Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 04:31
Static task
static1
Behavioral task
behavioral1
Sample
0deefe10a8e46637530933d785ddd297_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0deefe10a8e46637530933d785ddd297_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0deefe10a8e46637530933d785ddd297_JaffaCakes118.html
-
Size
15KB
-
MD5
0deefe10a8e46637530933d785ddd297
-
SHA1
174c042758d9950f2e692d7b3b148556ac7705f6
-
SHA256
dbb92df20fffc9e8c017bf458edbfe368415c73faf607030b2a6fc070b68c972
-
SHA512
a26ec626a57e4a3b7309ef5ac65c6c6b25e578f43d4cd0abcbd83a00efa96ed9e5fe00314be2522e9615b8a45b33c8eb01c9d808ed7c46481a763d26ac2a66d3
-
SSDEEP
192:JOZ21QHiuwdBXS6OvnY+irVFcSYd/O4VgjSrll8kpk15Wfc62xQ8JieM+xR0B3Xr:1QHiuwdBXS6OPTtXkk8VxRbk4Mdk1s
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000003d50615fefb5df48684ee1327713063374060b544c7a2dbe85c2abb88ddb9b9c000000000e800000000200002000000030d3f5ba3bb7a67aa288f9b79418583b486ff8225c394eadddf8e38a6a9e89c6200000002d101355a0e370421a66f498eb9f3250da2b6201a11b1301d40b515224b6dbf84000000009ea6e7b0212c748812dd8f866aa8f565f9139ff7026f4769f88378ccb6da717761f82972c82dc3532b8206a527f3c5d1c29f1783e1e72614607ef59917ff66d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c055af234d15db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4D13C4F1-8140-11EF-A641-FE6EB537C9A6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434091731" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2416 2384 iexplore.exe 30 PID 2384 wrote to memory of 2416 2384 iexplore.exe 30 PID 2384 wrote to memory of 2416 2384 iexplore.exe 30 PID 2384 wrote to memory of 2416 2384 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0deefe10a8e46637530933d785ddd297_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52da43403ed276da61d8411f7c6aad1f2
SHA1215443617365ed430d9996e64f35a9f7752c6a35
SHA256b98a70b0ef23c6d42a1b0860248825ed56c0dd0a2d94017537d6b86ab130964a
SHA512fd7e811700a94d6f4f5af08d682bb5b3f488c4d1a283360a5607302fd82cccd5847265fd45ae18299176e402541dbb0e637ec8c62e050d5de007b7179652104c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54893c5e8c0381258b1f110689520f759
SHA189c79936f36de13e13bc2882faf9e2fbbe9a470a
SHA256e5b2f08e57ee4d959dcc3eb9fa22446d3d6cedd5ffbee6bd89ad7862dc65515d
SHA512a12baa4acdca371195fcc5169bfe5b6f0b5db8addd43384ef452c6570b46745da48e44ee25313856ec61641955f106d7a102ef41fea435d6f1e865a4193c816e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531819703341570562e859d7b2ecc31e6
SHA1144ed6101ba887b87de600a6e9cd2af11b2681f3
SHA2565c660c3adc5e6aa1d14984f3b3ca16387318452a2379a84a177988144630ba5d
SHA5129cfb5b6d20c3591077ac1c9b640807196c4f3f4787c047a41cfa20ba3c4c0f1e652ca3bb2f5faef9a4eeb992d5be2315f8ce2037a015ef48b7e783839f9af6d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a349574ae4526e8e92ddb4516b0f81cf
SHA1c91fdc8d12121d2ffd60033b5cbc37cf3d29dee8
SHA2563713b831c366dd73489504eb7422e9d0ac1335a55154f8672a16d9e933f20bff
SHA51229a9eaac2718eaac4d8dba5374c03962d9bec37d2f36ada7b93d31c65cb6faa35c9929493f3a935ba67c8b2dbecb6432e15e2dec1725a500f95beb17a77d2f9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e439fe34f5cc00fe6d4d2abd2ae35848
SHA1265402b9a5505770079c6aaae6f0d8b666753b7c
SHA2569519657b5745174f05b61049865d59a236f6582d6c1d40f91d8ac8e41de667e2
SHA512d92e5df5a084939a21e1591e8b4f656b8d380466e97a8e547708453fdf1aad6a0464f4351e056d44f8b2f9e2abac72a4e9d69952f7ec4358cfe336ff852ad121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fdd01b70e6867b2fd5a52d2af2600fb
SHA1a0c01d21b94120dde2c213b4b54993a77249de58
SHA25686c1e29181b8626d29efcefdfe4550c75973fc5387733271f4a54f05aca766a2
SHA5122dfd5b825b19acf8e1aa8ec2d8adf4ce8b51e555fda962fdaca67a5700b4fb62d24ed2cbc43341beccfaf2c91534f907241ed309e09f7445e93076240106792f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a44ab5ef0e452c33a78132139523a653
SHA1a828163e3a87f760ccf546ff4307001e086bf26d
SHA25632ece52e3b649aa49427ca101987b6e7a201d3782c10711166ad3e3446362d45
SHA512e757ce2ea30b5f2a6957b09feab97ad35efa3905113b4c77711f6fae873cc9fbd928cec9a3fc7e5b50467ef0c6717045074abfc4e6d8c49c9c922c001e60e35f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52da6d2648e0e0a9a1379d4a443e6c992
SHA12ca2932678e1a80e77405f7acea07fb3e63c8347
SHA256f23ec816c6e5dfc81a2b0c670ff984b6c7e3a17f130161ba52bedb0296b6fd0e
SHA512e18f9b76c3117a4e4751798bb4832b464de793c19720161aa829c9ae2d3b316c1b7fd8f3a7b7517ce6ff1efbdc8df31b72950a86aadbc8e7df56abbb8acf2895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5682fdc21c26b2a57a7294cbfad557943
SHA16eb22e0524e5a9b65b57cd053e6bef960da7ae00
SHA256645e61f94f273779e7c02d518f14ce6be63cb96006fa9dbb82298c3f40bc6117
SHA512cd6868e2caf66986ef41c79266bfc4d4e19588c8f7dfd4a07fc89c23a3f637c2d770c02cccf8b3cca513e9ad6b2b1f5113510368ffa741e9058305cb7278c725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5239faf4b2ac939eb3a1b1d67a6adddb1
SHA1744acebaf4c0c9fd4ff22eedc56cb628453b6a03
SHA2562a26ffd594e5e2eced0a861dc9ca09eb207bcd54b23c637777313ba19fcd551f
SHA5121a3f5a38e1a8861a7fe4dda28397dbc1e15558e538907cf4a9c40f472293d849cd9b492a423ee33d649df262deda7cf7131e60b4b2da1e80a891de8cf4a3a1b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572a4f11223942cd37274645b67152187
SHA19723e12c2375776903161f890e9e71f80f353e2e
SHA25622358552ff732dba7862fc61cbdb2b6d24849eb44aceb04d01e30d7efac651e2
SHA5125c25681d2dad20158d681802399965ae1cc8d087e295102a61252acf6d8f17a0c10b6ffb502f3086bcd9469b2189ad95aed473e5626082966d07712e3f442870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e61148b3ebc8ccae0853bbd148a93a9
SHA11ccd2125cdb66c9d223e9bc195272a3eee70f2b0
SHA2561147421886f58b99a7b4b81ebc9394f24186b6eca780099a0ccee431f8074371
SHA51294baa47ac8acfeda5e0d2ee6df8527d2f92347a312b644ed023db82469ff84237d0bded681b5b87f0b081ea318e6283cf435f96c107b38b124fd298a154d22e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4fa77df4f964390e376ab12148f8af9
SHA1c1f546886c3ec299fe0c53d4e8298a13d908f2a6
SHA256b242bf50333a8d924db7d6d05500676aa8fa2b7856e31fc3e377dbcccd511aee
SHA512063e59efc9024d5fab0c59fc3388aaf63fe90aca3a9c6cc94e60cf685666076e8a34cabc353fb1a0a75a706d0e5ed4caad46db2fcc6b08aa2122a38994b40e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515c9312b600e9b1c8189f93432055150
SHA1fd8d46ed407669cb94139ea5f6dd7c46b2c1f5e0
SHA256f9b304690d71bc6a9cca7a0fd758c5ebbfc9b5670772f681569f9685dd4bebd1
SHA5129ab3ac620b7ec1462eb1887e871ed456e6b25603d1787898e6f2ef1acbef886ae671344bb5abf768b02e6f20c217dadf0da391cd75c54419d57a66fb39867c25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc89bfc84c1a50dd871c2011f8194c8d
SHA17ba90ec3ea9750096db5adc7c80ec191cfbff877
SHA256720d5a1a9e6e5faa13279735715be0fb44dcb792ec777de02868d2691e29a677
SHA51209d46af8db435e104032cf9fe1f9919b84ce5e3280c60fc5b243112d7329ac3803b21e73299edeac9c4f80544960a8e4bd92713c3518c32640526223300c482e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c873eef096beccc7b956297df435fea6
SHA142751ce43e28b58a5b48a7b35079d48f837d1a08
SHA256e3b6e775bf66437fd9db42d2131e4a63508589ca85bc7ff1f2bdbc6fceae3bd3
SHA5126604db76b6e8a9f7465f11919c6529eae85211da51855ca38cd79a73786b10b2863ee5f067637df55b043920a340ebf887cc2ac4ddd9a8188855e5a727242756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517e45cb7a14c25a3d2e6e617386d9cca
SHA12f722cdc935484e2280ae3c045dbe66aa35eec24
SHA256c952e5578ce5669f3fb35ea742eac5d09da765d69351fcc804668dd24d097afd
SHA5127c4cfb49096b7bd5741f9588f55eedd683635328d53bcad2e73bc87b9bb8ba5f920ec1a492130e93087f1dff7fa83700e00fc556aa0c84315af26920b3ae4592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55656d2dc0569607da54609b2be4a5152
SHA1ebd2c03827ca2bb6b4a35b05d073b1cb03901d9a
SHA256d33157e61f6285228c8171414913fc523d2c272b7459e53c2ab8b8d9995d135b
SHA512cfa4675126d955d4c829d0984412aedcd8d54936912f065b5e5416e312539eb11e34aa19d07367431802d394962e9252070aaa4536a81dd29283cd45feadc547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c133a14dba956737f81a1b6b6276dc1
SHA163895ce1ffcc2e942e2f180ba919a53afec2df5c
SHA256d9103637922a60145e71b492fec38ad95b3c88bc7bc12aaa2b5fd9bc816e916a
SHA5126e325ecba80291c3f88da28a932e71fed08de57bbe8388fcb32a4fa1f057791a53f2ac3677fc0b66cb5e9dd49958ffbe8d426df66aa6c8faf3c3fcbee4416bbe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b