Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 06:25
Static task
static1
Behavioral task
behavioral1
Sample
04ae45a47624b33fc6e6f083e3a5c9a6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
04ae45a47624b33fc6e6f083e3a5c9a6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
04ae45a47624b33fc6e6f083e3a5c9a6_JaffaCakes118.html
-
Size
19KB
-
MD5
04ae45a47624b33fc6e6f083e3a5c9a6
-
SHA1
d0921924416a7cb6ccea06523d4a827acc3bbbbc
-
SHA256
a04922feef9d8e2d0814a1fc9c329a9ac98791154eb15a0e5cb3de7e35544810
-
SHA512
c83840e4c6278c4fd6725403a56c80714f0726587de0d4564d429e8b518f70c27b612b156a997e803551f3d1f0ca891127d6eda2cc1d694d26c87a47523b52fb
-
SSDEEP
384:4+QfPFd9QZBC7mOdMc+tKfpC5IgSnbmFe7Ac4R6n8LDPd:Zcd9QZBC7mOdMcLpC5I9nC4EPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9018a1cdca13db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433925803" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000031a001412c495a3e52ba78155a6d346c5cf72fbf1afc49f88c5ca5cb9c227809000000000e8000000002000020000000c0f3b7cee459261d8a6c34d7626657d8f54f09d0b9008254a59f088513f6d04c2000000087e4c235c101fe79ac1face52c00851dcf5645a06bbed16697bd102c62e4a0f64000000018ce53037774d02589d7e41bdbb1571031e750df7f5095f601c8236c1b072f2be3a67bc786fe7ce8f7d9f078ec4734c28edd40e62eaae313a04cc8e34fb7d138 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F8451C41-7FBD-11EF-991F-EE9D5ADBD8E3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2860 2316 iexplore.exe 30 PID 2316 wrote to memory of 2860 2316 iexplore.exe 30 PID 2316 wrote to memory of 2860 2316 iexplore.exe 30 PID 2316 wrote to memory of 2860 2316 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\04ae45a47624b33fc6e6f083e3a5c9a6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a712efa578086d58a09694fdf849d053
SHA15b97989166950cd5a262036a9f6bda54f996a81d
SHA25697a497ba76d051579ba9e5338fb92e931d50fb3b7a9784ced1c0ede56ed7dc89
SHA51222c4dfdfe5aea93581c7914f78c81f905c5e5cdcb73c91fbaaf87b8c2ac361a453e85b0a32e3df3770e66dee6e34bc4cb33c9524f61426dc6129aef1d481822a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a71b22a460e0d15e4f14f88f14deca1f
SHA155ab36505f1fe60223deef42d5f820d85df7f6f8
SHA256739a014a7629bb94e8c7d4be8a8149a8594746d81f6ea7aa647747ddb551064a
SHA5124b3059b49b40746f97af9db122e938a3c7787c57602807c8ba2131e3797756d31a6b97c73d2840eebf45fb96c6358cde43e755f96c58e89c747c332df5ccdf6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571ab4e6a7e978ad5e2f0bb9cca41b98f
SHA1a8eb69d8faeb324c22fea3acb645a73e35f9ad79
SHA25677ff54ba08295555ecd4eb5c0413348143bb9780c1d6a846b703c655a95b7872
SHA512b6983ebb6c881caf6c08d5c04937e542d4163a2623e9c8b8073abcf24eb113aa7c970057072ed66f157cad728be157796f65f0ed96262b23e8d255ff2778841d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb727ee822d72f0750abd843899d25d7
SHA12283bacf6907ab6ddac4db3f874c2b5ad2599028
SHA256cbca61935b3fa2005480151f15d785c648fff6c619051307e2f6414fce2ee612
SHA512cb03d77d3a4254927cb7f8fc32729b7dd70fd14500440b4028273a01bbdd67f7cc6cccf07a5ee34d8e48fc34d2940bac94754115b8f2decbef1c000ad2b64628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a3a5f1cd72cd510826a1c2d06175803
SHA1f5cc6fc8dceec346726061ae1c463e8b02674b22
SHA2563e0658f1eeb552adecc896c4f80b8a455e55025619c010d1681f17f757ead9f7
SHA512dbec15e339900a5a25a1bd5bf208567f89a677a5299473bb80cede3a81273f34f8ab359ab8e9d77952b41ad439334cc0c3c5b8779beedd9b7f4f058504c86cdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b89647b63e7ded4955d9c4550c5ee0e0
SHA1101a079086e14b1d0fb1807bd3cb337ce1c828ef
SHA256d6adfa4d6632e7af56c3f3d617d4ceb4e70961a243ff79a471e8dd69cdb849d5
SHA5120a8b764f4cb5943eac7711f895ccb562311c7f903fe1ebc275365c985994071c82292f2be312e7036b405ea613bc51718ab19bcada087350286f65fdf631d4e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a4a434dc8ac00762c85a655699dcbb
SHA1f8ed9cc13135a9104004088b8a9709ac6a0002c8
SHA25642c596bf3833001fd6c271edb7b5758ec00ef58c3d9b93da42a8b3f54cc03049
SHA512c49d6ba950b4bf6774c7bdd3a0105ae63799f3d6de65941f478048bcedc1b82f63fe59eba813941ab9255f9786bbb3306f857a889007137ec59617d31dc55089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500c90891e541823c3e5a7bebaee62f4d
SHA181aba169ec1876b778811987372fb5379436cbc9
SHA256b7d13e30fc50f456972b1a241f6051c993c35c61704513d585298dfcd5b07cdc
SHA51277adbc1b106e1dc7a9ab73cd7573454673eb76c6d49d28761781b01f6159413a7f9c857c7afcc53ee8a3a24c181da752116bd09d6814fec5d3051bb582e10444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d2390618ac52aba67c75797d2980c1e
SHA136c3e7aadf3f27eda386ea658dcd786d7a8c7cd0
SHA25686b45df7168db3a9ff5851c83e1198acdd7bc69e43bf70b4bd7ccf7cd68fa691
SHA512280a7643116137d560f25d0898c8b913fdb67e7ed7aebad376d00424e8969438621e94e8200df8a4f866fcd800f7e21bf463ba87a0d359d0ef83fc06954e51a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b19064c59e8108a46e336af97cff9c0
SHA10a088a7a4822d56110271ee88bcd37f3080337fa
SHA2560aa220cd1812368ed5e85ff2ac50a716f4ff613ec2bd05124c8117660a1962c8
SHA512e146cef7b834f8cc3a4585fecbd9db88e255a4dfeea7b2e65dfc5ea074d6d1bcb9dd543c900e85890203009692d108446a5de2ca6684f2d9ca2e3a2590ae1a38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dba359704bb55297770a0cae7ff413e6
SHA1ff2efc65033f7b1a2c06f14d1824b6330dca172b
SHA256bc06ab97a9c84cfaad82c85a5317aa8923153e737bfb4a247a107fbeae06afa7
SHA512b95f3590b01d50168e3f9f0cf83ffa57fd52e35e00b141fd73186f54a48ee44bb7816ccca171d884c535b1ae61a7fdae6b43186c78009b8da4377246ca554f07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510464ff7b1e2eb92214de548035bd5fc
SHA10afcb6af39dc542b0a0a46abb07a425466bf11b8
SHA256e7901e0533fda90928b0070118e713c797d83b1ee3942a0bbaa33b5a93c56fb2
SHA512e988c38a660d43eb0dde653660a36e5a9f078f85f1bc11f90f552d8b0219f38b777bb97425e9852c7e75ddb095e75911819c58ef625e798d8c7a4a4c5bece23b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547fbd8d0d576d635a6267c974d65cc1f
SHA191d24526224695bda10c722e482e1106b0f50014
SHA256d73da3cd435a8a6282795d37ae8a038b60b6e298e8f54a7eabcb7ad18dc7513b
SHA512aa36251c546a562bf35207099d379d9bfb0a53b503d467409f88a4e885226de4f31a69c2e2ad1fea7b1ed5348a80ba1c6cbbd30bb0495f8a56da674e818769bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e6d7e45f6441d9fd3931d4d77ea2d7b
SHA14730132eef0cf1ba3c108324fa179db1b32eb740
SHA256dc84775e3768054563f790712c10b6af5630528547fa791dba3853f01a5e73d1
SHA512a61d35b87219ee0f5dd27384b0516eb7a57f1505778a65eb9b8ad5a83ebad5a0646cd5f2a5500c0a172542adad40cad2f35d03243c6969d8034d617573cdcdae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dede4e0ab51f5487a10ee1555593c6a
SHA1b8603b267c2d7a00bb9d127478e2c3a73dc766b2
SHA2563f8549d1c7dec2aa86e79f1a7e4e26ee7be5a8e406387a6959b9580b7e3f106a
SHA5121f43d3b66f56836fb39493548e92efc6c3eda62e1a25e822abbc73cc5682a313657f47ae0accfd9fa26d77f22dcbd1b5137ca299468afba9c3029e56896e6bd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab5e6e02049e6e236868e8a218a39c83
SHA18c343be425b7d7c4660f697b4d63fdb54405f011
SHA256574f1f512b847c1aa1579fe0a82a4319bc10860009e79454fdee2a75f27baff2
SHA512485f80c9b508f23cc47b60f039b21cbc6a65f94842f2247a37b06317062537e491b0e5a78e193f447eaa5198a25fc854111779a6aa9ba97472becf2b887cffe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539c85d3dee88bbc31e1c01271b51665f
SHA1a3421857249e00d4bac3761e68fd467c5ff51943
SHA2567182ff247a24eb77e6f2f481c2f4f0d6c973b9f80fa35f40c41234db47ab21bb
SHA512f50879f52d43874618d446c4fb09d1209957691755695e66f71f1c1687c0a298c6793841de3e7a1c30b23c92dcdfbd3d1136f8c355f8a590aafb2cfefc46fdab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f370ce6ca1815297d4610d89c7a19b4
SHA166fdb00b4f0e7570c020ea532e808ce87a021a00
SHA2566777f46b53cabd713b1c97d541613419fd504543f059eaa203253331b62ec031
SHA512043796d84a218bf0abbb3e4649a014a38fb79988ceb65024e027544dcc44bd44464f720c17e0195faf4c7cd111e8489bf9e1ed9b44e397e483abb70f3bc1b6de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58866a263ab1d3b068d7d9a9a031d890a
SHA125c9ae8d6ec86a63c33b96542209e4df2446700f
SHA25671924668bfb6c637a647a341372ee8ece11f81178213e9b7d82443da421a2a54
SHA512ff16ee8a730d23eafcb34f4a2a1ef8871b2c7f262c3830fd7f91f1463a8f905cef0f3f4ccb5e218211530b6c9c9dadcc7abbf57cb5af1abd1894d606293ef309
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b