Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/09/2024, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
f7221532e99b815135532841d11bd91c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f7221532e99b815135532841d11bd91c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f7221532e99b815135532841d11bd91c_JaffaCakes118.html
-
Size
317KB
-
MD5
f7221532e99b815135532841d11bd91c
-
SHA1
da341d163e8f1d2e1e3fc7f32426b0d11a8087c3
-
SHA256
7bcefabf3f4dfe370b1fefed8ce0a234b5ce47387fb0f77c685310777fa9bb14
-
SHA512
3a0f5888db615efb215afe0eb2be1acb21dca540417d32ee762cf980a763ffb771138b8cbc3d6f28e6aa9d3af3becedb29cc1f0a9f0d9c27c003f1880ceacc8b
-
SSDEEP
3072:rzabYvzaeyfkMY+BES09JXAnyrZalI+YfhxcVhiCVcejF1Yusd2t8bHum:DEsMYod+X3oI+YfrscehyusdHX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 109b0a6fa80fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000f26f94e71f61fc53bf201172189395150f655bfc7676e2cc9218a23f3f964863000000000e800000000200002000000067a710892ab3caa0a22679fb4a4dc3790873ea99d25c1d8d9585a244b925116d20000000b5ef53f6a1d4ad692559eea1ad4e892e7e8226e735a334c6e417b86a5b7c0c534000000042e29035b2d9efd02e824e1dbdeefe0a1e4c65a13c202e4ba4f7f517e6a84e4a4a0d2d0dfc0c78b4c11a0fa70eb2fa90b2759beabcdf7a8634355abab03713e1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{977792B1-7B9B-11EF-BF50-D686196AC2C0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433471233" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 1664 2380 iexplore.exe 30 PID 2380 wrote to memory of 1664 2380 iexplore.exe 30 PID 2380 wrote to memory of 1664 2380 iexplore.exe 30 PID 2380 wrote to memory of 1664 2380 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f7221532e99b815135532841d11bd91c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd145debaaefd310cf23a9b70e11941e
SHA1f5b313e668ab7f5ac5b8d6a265381e336c06cd2b
SHA256e7fd05b63b0c6610ee6059aa5507f8cfad0555cd46af0eda7c973c406f595237
SHA512430b7fcf4cd5b430b1ebd0354e34a5455084e5b17475f85c88d93af2eb92c90f7b46b37b9cf9edca61a9f02cf6db744162740121b80f44d12f51dd3b358f80f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5238e207c04da932b33250c3cc020a489
SHA17d87466e11068ffe1ece4835bcd14fb12f906ff3
SHA256f3684587693d7443bc41d8717c4a813c04ba53f2bbea51306e1548911c1e2434
SHA512522bb157d7005befaed9caec95830e3119eb97601b4ec342668334cc6208db5619bf7c6f2b0fb4bcdc0c62009c4f26fa2d2dcd5aba8e0eb8c7d687072b8fb7e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e7a3d952a11cfcb7e79527898042361
SHA15eee3860672f2e8db4129eda6200b7ea749effd7
SHA256e04d4816278b89594c0826a9441d861b8d2a9b9a2410fd0345b5cc3f6f22e482
SHA512e24de70ff73d0ac5c42a7de0dd3579301d32e1fb6360f797ce7fdf7a7e3d7e904a19e1e5235ae498261ea39eb682012980f688f93a7017e9602c85006302fbcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afa60913d3dbe2b0753e4b44fb7302c6
SHA1a60acc365d75b815bbf15d3e5f87a30fce6329c4
SHA256b9b29229aa0a37b44ac46905e0bdcf3056c9a7ec5f12b59afd7b3b8c842968e4
SHA51258c7bce08b55e654efc8ed1f86edbff0c32f9818a615c8667945e6be0eaf49ff8a82a39c794818410196500a3a632dece2a83330a283c80d6a5aa8195e229185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54492c8589e609ed9520e006f19d203ac
SHA10c9b1bfc96f77ca7eb7ac3d9e3d597f2731e2f9c
SHA25691c1783be283cd14ef92dada0659b05cbf0d933795d1f835c039c9c09487e384
SHA5121e7b0f5d56de538207e17a186f069e318459ee50e983e359f82ffad1d7aa42195cacbf2109009541bf9259a28d9d13c94745de3d757e7956ad193c9a52949d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9d75f5c1fab9f98d6ab99945c8807e3
SHA1d4aaa370ec8ad4597e047d761eb2182307ae6ea7
SHA256f5d702c5494ed314db21a7de43b8ff90eca0bdf4bfd8faa2b474632eba9b63eb
SHA51219735acca9205e29241efd3ddfdbaab45dbd44b04b225cc32b2139cb7f52d88fc3bb3274f7cc41ce320dec0044207f4f80a74214e43c0a27e69172a1757f8886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e925d6ddf227d634c89a7971dd63713e
SHA158331198470b845a74b138a34d1bf4420c0ada7e
SHA256f54503cd427756d1aa84607dc148bfa3058adcc9984cd2d109cdbe6f88cf1168
SHA5123e2eb4c90bdd3d05cfe8d3395a87c2505f290aeabf44c84c013159fe6593e14f459979cb78234b5d9a0ea26dd949447c9c75b6c6ad47aecd64cc3c23c9135a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e7491cd4102b0a4e6c68f8868408e4a
SHA1f615357a52b4eb7f5654d7e93eefaf93c73e4239
SHA256478d1ddf23472a7abb8513f98f718adc985c0703de4c893476464655ce646a1c
SHA5122c5196b090a9f639fe13c6ebfe17bb5b59796bde7802006d23cdcd55db47a8afb5d7f758337fa8ec6124c3de2bf21c25e24d2707638881e98c6f847c1072c177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5097403f7aadde448ee3075db21e4909b
SHA1355110cf1ce20c4f4d06ba47f3f5735d1b82d84f
SHA256f0bee32dcc25dd3e24a19fe29d81b1061904cc5b9f6df1e5b216108103a2cef0
SHA512b7b33b0a098c6bbb391abae74e58b7f2bcd88fc93a3f25919caf4c6e077ee13da338487b33cf6c108f24970d8e5ef03f9be623bb822219b12f78d705838a46cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1ead10beb111a5cb4139125b2b41f59
SHA1e845ad05f8c31154bbc6e3be4ff7e9a67d9f6e67
SHA25673805b74498944c3932d47aacce246407a5c7c5a72f6d88d20f7834cfc14dd3d
SHA512ce818a4057da7b651aea7897216bf2a7e2e40ed42efad6a59c7bd1a5ec2184faf0e5436a63dd1eef70fbf9d7ca51a4a6ba297063046468dff08226bd8b573cb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a7d13c34b83e7df02c890da1ce41610
SHA1f75a580c3258926d9d315cd0612d6ee4075ab119
SHA256a100a1cd75f59b0cc452499334f55722f77736fb8c931d798f38e5586f270a9f
SHA5121acd6fbc8be983f710414602a46cabb46195dc96a297ca87808652d261a377af52dabcce3f91efafa6e10913cb599da8ed08e292953d065dbd6ebb5a3e9df299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd24f68d374276dcf2efee0576bbff3c
SHA10ad995f7bf7c6dcfbf247d06701ed82d2d28bc5a
SHA256dd4e03895746f05402a34ac0aed9f549afac392c015fbb3c58e3c08524f01e64
SHA5127d63314349aba62e18c59ae5030e296f7240a1a242bc126759f2cbd4fcb9a58eb629c0998fe182b6d60dcd21e6b414fe8b751cfc25ec9487e502a09aef8e03d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c4a1631a4d903287144812fc97d4ff3
SHA1423610c9f904a6c827ff12118e1b8de88b4428cf
SHA256c848fc5057cddd5a6573e53465bb9a419fbe9544ecb7cc1fdae7c90c2a765d7e
SHA5121acb00512969984576ce326bede9f26e024bde263e0fd81f168095c8e441e9f4f85836ac5e1d903030acf0f6b42c3c6ad3981dff6e8c4805274f5ccf65626278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b4315c6ca51deec8a82fde7dd972575
SHA17aa510945650c7d023461720976040d0db7fd970
SHA256d527677782b6c2b06d80f77cb0fc97ffeb6e57cc92c7f26d96087ac4278b6c0d
SHA5129a2312b67529f2a600302605e6bd445c68cb2ece914868a587c6b498ae673c2221f6391577292e8c57d552d2cf41c7a2bba771d03abf664ec94708f1974f38c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0881c3ca2bf493321995189777985c9
SHA139ce3468a0c7991315059240a031d979cb251805
SHA2561a2cd8b6b44b74acfb7f5df81fef9819cec5952a906bd24aa30f2dc5223d4d58
SHA512fc819cbeab38fdaa46b804216f61138dfc4aa3be13d57fd89f2aa27a14123ac5c01465a9988909985d6408d504c1bfa5183f9d1fad1d168d0b6e25410b7876ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f605d1129e57f3a09a0d68e393a8637
SHA134ce95ce67b247b7133ecdacbf1a1efe900a2796
SHA2565324cb2638647022e908c4ba1b65ea7dbddc2a40bf4fe37dc37ed2d430b467b2
SHA51299a5ba1ca26b74db386d4bab2b0767dcfd3bd100dea51d2f7aeb51ec6e2b4c8ffad38b45ea21997c7a36b0e7281fec542c6072b7a49599d20bc8e3585e22b3e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c812cf415c0ff93628bff5c42c2358f4
SHA1e2c63bf5a94fbaa05fe415d53b83529cbcc3019c
SHA2565ad9e48bb40a362dac29be53bd2986b608aecde9090fe4678aab0db62ff7fbaa
SHA5124c11addfea0cf907720ec6752162dc92cebb025d941d6455498c6fe277f16a5bb3f02f0fc3813e0ee43ea94414cf8cb5394b6b471af5da1fb9faa9f0ad2d5096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e5b60cacd26db16f5563876f7a90ddf
SHA1f886f5fc9b0d5c28db6c445e8b6f06c7ddfd1118
SHA256857a15433bcd66402195157476df64dd12c854815aafc9186ffd117200bcd26d
SHA512b885511cfa7f1d055f0ffe70b45bb49a4c1f66707888656f9a2a9ca5b65fb07658d36a9273318bceec0bc55ae9c3497b9890f33c5e139fa74995b7b18ab86276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6330306a1dc2f191d293db4ac5bb751
SHA1826fe3a2a2325402b92ccf3b5ff314d15f536ec6
SHA256d101f59beea704ddf56593f050af42486563987313e7c2e83b2c89fd966e367a
SHA512f68b797faa6cca4724070fc267c68602954d9babf12b597a3346eab4a417f6b0cd87d77757b484cb987cbda10ebb3540f4fa073d089e857932055dce2eb3bad3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b