eab75b6a0e07bb3c2
SHA1be75bf090f4d6078691d03edb55774adeec91ba6
SHA256624444950781ada4123aaac2b6a5e6fb7da7c28f336d511e4e7e1b6dd5291eac
SHA512d84094e9674cebbe41c90bd2ec101c7e17c3f8e67b3b236a16ec6365220b8cb0998fc53936df78161738a7b2ca3fc28f4cd7a94fef0cf29fd811e4061616859d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5922a8753f4c3bb29a16ea77255878c15
SHA13539c32f555263d9573a5df3c31f1bb59c23ce97
SHA256cb46442bc71bd3b7441597979ddf17cf0494937bf5433e954b5073399014eee3
SHA5126ea42672e72e6eea7109c4b6e9b0f061e21c461f397407500310f8e1f1e030dcc2590c16393395b31da2a4ea5f7791b41d31fafdc6eb580b68daf70804bd8774
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b