Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
018b3b3541ddda5ee18ab53463f50d16_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
018b3b3541ddda5ee18ab53463f50d16_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
018b3b3541ddda5ee18ab53463f50d16_JaffaCakes118.html
-
Size
60KB
-
MD5
018b3b3541ddda5ee18ab53463f50d16
-
SHA1
cf3d37301f121568e6e655246c28c35baa2e7fde
-
SHA256
b225d1a33c9f3ae745a473187df50dbdb45aae6d64d44f87cb83e33e74240a39
-
SHA512
dfb98ab31b16e360c867fb10575eed4a9e245f74349a85810e402203c39cafeb7447f7c59b224405db8aa574a1bd572d4084e0848f1a1b738a29d013e1a909c5
-
SSDEEP
1536:K8qoXFmPBO8KwpE3wYP3NFtM0IjuHttME7qFTQwr0ALdDrD:K8qoXFmheTCu/788u0krD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000009e73f3a5aac2340a2eacf5c5eb7f561c82fc4c84bd4e58c7a3acdc77d350b27d000000000e8000000002000020000000e7b7b2398a8fc579e567b6d61f18a3a843c223c595edaface097636e1acdc1ed2000000098dea3da9fe0f8105c2ed1d1eb0e964921b06136c980a7fcc5ce3d4d5aef5fe140000000144b5e57d7413c11071f8bf58f690c4dca761ac8651149f802a93f11c9245811e14762e5cacde6f3a95009d5db56248d470d51fdec8681fb70254d58b5e791b3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433864417" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b04416e23b13db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B5E3AD1-7F2F-11EF-B0B8-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 3044 2132 iexplore.exe 30 PID 2132 wrote to memory of 3044 2132 iexplore.exe 30 PID 2132 wrote to memory of 3044 2132 iexplore.exe 30 PID 2132 wrote to memory of 3044 2132 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\018b3b3541ddda5ee18ab53463f50d16_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598ac415abc1db8828c47ac6724fd223f
SHA1ba98e6ecdff0bab42124fed577407963ec6b4994
SHA25684242dd679dd44b9eba306b1d0a14e01f9f5e796bfa1c0b5be79e5b6c1f84f2e
SHA5124e022278995bb420ff3781f79b5dcf16eb88259666ce7424497601f5bceca8d7a04883b8b87df4063b2eb5410ecaf3dd9bc75880928a6c03c88b9b3c3ab8b8f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bf1f382f4269ed203c65beab7ea1be7
SHA1261ddff8b52df601a1ad5506c6bfc0196b148e1c
SHA256f4f687ab62bc6045e0210d6e12bb05f07e955c5e0fc75fa9b1b0e58b8c225193
SHA51289c30cdcbe24f3ce93e9767357d11b5fe1aa1dc4defb7d3d2e236154d68045943297a065de223c2a12925950ae205a97500925e6dc31b5f8acec2e6a8ef9f534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3f5dbe5edf5f84a7726569b0b510681
SHA1c63606e3c7c04ca1c1ed721be3037fe1723f689e
SHA25660f8d391c6e7578a0d8fff42a3b2d3ff5ab981e3cd2d6d1fb35f367f6c91ed52
SHA512064324052e459bc161defea0521390f95cf1ecf6a024ed973383add4203260dff37300a78161f43d27a521797c4068d6f9b1be506867d2d96cc28c8f15dba9ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5580127988690a9c2cfe926746478c4bc
SHA1b7d65ab047967720fc3cccdc011845541b404c2f
SHA25666a2234cc1898b1dbd69560589a460f2fcad3b559e42acf1fb8960e94368aece
SHA5129ac16435a791d351c396459722b1d12048cd17c271e39458055e94cfbcbe11d61088185d679542fac62b3baea07751d720825d004fce14ad6d9d574a2ccc99fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5893ebb52eda4562999ebb5b85badd7fd
SHA15ed528f8db8ee9481ec019beef4984b86a434943
SHA2564a45178c4b8302f9749a9f3ef891b4a0b02456905deec1721f75f9d828238072
SHA512017625a2311b054eb3a38d004b4a12ffbdca1e5a288e186993de361f1dfa1538590d9dd906af54f91d33e1ccac9beb1f92a754e79e17513983272ffa8d4c2644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebdf652e0e9558bd40769a6cba7c9736
SHA1743db26ee68be2a7a410869d08ef0ea689f01dd9
SHA25639bebc754913f048297fcf5f1e471e480e68d9cf272939e7922d5993fa5712c6
SHA5125b732541c3a08a147440af62b49830590ee24e76729d80e1f5eabaeb7c95bd4c35507f6e4fb7bbfed6376775d4f32e4696a7c2c9b103f51fe6d9864e567b5061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad98c037e40d5b8db76d5d3ad745b882
SHA1bd413bf5a9d50857f048782a819b77264e7dbe25
SHA2560e1622f26a29ca3cb0a65049efb5520b757287fefeac82548d11474634c53098
SHA512decf1d31f82256ad637d043982b525e2e8282d7903711c7d01fa1b18414bd01c2ab38dcc74a1755ab7e218c66aae5076d421f5ec87ec8f312fd725fb9b5b4991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4117d2022fb43aa6f883855501176cd
SHA1401a0b231759ff122d4921aefd7ed2a9d38ec223
SHA2569fe7ec35969385e0cbcadbf1146ac969d3cb585896e65ba30eb401d5e24c71e3
SHA5121656edb464e7900ed5c1603e00ad8b4d5c8c17e7ecfb6c5752618dd898436ee98fefabd93d799a649950e099a9c90a6623b5052649b24f980167a83ff171c3d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e6301aee368271bf01c836a83170918
SHA10a6f9a13d8b25f00de31ce19cff45f58bb3e3347
SHA256b79bae3454dc6733329538e88ddddf4bad096df1ad6c5b581c4baaf9b7e65741
SHA512aac85ecdb6635e657d47598fda0b338091741e283f4e4f014a57ce9d723ebd967a6427b7c0d6c8b08a86d6ef5ec20f2f535d12e3ff43c5037b2b2c20f8fd1c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580fe9ea8092af69168eb14b6ce8b1a31
SHA164d17f11ff385c813137f92495a492972c05b062
SHA2563f0bbada78533d74fb61099f3225b1f57a78ccfa7b8b2a1124fb07a62f0715af
SHA51231fecc45d3d9497269e7a809f1796a80f5bae4aea054c2539e947ff05be15c121d3cc87653d3edfbf332cea2e514e3e2c30e63b1f201137c52c656484d1eba7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50188efafebb4327cc4b1855f5cbe532f
SHA197458febad7ab952fc67421e3f54ab80f7c812fa
SHA2568ea6f43c47052878218cb835d95f8fd0a535942a681a0f4cb2beacdd1d1fb605
SHA512f7cd12cda84124189943c922416fbd883fdf8dbba8152c291fd4b5f323dcc4a50e07690ba4ff7075f1d7b8763b13464039335d23cf55b54eaf79b14a232dfd02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544e7584400256c6160b5288e40ef0d10
SHA1f016f4c2b7ed9c340fd0d635e4fbeb416bb9639b
SHA256dd235f72672453738c049d033d4ef4b1491b2c63b6d5b70f150f6579cb3fde82
SHA51278912a9c86f1e332ffacac90bdca9938260b26f05d840cc2ee5ae3fba323e112256532ab2b8164acf95195e9f2e16eb8acb1fd1060a872b5516fff84aa5c3f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1033ba8c984ae3c15a6ca79d1cc0d81
SHA199684a271b724130cf1a0cc79d82c581202686ea
SHA25602f370ed93149ef6a36d3580f4bea44cf832839cccf9543d9837a9d49f2058ad
SHA512b85031f2dfd0f2285fe8088587b93ceac4ce030e698b62737679998880056245d9dfc45c5ebad975fb145f02b0586b377a664b2c718a9502f26d81feda3454c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b20f81c48f4512cf30ccfc43e8030cb4
SHA19910c7c4dcecbb73848d15d9d9f263382341f246
SHA25672ed06a0dece907fa7d361c37ea4a1d72ac6dad5523fd3721b3029f05fe53239
SHA512154bcae779d7679482e4a037179ba5f66b4122f3b4f4d9312c672be150aa6fda250d690b9a6a0505028a2df04f280ce050ed8d85b51e4d59f9b47fd3df4e2e1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559f1ee65b62285a4ea7c0cca0283ed7e
SHA1aac0d0f64d32e5d0643bdaf7d0964b2086aa5856
SHA256491c877ab52eb1f4ee5879670ad192a9339c239f9638e263ad948e112d01c4ef
SHA512ae541a547f7323aa21fc9ed0a5c847fdc5534b8d7918734e090c5ee19e6c56ecc5cf6e9ce4a043c767e893fbebdc0fbf98ca2d781d9bc4b2c4743e61fa916af4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f5793f2ebf08c06866fb345dd81b8a2
SHA186f3192293c75dddd01523001e96437f50b72099
SHA25624f6ed91d528339c002b70c7fc4e2c518776f20f8edd363233f0cb051b38138a
SHA51272ecfac28feab23cd65bcfe055eef84e6aa5553cf47b9428cc4d8690be44cfa491f9dbf9c7a112abb6551f371d4ef177acba9d750fde0f7e63225ce94ad13dc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f721fd16d06df5e9e75280d09d77456e
SHA1820da7bc7beecda4861324ab29627c3915756528
SHA2560881217f9601f6289d6f01807e049d317dbca96e81156806feeb8651a8069247
SHA512580d328d73f08aeebc84d7d316c4e422685bc9b1465ebfb9597d090ea40e42667bf78d7db65e187845af819efc984db6e8b9bcc62fd3959b63ea30b133e82b48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50554a105034d64f6c41f95f3dfa2df3a
SHA1e8a9f54e66dcd112aa359ef1af784a6612f231c0
SHA256cbf5dd3a104f7c92a91e4a7b39480df69a71f7df92414f2f7eaaaeaa9fedacf5
SHA5126f6665eacb1dd1db03f245546a801c5947e093d2876c9daba6fc2488ff6e2aaa786aff33b8ac47cedf0d2d7687b4784a8e97ca5ddd753700481eda355b72ebac
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b