Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 23:59
Static task
static1
Behavioral task
behavioral1
Sample
fd67799bb116a18a0ff2da099aa2b5dc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd67799bb116a18a0ff2da099aa2b5dc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd67799bb116a18a0ff2da099aa2b5dc_JaffaCakes118.html
-
Size
78KB
-
MD5
fd67799bb116a18a0ff2da099aa2b5dc
-
SHA1
7e17679a104419afd291febe51e5236754e59835
-
SHA256
f64e495bd0633b786f39dcd0fdb6cf0325ef2285d2029023c6102c035e5935f1
-
SHA512
60a30f0a6dbee8179633f0cc82b70f9b1cbb875d1efc1fca84f74831e0919d5a6784f0ae93ceb160a5818af9c3676242793b9ba83cd5faa1a6b5afb45c7e87d0
-
SSDEEP
768:Crh7ye2sH/MXgyjCKoBfuS/7FxIuKzNyGsaMWxS+uOS+V:CrhxbFCSa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6074e9870212db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433729833" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B10F4451-7DF5-11EF-8202-7A9F8CACAEA3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000005e32269f686087042ba01fb7338672e080fb6baeef067fa84a6d28b1b3d5f1e3000000000e8000000002000020000000b06d2b76f7c009fc8b5b6c05e2d3c984cf016bf787e1edd2d1996b00fe821909200000003e6f9827be8c5e1fd31198049b2d96cb6d7427c31061e99e008dc1c78e44f7444000000096f50ac427ff192e50c1c6c76048faf2b0cead0e6b5bfd5d9b7ec451a515d905e507275277a8b89523ba2c8536da0fcf45ccc1e6bc0854649360dc3373da1ae4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2552 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2332 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2332 iexplore.exe 2332 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2552 2332 iexplore.exe 31 PID 2332 wrote to memory of 2552 2332 iexplore.exe 31 PID 2332 wrote to memory of 2552 2332 iexplore.exe 31 PID 2332 wrote to memory of 2552 2332 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd67799bb116a18a0ff2da099aa2b5dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c88817538d4ec0fc18e7a8cb4a49689
SHA1c1c051e7a1e0fb97903165e102384c03a6f50ff7
SHA2567f9284f64c56b6731071b5abb7b4da2eb39395bc214e15068fd9c07cbb13644b
SHA512f26a1b54c1819df9ceedff81f9cb972b6d485550f140fb8749fba9f89c90a7debd56a85acbd22695d75b3a5498341966c3a332bf096925b3d43f079d26f28046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5171caa3008492ad7e4f1fe1a191b5bf7
SHA1975c86a44d9fe11ab71170408f915fa1b93cff9e
SHA256e901327ddc3e7c395f23c7bef2f2d126b83a62c1fe8c7b72f55bc0ca8f595360
SHA5124429cea2b4766eb6ad9e13e09cb14fe07195af3f54dff985aac9d84e39a8d5111b6e527f2ac8f470dbd543b92d2feb20b03f91b399e398533950e83bed2ad561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56159267954044827e40902668898eefd
SHA18673a17ac14c2ac734b9a2321d7121d0bccca537
SHA256dd6f21a1120d76b5e4ccfcdd6f8142f4512c943052cc52cd3f0e1213d35f3c5e
SHA5122eccaea7f135c0678cfb57707e81e403c3d04d273dd31c28d40f7e281b7f460008a53609d65076f573373dcd7cbff47af36157c2c6145a873758104d37accfc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5248b275fd55903e41317be0e0c6180cb
SHA1f7b73fd019d27c3688073087479f2df53189323f
SHA256710658d24645edc7a0a171d2c89db2a43a01f00aae07ee4c13e4289370108b93
SHA512b94962b00fd7e298ee82fcdf5a150402e0785b2a090e79b626b05868d9af4f8d4bbb9e1cc63b1e8a8fddc73b22c7ae5d47c8d35ad496460a4d6596b9996a0535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56636b6619fbbc6e87723649836bceac3
SHA1ac82aa4c351ae8596856754206159d53ea485490
SHA2567f1de11e0a36bda19d34b833efea1d82b78845e5279bd2483faccacbb17dcb87
SHA512250aab3426fb6cc1e38c0fd92ecb6b4c464512bb72c7f860457884b4854588d06a11a478986fcf075e255ec64b22f52801998cb11808104b421957b0e0444b5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca575b8772d2413e06878663e2aad2f3
SHA1aaeed87e35d941e9def11e82e5bdca29792c8fb7
SHA2569a0380a45d9c257aa9e7e4b2400235ee41d76814a5acf5f47774fa7ce9a20980
SHA512a8489e55bab78439e6c97b86963bf6199e47a5a10bc853250579da976e4faf777e8091c52c828d04c25d78b50b2e5691f13a364757704b5fe7cbf1e24d6dbf69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535b832e570d2faaccf33f70cc365d850
SHA1daf14b74ee33f3fbba9ce57fbb25023552cf9684
SHA2561fa029cb0686873edca4e556027cd1bd0a50f8990318e65f6091d8d0e9132e71
SHA5126a6166338d4b7881731d140e7428171884d4f8e04d67d005d057f8647db826ff6396c664fd7d5778037c84bf00060437f3e1b36ac07faec18e9980df01055117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de1f2fc03b7520d8ad92e7cdcf97660c
SHA1df0fabf5036bc544564dc4b342f7c7402b6ded81
SHA2563ad6421778a65f332baeb8ab37f5a293c18735fd4e722a13e298a12946b9b457
SHA51268f8e564676ad1f4da9de4cab715dafa3497948cf9111d706c9beaca34d82f9ad118685391760e7126c3d120d5a10938c89f043ce0ed315e97bdbc08229bf207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586c1f3f8fd2b3b9d23cd6d284fb08645
SHA1afa21ec143780c9519b385996af34f071c1879d0
SHA2560156be0d99d5a872ba6756a4aaeb18e335a5be277357f27a708fe67c86c5c05d
SHA512923ae40429ba08315d29ae3a999c80108637ae106de3a49c62c4bc84a3ba521e088255ff99707d0e87a787578985a1967c363d9c6b29a75b4ca461313719c3f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f551fdf3105813e6c0d0c36a6040452b
SHA1c3d34e9d545863bfe47956036080570f46044162
SHA2567ff8c770c666b704dd457942a272c32fe0e8dcac4a9796786283df499bb1104a
SHA5122ac4020e6dff33903fe2656d341a48765bec488bb083f2f6da5b941af0c44f94c6e039c86d0c16a88c2489f559cd226b68ea5c3b4750243c31a2b75b4101a349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530da0a89d1c3df9a53bd4a9fbf36201a
SHA136586544ca4b23313cb741177c3e0beac886e1dd
SHA2560f6883225c7199dbe3da7d0b1ed25f160a39b2d81baf1d05355d56f28a7f0849
SHA51249af3288bd13f58dcffaad8fb03e5ba16a7466b90ea7999f07a11c087409b809ebf6ab0299f400364e4f7b16f9578f4aa7283849bea8bd7427f219998a649070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee74a61728407e60e22ed81c6a3cfb5d
SHA1174abf72c239730603ad4f275559f0fcaa97ec01
SHA256140e44623b70e7ca8031997462e6d0e5d8687e1582779f88aab6591279190366
SHA5123056d9c275a038972db3bab26e963e2c12c0066f06636cac157ada38a299954f8a6cce36d2a7a686bedbc3cab7a61a378d0665359d60a9a2a95be6d8bb2a3fbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5610b7504622bac1d14480d4d2cf9da86
SHA123c30425748b3f749d37c3d27d9644abcdaad08a
SHA2561de28918b7a82f2decb98972a8063c1e19a9a81700ae67cf8e2874464125a984
SHA512fc5010876c09cea438bfdac73059e27564761efafaafa26bc6eb264714573aaf0cc94a90c39c8759554d9b717690e888ce02852d3b1dde9a251ca6f223b6a946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544f4d075056ca34b889ea41cf8c99c95
SHA1d715cee48b32dad5f63e2c9b08457a2355b2e7dd
SHA25608ff53730a6e5a38edad9a0a7140b0bf847e55d88f1965d31b2962178663796c
SHA512febf4305413068e95ae43c891fb1f5e20dd5fcc5cfdce37e19d97ce361ab4e73c6618cefe89a62fc4444de5069302da62bdd7914938f92047fb561f5555def13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ced1ee6c9f13a08085957f6a891a323
SHA123a1074be78a61f2076a3c6c1450e35dcf9e785a
SHA256d8d4b2f85b877e9969554ba5dc1264084bdb5aab2ca16e1e3329603ac4792300
SHA512e06ea9b3aa6b2cf0250a713fa235b30dfa540c421aad604bb577bf889dff86163f6d731c55312846adee981ccf87709f8e546a32bbd4ca863cf6ccd7e405ba9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56df8b6d54cf51a75334853deaed323ae
SHA1c0c4cf48308644ef7b64f99ed9082333de95e609
SHA25675f7271955d507a2f49bf727fb5cbd54a8b1b5ceb4e01440aa8107376dca880f
SHA5125f5d98b210bb3c1ed2ea688ce2a4d5f61f6b4d7a195ee60343415ef9281335e3e1d6696fff940c32a8314b6af0c9894f72e5e416f19f3741a442a2fb2578b588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6a18cc705c7c6b467ca8c6517f8d459
SHA12c357d814b8506906bedfcd1ae1052e4529efae4
SHA256d8ef6d074ed0c5752a59f70bcb385d510f66322bafa382e79ec59ad217a04d00
SHA51205bc0d2e87914157cb8a531826887a449f0889b1526fc2572620d437d7323e02f3ea6a4a04cc470c950a69bb3badf8c56a64c9265bc23cdbaa625f7724137b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52147ad2c3af953bc0716376752e0e6c2
SHA140e329a4aa8ce0a5b4b16d28ca11744c2957ca4b
SHA256b25ab1bc80d89062c11a6d5c6941d47dff6cd383ef6f0312ff6b909432f49a7f
SHA512dc3ab5bfa168468a47931c80037621b289487a351f2ec159421d3aed503a20ec3fc185e7f620cb74b15846e47ac74b556e26fd040dc6abc9131f0816b7e64c22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5215d8389064000954df302f608a1eb90
SHA19d8fedf42b74ab17fd41ea028a49b00f571426f4
SHA256d2cd69fd6d8ce2b6ee476898db730b626074bace772c3163b749bc6f8479c5fe
SHA512b59ae3d28e71786080c6ae0c70cd1362434147a847e489bcb1f788a6a4d25019e1904ecc3e8fd57923706e9a10b3ca0500ea6bf9c077c341b3f7023a481d35d8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b