Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 12:16
Static task
static1
Behavioral task
behavioral1
Sample
fc470c531d40e5a2ac0adbe79cfec852_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc470c531d40e5a2ac0adbe79cfec852_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc470c531d40e5a2ac0adbe79cfec852_JaffaCakes118.html
-
Size
3KB
-
MD5
fc470c531d40e5a2ac0adbe79cfec852
-
SHA1
f164d19ade49caba3143b687404f6b15ddb69495
-
SHA256
b68ba8411bdd60040a5a3eb8e8910109216d490530477e54a6ef113def59521d
-
SHA512
6f14b4d374e193a1ab63ee9c1024140a237df5fffe90dfb26d70ea802440c34003748de0d430e8b4b31a0eb6ca271834d2a730b553be531fbf9fd677b81f22bb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000478a6145e7e022f6bd9c9eb02fe472a5820e29b47e50ceb13d51cc93fca6edd9000000000e8000000002000020000000e5f5b1934d4e5bc8f86629dd48d9d8de745a5f62923ae8259b143672be7de8e52000000024b5acab7fc1d1bbdfc22ad92cbd2aedbd3d4f212709f142d2a4fa672b70616840000000191dcd51026489da9e18446e665c97135737a6e732f5f0a9bd8c75d9e47da66ffcad0a5880377e29e49a3febcf833eff0b0a3a6becdf56595d36105401d3a31f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b024e552a011db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E33FEC1-7D93-11EF-B30A-EAF82BEC9AF0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433687658" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2920 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2920 iexplore.exe 2920 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2740 2920 iexplore.exe 28 PID 2920 wrote to memory of 2740 2920 iexplore.exe 28 PID 2920 wrote to memory of 2740 2920 iexplore.exe 28 PID 2920 wrote to memory of 2740 2920 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc470c531d40e5a2ac0adbe79cfec852_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2920 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d6db2266538b2ff0a7274c7e21db5bf
SHA139c292e8535af5cac4cec022b2b470e1dfd89ce7
SHA2565eeb7c5f1cc6a3df02fc471850a1745893d32d832918466fee4539b4a5c84fad
SHA512ffb73d4fbccf7906a0a8c9fe5f5a9d696f1529ee588769788fdd5c0391c9181a8f61e54e4638af8ec43e17a5d152f97ec4f1951a1ee418a2dad40684910933a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e61edff0c6ca639af2be9de06e882f26
SHA1ae969ab21155964e8173bce9300ae8e1700e9c4f
SHA256bd2fe4a994b708b3b67f7c284ab2db0ab1e707b442ed842247d13ef4f0802048
SHA51282fb308d725ac3682eb071edfd880fbf2f70059d8909e062e045641c1dd12af4b4f5c541af38a3312eb512ed8d3b73e8bb54774518f7cdffe1664dce9c182401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ce5dc5a5a8edf442084cd53f7415d53
SHA146d960e5c485f0c4f463d038fc0d9caf79de6c21
SHA2568991950734d5fc03438dcd971639e095f68139cac18d38c8c43d350132f2fd4a
SHA5127a92f9d652133cfa7dcf6c0ab6a4783fc4e3f9a7b00c7b404dfe6c60264ad5908eabb2ce72f7c6003ceee799d076b116a82810a77c6c4867b21497f0474575f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee3ef9dbce81d96608f0c479bba3c177
SHA19ebb0e78f014ffe10c323e25285a1190e3cf3bb3
SHA256157dc1e0c996c63c55cdcbe997b13d9ebe9287ed1b4bed5e2739f43c98eaed62
SHA512ede6f84da8fe1d45ebbb5d564cbb6f3f3b2b1903f0aa893b11bd7dcd58cb13d774c43014847e94c165158ab0fb84ee2082200be822fdd53e7e21090573977d7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bafb66c1870f1ebcff2266a37a391c71
SHA10ef78b90a1e3ea8e9dfe0acab24973f717a4536f
SHA2568f1e483a5fa010b5f1d3e3e5f929a2973e305e0d698c96d3254084e1de5d472b
SHA51253cf4766dad2d98cbbde090999ffcce943b14f4349865073f8e1889dbaf6312f6a282a56765ea8f06ad74ca453e0208f6373265ed759b96d5ab96eeca6d31d48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d43be38ec8afa33bd78a023a9900e8a
SHA18378c538bfcee18c55a248537ed7869ebb0e952b
SHA25660b8f72f96474ecd67e969d11f920d0934805e205e0afae6b37ffaf6fa111d95
SHA512b7f1d756114571e8a9a9147fcf0b53b0289ad8b646401ded62944c40edd38a2dc6026028dd1111a01f3bc16be4830bd5c8f5a833c1aea858a4d7494551a339d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555bc35a3278c7482bd0f78bdbcf735ce
SHA1899f02a646f91872146b01423d4d868b455e8620
SHA2565bf9269fd117131924705c47591a706c0cf61774cf4bdbfba0094d0482048714
SHA512718857cb8a619ce770abb44af77a473b7463286ebc272bdea198a402df7869789bc79491b3f2a0aec6165e32d690284b6fab84fe7ff14e3bf907e633c9836396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55480aeb24f4ae020e529db92a22b2ec4
SHA1f1b764119f3bbeb5e5b7d6244b925868bc94f192
SHA2569dc1191b36bdf36dfa0eda0bcda2552d0a298d7e0c5744b614cd81f9f0c0c630
SHA51202a81147349bba356a0a5cf94b713d09adf078bd0363f3c3428b04fdb27e47fc17297f4b256b64a0edc40023a7458125e0c2c68ffee910410dfcace7aac2e966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508dd72326fa1d23118613c56ef2b4559
SHA170ba68637538ac0a83525a31ea867fcc5c45c975
SHA2563cf8ec085e8ff098d14ee700a3c2e0802469a6835f2e4470b9a040a6d8fb7238
SHA51288dacc03906406378ec6da3cd0016e7dcd34a640bd94d8546e35c1d7ba3642cf6a50b0f2ed36cfbdaae8f2fc7e47fd0f45ec967559afe062d5875e931fc58761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d549d72f057b9bd6b5f838138510e0d
SHA1bafed19027f698dfc019d90e38df34ff528b6be2
SHA2569a061d330be97f08dbbc4a436ea8343a8bff6492e410efeb8dce762ce2931e7a
SHA512b10be1649dd3ae02bd78ce5fffb05297a23f6bab7de6d622a3cc11ba27677b926cda932df32ea2725d7ac06be2d770be08f28a77a97536ad6724d8b6aefba25b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5234ef318d9b4be17ed72f4cb0c4a8a89
SHA18922dfe204e0e466bbfab6881fe48c21b2693a76
SHA256d4bd45fbb0c46b594c731aab0846d8426a67d3d82eb35dee80764068fcce0402
SHA512ce11f85be8d75f4774ebd6334deb5719fdb59b54976dd5f8bb7ce34258eaae6cc7c5091ec99ef49cfe96c302d9297d224ae2a39ea3e8e478c2f91f06770fdf6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7f7442f62cea166e2d22f17fc70e31b
SHA18770f8707cc10cec7cbb74798e46dee2e267c988
SHA25697982eef4a10c4eafea0477d341bb4d4d6d0345a3d92ace11eb9fdae1aae95bc
SHA5123a64448f041865a75618516e3a44e3bcae091f6cf4aa7227b424bec16a761c94363546fe35eee6ad86c190e059351640acf1416d4c6f7f9ed272803cfac77c5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc96aa3d2f29f0cab3286e473379ac68
SHA10430783926bd95cd2d7aff22b2d0cfe8147b14aa
SHA256dad714cadaf86df691f535d7860e794416ac8e8cb7e50551a6defab441c622db
SHA5129b2187205ce4105f38772a61007b131ab05bb496dd774028c55497cd941b0ea168cb424288fb71be8fcc3e9630da523abe2992ea2911aa733159b45b6ee4a6f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5828124869d2f6cfd9b71d8c552355a91
SHA1d4b9439e7bbb9de4e0509e77d4343dacd793cfcd
SHA256c6d68fcbd87b0ed34348845af4821ec93dc1b88377a13be619eb5434620f939c
SHA5125c3c5c7d3564d5d89cec7e34cd58966c3ef6442e00381106b289370034a86f7ce0ed57c4f2980f17c177225a488a66e53232e3235182ae306c9adccf1440d347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ebfcb419f96e7ba0ed141c56988fc50
SHA1b28e7ad3008797b3f5845c6e8f9f1cde34259e51
SHA2566fc7593972297458f33b3602a447381cd06085cfe9153bf79c30b8f0fc800ce2
SHA512690ce9a23e38128f9aa1f30c7b22075bd3d7f89c7a6bfaf6390998209ca4f0a6107871c5d1f81e2a51379b96f91e32ac8f5103d298552ff714b2aa538ede6049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adad54d350bfe384851ea8c4ed11cf5e
SHA159f5f9875b7cdf3160a4ae0ac17cf8ed35146e70
SHA2564a1cea742d392bb4791b203f0403254071e9b18b7b05c31de52e435cda2c4a3e
SHA512ed756068356f25f100237973fe3a3dbc1da100e0ff338d8eb06564ffaeeb570b2ad87704353422aed4051a7b10ba31e24d067b68905f5673fb99802a8d83b411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b86ee750e3066650966d83883b7bcdf
SHA142acf427760f0d66446384c1a0fb0ec951653dd1
SHA2565135d5fb47db78992893827fc0204f4b606bbd974146a8b2ca79359fe766d038
SHA512d3531288ce849b65e0c53f65e117d0ac8143ed4d7bdc197650f7a2edd83b47974416e9440be6427ec554bb6f5517bdfa85f9af3771ba26befce31738f00397ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580081527db0f0b44e3a21d3291e998cc
SHA1a4c580bf1c7a30bce2fc97ab6f025f001989bfc6
SHA2567005b018922dde28d27671b260399dfb8e2542cc43ae950bd031bfcd16e6d11b
SHA5127d8673fda354a89c59413a242baceb79dba6f95e7e93c294c4a2f508b14d6fe48d3207118e596d04b156ef46fd13f322acb682d496365e264eab3c4f608b078c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2bf45f17a314f4671f487cd152140c8
SHA154db62dc0b6383fb6db4c646f63b5e8ed530212d
SHA256e51926746e27c7d6d0cd5cda63fda638330d2d62e9256f4b6d599eaa96f1b7be
SHA512192832243e778aafbdba057819c26b4956b5a4e7e0d78f7c69211b2dda368d57acb3b89b58e26d93aecce2da3132e265e820d99e470a30e517e58e2263922cd5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b