Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 01:53
Static task
static1
Behavioral task
behavioral1
Sample
fd920972522e37dd6492f005673db378_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fd920972522e37dd6492f005673db378_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd920972522e37dd6492f005673db378_JaffaCakes118.html
-
Size
4KB
-
MD5
fd920972522e37dd6492f005673db378
-
SHA1
463739df4ec44940ad38c1ca3c0986a4d5ede55d
-
SHA256
c78c04eac5dc882f9e76139d0859220d32fbcbfa81bf23154a02f9047e324b43
-
SHA512
97b50d9eaaf184aa637b1b05ce944f5900459c8b5186b0b88afae99227efa3db4359ce9cd91be91431fe92a17c9cc275e54b135d566ebafb4cb6ac0dd764580a
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o1k3dYOd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e00364841212db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000009a3616eab6b9cea67318f098d987dafec9b21b5a40d46113a897935187d52a69000000000e80000000020000200000006c40ffc494831fd88cfe6200fd713179933ed057c9c7dca1923aa2fd12cbca9220000000fdc8e7a7997d84803166bfb368b6724cbe7f1446521728500e3fbc7b9bf90f63400000002553bd39af783f513134f45a30ac0c59987f0189a2a44c46664d6422fc4a37d9f973ee694850395edd3d3b2f9906378c43a70a690e036c0c191b3166dbb824e7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AFE7E811-7E05-11EF-8B76-DA2B18D38280} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433736704" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1700 iexplore.exe 1700 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2088 1700 iexplore.exe 30 PID 1700 wrote to memory of 2088 1700 iexplore.exe 30 PID 1700 wrote to memory of 2088 1700 iexplore.exe 30 PID 1700 wrote to memory of 2088 1700 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd920972522e37dd6492f005673db378_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f005cc7fadffd5f0f917431b2f9c1829
SHA112a59c2e6cbcf6c79eb9aeba5502ed2ba5e1e765
SHA256e124042c791c11586b623bc0c04554db4e1a44864bba27e4aac04cabb8b4e11f
SHA512badc17453b578dff3bf10fcc7bb56c42dab197d1eaf53e47acba0b516b3619de43e4b1bbb1d209a05d725ac0019b9ece39a6acfdc5a49e951bd1260340eb08a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7e5197758068437580e246fafea8b42
SHA1784b64a30d5ea71ec23a9e8cbf5dcd2e82b254a7
SHA256ad4e6ab1f9fd149dd1410c5626e4d1775770eb69cd37a8eb7703a5a913151859
SHA512831468fafdc61efa2fcf4277a9cdb3d6254d924e3312c36f7af63f3aaba8a148430505c0a5a9a3c4b80ea71485b0a35c7a51855ac62a078ea8248d20f1c039ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fddd660da54a2564f1bb48682bafe375
SHA1f46b548695523a87c5db50714851077ef9c041b8
SHA2561f05abd1f704682dc3736ffcb727d138f2304cbafccb617efbc89a245b216d1f
SHA512f49dbf64dbb82ab4e0218e2bdfad6e7d37433b1093e8662eb6797a2be6d17faf9a4261059d5eb6e19e15e07f97519d46c58674ec366454bdf985e02bb5c6cf82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4d29c0e0768e179bf1e1bc814b62e2c
SHA1f4acc06f58c937c215eaf215298dfdd2e92ff0b0
SHA256113d7bd8967055056857df9c0b6fbe976171dbdbbc1fb12680d191aafae445d5
SHA5126b6c77a86f0dc47fbebfcaef8403095e08ccd5784bcb7d273ff350746664c03f32064e90c6daa219d3945293ed72bacf5c0baa7637d3fc2cf67205030d9f3843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56862893ff93aca7a69edb9fb8b30df7e
SHA1e99faebe71d102043527b3db537a5c872deaa04b
SHA2560a35b25f905ab6253bfc0a0265a25d6ee7397b54e0baffd6d1fe0cd279bd8aca
SHA5122f1a2e87b5f7bc6633b768871c0ba779002ce235ea9374318172b08b9dec21c2287b5c41799c0a20f570c39f21bbfa371f80d3dce089689bedcfe6b798ad8058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8357df9dd26a66c101331c1788eeda4
SHA194594dea923c611dc245c9d841c0c00f43671a66
SHA25692f1c0dbfe9ff4dc977cec0001072adefbfa9e9d3195c30b8b61adcc453cceff
SHA5122ced038820cefa32c928ccf6e52f157d24ce2042ec40f97a6616839998d77efecdd256eed395360b7eadcd1f818d57a662d23dc10485b272c18e377a0efc60b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a80e159f26c5010f5801909bc666bd2f
SHA1e1d1ae9e0073628df6f8596349c48f13ebffe2b0
SHA25611576bf49cc764f0f5c90e890230c24657e3801783020b44f81f3312382b6b07
SHA51237edc3c7fd9adf9aa30033299a5580fbc02f2a8d496d9f902f9956f090a1ab802cdfb25e57e074713404940968cc300783476a541aa6baa396208b2f630b3093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d164b6efc910b3715db25b72c4d9fc44
SHA123ea1240dd3d26a7086102eed12ea143621aaa25
SHA256aac4a04747a9ab3cbea8bf815ae0528002afa436cbcc7b91ccac6ecf71571200
SHA512f365938b9e4dee2f0dfb07c68ac3ea036ace8cc494ca16c75a1c3f4bd88a6e0d7cbd22f59197f626fc7cf22ad06a5e3748e56278692b707176b71403723c9524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5206176772aab72638eb2e16880fa7846
SHA17909bfc7e0d378d6fba2055eed2f6ccff143a174
SHA2562f75d9ad3e8757ca9ccb13443c0811cddd1d611cc94e8383bc78a93c32c48405
SHA512de886b564563f23c22142bbc97faf8dbec70887f3d947c596f2807f6ac370944bd14c00f0c5ad8e74fe7300991ab5b52c860286679365fddc73f9e7f006a9775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d76474485d34ddce4e18cdf02a3c75eb
SHA138999f301fa96e5f363c4db37c30a5f4eab2c00c
SHA2566153d545065e91e77368793f43cc9e3cf8b6fe3df239448942ee16a54017b697
SHA512398ee7f7c3007f22e4643e10b5e07b2a994322597ff7b6fcb5573c246bd632215f11b9a60cec77454639fa6a9aa11c75e9fe19cc77bc5d7c8a92c6891ccdb13f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5819d01b728336181225a3b73ba65cf01
SHA148ddc4496b02836b9e4da038a3b1af62a0de2a9d
SHA2563efbc5793d740b387a44d744d96a843f8edec4b94c33e6c9c16fac32939c8dba
SHA51259302b9f60b23d5009cd1d13f5e55d6fa5d7538c6c9f6cd87367e470986e497185ea4e804b8fd3d28ca1d454f0a7ec84ac01afe66a2181ef7d44e5b291f3410c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e1cb55ec2e1fae1ac1edac8db9eb90a
SHA132abc9dcf86deba17c7ecbc2d3170333cd1a1e24
SHA256ad782d49a1909927ce3766df919b989ff22d465db4776a7bc1a7173a425368b8
SHA5127614978742aa684e8eb31b3bf2b2af8b952cc2c09ad1d41abf8fe888513abfecc64f57f84c1447ef7aa870be106e7e02ccdc159e3e2fbeb671d6e58639124935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55451d98c4d1174db37e0d51097a22512
SHA1a5b96ce038093d4f39188f53d8a1d3adba0adb7b
SHA256ca40efdefc6d2f4e9aea62fb08f84243b3650804a9fb6247b8f51420123c2e92
SHA51278a4531f3d760616b790d6a85d3d019f69dcfd7a11283c2e9e78d9c9c812d3b5d91037428c3265977b16bcac124b87459edcb63d0e818b6c3f29e6c1fa97e550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f25fcd2da5da06829dab73d91974435
SHA191d92a5d93383e1923dc2684a495d70ea0f030fd
SHA2564aa9217a787c75c670f12ec28436a5b4f56a4d6a581f253d5f3a2595878cc35c
SHA512385f3e0f0cfdc09699a7bb4b8244dbef6c934dd4528ceae6f217dc1de640c6758bc10a3e4922a4b4c365f4ac9929a35ef3bedf8db88d72e32c12c5b184c9e4bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5180e63758c407b61360d0917cbd999dd
SHA18841c86687a06b34e278d9328e6f019105f930f8
SHA256368acb6abae2675db1c0ac53f52e5f3689a4c6cecc9c3f09337e933ae163f2e1
SHA5128b2f85370442ac6a95ac0fed6b283d6b3e70df8f9e990932f6dc8bb33746b08c68ad0bbf24c89b2775c7990d51bd575e1daa98e3ec2b0969ae9d33572cfe0f84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2373491d6e130b7e114a98904ca75bb
SHA1826662c5d56a206fe64d5e9824a1f575303bf839
SHA25627b1d6e029f691125f9cac1c28a95786fd2a565ccf73e3ce66abb021d79fbf7a
SHA512489f5eb3a5bb8b536ecf8ec3f9db0f53566c6c2fbfc339ab676a9c7a96f6fbab0c7ade5033322d355501031592431d85994d2c363cd1d70628213fe779714379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f950b03a8a7815776c93cd0a157f9c3
SHA19692d11882ece1fca3e6e3baff3461c57ddfd53d
SHA2561ab97e4c93566543bb3c0ebb3613a33ba00098c3d96ea17685dc7d41242a1a28
SHA5121e99b0385d14c1e7b3f87fa7cb65b4205469fe3ca02c2ff769ba3a1e2eb776b56822d5acac587a9c758f4e27bf2e71deb8d428dc8407391640af812d9b48c032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588f103558cb7d6d75d3d52bc7e434b99
SHA107d6dc8ab2e90243d8b84904e30923d5043564c9
SHA256566fcb17209d1a45481235cbbea7e12fb01801735d7ad606f0d8802ff2cbbcdd
SHA512c5b1ab1846bb8eeda04c129ba45c585e49e37812c1b5cb9c078922270aebea29509c427b620ca4cbcc61394528236695654185c18abe799c5b8515fc247cd009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f301be5c8d5c227b9581f7120919993e
SHA11ffbf7f5396d9178ed37e4c5a7252b9792c2a454
SHA256d68d11ebdb0dbdbb0b86b0ba87cbaca4c5aaf923d15e858c0cf55d59b82f8537
SHA512f082ced6792eeeb96e133983b4f6162ddb79346cebcbd6060cc63a3c8040444e229a19b89bd5b8e36b716f7dc14ab5f032f1c3e62a4ecc29ec41ba21e7ce76a0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b