Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 13:15
Static task
static1
Behavioral task
behavioral1
Sample
05f41a09c6db496d5f2cce32266d9ca3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
05f41a09c6db496d5f2cce32266d9ca3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
05f41a09c6db496d5f2cce32266d9ca3_JaffaCakes118.html
-
Size
19KB
-
MD5
05f41a09c6db496d5f2cce32266d9ca3
-
SHA1
1956387c611d8d1868ce86dc0a06f6e2ec8eff66
-
SHA256
bf5074764beecaaec286da03c6bc9dbbb39f337223dbcfeb826702f5a97b9f35
-
SHA512
1bdb413c1b5c7ce47f69e6d3e86692e4d46ec46b812c237f4b3b88771f194cc6a1d110e2691cd84c4233afcb64d1450002cdc8df6ad7aa4480671d188924d8be
-
SSDEEP
384:zijKhgES6VBD8csZQ3RRP9hemLxXucfIk99heKzVc94dl:ziwS6gct3bPimQOIk9SMq4dl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000359958d6c235fa647e8a8efe0cd42ce269972228606af89618ac622504032ea9000000000e800000000200002000000079607123f949aa03be7766c347466e49523289a41f3ed9f361f711f537a5b9a420000000d00dff34d3595951e61e03072c0659a87825d503ebec64c7c5433ea226e64bd040000000c73dff1d38dbaa035f5023a64fd3f20370f03d97f31022ee2317624b3ae13eac9f370f838432be366cde3478956c1fc24bb0462f229ea410aacfa2d854b4c19e iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433950373" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C869D61-7FF7-11EF-946E-F64010A3169C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a02134010414db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 964 iexplore.exe 964 iexplore.exe 2000 IEXPLORE.EXE 2000 IEXPLORE.EXE 2000 IEXPLORE.EXE 2000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 964 wrote to memory of 2000 964 iexplore.exe 30 PID 964 wrote to memory of 2000 964 iexplore.exe 30 PID 964 wrote to memory of 2000 964 iexplore.exe 30 PID 964 wrote to memory of 2000 964 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\05f41a09c6db496d5f2cce32266d9ca3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:964 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8c48c16ec62297e0ea464162c40a52a
SHA1d583d05d269c599784790c19eadd541e3dd1182c
SHA2568e07962d110ababdec87e3182f0919891084b096d5f50273fc2579f524493ba5
SHA51291bd9a9b9d8947f9407b7a103928cf4bba8b562fd11e42fa386c9ed036cdbd3e87792eea284e0a4dab7f8af47f3af357e88a42a4d545a11742a273662c3fd782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b81294706947b7280baf7a4b74a0183
SHA175cd74e8bb8e174b8b413a72933929fa0d353306
SHA256026e9b1905c061859b1720fd01513166ad7ff5938e949ff8fde37a805521b972
SHA5126b0a524a4d2c3b6fc2f0462071467a46dcbe97299259b382c5b984b5997e61966db2436126fd07937eeafe9a18c7c2b5325c4a886a46a0385ef182df23ba6cb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5658af5825b368bb7f208a6e4460f445c
SHA1d2d80a81336f12fcf63626d8069313caef4fc156
SHA256f71c2dab5968294465e0e7ab4ad07be3cba7c0b66e2f3163072bd17ed48193eb
SHA512090ad751c4c5cff866a7c54aaac81cf2abd2462e976f627c579f95eedb2530c9ac11c9a8c58ca2a3faa3fa7ab1a968bc2e2a5a48806eb9b81ea9b9a690b184c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51be9c899ebbe7faeb685cd31fc4db9e1
SHA12e8f820448c68730340e77651f44844f806cdf87
SHA256eeb1eed265e1690571d9e4c429f35171efa967d8ae4772276681454435597abf
SHA512941ef4f3ca4ab2dc57195745d48a046780695ce92cd247e1da4b9526c2dc5d6a0a0fa7675c03b35e9e4ad066e6d5b90f9caa1c410fd34ab83099899ebccdf930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5e3f28eaf898befc1d9176004182de4
SHA1fc165b774ec9657017b86d2ce9f7d82c16be97e0
SHA256f14b6f685a54d6653daa9311ad269155df5439f41bc6156c70aeff5770b331ad
SHA512f625c09c056be0ef7e62d322961aba7fa7a175711b878b0731bf3ed10a0c54a52b761bf9e14760962b25150ff0eb3ac440786fa92e294aee80e69eb1854d0693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d719d50cf47bfbe58beed052879284b8
SHA1ecbca87c422e4b0c571c33ef82d6cb461238bdec
SHA256ff85a02a0758e6a55b14a17ed50361e7fd66d26fd41cb81283fa7b1739ddc8d2
SHA5123ed6ee5bd046e057d9040b68c55317e139ff09df5983bf45bd8166a420cde013c78b4994a2c4049bb5ad67e049ebe02918742992979c3b2a2c2e4fae4cec85cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f20d94b20f8efcb10b61278e2f8d4091
SHA1019c59906054c6f748be55f2e4160beaafaed5f6
SHA256486c238e309536bdaa08603115c4625454f9d255fdba8dd67b3770a9b3d77d8a
SHA512df86754ca0c2fdf6ff868a46e1148ae12d522cc4ef377c809c6e617606575be8654ad15e6376d1aa2ec4c3aefe45ebb123a222271df8d0150d2c7a3507004dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea47604466494a7c8c59110ab12a0bdc
SHA15c9db9f27c51b4a4abddb05ec15862ed1f97047c
SHA2567ba01143fabf2d75513c7a0293a9eda8f2059fc64d655911b4d8d21c1bc11632
SHA51289ef70f461733667254c0bf99a1173edffaa3d6c27718ad3e156e20fa722a602039c337c66a913b1b848f31cc3d045a3a97c3ca7716a72b361253b9aad0c95df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbffc40dc47594c9526172ea06929990
SHA13b521f04c4c380288d62f3081ff47301e532494f
SHA2567565eefecaac74ad44090918de26eee365895b3d4f3f7f883db7b977f7f98b52
SHA5121c304ab2a468fa9aae8c13853cf19c9e89e15954d25a7341e75fdd1fc2ac9acfaf9c3a218253139543994ff9d73f3ea82e799ae86bf57d9afc98b42a7fccc097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56aafdde50b9cb44a52f4be113f851a8e
SHA14cab73490f77f425f2b4821a2810e092f9c16900
SHA256e90779fe01b65f3df238c75a3f3417d154f5beaa1f181e1268c129a8eacf3faf
SHA512c041b8e7d022834d41ab81fdd9e1acf9259bd0c089190e3b518402f368282ed1b33b4e4b9dde08c24952aaf0102fd7f6c8c1b58876cf3c18ea51c7d782463892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d11621aa57d0cf96af1dc899ff8ac4a
SHA1225d9c6131de52d543754764c425037e1ee8157a
SHA256ad15b6db9105248b4b6f8011fffc0c6f5b4707c04e0bcb6d496d758f54946e23
SHA512d65964116ddab9bed949405728034997dd7c052fdfc1abc7714f1bb11f302831e7336bf0945672026ea7e1471784213e3091510c04b26c4083a22ce03e2e51c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554541a212abb5422bd832600ef12e3bb
SHA1b59e2ed09a1975e5c5f11bedc242e35441dfaa79
SHA256b5e839fe375b7d89f4f2c420e437bf895673f8997af2dc06365b7fb941a3bcf5
SHA512f800721b3fe345b22213059f64465e6027971953e408224b0859660903f25203e01fdf3bbbb227212ac1e4f4d3ff9d43bbd1c621523e70347e8fc3a61c248ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d4898d9191f30d944ab563d3e941fbb
SHA1493edc7f39d0a7d0f16aa88016dae1039e6e41f9
SHA25619e2cda151a0d4efffc4d8d2fafa7acd0dd9b1ca0c3f953eb67197728512e61e
SHA512b6a8ca8b16c374a7068589b9663a64d3a7d324e7f6e82dff4951ad61ebb5ce3dddb47953a5de5fbb9bf3f8774eabd81dbfe9375c8bd61e336811df8eda56959f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b25c0894583e419757538f782cd6490
SHA1b05cc666ee7ec076ba15f2b042fe7585d7b2c9bd
SHA2569ae39838abbad491a81b846a41a93a243ff461c5529c75ba8366cd3a6de332c1
SHA512e436917cae58ddeaa048f9a25d561ab56c07be2c0d1e87760e2b093177132e7bd9ac64b38e63da8e9559738c4eeb648ec2387b0d2c4b1b788da3b2d14e2ae048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4cdc0ee4de9224b48f95f0b254ad257
SHA1a0960f206485239e72b0926e61c2f369c37473dc
SHA25640ee0fe5c574dc44078a5e8a2d67ba1fb8c21a9b54f28cef4d5fb351b270d8f3
SHA512781b2c826b1ad342d151a3e45d174354823a35faffced32f86a7a7457d7507fb1a8d879eaae8286f41e9d0448b5f3dd043577cbeb3661f8446083b858dcf0213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a14392ba6e81156336d88b388a3f297b
SHA1464377c09961984458d76b7994c954f10fa7fa39
SHA2564fb41db9de8902bf72d3d500adbd3fbbee8bfbd47cd71f98f3a4f088c4f4a012
SHA512d50f3dbb805990c5a804bce7607e231affb9a7774343fb42121996f64615ffcc09dae4e766819ec2c9290c3bb80fbfdfc936c02650bb1ccc10174f4a97eb3e4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a3c1c0d34c3d6afce1f73aabfb839db
SHA132a8ee0fa881fa207cf2ab2f960a2082371a4026
SHA2560462cc0878c0c03e5bcfb1ad7b7ee6c1c08687936c47262d5489ef04da7431c3
SHA512bf511b4dfbe1af86a728f6b6f4b74145f5ced95b41d254666a8441a7fafe209158e32620c4985804819376f8c528e3b3c60df3ccb7cc7a184e890a0d3a64521d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a921ccaf2241129966a40a80ef03f52
SHA19ad942a48ac6573f51f344bb89399e97aae46d25
SHA256b4e459406aa1160791e518dd4554ba0fcb6395b52fb21f24d36a7477aebc1f45
SHA51295cf6e0a22d13be1d12dfcea4a4ef9c1cf00e51288abe3650ff20738f085e0a05cb564c71ba0a1f3d7471d0328c45d136abeafb8edfe096ddaf854e4b8c036fb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b