Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
67s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
ffbd23182004f94d28f24c827ae5bc0e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ffbd23182004f94d28f24c827ae5bc0e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ffbd23182004f94d28f24c827ae5bc0e_JaffaCakes118.html
-
Size
23KB
-
MD5
ffbd23182004f94d28f24c827ae5bc0e
-
SHA1
858d429552d3fd9328526bc02742fe2ca0e9857d
-
SHA256
74f330121aba69f894a6c62656a7a1447f82578588bd919debd067f2e9da8200
-
SHA512
23b90ee17db15b69be3d03bef9c57d1f957129d11e4cd76e81d842a681b21680427348a54b45e5245faf19b2ca0eea8b121e36b99720dea329a1dd953537b24e
-
SSDEEP
192:uwfBb5nEGnQjxn5Q/TnQieiNn0nQOkEntZZnQTbnZnQKdjwvMBCqnYnQ7tnqYEfP:IQ/Hrkr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F82442B1-7ED0-11EF-A839-E6BAD4272658} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000007cd1f39db637099614a02d930c88937285dd76fa00a09a8216be344594a20a0c000000000e80000000020000200000001f793f903221568618e7b96c463e34cbb1a55b832f8059bf66e43aef33d0d60920000000fdf6e6842c3884740f097444ec29b8b24cd1b07cbf2c1bba2d4d0605f1f9d1b340000000671711a6f0b387bb3396184586d2a05f502775b7aaf4d4bfc306b1a185d76cd8240c427ac41be0d8b74eee52e06791abf07e6df13c6ca3aa231c8914ea0b2127 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d049c4ccdd12db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433824013" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2440 2380 iexplore.exe 30 PID 2380 wrote to memory of 2440 2380 iexplore.exe 30 PID 2380 wrote to memory of 2440 2380 iexplore.exe 30 PID 2380 wrote to memory of 2440 2380 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ffbd23182004f94d28f24c827ae5bc0e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f11dcad0755edec07edbcdbc2a44fa3e
SHA1f87a62006355c0b740657a3720e07d2c5ccfc9c0
SHA2569c6ce669cc1bad205e9669dcfb7760f492e15d752f3323b391577988d169d654
SHA512de78f5535bf36dc063ad18ae65d51e54cb99bbda0ae45fe85c436f15959da53f89ac735e17a48d4e9f75aea095a3f428333de3fb3dca480c4c32cd8e79c2e436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5442d4fc495c5530977a83feb4ac053ab
SHA19c35c922c638bf9485c66200e6570da69b5a8240
SHA25684241607fc8217986347c7054ebfca0d4f2523d0c6992b7f15af739888e97af0
SHA5127d1e284843ddad4497d006796efe41d1cd4d28b3efb5870027a8fdd29c20b2f1ded6e88651d502ae25f76fd932b17aaed57402644dff31e31342e6fdf86da8c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584f097b0d3e755a86b4adf2578169481
SHA1edafeaf98235e47d7380d7952ab65c30eeede09c
SHA2565b4ec5ed1814c5fb0a4669dc692cd081afc0a4d667a1fe3105b4a18c22f988d6
SHA512b77aa1a91497ee962b7e35a25ff65920aaa94fbbcf3c9ea19ce9e5b61ec8655644f57f9091f745b4a72b7563f78f8fc4dcf72c6e901a7bea87f09eccc047cae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5264717be76708c2e493470bd13514065
SHA1597d474a6abd7f8c4fa08dda8e214fdea4cca776
SHA2566dfb2e54b54af67b45d4b0f38a30b30c10f010589a8402e6d92917677948a2eb
SHA512addea62370554c9d5982b7152d48b79b75461f567fe53433e63dfe4ee3b174a73821d746859ad92e628dac7f7f3b9f1e76b2bac5bc53396643cbbe912b2d57e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d75290ad5a51857e5f36a2c3bc12df09
SHA1bf5a8f2bb51e37f031f90527cb57192de685ea2e
SHA256d77285c00f053ec5d40e7600fd9694c82e80a48d5b4a7cd223b86b1af21eb982
SHA512cc19b0a7aa666e2237f284ecccb0ec4bb6f3f8b89fc718052a5fcb7a4ea51d7ae48f87f64ad0889e2e59aaf8c3262cf611cd09d6c3c5c8ca84b1dfedb7f3bc39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a5af603d0dccd7b4433556c79c8c841
SHA1b83f5081d92391c3a20adc5b99e37ca7876f2e27
SHA2565a94dd66d6bc9b321952b15d54687ea43cd5c16e80aed05b8144fff53eb25204
SHA512a2092b0d5d388ad0664143bde35a830e13b3a4dbe694c8813e8e33ccf8221bebc5785d0da55b2b2b6cd060afc800761119d24d292bd2623329f9d94bb643e011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d792f2b472664e7a26cb4868c5e5b741
SHA1dd91d7b5ce365ba06ed6e93bb623dac070183ae2
SHA2560d5ab5108504ae1b010b757428d5bf14bed9630b0cd7dd54f0cda98104c0f25f
SHA5123313c7109a7456ed5184f050c0c76a98ea85d3bc9703fe2d8ee69f04499be9824b4b27b2f7f81c7a25d63858a71be0ee46b9df030d15da0d10593e20f30c9d6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7c1cd03d7a18a2e3678cba7ed368031
SHA197e851d03d33781f5a93c780bae86f06736f046a
SHA2561ea77a5cd678e226d24efc7b91b047d04905aa9cd241983942b52ab3981afc2b
SHA5120076e051e6a7c254f32c23743e56016575359a3f388de52bb65be48645074354dfc72128a57f3bf057beb6f1811a2cc83e52dacd40af9d87fdd608967d4e2e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bae8a50f57e6c41a4ad68985f4118ce6
SHA1ffe25f1ac25369447ad3f6578d476af66875d339
SHA25645779df37d1ae3b0345d56577d7f09cd7488e6482d33601c102aa6ab7ea6682a
SHA512feddd21ccc55e9c9e0a177d1f77498a98a823b2bdbd881fce5351e48fe40b85baccd7941b2ce734097bffc44409ae4807666b7d7e150a2e77b6b3da75b49861e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7a2937fb187f37394cfffd92752a73d
SHA1970c6c970f97779fafabeb73ce7cee45200a6d83
SHA256fda35f5e5dd325fcf484a34ca916daecc738691a2b94937f5763fb56fb54ce31
SHA512e39a87aa1199229b40f41d90ecc1dd6c8ecdb9a331dbbd761d8ff1f4687ee94f1bc736c7e087847ef27f35f8fbdd9fc33ee11bc39f03f47934f24ff46d74dfea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53da925987df8a6de279740dc85484667
SHA1af4ca0d45b208510b6275ed542c296ab08ca1873
SHA256c5d90acb18c14f9d2fc3d4ef8d995549a9e7d973e159296aeac755ffbc482bad
SHA512bcd0464ae807ae6ac3d8f04a063324c02bd8b6dbac45e2adb461d289eee858766ebb35c40f3ae8a39b29ae8db7e63282a89f6de2bb01b4b12ad54c1a0fd4b6ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df960cb78c5e6192bc9f64355362adf3
SHA1af4cf95c53886911bfa94db24b769bbd23f673b3
SHA2563540e116015eb1c7ca525aa61b13da80fea19569fe3dd1a3d4ba6b967f059f30
SHA51281d0bd8f409271e66318cce8be281fd666865a0f61bf5728e56b27a7bf60ea1ef7a9a3b232f6f700b1b3ac42b7527f2cc6db28244d3911eb32060ec0beb2dbbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b5433474eba258934547a1cf79d79a9
SHA1b5f5f920ec56899f50c1a36c0065a8fd04d60bc1
SHA25669cd5b7cdbf7767fd7b7d1c2bb91fedcba2e9f6089e20ed2bf2be8e704ae10e3
SHA51204e60de8600a9e9ecc509fb1f797019595bd67694f44878d2384a790f3f4362281549294b952d11c31f7946d2b79cca57f770cff20eb7229e593e4fe770a068e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcf6e53a76b079209521a3a6470a78c0
SHA1706c3cc3ca5bc72efd397d4b830a60a239b9bebc
SHA256ed5cf2f9f79ffac22a95963d2fb0e49ab6820a8ffbcb866a8d7b7278b299312e
SHA5129f6876b3c6976c1ff4fec80a6be99b23536f4c2e52810f518e409cc7fcb7906fa39f27b2d907ad3286c06b58da1d4fa99e4dc50cdb619e1815993eeb5bcaee53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bff8dcecf1c429af9aa24d58a8c1485
SHA152d389aa0e8dab45f012210560f939f2dd6a0f4f
SHA25622b344706d62adce0ae6199802145da5f9e7740b807cd753f5cda2e92be98480
SHA512f4a2c9d995aeb4d68cd21ecb97268b70a41341fbcfaee8061f5b9da97b53c3372f56521168fb42ca4f326c2cb0bb6044c90d39a210accfa97f6f01ce0b0d951c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1283ae6e8f2ca79e50595774fe2d2d0
SHA12347689852ff1a1bf72ed056028330d2c40691d7
SHA2568523b2cd169482b35e61124a4fdf3d52f87e3b9133f1102586a33028eba6d41e
SHA512f013ce3b74ec4771241d90d7905dfa44d2d855e9c255c9f9579ed659d0103a56153b56c6ed4b4eb0e8455b07f07ed3868e385a330bdc1849f343c7049dc7d5ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f30c4a28775e1ed7a7209edf93d89bc2
SHA196911b75e699a2c4e55b694e50a9ec248aeac74b
SHA256d9ffe4458b35f6686c886d4f12e91ef00458088e111cdc831a0dfdb33ab7cbfa
SHA5123e8e2a4510df26d342e4068d8d7c45f9c1cc704a1b5d71ad41f5ccd7cc249790995d7f69e01106396f12df15a148cf0fb9e3fcba5ef1a36ff5527dc86b90d302
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b