Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
f5a25c22f080ab27b4d8aee86bd827c1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5a25c22f080ab27b4d8aee86bd827c1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5a25c22f080ab27b4d8aee86bd827c1_JaffaCakes118.html
-
Size
460KB
-
MD5
f5a25c22f080ab27b4d8aee86bd827c1
-
SHA1
0e1704b62df1a32afc85ec481dab5ec5d1a273eb
-
SHA256
8a66593519291877ab0562942a17e193df1bfe81fd636a5e9f1daa34c44f62f7
-
SHA512
fd313e16a3ff3dfe18d074bae12882a330703af9ad7900520899a7b37ab82e18cf4d011367ce420b8995a8d8edcaa2e4f05a424485aeba869aedb6c348d7a44b
-
SSDEEP
6144:S7sMYod+X3oI+YosMYod+X3oI+YWsMYod+X3oI+YLsMYod+X3oI+YQ:Q5d+X385d+X3K5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{09F3C1F1-7B1B-11EF-931E-C28ADB222BBA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433416020" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 204dabe2270fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000005d826c17e082d4422e0002979bfa5a84036d6b41e05eb609b881af53562c1fd0000000000e8000000002000020000000ec3ee3e5d544f4b2bdeb1f038e3b9e73baebe34f02b25064cd432c3dee65a6e520000000dc16f660b4ab189a2b2630c16cb76f4e7527a1c6541f9616ae345c3bda71caee40000000eefc3021d4bf540ac499f25f2b18de1b920f5af5711b38fb762bf3f54590d2eabaee7b48b723db79493dd6a06be5da5b53c28cf6b88871b8ab8b6d458d2d13b7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1152 iexplore.exe 1152 iexplore.exe 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2868 1152 iexplore.exe 31 PID 1152 wrote to memory of 2868 1152 iexplore.exe 31 PID 1152 wrote to memory of 2868 1152 iexplore.exe 31 PID 1152 wrote to memory of 2868 1152 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5a25c22f080ab27b4d8aee86bd827c1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bce71f3d41807a4355534bb3ae661988
SHA196f6799dfa565b7b911d9784073cca767d076e89
SHA256a87ab4549b15b8c0943c1cb694ac51f62d8470365f58745719bc2b3fd09bc9ee
SHA512c57d06097186488ca7f9b59d91cd4a3a6bb7dfbbe0ef01e23233a0c9eb7b832667287e53ebcddd71a90c6fcacbe601a819380e63a10bf64a34e3b45ee285a765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e01063e223fe1c8dc3f5ef892769763
SHA102b4a3b71d7b65e7d998c229e0198d843cac0258
SHA2564901c038836e7d4558fcb6351d5452c89221ef5f608345faa8dfd18367bbacaf
SHA5121b5cb31b035aa3089a0a13222883ca88ccb218f0117e0a3a143c49a98c26865fa73079027c99b4052a1bdd3289f4a749986eb295c3d07841362930bbf66fdfc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4c5dcd78d9f104fa2e8b4b600c24b54
SHA1ecb60f3c539880875438d552032f30b7abbfef7b
SHA2568b11141708aa03a1e7b20fa7371a2058494170dbbdae0babf835e9574e23c56a
SHA5127dd280dd98353c6512ecebb52d0e48e0ef3d36d25bd0508def5353ed2027826627a00b29b60391ed4d29442eedef9a4268f2d4ec53e683505886b3b18ea8ea4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501d3cca49409defce85430c55511c75d
SHA14831a7f625e4c80a86c9d4764e1328d484d981b5
SHA256c41ae4ebcc23997323d1858ace1cd5e4b12ad79af7369181572c6c1df694f90e
SHA5121cd4e3260d9fc1525656e6995775648cd977a4996d2a11ef82ba7b64091e1ac2eeca9b568e7959b1611a535f556a84e8e498ece4f492caa55fe566184ee58883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc73008eb5b3587825d2356148d51fa0
SHA1ec39e6da326323d6773643b317e8d857d0eee54b
SHA25635a717929295d1a0760fa6917676d2a62f42fbdabd293d03d75eee0cbfd185af
SHA512f6cf85697073ce29ebcc3e277e55f658bf6c36be159e905073cf9c044c45b9701ab5b8cad45c90ec3f004b505b48ecc5e7f28b4b943a59631c3dffea48cb0216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac15dbe0125292dc58607ad5660d3b88
SHA153aaf0d871271d4bda479613ed843b4af7607b79
SHA25653e509e2b5c6f4377d741a64f1004b5618f99c8951911d25ee11e9207f99294c
SHA5129baa2ef0d471ba4f87af338eb2c32741e5d1b3799cea2cafcc40f71aa1bd8f421d2fd035173f19155f75cbcde3a344f044dc008fbcb532102294b418d5fed3dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd8649b72115b8cd157c67a0a4f4fc97
SHA171f7ca5d466b72fb2919df0e5c0b189c496a37d9
SHA256c4915f4c711c4fe98985891d1a4204c0d046178478c2d2f526df9c7ad53e11b0
SHA51253b9ca100e23ffab86809855585c6bd63ca9018a934be16f0839909bcabf34bc9cb891e74d47563f533e86f61caa715d655c51fd341e47e749731a59f5b5458c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c43e5d896e9885d0cac8e6f4ddcc57e1
SHA10486b517fdd3d6e638186b72a2eef8f5a2b67623
SHA2567080d8dfced2f4694614560bc1ab3b164806f59c1923e3ca79cb5b32f4abbc54
SHA5126984930e6899388efecfb94d6277ed19fc832441bda7f36d9e8db75f6acefe46f701e1ef10cd1169ac1fed2cac8f311b641da436291f77a48fd08d944a7ad7aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53756e6a1963b1245a02fe78ccf4549b4
SHA1476fec50a16e3b7dfac4915b172e1c3eaf23af06
SHA2566a6d4d6ef46fb7d79798322b4550df04122cf3f5f5050e94be3178fe2b90d776
SHA512b29ac43c0c491fc33e724f781ae586a4225061ba6d7a547351b5a87c7f11d119d8479a96bace4422edc9e3ce92246b502d1bb5918bfda4331a79270952e3e35a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5e8febaebd56b7f84f51b89efb5d3bf
SHA1bec84ff8121a59f9bbd02ff7853dee46eaf2d94a
SHA2563d398393fda81250e9225f60a3f3e2c36649732b764e8f4dd064393a351ab7f1
SHA5128a16e5a7a2350e3a271f20e7579d9b30ea8aab14b49611814c2d55aec97ea288199f3eebd50876dc712cadbc9b8ab3cad4725fd5a4349012bc48cb31d161da33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9fd928150a1ee589beff1b27d66f55f
SHA16864d430e97c6e03f2fc8271dedf5dc925283fcc
SHA2561909f00ccf559af1c4d04185aa50cc15068d9e7a945133e43162fa73ce3589a2
SHA51243fcc72f27a1d7659225cd4141b22df6e978036adedbdbd14eb4b39cb39bd2e3601e9b2d06f4832bdf9a4dbb0f6f4726df216298e7c4605c96353b768e21d39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55931a9ae75f77135f06f9f3365134f75
SHA1289cab31df27fec494b83138e02295e61649e024
SHA256013f979a4bfaa4dd8bbcbd4d7014adc20cf1b92dc081b442588984fdca34ab26
SHA5123fbbefe22e9fe247de747c0b691635139f53f2abd46295a4bb02188bac794ef7bdce405e2eea4009ec78a9c826dba24b949eacf3a1af4072e0aa1307c2918be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e2f7ed090f01f2d152792c27f446bfb
SHA17a5e81678212f1dd5d3cb8f53c0cb6f24e1401c7
SHA256d514e8fc6fc3b44097138509c2b431346b1cd4598b84c01d187762f8edeb3754
SHA5124715e268f9c7a9e7dc9284af34d344b8ad8ab8ec5268d73a6d2cd45a2078a51398dc677340414a4375136696886dda48d707b04ec1e641987a3cf1596d33187b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a732538d1d8a3f6a66a8bc3e869bbedd
SHA177109435e7f014f056b9304d3215cd15d3dcd81d
SHA25676b3529b1a595b1a3a8e427615a83587c9ed6de22a9fa457381f63d8a1b9edba
SHA51237df5d97f93a2adaf9142b1669b4fe4bd7c7f3bea8136cab855c60ec25b7c021a9a1201a7aab458371a773c5b0488f77606c905d30a497aeb2d547b73a6132de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c160f6e4f24c744ac497b00ac13c355f
SHA167064ae663b86280fd4812249893fb38ced6e86b
SHA256d224647b3dfecd0709e32650264ea004a40d6cb9d000edc98b6fa67234d734d5
SHA5126ebc452cc9caa7378a50f0f5a8378301176d7925fffd662b439a0265a147ec94c9728a59dece9ddfe53afedab81c0aeb2b218fb52ba8394361ecd3fe819b7aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afd343dbbf01d98017b9d2d08246ec8c
SHA10a2843d03a62e84d5212b6643050a66d886e89ad
SHA2562b51dd8d447973776eeed3478a6646990708b26609439c205a4a3b89267e770f
SHA512f8c20f15d2e83edae7722b51fdb818d0b92e1eacd8dead838da99be377adbdedb248d141023fafc22b5ac82395f6c2544f5a80afcb7eb88edb3f2f4df223814a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af7e45743bd7e1e16e2cec8041374866
SHA11460df20d710ba775813fe77ba089d735682a125
SHA2567b99efd817c07cf8a221e19a5f617d19d5d4a1dd3d629fe30f02bb06c272119f
SHA512a70deca309e0ecfef3a3ab95a1f105221f9726eb228c0f7c6530240fbff2cfe23cac9eb5a4e3d2d2ed480846aae5a7acbb0fd26f0c921623ca3901e86218dd70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b1b5e3c92acff4156b022803e72944d
SHA18a4cabb71b7072420d468f8a6296e2060d995d96
SHA256e1d5139ab4e2e434d50b252ffcaa3bcdaf1cce52de9ac44828be66ef14773e0d
SHA512b1ed2e1fce5d09b54694d8d6e345ab62373f499f1ef7c6bd56f3dc4502c5b2c000a5033156c75f9eef5e418e2a01f26e144c256537fb45dd523d3624d0e15f09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550737b35fc49e33583971e6b0bea25aa
SHA11d44e621bf1ae60f508a586375263b2b9bfcf46b
SHA256cb0ccc92b701d3ce38f7eca5993c635b63a2d0eae96b36d17c20821829e062ce
SHA512e0a4f43700003cf91a37d08d882520a21b065066931f22e42c60a5af0dfe2b3e64cc1ede9fe2c12ca916f464d67ded61871e624ae237ea7622b112faba6dfb83
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b