Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
fd16b1c564fa00e9c7dc7f08bdcf62cf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd16b1c564fa00e9c7dc7f08bdcf62cf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd16b1c564fa00e9c7dc7f08bdcf62cf_JaffaCakes118.html
-
Size
658B
-
MD5
fd16b1c564fa00e9c7dc7f08bdcf62cf
-
SHA1
c94ecb586e9892d4b2d8a03d8889d80a06b4ef7d
-
SHA256
242d6242d056442d8817497198139df90259cba3dabc8efafefb4c40982632f1
-
SHA512
1eab8e76bfa0822e55342cba39cdb817f0983cfb9417774bdd3dd1ed20372c8d8a8cab02aef9a546523200cd5b9e8932f5a4e07d84ea41ef29308b033dca390d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433717330" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f005a568e511db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000006d482c63d8a7ac1a1e82ba92df2b0cadcefd4b7f1866787579fe6abe0473704a000000000e80000000020000200000006bed5435c479cbc0e7fb33429897782ae1ae8075e399b09ec024d26b116c1814200000007af7b4512e1330cef161c93c41e3a6aa856d535a106e093cc6743866caa2f8fd40000000fb47cdd831224d5f95f515e055de985cbf604a32238df6e53477200d30d746e30f3ba70049c0cbf6082f9713ec2fdc4a125a6e148a9a19719bd54572a0fcf9d3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{94194251-7DD8-11EF-ABAB-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 628 iexplore.exe 628 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 628 wrote to memory of 2704 628 iexplore.exe 31 PID 628 wrote to memory of 2704 628 iexplore.exe 31 PID 628 wrote to memory of 2704 628 iexplore.exe 31 PID 628 wrote to memory of 2704 628 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd16b1c564fa00e9c7dc7f08bdcf62cf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:628 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599d2c780c8d510e3b5c3f05b42cd264a
SHA1fc714fb962461f778c853622020a503f8682f36c
SHA2568e93f5adde874fc58b30c7e40bb5857c4ce3ea03b917c5dc5abbf397e4fc678d
SHA51232c60cd1355212551a087b162bfbec66c3bdde595d2cc8d464fe35a1b2e11f4837188d9023e0423e21c88c9c060e38c82de88eeca527c335d135b040c7ede707
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f21df8cdbd6a67d5254cc8b4d9ac357
SHA1736b0369cca9379f1298ae4d63e605a134e7785e
SHA2567a0ccff3d9f3e881be68e32296bf6a5ea718ba04b220d817f684e4aca73674e5
SHA5128e810001c35f92e662b9ff132aa4a2a4dae00a34d4d7b7cabb6c7aad21885b37c293586cb2502e32ee593e816ffc2c7767a9046c1cfe148e11588efc6256da03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54511e38885090b2fd3e04549f14f60d7
SHA1b5717fc3cbf2a470d9f94d450d994da47f9c0701
SHA256da92d7b56f854b1aa21520ea78046d91aafcd7c75cd5f9981857ca22ea54ccac
SHA51272c5cdda5add2415422e8138331e2dc57e1ff2c46cfc65c461bd67c4be97d8df7ea9cbd4055181247cd71c801cae2d90565398bebb49b5d308610e7025e5e6c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dc277ae555f5b0af2fdfcf611fe2c4a
SHA1158165244af4e621178ce5fb6620f3cfbc3940f7
SHA25698c9649206536b8ebe0fbf05be6470f83255d70c7305ce8e670d44e8d3c771b5
SHA51298d22681e66a9d6cbeeed022ec9af0bcddfc8c7e310355791d78a2dd7b6ef05e678806f7ca1a634a267eed92aef6f7535e08dde418e8ad50d2616830896d330d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518c20ca619a282c71b3f2db8f8620c1c
SHA16bafda2c00891060612152460e3f6cada794b80e
SHA25663cb0ad75060b67b671b8990935474ab26d941b369fffb41ae41e73a842d1bb3
SHA512cca6eae5ca5b6094f44d5891198f4cd1bc0194981b3f5de71aedd929161192930e434c96f381c6a24e2e725fbebd1495d6753c0a13d928757ecba36db01ab139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577b8dbba1f005748dac2bf352afab6cb
SHA15d0832eef2e653499a4ebd643f91adbc4732558d
SHA256c98b1fcde97cb6da457875410c3bb690ca49aceb539b857b58966de786d41ca7
SHA512c85ae00388b3a792b31795a2b39c8eb906df39535282d369de9fd0bba1a4233d16546c8d4ce1d5e6d6556622e152d19184fab84f7ac0d4ee2b15c938fc37c22e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cfe382225ca7c77bd2e077a8d678471
SHA1ffd0c5c6ca9aa513454149999689bd133c05b395
SHA2569e1a2374f6b71940a97cd13fc54628a9b230eb08b8e53c77b785f10e9992f6a0
SHA512026cf52d6fd74680085617a8eccc56953d45b09cdbfde59ce6f678172ff50d549e6a1ea3917cd5f6f61a37da102a4d7bd30406558b79d001deee6a2007dee0cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5041e439b7eb9419ee4ee30db3af4a439
SHA1993e3c459126847581b666c84f33ef0862087309
SHA256d742f3a9946e58a9cf13f5efeb80f0a0caf159ad5641ab1fe936942f442bcfa2
SHA51281939c385eb12a9b6fa77df90b451954938a1632a0d742aa7a98f0421367608a023a32f13c493bb69bae333d16cfb2f9f41384aa2dac639881dbad355e4364e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b09f4c2ad6126f15e7ea0cac24c3957a
SHA1a572a51fad7a0b31586c0b326b2b17874b535fd5
SHA256de3bf52df5acb44cf5505e77d34a0f6b3cd47b3ce8a8cd003547c2f3f1b3aa4f
SHA512fe6beeb19c57dcf6728adccd0e82e05398a1d031e3a31a704f3c6978e6f88face5ffb4842f6c39a97b872e41d6f931cbaa0c619026c2539521785e98f4173d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7af1496970b66b735740f84051256d7
SHA188d99b67868ce1f67ef46d7a0d517490693b764a
SHA256f898a866663742e0aa9401ff7411f8b1e83fa4c75decd1ac4f24e07b36e592f3
SHA512a46231a8a7e470848c2637d6f13fc267609b6df5c4f5e238345cdcc7da68ce15d9ffb557b19f8c617551b6f63f4bd1f3bb5a369965197cfd930b384266efe802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afe5345e3f22658172ecb559fe266bf0
SHA1823020ab5ef862ef7be3e4492a76e4eb3937bb92
SHA256e3cf114b7a82aaf7169287d01364404f05307ae0150b60d66fed660690b8affe
SHA5123b6237df2fbac2d0a99849b9b5082bf15040aeceb907acdda13051feabedfc4394b4bc440b8574d429c25b4e545d9bb89fd1ab7371196fb8f53c921981154a4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59755be87df9a848fbc347e6edb729fbd
SHA1ec91407bcf4412773ab2e9dbfb58ae97269dfb4c
SHA256dd36f301892e2b1a579be1259be5e2fcc2598bbdb5a0eae896b23a04f06e5cad
SHA5121ecb3d23baa302e21617334735e8f0b15714ba24f5909dfcab81b9fc97dc1f917340525ba5d69a51f3f0adec6be016ef2123c2ade11f0f1d79ad7e247c65e0f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58846cca94c053d36ede359e8cfbf30a8
SHA1fa1c7a7f7a2f7c47778bad88002e145fe7369cd6
SHA2564feb30235a4bab347e3f9397bb3376a22ee862ae3db415faa61bb3dc6ccb7670
SHA51252b09d5886bc1adb637f6755ab273095a2c29730dfc5b0742b3711cdfa1e1a3c526eb4e60dd29c369c80993e0a8828de0353f68924cd9abb64bebd139eb88c97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528174e702c08c0fcd81bdf5765a06ea2
SHA132eb984059828e6d71e19c0ba624860132bddbde
SHA2563b8d82ec024e63e49c63ef96a086b08dfffeae00ee0d4c8716b2c89d5a01cca5
SHA512b42a63a90eb99afbdb68d8fa50c20ac87f5312d29b024b19a5a0540c561980ae8db7be3c33b5ffb1b33d4d26b39beed5a4c52687ae28d8af9491e23abeb94b69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b09073212a610b70cc21738a79b2f70b
SHA18efad570c9a8483949e20efa3a9a0c89faef50a0
SHA25632b14bc4591330c65e0b3d7f70c649f7202064d3a2e50d103c90a0bb399ebcb1
SHA512ec36235b487c8f9e801030cbd89696ea9be4063aeaed4c9807327c28bf36c25989a66fb8b9fdc9592d829f83699fe1727ab91b1c746b449c696e388772f48b42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c0d2c9c4df1e7176c4c980be453c116
SHA138a03a150bf85bc966bae3a7c430508c776c1f9d
SHA256942cfe37a5aea064b37f01ce2da1dbbaf097c23b055526ba800a0ff39e1d3c1e
SHA512373ee5e25713db4667e8295edf6f8fc51fb79834394142d5c17b733668fa2e99221331d431a6dfc64b9bd3c0a48fda9574ceb90dba9997e520a1a528f5c51aee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5453852058057c9103451e378aee2a0e3
SHA160229b061eaa54b592ba5de3043c8141a428b2a7
SHA256cd763d11fc4dbc9d682070c97e8dd612200879ad9745be36dca672a36bac795d
SHA51248482b2f94cc93b8e25e02d14fec970bb7ee265a53c5a74c9393263c7c2a5a5bd65cbddefc450533992d71a6b4bec1de3b62ee809124a70f54e22ac04b0c9be3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a00e93b1fa8c2035439a734f1c4640a3
SHA198db03515e70863e5bc6dce5a3a9443498b130f2
SHA256993c9707d699fa23bd061d9e398cfbec3006d3d424df1b179ed0850414dc7549
SHA5128403fa1bf31ec06c4c666d049f1f54628dfeca884c5364ca0119c5cd142cfae55318c906ebebd59476ffaa1992dc6b0602d34afe2cbcbf7260cd01969be65621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5326e9d0606312d189c31c3fbd7578407
SHA1a63e08999f6e1c2aca62851425a155838505c8bf
SHA2566a5ab36267746d69ccb14191919e92c5d121136eabfb0101817dcd91243e5aaa
SHA5122c758aebd1919763f0acc240fee1af2b5e99d6dccbb69811c925a138259309a8d92e4ed532701ec6a355dc5a8991a13caea405af49beb4a7c48b28392a9675c7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b