Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 16:33
Static task
static1
Behavioral task
behavioral1
Sample
feed1247af4e56daa76dde8fe3ff776f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
feed1247af4e56daa76dde8fe3ff776f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
feed1247af4e56daa76dde8fe3ff776f_JaffaCakes118.html
-
Size
76KB
-
MD5
feed1247af4e56daa76dde8fe3ff776f
-
SHA1
5f7fa1767a3a0dce01574e104217e4dfab9ab980
-
SHA256
33ac186c21b88ad5ec69d2c144cf9c23020dbdcd6e87f94bccda20aac9e4a42c
-
SHA512
81c807deda00e2ad30debb6d587fff034d5e2edb80262d1ef5030c98b0b4b6efdb99b1e01da0a35e2fd942803019b60d1b74ea335237dc61d35a6795c9295231
-
SSDEEP
1536:cGb/BVChnFZPlWzx/aRe3YYqyxtmdPMXjuZoe:cGb/BVChnFZPlcx/dIEtmd/oe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000b980379899af39963fdf62c63169b48d076ba35a1290e8b71161c69df84341a8000000000e8000000002000020000000c4c939d1606cf8de1fe4017a53d46460ec622ef841a9bbf412a165fa02f5f41e200000001a41bf69ef0e84f73ca71ab196006036a16614b4849a01907aa2ea37bb7c83fc400000007279578d7603d863c0d4fd327fe18f4cc186db0b30459d748d5bfa1866676a8b1b9b2fe33eee731f83b79c62e9b5ed497cf62cb7b8f1309203cb0a99994a4e32 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433789482" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{92A233C1-7E80-11EF-9C44-E61828AB23DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c02c55698d12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1036 iexplore.exe 1036 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1036 wrote to memory of 2352 1036 iexplore.exe 30 PID 1036 wrote to memory of 2352 1036 iexplore.exe 30 PID 1036 wrote to memory of 2352 1036 iexplore.exe 30 PID 1036 wrote to memory of 2352 1036 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\feed1247af4e56daa76dde8fe3ff776f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1036 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5097b8abff1d0645b6855a118a5b96a11
SHA1f6107cc99bf244b4d2b6abb729c123a164ebe565
SHA256a17e2b4d065e7fa237702aeb1894ef8c763b5ac98029d727976093c2bc029437
SHA5129e3a2740a7c7921b54fc661a4736624e55dc4df44248eefa76de7f3ed26337564b14bd7d10cc1a98bac2d45ef6c3ad5d22a2d944c01b50c6d9579ba18db6dec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585c309d4d92036136ef40bf529f31e75
SHA133ff1bac84c66287f762c72eaf362505f0007670
SHA256620260cb59cd5fba40b8a6b414a26e5d9ff86917c9f490c26f128ed6281fec69
SHA5120bbd86aa64dfde34dbc8f5231f43bed696a51a9a68bfc0a1129ca79ca9307a3f29ca31c841dee016ca21eb36c5b5a3c4fb6f761ff86cb853a7992c808bf12f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e91344b65d6d16f24736c9c98beb0f8e
SHA1a7c58f92bc788b571749935541bbb044629ee395
SHA256f3cfa14ca19ccde2991c96fa3325f3cba143ea4488f7eee7e2a26b315426a6aa
SHA51222a8f53099594c6900644c01977e817906406eef737b454e6572845efb3d566b7656614d7cf6b6af7b88f5824e4b2c5cc3b9c9667316634c34d46c43c7682565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ef4bb84199f276220b1e6c421abc15a
SHA1b87ff199958b07afd3e0810faf885614a879eee8
SHA256f0ddb29b2f805eeed42e950eb5f73c2c4942047b36d0a90d57c88c8f3e95e69a
SHA51245d4b478cb7b190734cfb5dbbbbc2108e3c32bf0639a795a40443495ea902fa0ef7e21b985cdbc69443fa6e1aaf26aca6b74b5e2c2f63536d45290048818a5cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1753159df075e57dc554d8c32951fc5
SHA18c4c29702f28c015536119d4c68a5eb6ae8eb708
SHA2562d98f481f265ee2f10794c66dd46f5cc7a96a241f3c02883ef976cd12a549836
SHA512a789e523614cd8762cb01fc10591cde25e5a4c6e30b844ad7fcdd9d5400738f592f38656e3a16e11f086ac0f1cb9ca8a78d601f57dd95e08d6c5389ace935074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df6640e83424e751a0e0a3ae986fdcde
SHA183482b686c7652d4b689453664f33706d2403ffd
SHA256053ee654a8d03c84b230be9178bb6d7aa04eed848b82192ceb8cb24f42c7ae68
SHA51277d9b0af9d48db7b297ee8bcf401e158710d0b30f57ea702d5ea8824d2ee3dc70147e80e9d72aa3a226219565f7019ba132b6c15f654287ccb6ae674fab82770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb24e796b49c8db1b140b195e8469f56
SHA156f1c8dfb12c70a93fc99a82373b6fd1b35f0fef
SHA2569f90a6b43fb21f4f378f2fd98f6318484d6c3d1cb2cacb2a42d25c9e8b7910e3
SHA5121034105d843903871043f165ec793d3d1ec0b13720182f4b9593d3a57da8bfcf32cebb0a2d7bfcccce829b6c539545c8cb56c03d56f7ec2fed1985e9d9973aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55934b820ee5d49df072fa597027b9cc1
SHA1824e0334ae8d4174583b070e08e735c6958f5492
SHA256183ce42e4c95cb3880493e51f6ce97d16b97fc7cb0a5e4e929faad9b4962d0b1
SHA512f8d5760304ff0312bc94fb8c69aecc32798771c5f5bff0ae71d29198decb1a6d0645a3a05484e7f1638a33e8b98e096b4d2d4a872e3048903743b67d69b50f7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5c3ea6c84ac4f52621f67b0fec93984
SHA15b8aaf525a806d3f849b08c7697ef97bdf1f6c01
SHA2569d6a85851e9607dd54455748e5aff7d2b4843636fbf4b882f38046bd6df7cbe7
SHA512c4a48cef4cf3b43033823a4df95158103ae5453c179b95818bd0966d15aa802e0c51da4aa607d9089dbe68c4c9ddd6c9d74baef5e458c37fe6bdf21ee7ee7820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e28a60d31cf004c6bdedfcb70ac63bb8
SHA1ed7fe75a7081e4a30f75bd0951ee8f7c90663031
SHA2560fbc8efdc0bdde59583ce2d1663c90c64c497c377eba99e1f7faebef7128e6a4
SHA512e64a8e306a56ba54ff7980c3c0f74ab539f0c6ede6a98dd1d122eb04f2f2b350a9493155a336f2220d88d888be8209330d058fc14a7558df32064c670ab94104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570cf413d2b6becd292cf2003e576e71e
SHA105d504e0da78a446e0a616f38abbe2f018ef9108
SHA256f291c6f358d24046f1e350ab21bf676fbb004eef5c22aa8e001f36e3d062810a
SHA512a9c2e183b38f371e6b6c70373a4601e4b0f9943ec8ec31fa1aa3be8b6616ed542516ff94439b7fa897d137dd3ab6d61f8699ee42feebfb8b27ab68324cba9307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51641e047ace9b91c042203876414e92a
SHA1189f4db3dc5affdc24d0c20e81441cd0fcd5a06b
SHA256c82dc086c018bbd7d2ffb75241378897405612b9e2bea95cc94e0d38e4e7d38d
SHA5123b590d92f589d38a0934062ce9f5315bf000c80cc292890d5f69506069aea16e42c118bfe23117ad3f66b973a2ab8ded6c11ec171b10ea7a8cf195c83bf01dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f31f5782c1ae5ce470a26422f2f2a6ca
SHA1c96708ed19a4672fa544b6c7c96ccfcfeaa913b1
SHA256c4640339a0938095ea03ec4ecbb903a8e2c3c7590726f2694e3761cbd4f14c81
SHA5124a1c6f41de445d1eaec82700de0656c607b06f4de58356ed0f00af076a97443f75fdf4b4479367d6c91cc105d4459f53c3b2d3ac5ffd55830278dfcd05a62684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5494b7af03ab3cd9e1968ce4271631790
SHA1d0584b999ba806b3ae120599bb2233aa1acd5601
SHA256888eb062e58ba3ad6f8f8e5e560e395c87ae2ce6ac4ae14f4b5555e124319a7e
SHA5121616fec078bdb367dd35d575f03cfa9c4bc4da8a9d25ff1d24df7455c3f71934abd0fa621a7f7c2b729ece016b8fc2d577047a48f741cc30442d230a0bcdb5f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5474bec003f8e83f182acdba9f478be74
SHA18649518c0dcd26c95a8706f288821efe229334c1
SHA256ab1c9ecea109cb8ff440658f9535ee9c0f0199240b0d68d536ad19495b0ea197
SHA512785b666b02c8da7ddd5efcb53c7505b819baefc6a92c89a75550a04c263d81a22b1775e499ea3598393b96d638f64c61efac40a12ec1ae9106918917e53d6833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e899d8b852ad2045df7b9e8f0310b128
SHA111f7e23dc393d7c95cde3f31970d9200c2880753
SHA25650dc88882f37d1f80fc3ec7d1905c4cf07ee410976f8432f0c461bdfd0eec7d2
SHA5129203cff30c9b92ed6b1d6f60031861bd01b3d049b06cc659a0a464d3c477be4b6dcf9654b404968c47debf5fc6d4d83de83c551faa2d57fc066df3326f59257d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5489b8e2e5e65cc3c1582b35124baa8d0
SHA1633bd25f0af4dce65a57d0afcb9792d2fa6aeade
SHA256a322076443aaff430f34feab8ff1a85aa98b2a7a4bd315f1dee670d1cd054af4
SHA5128b8f0403e24d99a67a2d1210e07200010dc597a8d053534ffadf65e9e544de7af6639ee41a23a1e0a889f96dd2bfe4432056108df47984876038a77c4cfb462c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b5eed5ec3c69deffeb6cc5bb8bed48a
SHA18547cb23fe7b4dc241e50bbd437175410dac51fc
SHA256139341c84240c4aa15a95449db5528229554024aaef30b3482b01a715a678159
SHA512d61323038b4194a1ffb9ea2d45b48b4d48b067b84700b2dc15b9c1aae113957211540a8addd6d7fa11096b20582b83f82bb0703852db916b6fa792690f4c487a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5443aa8b13f69f000965a98b8cbb1c7cf
SHA1c5fde4f7e8474674d64523b7158edbbfa5978e47
SHA256f412acdb433af8641642f94eae937a7aaf24e0dce615d92e59e7c565cf909e2b
SHA51234547fd821bd36a44d6a9a1ba2808dc81f4898a7f8503affb17f596fa1baea035cd05c9913ed2e0171156e5273e50b5b93d147f70f9e0b6fa150bd2303c0e1b1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b