Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
0592b3998ccc07891f5438285887fe73_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0592b3998ccc07891f5438285887fe73_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0592b3998ccc07891f5438285887fe73_JaffaCakes118.html
-
Size
139KB
-
MD5
0592b3998ccc07891f5438285887fe73
-
SHA1
b8bcda73c50a8b871b0202f29ff1b0d4de77208a
-
SHA256
5ecf5a1dc1bf9f02c43a748bd4dd0e88a4d28c33cde1dd222405001e89d1ef13
-
SHA512
190952dd134bec8ccd930188289ae81c450dbc6dc934bc6ed341ea941627758a41763862ff15859da3b8d306b6e10f28dd80f569c779750ac211cd4385d0ac0e
-
SSDEEP
1536:SiNqO3xMtiBkVmPl9yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:SizyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{285E4DD1-7FE5-11EF-B5A6-7A9F8CACAEA3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000f013777418882a450c54f261d2bf04f6f01bc748f0c722d0e1a7380e0d027b90000000000e800000000200002000000073797e3607be5aa2b1e1f351186bc3963bc4cbc29dd0fe2a21d89f10155e49c1200000007d357c3e3a4db4deb88360dc7e4f315e0d5ea4f345b44b7874058550abbef879400000009275793eeb8114d1fb114f84118ddc74786d41ab1790ee4f0877aaf8c122a0c40f0347304948de0109a0ae5ba0f6b63c07d46c6622cd71456743812b19e1d349 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433942635" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f8da3ff213db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2348 2112 iexplore.exe 30 PID 2112 wrote to memory of 2348 2112 iexplore.exe 30 PID 2112 wrote to memory of 2348 2112 iexplore.exe 30 PID 2112 wrote to memory of 2348 2112 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0592b3998ccc07891f5438285887fe73_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559de6c0f18a643703761136fc6f55063
SHA14a6222ca8e036502b695cd20522afc52a747cc2c
SHA256e56f6fafa397cd051aa8d7e689b19fe4f3afdb2dacb040b1115fd4ea8fd41791
SHA5128fcd0ed47671cfc37041ba96d5ac17c9188b93a3c5fb73c88fd5c8fc4bc39701ece2f715175e3e8da865fdb5f876610d055d769d7fa6b5e94cdaa81e5987c127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baa652237b59f46c9b43834b4e50b6db
SHA14d52d13d2850cbb6efc678e8f4c4b3093c954447
SHA256d060f4ee838393f68047e72029d4a1ae24107441e53a9d6bec43dd3f0db0fadc
SHA5123e3e2fb0e2a99141cb874138ce515473d8dee4044d5ec3090b418187928a19d0746095252374d0664caa65c07ec32673b350f227ad16cd5336560351e2204038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d594f28d02bb211eb2ec243e4e334b74
SHA1620ad08bd1b118654832e4ee7fa644247168264c
SHA2563a50583e6444a5b74b8a0f359d79159ecb43eeddd5aeacea4e0a8cac87b758cd
SHA512c406fd7c03bab852533e6ce11917dd1ebde775aa552aa149f1d5f6bb8d94e796365b1713a156e991de5f24eabfd8f1b7688bce7c26e58ba48c4cb218a8e0d036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e20b7ab462e53f9cdf66b280556b0883
SHA138486f07a8e8b09321fa620a458964773214524f
SHA256f53fcd9ec57f46f2f2720203dac712a5ebddb9272b59d02be1f944f6b8764c17
SHA512660fe810294e536327a609606f627070816da74d1099d05d47962b6e715c94e7450c950db285ad9b223874a1e5e6377412b3acba06d3187798c4f3106b1cb3c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507978c61172cc9cd61ae42c2b298c685
SHA187d0c36b169f941c364c1bc7e6b2d32177f1ba83
SHA2568fe3a4f41b9e2f38f8c2be1a0f944b5665e8c6a6e4b71cad7dc18eff0909ad72
SHA5128bdfe9b45b0f042bba4b42ebdb17c5d5c2396c0d4f0557fcd6765cb659de536c097bc4f691b3fb31ba25d36c11a1a9b1713126885e4b4dbd9859fd246faf28c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598d249f6594ae74a3387ac117a73ebee
SHA1062f3367fc6dd7bdeba1bf801210ec22505f6a42
SHA25615d134b68616be98d9d500afabd4a17d16c093e2e4e88c42565a5dc8b2f68fad
SHA5129779a4648e24b69e4be1598a0951f2ab9981f2120ebd56d4bf65123fc1f95ef5eb6c837907b3c39f98428a3d9116addaf4997594d13d8bf60408b5d4d3d7603b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55205b68533eb60c1e2d5cbe1e8c1d42d
SHA10096c727355b1d17340f92790cdf1bb8b7df3e11
SHA256e253d344dd43e259b63c403c0867474b00ea2f5b5c6eaa1ca36c87ea52f9bfbd
SHA512d6766b197ed670f56250f8341408361e285cbb8d7be337893a20d9997a2ef68049a2aa2afa43878e8a22bac15bfcc86edffdef59037bbaf7303bd122fb56afa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ab5e679e56500b0a5f4b81300a6e554
SHA150c13c9529efe0785e99e0727f397f530e4aa4b3
SHA256c9b498b7ac8d0417a14bb4fc8a2cfe73f8447dc8382322ca4d95bbab483f6777
SHA512f8087ca22f5b37da4daaff8ae76c26bd7fd60dd356ec3178c7b8f712247ef3d5bd5b632dc57aa28427237c0d82e376ad75840f60b6825cd427638330ab8ef88e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d8c9d13ab5f45324cb04b61a41a101b
SHA1275c287252dbb254605cc894bfeff4abf9693ab1
SHA256852dc25c784815bbcede3cf6a3ca7c2eaab5afc240ba138a9a44a5b8ea917181
SHA51214a9929569cb52eda62ac8c4e7ab0d55c87672648c5b2fafb30486c7d04e7635a081d46fa15d64b4f284c81702e98314171bcd66fab5938bb89fa1f35ba50443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562aea9bfce4e0b5412fdf78d1ec542e4
SHA11d5a56380a26926b78db426a8a337456665607f7
SHA256694a38a22931c760332e1f5dd0669dfd4594af3169b41e0c97d995ce4994b299
SHA512c7fe1f4ce83a1e2920cf7571126dfeb6a09116dc627e8c053dd2d59bb585bc9c0eef454fe9fa4ff0bd8772728a9ed8ebeae788cc3142770df4f258a3e8e589cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551b1e3d802bf9da1a8c70fd6f8eea2c6
SHA1cb0a3189d24fd5c009592b0d55fc9c230ffdad4f
SHA25643f07cc9feaf9f91cfe405f40901049d3a83453dc1cbea2130643f39254c4841
SHA512e11d33c93da7f7f544627be46e3980299a3da3d7e2ca853ce65a0a1adfb480997f2b722011e307a1df25ec966b2a858ebe53c19521ec16cc72086caf52e890c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4ef31abf63df76ac2612a5767cb8507
SHA16fdb2735b4fa3950085d1b3d516341af7a0ac6eb
SHA2567663b95072ffb9c2af947b68295cbf6965b0609e5e09d2f09c58f717a940243e
SHA512a200b1ed2b915580a4295048eb8fe14504675dad6d186633885e347fd8118e8b153ea431adf389131e3d039d6499b84fd4fdc76311e48494e315cd1cb998156b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f74931123a53bcfa332ff3a0b7f4803d
SHA1fe531a327b2ce93eb9d9199cdfba480e3d4afa40
SHA2560732a6155b413014f50cf3905a4d5e80b65be0612ef3655329d3618e6530192d
SHA5123c94ceb78324af82052e3e1f916a215950b8c9e3255880f710466aada45f5545ccba475a694f7f65fa8be7ba2c172508aed8e4436ab3f7fe9a5210457674712a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5396bf9c1ffc2dd915bd9d70cee827e13
SHA1528bdba2bb618f42f659e3a59effe5a0a2ce56e6
SHA2568bb0b88bdbf7d8df1671bed08e23bac76961be79a51b63764df984f6a46e8792
SHA512605792d21dbc272f92ea2062eedd84ea4f35ba67d0c567f6d9d1d066e32c7f01aef1072cd012e84c55003ae929b9ef5fa4f0a3e5a959233a93791257ec7b7cb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570015df7a2415788a9bf04e2fb72a527
SHA13e9ed14405268a20533bfe1ee5b7fd26125412ee
SHA2561044c04b77e87d6dffa6bff5cab1bff0d048f8113d323661429f2c6bc0af358d
SHA512d1c1b671bc490e1fce5a02d75f0a8a178e50e986e110c3247ab8a0729c1f6753bb8a1988bb130c5d42d794b1c3f83c7a03976ef0c0c90f4f2079a597d00d0c04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505a9e40798d233dc15922327a3c83e6e
SHA1b9803659c4ec10b3155f3b293ac5dc6420842eba
SHA256ffe35308be4383da458c9bb61b394ba3184abe48e84c4fee48379458dd273f3d
SHA51228882b127ca043e5cf4cd963fa1026f9bc3ffe0496602b26ef3eb02452c7ef40ef73e5841a54b49384a64e04b14fe0e03669783b50a77ba0b8279f8e5fd97e37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1cfc6533364a87d8328ce15f170ce25
SHA17c710d55cc780721eaf4f0f5de3978a578633c2a
SHA256347f0bba63683322d27da67c5107a6d6a7df0bdde8345ce1bb15f7a6ec486f75
SHA512d05ac49f10938311ac1273d2685c5446380dbee0acf491efe04c87db905aaa6a53af1c130dc240532e281b8d4dc27eea62571390a4c63a03d1ebfc3b3a8b5d58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b7d2b114cacf453469f3a85c2cb4464
SHA188bce035affdb1c6c24081523ff6d84ecbca46af
SHA256ce8eafe9dad130f89ff2c8ddab04ed2f8de1e1559c49052a53c97e8d1c0d3cff
SHA512938a217c109c505862b9307b5057b3109620ed7aa58ad4eecb85f64db09763ab5634b55a840e3fa6e80dbcbffe5509bb76b52aa513babef387c2607129ae40f5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b