Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 02:26
Static task
static1
Behavioral task
behavioral1
Sample
ffc44c7946d34a74062dca9c946720d7_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ffc44c7946d34a74062dca9c946720d7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ffc44c7946d34a74062dca9c946720d7_JaffaCakes118.html
-
Size
67KB
-
MD5
ffc44c7946d34a74062dca9c946720d7
-
SHA1
718810bdc9b75f584ac856abe71bdd683d61b8f3
-
SHA256
07b58567e70a2e08f3037b81fb928bfed7fecdd9789faadbbe8d0e60e797742b
-
SHA512
cd73ca08778dddc136ad8ead737679bdf6b67a1c6b11aa27d2d6d7a458513dbb072bb361f6fc02bad4c870880cdd81bc54ef588160c206af52952d06c8611ba1
-
SSDEEP
768:Ji/gcMiR3sI2PDDnX0g6756Olf2oTyUZwCZkoTyMdtbBnfBgN8/lboi2hcpQFVGo:JdUTbZen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 403a6159e012db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000d12fdec5b183a43eb6ada86bb28bf770f0e86b061dcf53f7b28dcc63bc6920cb000000000e800000000200002000000048cfec25b962fcf7a50dd9301285d7e40787d1335ec8b16dfd1691d9fa9bc9b620000000cdabef46b7d8125c2bf682ec9e70f2fd519717020b0bf904ac313e572a5ac82840000000ae39cb08802bf2c81b9b1c86c460ea7c216edac276f6310793bb32493448f3bfa9d40a81a6149784f4b6fc41329ba21b233a99a3430ccea305e474230f2f383a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433825105" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8315C541-7ED3-11EF-91DA-667598992E52} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1296 iexplore.exe 1296 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1296 wrote to memory of 2252 1296 iexplore.exe 30 PID 1296 wrote to memory of 2252 1296 iexplore.exe 30 PID 1296 wrote to memory of 2252 1296 iexplore.exe 30 PID 1296 wrote to memory of 2252 1296 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ffc44c7946d34a74062dca9c946720d7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1296 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bedf14595097f6b0415b38fdcf41879
SHA14eef2fab77a1791952de32c9cbc16280695010cb
SHA256184663bca2fb41ff688810a9224dead18ba90a553a9e06f0755550a5a2dae892
SHA512fb2b0f8658cda38a7f27f47d52b8286476eaccb0e99e931fec93315dc9e8b89fed6bf54c82a6945b20b66378224ae838a696967d31762e4cbbd573a6f1251810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f79ec2a8e2724dc448e832cd57ba123c
SHA19aa7a434eec9daf944736c334b0b1d709580c2df
SHA2564d06023c82b776d38d8043b92a41453465454a1d98492b79ba95099745e12ddc
SHA51265ea1e54b3e456b84ca978045d8b6927ede51fb16d7d991b79ad30ba7708325ef1361091fe7e7a3e865a393720ac640f28b4cc3f5438990c99e20c0b02fa62a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576fe2fd91cbc5b62cfa2e8ebd6d452be
SHA13de4060bde31cdd9d2d27d42697214cd497cdc02
SHA2569d2997db1515536743d626ae8e31abe0ecbb2e6093516bff8d14329c9b1c49db
SHA512a9dd89d97f0a109ed4c3dfa308d2902c751fcc42120047b9b453c32d54978d256d2285d1a4e31917b63c97136e9f91dded3c2e8104561665c0320e97ed24e532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533d1fe394ee86cc00d4b662ea2b1ca48
SHA1e764bb5b5af28cf77b4c97da75d2504d9e756b35
SHA2562600e30da31fd4a007ab456d1da2ed917cece68eeddf74701a227c187da83e23
SHA512bb0895b60684e8b1bcc29850f2e30c1fc9d8d5a6d94d005ff082b87b9cb4ab6f85aa6d9f6effd4c2edc6df8446c2e710360bf354987aac684584210ded29e52d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b87a2e896ca5655fbbd0f836d388d504
SHA1a026d8bccc1f953be10ad1d36b089b299988f44d
SHA2566226a108de894788711ef5fc7484518a99533ce1cf4f6f531fba117b9d373607
SHA512dd022d1511fe05c46b81cbbe0bfd692f8a5d2a5d4a4e0bebb7944df7c1ae816de5e60a45f3d56a89aafa10d44dd1ebd9bea19ccd5eafb6ef948a648912b009a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559fb8ad2bf70d135d7fd23c49ac813e3
SHA117d2f6f2a465e503d27f7b9f2ebf0ff1fce48b6c
SHA2561b66c5fcaea939295738f02fd69e0d7c6b9a0b7d0499f30b29b32f01c48de475
SHA512273e5e9798d0a1e4e8ac7be16ccf0cb654da324534ca7455dca83a34adda80462c5754493ab8036d94f2742952c804c315e0fbd2b36e5aeb059a6b36a7474b1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534fe865ca8f089223dc25f7f2afd61c6
SHA1a4ef93cdc02f8396eb69533da58bf02af825cccb
SHA256601513eb182961c59ef6e99fd998ea5c7c25ec5965dded677711cf8734711e5a
SHA51272d70338a90500c56e2a27dd69aebac80f3f90cccf0434efe10f52af883fce51255b3acc750858f0aadffa8b799948d51fe78cd9d040ff33a56a37a0ee30709c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56693251ae14bb4b83aad43b1ca292a29
SHA126f0f68ed9af10dee50fb3ee4ef5d5212a89c137
SHA2561e394497b6aeaf695ccde1b4d60ceda714c8c296bafd8d96534439bea11a5d96
SHA51222185db5093a5fc1a03091204c063293d92db57ec4234af41ff1356e89fea9fa60053577ab1ab0a8b7c7b8229aa268be299bab0dab73380898a96329af5506f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1fb356a0b8711d7557b587725c5e8c7
SHA13a8e652374f7467ec48b14a5dfc9ac0ffcbf9362
SHA256608532047771b33549c222603fa89d5d0d6e744db1eb640cbf0b8ef326021124
SHA51236360e726c5bcff22f6799cb2ea429c3b0f95ce2be151d1beddaea248884e1957b2499889e171c506b41462a161bc15df8a3bfd615be7660f0f06a3144a6ee70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e37c07e43e75590edbe87be46114a0fa
SHA1c789c42f8ea2c66d301f98a5a9a15573cbc6cb20
SHA2569e8b8c7fbaad105584107c0dcd92cdfe8b8b1eb757d61b3db18213f0bdd7d7cc
SHA51288dbcb5c40e36565d77aeccd77f35ef917a8cf65dc00c1888af68b84712925553a295e24062cc0fa176784132bdf494b8ec8f335e757365ad58d69cd4b518766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fd2ec576be207b39fca899648b7ab1b
SHA191835bca46b5680b519c04685572e0f6bc52622a
SHA25622fbae128b21f2d08d4e375a44219ad905f0ba221ad37260c442bef3db9a59cf
SHA5123c364cd884addda3b734efd5688badccba4bf758c1c55c616577ba0c80eb6b9d6a83a9da0d2f800818ce2e023091383c003385281a2f577ec8e4bf19b58c9059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc005eded7581c89fda93ecc34ae76ae
SHA1e18e311e56bfb5106f65e4cd20b1e8c1737830a3
SHA2569656ae8a10975a288c4a712b6f1a9712aa83e0fdef4d38d6b0b601e9bace29e2
SHA51204adb1cb47b4aed9385bb013ef9314250edf2ef7365b1f0f1c7e6cc5d0dcfe7d02f7da74116923538235a65d884479f1e730c7d407ad3186855b9f39b8c4c240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abb12f267b1eacd9fbdc08fa9ed79f17
SHA1a50b2302e65a13455937ff00f7ab5f536c838fb0
SHA256c9ca09bcfa2600f397b1e640f7b29ea70bec49e56879ab5cb95ad70a65f227fc
SHA512282fbdeee28ad57d16ea28f92974e5ec8fe55b0afe1ed9ba5ae74261e893ac13d48fef8f9797d3064a24267814f8dcbbd7e40acbb31aa7626eba7894237852d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a70ef9336faaab50474e1d38b3e0335a
SHA1de7239d273c5fa017a1762e565066b228b0bb36a
SHA2561d893faa3e85b00ca62bbf4aec9b7eead2a026574ade6a4106b92137b20b64ea
SHA5125ef81a833e61e8badd433611d5a8b99846ba4a2c839c192440f5ca470c7a1895101c7d4aefa03b3e0a364f258844472272344e0f5a1cc664276a3629845b77ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528bef11e79944958a7aea67518f23971
SHA1e5c6dc337d008825ec6752ebe53faedc2422aac8
SHA256624242b7d958022b3c97d4a469b9e4b5186359f72fe780e697f1fa437dfff2df
SHA5122bf6b4ccbb3c2b16d3e5a1b88fc7bd6de0a3d97634a1fbe19c2fe62c74bfc6393cfc540b45480e775b29b1731225c6cb8a594e92e7f44b66f00fc9bb6691e72f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aad40c987d686b1e922bc6126eb12d5
SHA1f45d776842e7cafa69dd030ff6a1bd67f99fec8b
SHA25651df4010c8c79f1696feaf88ae7f2ed3be05065bf55ae173a11ba9375d8c403c
SHA51241602eb40715c8d381400df7e253b75a05bc13786d3f55e79356c842a05b80873283d8e15084058201b13fbc62942a7084677031ef947f908ec9b7371f16a2a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7d7d8af6949de65c52dcbeba9e3287f
SHA1be690db4e36a6b7bd65a998b84439809a486f87b
SHA2562a1f1cae7ec46210e68fd895c8ffc4740044a233c235cfd5c7c5e707ea0115df
SHA512ba50013c683a2999637f742dfd363b36d3a317a83858027558ee695de31dc51a61143554c49c09257a64c775c5431c1c1d98b0516ed86eb21a44e8d3ae92eac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f15ad6d412a2d0cfd389d39475158443
SHA1049eb854bd0384c176063e5faf45e96d552da836
SHA256a1cadf6c57fc38190033010df8b5b4ec230d899a9393ceaa6e716f70e3ccf136
SHA512d7b7f0424fa83ba0bc4d3c158aac2058a12117b53579313874e1f8b9d7fb305612d772a22479131c7b0bfa7fffb2bef37f4ebd2417f4d3f6c66a056f90dfdb83
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b