Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 21:14
Static task
static1
Behavioral task
behavioral1
Sample
07724ab609f2e2368fcf3c993dc1f4be_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
07724ab609f2e2368fcf3c993dc1f4be_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
07724ab609f2e2368fcf3c993dc1f4be_JaffaCakes118.html
-
Size
32KB
-
MD5
07724ab609f2e2368fcf3c993dc1f4be
-
SHA1
e1fedadee486679076aa18f80d82c082e1456ff2
-
SHA256
73c0cf4b601c99e8ef03dafc9ff64b8f68c738ba5ce974554bdadb2d50187df4
-
SHA512
5c22c720341e8d6b56526c2d17d978aaef051dd1cab5babb7c2215d9ae79194f1c2aee71f5134765c147a4ffd559ec6255093f0973be4b7bbb049fc57621adfe
-
SSDEEP
384:sXlIcytn4PWGTHVWl1NeCI1lm5nakto9IATGJTHlSqIhOl/gcrB18n4VjXlb0SAP:ENWHrylWnaEJEigBchAxLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1EAFF811-803A-11EF-8E54-C2CBA339777F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f07d8d1c4714db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433979125" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000ddff969e09a9948c6c3f0303d13108de6fcdf9aaf2114916f42790f5c1e9c6ca000000000e8000000002000020000000f6988e0a742c01d7bf6eadf365d1da40a27742d5253cab38383a271043c2bfd92000000054674888040a9bfb8c272c33bb462ea9f1d92149954ebd0728d66aca6793e5ca40000000e04cc95e3ab9bee06f81933d788824ba90df93fef9643ab2a812f47dfc05ba0e871577109a8a5f39ce39237a8c58626a9d098953ef60ef1c5c88a24e1e0b37e3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1072 iexplore.exe 1072 iexplore.exe 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1072 wrote to memory of 2988 1072 iexplore.exe 30 PID 1072 wrote to memory of 2988 1072 iexplore.exe 30 PID 1072 wrote to memory of 2988 1072 iexplore.exe 30 PID 1072 wrote to memory of 2988 1072 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\07724ab609f2e2368fcf3c993dc1f4be_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b9e2c7490e1cf7c279edd48b1654d76
SHA163acb9c4ad9bbc015e4c780f7af64df3d9f0a676
SHA2568ed85a450b27372cc3821a6ba5b39742f11580ae554260e7800dbba516fd3c1d
SHA51209d35163a7f253f38b6daafc427cdb47b36732788dc2a29adc8d934c67dd7ee16a18bdec1696f92fb0190a1c224805bc77418df275de4b0f6fbd6b5db9af73e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9e4f94e2fa767f77a621f6171ae0c1d
SHA17e4eb2b4cdad77aacde7cf3a8decb228e1e3520c
SHA256615c44bc50c87fda78beae6b6896cbdcacc8371c458f0085240c16fca5848699
SHA512c6a87f17ae17a5efcaf2546a6577fa596a1062fc270b78bd5440213da09c959e44535356715d64a3acedb02e2132a06dfbae6f9fd7e613ba0ebb575ecd2d65ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad12948772feb80d00b7106132ec117e
SHA1073e2f9135e823778166c257f1d197e5bc6336ef
SHA256d06028a7f607392b62800107928c75e4de0a7a15afdc993fc4e4fe4e4f4dbc4b
SHA5123b07e94864ecebe390cdb726483a01516d95bfdd9fe1f7e62a6953fc0c2fa1845fef8c891098d66271f70040e3a97a49b1476ae6d5ce722eda2621ad4ee0a24a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cda4578fc4475b088f48e0365ff6a19
SHA152463fd12df1ad8335a3c3047821a08c552b8bd4
SHA25663206afd12f3885312d82a0145323587b4460cfb7265c0ff5623b1ea87fe8883
SHA512cbb81aa86551cbe1b4bca27d7081152385e1f713082a0b4897f5289d93ba5580be744d1df40b8e5dc6815f75d4372570084f7328389d1c855823559b301a1d93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54562653f10fd1d278fddeafddfa8a586
SHA13caf2f0e44427fcd86d8c03a9763e7adeebdf55c
SHA256159c620a41cb6174fd67ad9f41129e8f021b88977589a53eeeb4797303f9c200
SHA51225d3e71f7c6c0e942968beca443cc190b7cf3950fe37260e2aa0dcf4bb9be253d034c3041a56a4e5b9ed359e549d87429b6b1abba2e69311bf956971a6daf854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56001ed74e5f115bc2ceb551ac87a0977
SHA1ec5a13e0beeed5b385fd299a0146698c13451bc4
SHA256cd9f73ae1f620411f0c1974d5a72418fc0ff0839907af9ea2f85da08b93d8f67
SHA5127d5da9611362bc46c5ea659b0fe944c28be55d55228673bb23f53975e2beddd64b9ef4364efd0d215b948926353fd640471cb856a9369807192f4723b9d4670d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eba45dd324750834629d69196c3d4768
SHA12001af9a53470fa858000a3a55b3279b1cfeb093
SHA2566dfa07618008bd35512f2c5dc4ef0df7593dbd7c99326c4d80d78d6ab2492050
SHA512041b4d848599d1aba0910c19b86ce04cd64241d331f886484fc46393270319689ca169dfec6ef5b907133e7d2826c1fcd5a915d797cc7978b01801fd53602472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53695c61b327a5084ada26410d41b56ed
SHA1bcc27d0b2af47a895de67830b0c35da7a074416c
SHA256e53cbbc7e33b0e7a4e0b6ce6bbd0aa7d0474f563ebea67ed7b0caf6dd193ebb8
SHA512799cd0d754eaa97c7332116f7afc01c0d93ad9feae5466d7f4f0217154dda9cf05157c295f84ae09de5e6c8574a95ae53b3811f052b6230b84a0d89504f5fb5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e837bd6129853aedd7b48321b9bcb9b
SHA1190c9bff0ffb23111724c0226e02ec7b246638c2
SHA2560fd748b0c55e37decc5dbbd5e1561a38df3078054b1a41393421d15efdc33957
SHA512cfb3155413e39bf188317130289629ea00fd7dc8dc4d8fea0339dd8dcc1af825483edccf3619706058480a5d1bb11e8dc9ddf82132630a535e12fe8752b872fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdc1f2994906eb792de192cae8dacf81
SHA1f5a66c8d33a5796d4ba142528f2c1d89892991fd
SHA256c6599cb17f66ec24468828a833386867389b2b88d6ea30743c0c8039c8e346f6
SHA51230f621a4c6fd132aa8dc594e077106443acd787c07e021b65fe0f6e60da43d9d01847c352ee0278128161622e2b9a7d84aa30ef5960a9d806cae6c1095c0086e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5904d871634ad199d73f1394c8319634f
SHA151f523ab5cbb6636e240f1d1c2c4d0f5f24ea99a
SHA2566eb34721c59c6ae6aff67a0d7da77c71b41367aed519c21f2387020e85e540e8
SHA512ecc6c2a601a44b6c7dceb740cb2cffc32757102a75571203120ac162deb5e1e700f6469fed649cec9a387a55ce2ead762dfe0eba5e5539e138e18e455c725cc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b5c14e3c7dcdbcd7a5bdeaa5fa0fbc6
SHA13c5edcda1881667d719ca31115ef2c9ef69f1a5d
SHA2565adb700a50eec8a6997d4c514a07562c01f385cd44d8cd6e0263aa4d7ac3d7a9
SHA5120c986d4e1a3aede561c258fc63b4ff0c27b18ce768bcb1263ed9e1f4a9563f704fefcaf1304fbeabec1a460adf5624c552a7cb3e37905a2a5c013704606378d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7b40e6cd40dc350712455603d7b1c61
SHA1796b9ecb65b81a8088c96468832b2a83628089a8
SHA2567004d07128f78a719814f18fae2d9699b507d697f9f48218d401a63c6149bd0b
SHA5120e4d32ac0a19f5f28454ce9d5bce7ce48c46e9e9ed30d9004f602f8cc587dcf925f2212ba2c7ea85c522ffb2f847cdbdba0af28a0f73283fe54112a43b51edfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bff094131d7f3885caa94a19715ad4a3
SHA16239da4d637d145a14f28cf9e37c9188ee250b09
SHA256b3ed9a3e0bd86c22d98708faa1ce86fde94ea85c9cf708a7b4cfda1aa421db7b
SHA512bac7c366be5ef473cd4dfa352ffde782a174ecdc2646b51677ac4701555ecfe128592bbb835b26272a3d3cabdba3b1a42c05176e59e942eda145437cada21304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b108c0ae8ee37195dfc1c4d8d04e7ad9
SHA1ff69d07f0c830f7980076cf3fd1b23c0c4725113
SHA256c53ccac1361a5dc4a848cf6505cc1277cbef1b9e2ede646c4370f95d108aea7a
SHA512ddab58219b4700851d767ef7fb97f6a0738a6519a4fa0cd865c11fe400892a201647ddf2c0e89b601c787e3a4bc098e90e1377c4d9cd4cfd7e87ac2c10827b94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5576aef7c90838dc0e45f8e421d9c5747
SHA12656760b704d90bd0e3efa51be1d31f4d32229b4
SHA2560f4848c62ba94ada2f87c2f0e1800d0f5f9ead74a9249887e7161f37b4d1753a
SHA512c2b4438c2715bb0f64195a19bdd3714c28f94e4d0708b389430fce9b2393f98aa7af6480ffcd6c8befaab4db305863874411be82aa7f0e326f9b6d17a977a075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffbd798b3f4beb9c443d8298966fd61c
SHA1b83f4192ce2658d21d4727c6b9d602fafddf07b7
SHA2562bbc2b55533c2b51dee0d408ec7073d74a30a2946e62190615984bbf1994125e
SHA512fceae70dc735066e5585967daa3490ea656e260c362307b159dac6892d71f5a38dad01a352446458ea41b769cb5b67885d338f0cedcd2a75cc1f6d683056b7e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eb282b10f2ed5446966ab351896cc09
SHA1537fef1f9dffb724e53c9a92f137de5d446c56b5
SHA2564ff475e68dd609facca94f3ecdd544fb3853ea1cf32c840e8a14d9ff6b20ceb8
SHA512fbb5c3a9216562ac1f00f124b98027110300448189754210ddf66164b343646bdb7eceb04915cdf62c6270193949e45371ee1a64a8cc836d5bab65ac4fed4555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c57424a347c3cf40af2ae7184a15c75
SHA19c0c985a304e4417e8d34cde6d7216c6180da63f
SHA256f110874d4b813a399b9bbea055d911388e9058e642430699f921cad5fab35e58
SHA512ad78fba657cc9393f55af46cf83ddfa4f7c55f3480cab73c7cef46ebfd48ba6c69eee27e9d990ca99c5989158e47933962a176186a90bbf756db88c88a04c252
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b