Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
fb8fdafd660b1f3f0c024278d8c80dc4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fb8fdafd660b1f3f0c024278d8c80dc4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb8fdafd660b1f3f0c024278d8c80dc4_JaffaCakes118.html
-
Size
15KB
-
MD5
fb8fdafd660b1f3f0c024278d8c80dc4
-
SHA1
bea5e70f3a213128a29d2cf6c4537b9300d939fe
-
SHA256
35958e1dd71911c6c07f0a2f97d6c9c2f6957d9c959e1b209aead67b4e18a06a
-
SHA512
7c06f56f45355cecad53d687e79eb488e1109b988bd0f11312b7b8cf0fe07e35827101cce2601469932fbd3a5c9738398fa1ce9ca44c7e3ba0f798f09e0fca06
-
SSDEEP
384:e4C9ynGqmLHEqQEb1tZQx2aDSiSycMdToV8xTknBpR9Hn5/C2txqjA5nCMh:e4CEGqSHEF81+1dsVimBpR9Hn5/C2txz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000029cd5bd66e1a5353bbfcf0905708d7969bb9d816c33400b13a19980a92abf4d8000000000e80000000020000200000003c5a180d0d866dbd6fe126ca4b5b48d807bce3a97fc19e221766910c9e0940f0200000008384c47668cd52826782f5a5ef7fcd03edd40656b61ccbc8bf9fcf10135fa38e4000000037833cbee23a7a2e4025b653dd39d6abce6f132e2f9d4251f3525c8fd40d34270f6b47565fdc97addec0ffff84e1ae65fe6326927ccfb5b27741ed275652dd52 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e01d42316411db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5CB30E81-7D57-11EF-BCF9-7EBFE1D0DDB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433661831" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2680 3044 iexplore.exe 31 PID 3044 wrote to memory of 2680 3044 iexplore.exe 31 PID 3044 wrote to memory of 2680 3044 iexplore.exe 31 PID 3044 wrote to memory of 2680 3044 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb8fdafd660b1f3f0c024278d8c80dc4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c933506809b188de278e1f1c381c76d9
SHA15aa18c8900d7e6718aa4b245981aee81a303313b
SHA256feddde2d2c1ab3f3a692903e326c67e999a4fdd2970182d746de5e28fb0d3173
SHA512596823a056d9b0315c60771dda8be5c36b511fd7cf47498fd970d2be3c0053a4d8e78c710f2b84108f3e80efbd8e44360d56a09611d7383ad8e8000211a50084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc1816efbe32372c1f6e8c2114ee1bd8
SHA1a0404c0dcfc998594660d540daf8b998ef5f7eab
SHA25650a21a160ee4f4c611142b76c4ccfa6b8742d61278a1899c00d2ab667ce78b8e
SHA512968a00313a83fb171a7952051d8fee8078c2ac04432a74f9b0717b9ea4fcc45538f0e568e67d33eadea70b0bb9b93be758e68a52d394d5df64226bca71bb296c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcfcc174976d08014303376e4429ad94
SHA164532b827ca7738182d068fedad78d80258de8e1
SHA256bb067dc90b60b522498560c2be714e3006f7c47ca969969e4fb4eb6d19a5d9bc
SHA512a36dd64b2e28c1b6f87df82a7d7a5a2c27a2b37857389d6e31965e965fbbb0d6018ce90d99d99c3658022054e2f7ffbf1cd44a69ec835eb71ef6f001b093b657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58298b59716b31b0f33c329e14e3e47da
SHA18940cc4ab66794f6173895fdb6a2e79a45890d39
SHA25681112e6f92ce4f68122fd38ee47daf8a903ce2a6e6f76ce4dc562b2ed04fadc1
SHA512041072774432b57e8f9ed3fde28c4cccf5c1f05430109582bfeab4dc5059328ffb6161f8d38d7261628f1cedd2de8748a3e07a0705dc59ddf62be0a7447590ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55648320268c4060dc30010bc527647c5
SHA1f03eb6056816a9da0a485345318538ed08763e10
SHA25652e07a66d82c8b1f42792d184fc873c8e19764b1ef429de9e64af4a124b25068
SHA5120d0bb88bab8c3c63305346d0fc907d40fccb231fe0f472e48ac9b10eb6a86da41a174e4b694f3fa74449e219365595bfbfd50e18317ad52773ca562b3552a37c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a8f243cebcd3ff3946ccf7c2426a868
SHA19b7d5ebfafc62d075590baca3495eb241a8d296a
SHA256b41b7062c66a2aaff81b3fa43175fcefb9d73fb24b418ebff396db42cbd30916
SHA5128865cf8431e5dac743575275f5472e21d7488e882adc4d573b09d2642df565f0d8f8ffde4b035825d10ec093c6ea167e07ab2f0d456d5ec0b2c8f3b52d956af5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4409e9ea5706f30b280cf92cdc1c395
SHA1ab788392ed7097d59d4b445b723ff97d4c6219aa
SHA256b51e207e0a0679a6d40e8ee9db3bb2dccd840865840955c6b7f4ecda23a2c9a4
SHA512c701a962b12b9e07f55030ec954134e8f3fc467515b13b2d4d5004dcffce3d2c488a58be57a7f59a4f1797dc1242e6b9de5f999a259f1c8ee54681be0141315e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3e9b53cc27e10f3aa76efebb58e2560
SHA17fb1733931096560343a2697aab3c5e925b44726
SHA256ccaf6b4896b98f67d8c83c6996328a3fc061410a18f5dd7a32ea5d0d24afd4cd
SHA51228701250470237a9a8cec2a839d9ef61c1e6f440afef9cc718d1bafcc4b54af39b1ffcd5297827841add3ddf402f63817cee57981fabf891fd5dc8e2b0b3092a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cacc78e4f61be104ec78e0d4bd414822
SHA127b1868cac1db1d83d92223b3a57f65688309bde
SHA256579aea88584dfc88c9237ea7c4893c151cfc5d01bc3de42ada0b59ffdacd65f4
SHA512f8fff974c088ad4a1572756df2b7524ca370413c1090782762df8ded4b2ace90c27e4da6bce75e59ffdd94bd1401141b0458d43b3bd9be4227ab0ffcd86391c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552cb2168469779c02f15716043c90876
SHA13c1a8e132dbcfa6d0a714158752d34a642fcf7ca
SHA256eb75eb118f35572a9e16d3d37c7c3787ded67a35730fae0bcaf49c4e2124772c
SHA5127d03e0fbeed094402b92c86d9843d88bd9cd6a09ca8972dfddad128c634484edc481e88cd5df462381da255e234756d8ee9e7baa6dd874724c5b7749994bcd81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5855d4297b16db424e99d9377dec8c650
SHA1570f98c06dbf589473eb08e6a1926f5cb158122f
SHA25604129006d9976227ca4ee23ee951ffe0c973f9fa0d8a88481ef1fbcc6ad9ad6c
SHA512a88d512149b7526753bb34914e2ccff1dd8628f8c179fd9357ae987a3dadcc53e7a357b154d9d9f48891afe379f9d639f6503b428f83c44a3e0576d64d93a25e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568d0e4a002037ad978321e1f01a37fa3
SHA1c7ce6b11a773404e4437bb327510a66f00ab9864
SHA256ed65a0d04e3608b10419d2b40516f24fe1de1da9f729c5a86d2985509b111235
SHA5127084dbe0fc6a95680efc375d4911ae2e247d1a47ad423e04bb4f8e0ec04a5dc48536e62699008d181d64effd36ac02f9772548bd987269fb132039665fd42422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500d0ada38a0d08706a47a08c83aef002
SHA14a4531fb35a8ca31776a5e2c7134dbb29b99c343
SHA2567205b6d965fef7882938a26286b14f847f30dc76584dac431bbfd8b1141340c8
SHA5121985df6a65ae93736d72384c2729ea4ffb5fca933121ed3244ea43f4deac78679facfdada45bded9d6d486ba51b717f36b676b84662a70a91a7278c95bd68a8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535694aa879c8f721178593b967ad91b0
SHA109b237a23c69f6e9ae379c13bb805db75933e1e2
SHA2560bb806a7e69e6aab203ecd45f184c050b44400d46580ecc8b6798ba55e30fb1b
SHA512edbf96cdaf4684aea1cb6b255cc01059c83e93175f9aa35fbd723f591b76fa1d4666260fff935d95c88174988af6b9c89b32f3439c565a5691bc18421296029e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507092c327f8555d437a14def83b95f47
SHA130855305d78d67ce1c945c5f7d8f8ad2704b8d88
SHA2566c34a3e334b8e3039ad91d212d8e7fcc9d0913c011343d6b86a581e27d012860
SHA5125981f7e0e56a36ab11837238b120a9e60eaa5ffcad9f88743cb78178e4b2e7d65ef368e4bbfa3635a82392a982916cf35cac38242a010ea8e837f3d4b4dd5211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d63f706db529d8e2e66e7a6434d55240
SHA1ea91168e7756f32c9d283266ad3e4f3425018dba
SHA2568846af20107d9b80837c6639e13b4e290f044c65b5299097a53708a25f006e28
SHA51236dff720d37b2c0db62511581e97ddda920c6395fe4998e3bb3379e08d32cba7dd69d764c4e545673c7ffd6102a94f47024025d922ceebd7e80aa16664116a5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5372cf9253ae29e1d0cddde3c67e0be23
SHA1f9a9f593ba47b0ac04aa3f71fcb242eb4bdadbe5
SHA256a331f67789c5fe16c036aada8dcb5f39d95b9c8c87f8221cf26e25d315591c1a
SHA5122075e6a30bb692b839fbd0ae967560a9cf81077d4b98f62e09eba622f2c83639bd62340e320564f167e583c2000fa5659f0f98ce92f7507e48250bdd10f17a5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c75d7643112a98ec5c94a41b0160a6f9
SHA1269898237dff001d576a2e8438c12b41de802caa
SHA256be5614fff256b2ba177dfd7d6c682c225d1b0db138f4bd8480ddc438c1dc92df
SHA512630d5ce0a22bdd2e8b3367b8eba842ffa537a885ba7025befe96de445268cb93a7afc577a581e82c053eff3e36f45f6538f7539c4456e15bc5f0998d1049b00b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d46a4131b8eb72fb6483fddd190d52a
SHA14cac0c3a191ebaa4be45835dc572e982d718e3fb
SHA2568d8157fae0f0806f6534c733263865a1a74153b1fb7ef1154f5ffc846099e0ed
SHA512218d2211dd27785da13bc0493b24672cdb6b86fc1c4fd36158939add8b427dfc1425a486bfe211c37485385912ea8013786f9b6e7fe88e55e5811de189c9fa8e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b