Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 15:05
Static task
static1
Behavioral task
behavioral1
Sample
fc8e32880077f41ea3bd64a855d478ea_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fc8e32880077f41ea3bd64a855d478ea_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc8e32880077f41ea3bd64a855d478ea_JaffaCakes118.html
-
Size
4KB
-
MD5
fc8e32880077f41ea3bd64a855d478ea
-
SHA1
abb9addf8a8beca578bbf3156ee328f9d3e312a9
-
SHA256
bb0e20921311400d101a228c1a33600607067fe6d07b0f553b1114cbcffb2e83
-
SHA512
15c1ba391af7015a1f1192e07f7285ac93e57d5de7c4bf856cea2542ebc400bbec9271b6ccfcf7bb456319f8880b438d87ffc72223ad8de321e2088e00e13bd1
-
SSDEEP
96:oDausDoyrh/rieESWozSrwxWhT/t1KZ41W9sAqM1KDRflv4xKfsRqZAkQ3W:3oyrLs/UxWE41W9sAqM1KDRfR4xKfsR6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 902e8deab711db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15F62FF1-7DAB-11EF-A14F-CEBD2182E735} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000067ef32ddcbeb6422f8c7144d4e608cdc219e67e3b4f998d7323a6b095f523612000000000e8000000002000020000000e0863d74b2ac32b56b54d78aa433f4854b7ea0eb89de5bb46e6c22d7304b770c200000000f75a822a3b8472be1adbc6e07763da4d50c8479e7e6001f4c04e55ca5b0371f400000002a2fbd6293cf155a31b26fd8fbe3271243c4b700dbade06bf3973f6b022e59872d93703f285b17e1e472b291d9fbbff64e5dcd02a1d7422cd77afbab561791ed iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433697794" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2756 iexplore.exe 2756 iexplore.exe 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2424 2756 iexplore.exe 30 PID 2756 wrote to memory of 2424 2756 iexplore.exe 30 PID 2756 wrote to memory of 2424 2756 iexplore.exe 30 PID 2756 wrote to memory of 2424 2756 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc8e32880077f41ea3bd64a855d478ea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522721def89c01b4b9c631ac5432b436c
SHA16b9a7b23e98ea36a1ddfc23a9d8afce4aef3a0b7
SHA2566d78bcb4fb965c9361bddc451b4987c2e0fe5be48aa1515b76fd751169e5cdc8
SHA5124c0d947a902bd4e936e1b7b7ec7277b7658b9e4d9df24b54eb7ce1438532df7406e78f14223bbb01aec599bb92c105138da983cf2d818e813d4b07f03ba51990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ef1467cb600e7a5878dedfb57900bc6
SHA1e11d2ea13bcbad2de444116bedace81c25b7aad2
SHA256d5828cbcf18a50a4bf7104cb891c415e284c5bbd2429dace7510eac7fc7fdeaf
SHA5128b13b24f02ee54acc1ea007ccb15c2f68bdf6344ac8202e9b52615f562ef860c81bc9cb7e65c95ab2a1b5f8e38c26b4cbeda7c711c5ffcf0201af2bd557be6c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fd9118c6e2a40a72c3e14e1928af277
SHA1128e9029b8b692a39c17dca317728d27e241bc29
SHA256236645b828cd28452e7538002943fc61f0a3b7bcf945af234fef133b74bb79ff
SHA512449c9a16e78e5f8af62f0bf42e95e02d73f5c19429fda47abc455fd771ee32c12094937f0dcdface24b88b65d061f4109fbd50e30670363ede49f9897e47df8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550fad11f8eb345b942319b232759c1a8
SHA1eff1f40c1db7679f053c492f46feaa261f2e0b3d
SHA25678e6a5f3b30db1a7784e57c8d6f4e39362893dd8dbc20e723c3279b869cf7db3
SHA51273cf0ef823c8a2334262a5b315e948c2a9bf98a2d8543e457048639e67b23c90b77203621d10ea1d4d6f65e1966dd699aa6619383c81c741ad23bf1f238c35b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567ef754ee4b88ec9da31b835e7becd57
SHA1405a610c37b5924a2fe9a0b64d40ae05be8af239
SHA25604014f39f7822031f0fb8235eae3a867b015e3a59455ed950f8cd36783b21c2c
SHA5127f6dd351fbb9222eaaba61c02350a60f0e4574764917514be5388d989aed97e8ad0d7a346c5e29854899893984f226ad4956a62ead7746a05cf9901ddb3a1588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525132136acd424c7da8d6b8862169a54
SHA1d13860982ab9a986f50cccf5260b17fe78b95e47
SHA25667dc07100ef220c87b51e2f55fb330b118c5ccbe0bac61f31ec243e1fea0bc28
SHA5123beccd46b0b1ecebe019f10836943566be2f61c3d2b82fd6ddd7e5174ecb3660502bcafa9af83523b7dc2129a06d1da567c26208c42ffc2b8a2c2a85ee24f3d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5000ebe39611f652f3f6295401b63cb7e
SHA1cd3d58364e6749f539f857ba9fa1c6b5b5339a5c
SHA256b95fb6986568eedade8ba1f62a325239794a6ce2c7a22a7d58ca09905788e43c
SHA5127c0af1e725e694ca0561ba41728c90509b90079e26357cf6f9d047c5536fc73aeebb79d5c8c1435aeb2788393d224978811f35bfa4d40c69636211cb82221482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abb5197a89f86795d713d771bdb9bfa0
SHA176ad992c707becb5ae70800a3e76bf0efb1a25db
SHA2564bdf8ad065be67432c203ea85de920dd6482b38703e019003b30782e3215e25c
SHA512b6e60f3d748c11a62a5425c4ed3253a143076483d811d350387151918f536a5a5f38abc7b1c94ce804fb32c1798ae25cd92c621c70e3ea9fbd6d4b11ee32028e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5f5d2a6af03a5f7a251b098fff492ae
SHA1090b2bf9287f9112398ee2895d46c20873089c4a
SHA256e26fae43a3bd57535ced6c35ad520c83ed7d598ff8eb691312ecb4748c8dc953
SHA512438dcfb378431f13532ba95419918055845bd753d871b23ff633431d2ba555058b635040584e73c8ed484e55849598fc691331410ece8a63fccbe4665fd33985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0d06555217b50d2e91a920f51cf0486
SHA1345114d21f6db95508a542188033c90f14e30f0f
SHA25640a95761055b037b428f6f4b47a8c17856a55622cdb2d7dfa32b924e5755b3f7
SHA5123f17f3905e3c8b3f0629e33921aa9266471778726225d298b71b45516c0308857181b504b05fcdaedb4efabe687c5c40ecae7d561925fecedbe67db8b2c28fca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b78b705b38dd10160849bbd7da145fd
SHA1b0514907fdadbc118e6654be30138aa353a23836
SHA2564028bfdbd10f0e17b0e0d6efce23d02bb6de914d5ab77857ec91fef6bdc9d758
SHA512732196cff4889889b57b34b2248f4de45f782aa836f2598cdcfc9a9a998c1f6a0c126d4580051dd8202e4f42727460eff511ba817d61e93dddf31cb39427094e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd0bf08022538233d5d9c9ba3d4db4e6
SHA144a42ae0d9cee4473b526a3d2b3d51b558222733
SHA256e944d6b83e0a3a5da8f60b05a26ecf6a0e0ee2c9a2f45495e675a9f37717c588
SHA512a56c19f3631d3f3a5b632542fec1558036cec6ed822bd7ae7ff7d130f38d4e08c7c8c2d2ed2dd32fce55cdd425e6ac627ca03457ce893fda2854d91bd228679b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53afe075715fc75d5ba16972a401a7429
SHA1fdc7395db355ec8106dba0a1898dd32f2694cbbd
SHA25610941b0458cfb79055f86c0a6ad156aee717fb85806d3f3a34b1ad936f14d136
SHA512274abb1386063a6fa7953ca5a5a6c49a1dcdb87ea5decb599a9e95b05db05ea88b03149fb26ef85e3fa7f1870359a1254e7e6a25e1949bc75ecc628b26076d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bacf80ecc49e49b091f12d17dc8e433f
SHA1c1bda5512423dbad005d9ded281c1835e20c05fb
SHA256eee4fc64ab7796bfe0eca8395c4424129e73e321022fbdf804bc164d4ca5e3f1
SHA5127055bdd660c612cf52c59a004d7231007f35b19ebe788569efcfadf5f26b7a6869795b2fb7fc6e226b2907567c2e27b14958442fba0274ad6f6037e42b16f349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3080038a5abe7a00558375b8cee55ed
SHA1c81a88a403cb5492851fcd225116326b6c431d58
SHA256e8508a435409cb3aec6a40851b931af5f31081d5302c0bc59d8fb7f331260fca
SHA5123e8ac5b3ae363c0e76023102e7a884ab30362098134c116ef6faa7c2e28e002b9a175f7d9890638b09bc91d49e317f1a191d4f254eb524078667583638eafd99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fd7b65d57ad20e63aaa9f94b4fc7373
SHA1a65a78c1b4151df079f4ccbfbd50edba46eaf97b
SHA256a1872607ef98afd9a2d97bff86af3e58d5b476a78eed2f493f41ff50c61c8d44
SHA512daaa64ccafc23490f777beef1f8286cea17deb358d48d6fba81a9df180da575d25a876a0b7a5e7f2427c34ad4ad7c1d0198a49667d9cd20aeaea09b0c0fa7f2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d4622da0b81db9e1c2f6ea7238c572f
SHA1196f3a1fb68d0d486324d31ca3c53ea772a06a6e
SHA2561fbc2fe2f8eb07b938248d9b8a63611b851a817e9c46b694427d55b53f55f785
SHA512b4b92a16e8e359ad796f63b2e9b6360a39d7be35862f0dac637973c1387f48a4243cf3d47a8ec5c5542857c9259ddf4b1626a9d62d471cac1fa6a5a112ae241f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd2183adbcb9afee53836426e7d9178c
SHA17b55663ee701027a43dccbcc5b4438b5aa814a64
SHA2562c8db524dec453e556c37201a9cf732b0a82598d55a4a6a0697cfa037bf59e52
SHA512cf5a54e5b099667b7d04e930ad9eaa9810b090234bd254720375b568d44eb1d0fb53d7ff613b11132d13eed618c1e35a6bc8f1e1515ef0c842ac8fbde4ef2ffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51300949af889d629be09a2abd9635411
SHA14b46b8e6a43f66491e7f4085c9512bb886ca66a0
SHA25699c43a65a7ef50cf7013921d46377b23d53a32f9cac561605e9e66816ad55b28
SHA5129c9f59f2ff7daa96543734d1023d45fecb7fe0778d0a8924d385dd08f8be94a3d38a0a76c1aec17eeb2d0813cc61f97320277712c8c237455e3d0c068f313984
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b