Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 11:17
Static task
static1
Behavioral task
behavioral1
Sample
fc3037e2ff2fb027ca0b7af6b60de082_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fc3037e2ff2fb027ca0b7af6b60de082_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc3037e2ff2fb027ca0b7af6b60de082_JaffaCakes118.html
-
Size
66KB
-
MD5
fc3037e2ff2fb027ca0b7af6b60de082
-
SHA1
7ac970f9ebf10de6b3dec6ab5f8f25d4ff68bd65
-
SHA256
6a73268967fb03af30d884a8428da11ec24578862610f0a43b78f2ec0ab6de34
-
SHA512
75b12db1d159148affd2f95472ad060abf529da573db65b8b2fa40746f95c3faa5c8d6699f40ecfe416358cdee03ec1874c6dd7b3728ad252a70c66e3856faff
-
SSDEEP
768:JicEjgcM0St8tN99OIs/0R3RF9oTyOqhCZkoTnMdtbBnfBgN8/oycc8QFVG8sP/i:J0s+13RFaTIgec0tbrgaCcFNnzAC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0e729209811db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433684137" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000046f96181b053314926e96fe5c6881d04152ab5fa70641b219cf3ad1cbcf5fc5f000000000e80000000020000200000005e03e2a3497c4cec08abffa830dac1bc7ee29525465a2641fb8343cc28b76758200000003883ea8f4335d6ea5cfb61d306b18b1e20ad796099599b23f1d0031dc3c333d74000000019f153defd58904f8eb43c838edc4824ed07c53598fddaa847ff30c85da68ce346f516210c4309a68d2e59448545ac0c43e0b8febb45f22ab3830127d87de5d8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B9104C1-7D8B-11EF-8705-5AE8573B0ABD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2164 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2164 iexplore.exe 2164 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2772 2164 iexplore.exe 30 PID 2164 wrote to memory of 2772 2164 iexplore.exe 30 PID 2164 wrote to memory of 2772 2164 iexplore.exe 30 PID 2164 wrote to memory of 2772 2164 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc3037e2ff2fb027ca0b7af6b60de082_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567bbe76aeb3fde6e8af2d3008e48ada9
SHA108bb1207532fcfea7fe6d03ec9c43f6e2af1367f
SHA2569f2944fd7bcb5360f34ea5b724e24bc46c67696a802d97e8333f3cc29a49f768
SHA512e9f3600c276fbd7e1bbd11d2809d4fbf157dd0595bc7cd6fdb5ce90cca395ba0b2eefb3072f0dae0e499163e1826cb0f20346ad6c0f080adec9b8119c88dd468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ac62df377a96ae5cee8c613dbad750a
SHA11390f74ff3b685ec95eae712fe04e17992c45170
SHA256301d59eded051a15bf27cf2ecaae989bdef44c2f7d8ad96d64fbeb7a586e5117
SHA512cf0930cc62171d6bc66f70a8853ec07ce99993f740dbd77d9f97a8c5a2674cda4ee89616020a6968337c1992d09a33f002fc88952c1c65ff48a86c5b66e2d254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d0a9d067975d5ef4e114cfdf079d49c
SHA177f655b3d9ca0a834f6fb1e1888dd66c84dbe032
SHA2568ec83c0f87525cb814065380dc726aba01c55b42fb5ff7956f24ef9028cdace2
SHA512a94301daf97901b439eaf94be6bb004c7b251d6daf23c2840e4b4f8ec88e882808c0eec7d8dc963c50b9f68d01ea4ce15ad13d3c4c481be7131ecc04d2b9feb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d1940b956c85430420cb74fddbdb13a
SHA10b9b937d5d07816a43dc8a5f76f13a733dfac0ba
SHA256d4e68949c7de804535c4bcba01189cc7ecb865cfc1dcbe80d52afb6da9837267
SHA5122cddab2e2f8b1e9219a5c748c151fe993c6ca4bbe75ed424bcf5c41cd0949523e5263c06e34854fbc55518706fdf8203279bc6c2a4fdbe82efe5b0eaddd2db80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1c11f7c333402ed5e4401f5a3f2b633
SHA17f9cc6f57743e15135f23494e4e98b642b1c7501
SHA2565559ca618739ca1b47791d8d1aafc7b96c53d81615ad0847d052a0bec8b4e0ea
SHA5120bb9c644c7f66d0493c4b11b0250b6d8cb16d5a38aa94c419455c33a207dde36d07c3492fe74c2a6d1e4d72de89520f99b86aee960dcf84124971b636739c510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc3c73fb286a7e830f59ab186acb8a9c
SHA11fe0117db34c3c053503b048efcb03b4b774d56e
SHA256d42f959966f06a0823edb9c1d971b56d4f7b0e524859a93dafd13980393ef0c6
SHA512d43f29bd94520127c3c5edd422a627a254ee33c6e54a98a5544b1980fe321eb9b82cf35b3f5707c3d66e18d66005b37e4596d1652a432800c606d91e7de4523f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d487053c07b8971a073e65769d5af6f
SHA147660b8e71fc74abc87ff4b084607c9602b3fac2
SHA256810c08a351fba53f2ac91a6b597da802af7196ad9c101c4b91a92dce535b7b7d
SHA5128c76779e030fb06d9c388c7b9fcb980260352c38b2d22b2b6c2df65c40517b21bb583d09a56ec2837ea1a828c41c2107fcdc25d448c9a7bde556d4508c981171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540776fdee06f4963c30a2c247cc1c102
SHA136a3f1d31fa85187d1bf3570a2138fbd564b3d0e
SHA25642eddbecc65bb2422c6365ffba067e9ce4a7f31837a65b6df45103297f03b69d
SHA512b7271fffcca6705f7eed935dd43b4624ed4259708a9d693a50997a1af444a666e2701673d52ad69fb5baa4bbbc610e1e92c6dba585889f9fb9d100b8f46f1eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526067d2546dceb3db457d0104b7fe51d
SHA13f68b7ec0471b6bef02bf08924eab71f8b3ac48b
SHA256933ff709be7c2e7d40a0a3ba6893245187ca27ec7bb3f4e0f2b24d544529e7cf
SHA512a1842118ce6ae4a147c6854a9526b536e7a99295151dc48dae59486417b38456f84bf8633fb7e474906f1d1308b126101b76ac621296cfa6aa810344b29964af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f04fa7193545ecdd1f2fbfb05d515ba1
SHA1ba5ab51765df5c945251fa718f0864adece371dd
SHA256300b193db5a6f490e90fcdd02559ce65204c175475e6620d0e38c7578bb85d5d
SHA5122d9794d34040672928b44ddeaf64d8733fd313605bbdf8079c0be4bc87e94dc554f6e79b263e3b9040f8e6954bdba456573320bb69a7db0338d57e916a4586b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509667e6245e529f7f28f1585dd250470
SHA169e332ebd3b37ea72efce1231f391537e1552627
SHA25643f1734068f61a03065a16977f1944185106df6702a4b9e89fde47ee666353b5
SHA512a0039c60a483fbdd83f6c1967e474d03c1a93599829c9fa2793809cf8aeea1940d6ce0350a7e9bb51ab7386225934b59b937abd4281a6b133e4f303591511196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5681271003fb3bc2d83aba9bc6d4cbd3f
SHA17a36a6233680d044b73fe51e39db9f47d7f2965f
SHA2560a0299803dd24a4e1e88746e4524b16478311313b3faa686e68170f173b2ea0a
SHA5120461c9f56ac645e330e1f208a8d4d22e1d7a2b1dbf98627395eab4d177c387a011cfda462f25efbd342b2d6b9b64e3d8729f6fab83918f20108cc4dd58a91af4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5621100bf1f4692f75b57232f4d212264
SHA18960755c851d7ac54d8677615d1cabd8f858916e
SHA256c910c2cc1bbc853cce7e2a9305b5a72b6ae2c85af42174b4a1449687bd56c765
SHA512906f7b1a27e32500c4a0e7fa14e62c8c053745b797ff78a291a77d414cea8396f0539ef1c5eb206441fa6c1af279a910345f6bc1e39406337fd114f7af64159f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5004558d4237096969a07e719a7124352
SHA101ba3643a3dec73bbe34801b07486a8b44908921
SHA2565e87887a49ac4dbc44248eae99bd44271e2284dbd540603ba0b3b5ede17cb13c
SHA51255991178cb0b5a796a38b77bc0725a8890b917b7c9bf5d583f3e8493d365e054c421de18de4b199ddda788f6c246d7a9d02bba27a7de25f3fde3f3fd53382486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566fb31b4f7880f639857d77bc9ba2f9f
SHA1ef5e136b122dc703a7e2032365cfafeae61565d9
SHA2561a88f37fff3e6cf58968a28cbe0a03b7d550cf83ba05e3e221e766a5ff41e032
SHA51230c5c9a21401f2bdf95c176f1481b7e35a3370690810b0202931b711b9c4bd5bad409e3d7536d88ae653bdd05331537926f164a65ac172c6dc6ff430eae692ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53abc66357dab5f5b487c493d70cb67a6
SHA15df7a90d589cbafd5214873d961fe4bc517afb73
SHA25679619b51f7fde7875c217b6d38ef8d3654b2046d6483810997ca209cb1efcea5
SHA51277431cd6fad83f8d295f01444ffec966f1a5686ec6bc922967428947bf6273aa326a122aca96c5b9781b20cd1ebef8840178a1cd49e1fd973575b88066a2758e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0efc2deaae14b2ae69eb966d975cd5d
SHA1a4e2b6f9695e1944dc99ea4970035a64f4163ccb
SHA2566ecc9f33bc4e5d28483f870e0b2c50a1a4f66548ff2d87dd5d37dbd455434272
SHA512f4f9933f267eda4df58396bc0e6e960420d6af9ed2f75a28f2254593b3a9f5dea0ec5f11ec7d9345c91e0084f53f7ca3cc74f96c502ad2a5d198934fb45fd785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52496835ad1361a6fa0af43288ea97980
SHA1a5a4a26d442b052fa5190b657389d5f0f158f2b4
SHA256f83868612daa8bc7a62f7ae00980528704c5658519774987d0889ece1bb85b87
SHA512d167e42bf9374e8d6b59b752199b926bdea43734b84389b2ec7a2239130a873505bf67d652411ed486b04908d8ea422b39edf0ef547fbee31890f6bc0014ed7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dbd0d96510a9dd295ce671e9e17cc4a
SHA18dfe0d18ae77f5263e44884bcf2846911729efd8
SHA2562104e3dfc826a04fd98bb482f61e49c65bbbfeebeed7005cd8fbad93f06f036d
SHA5122ac94a4d4228d1ce5ca5bc6bc210361eca2d8eb7bdfb3cabb8e15fbda4045238d3e0f1e55f17aa9d8751db188b8983a9ab2167341b5f6c0174c5a20c9a534f76
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b