Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 08:36
Static task
static1
Behavioral task
behavioral1
Sample
0ece3bd8e1c126309f1498e7bc2c4eca_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ece3bd8e1c126309f1498e7bc2c4eca_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0ece3bd8e1c126309f1498e7bc2c4eca_JaffaCakes118.html
-
Size
9KB
-
MD5
0ece3bd8e1c126309f1498e7bc2c4eca
-
SHA1
2d9b599c3d3e32d82689fbeb428ba45b6f06556c
-
SHA256
a12f3c8bfdce45a508d12d49352987f9fc28b33674f019903538a095e0bdad8c
-
SHA512
4953f92794a3944d8f47f1e113404cfd8cc13caebbf527f12e4a45772321a9ebecbc2cebd991fa85f50eafeb04eb024f0e970e99f6bbe813e740fa0ad0aac8a5
-
SSDEEP
96:uzVs+ux7T8LLY1k9o84d12ef7CSTUVGT/kPsmpUlVHcEZ7ru7f:csz7T8AYS/c9UPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e08a805d6f15db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000003ef962005f0f22261e8692f45e96f9c63b104c7356125c0ea7e3f8dc0994ce03000000000e80000000020000200000004198d00d7c9eea105d9406642b874e11a60aef99fde6956083217b072456e47720000000d5b5ef50eae83ebe505323df28ba3b778cebcef53b45a1917d3e6e150109863140000000750257d07ee26e3579a9cafebe243c9341f844eb9d28dc1339865508ed47d657dd7fdc5c3b2d99042b4a075b74ec0ae0107395e4a5684524dc00dbc511dd4a4b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{86F48A71-8162-11EF-9CB9-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434106432" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2388 2112 iexplore.exe 30 PID 2112 wrote to memory of 2388 2112 iexplore.exe 30 PID 2112 wrote to memory of 2388 2112 iexplore.exe 30 PID 2112 wrote to memory of 2388 2112 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ece3bd8e1c126309f1498e7bc2c4eca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e982731041a295e513243ee7148bad4
SHA1de6ee8d242e778911bff7b6690fd69b5c08914a7
SHA25647a87b776b1280bb0df2b15e6a18b4a3c5b314326a489bfb415a654f29609f49
SHA512c3763a4373d25fcc5419e043e994eaf16f41dead1c7eb22f14ab86e14e58847994a1c04a3074d3ec51868bbc773c234f67b449b0e1d187a5d00df9c0db2d4058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2406fe4351811edcf10501207e3c06c
SHA1578ca2f5c513cfb457af1530a84d5149f7713a14
SHA25662f496c08e8402aacfbec9c5cd4eed8894b66d777daf39279883c6c7d06ccbcf
SHA512b75a3a3bd29a0307fa2fcf7b23e088d5343111ee30143b18f84218c2eaca9e4c0561e877823c2ac71217664676380d91101b14fd56e59c214499c1a2e277d2f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528d740b5e38d5e4a6220b601cb624e61
SHA1fb3c5db8bbb868988563dcf10f4f057413d2e044
SHA2569ca7d13f29624a6e1cd333975a7f19adb5ad43b7a08febe1e7796e7c179ffc49
SHA5127cfcdf56fc6319191d1390ee868ef67038d63833ab9d260130b69989e12e5494241b2ac75717cffd298b3b915bff0f95bef9dad8e9a37526714e947577ab5018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ddde0cb434e48902a820a1567a7e819
SHA12dd02395d36114ff7ff764eba1a4234b2893662c
SHA2566f80b043a045093ce1c12700f1c641565a465c505843b9a36312c8a17aedf81c
SHA51216ed0d15fb6f64c943871c19f49239728fc9327e12f9de5d1b7615d69a5f2ed54ef0498c539d7861e23f000fb44646a9b5aa02441cb8c993123970e01c3bd469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529c0e5c5d46af14ae6e1da84fb00b634
SHA1aefe977c1834d9dcd75d854da051491b109b61f1
SHA2566766ffa5cd9cc4d3083a4e854ed367b7eca196164d40c25151efd6eef60c2d7c
SHA512c3d83c1c10a03c365503f8d89e47f323f92c8935a2abfdcf6b79af7285de7a70fb07da2be0ee71647bf31fcbe064cc9af6b4d9cc6e8eeef7012c3614c40bc505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52988a479de569fb04c360fecd4b44930
SHA1137edf28d3a2237a186812294e58a2595d68c8cf
SHA25674c8481a2f46d2b9d5719d6145ebb29539e289efb8bce9bd5429187293444f12
SHA512cbcf22d01275265d6370ca8265147af74c4538f3f8d16286e00cda4fafafaacb24d66d0c7b255c31f4a8b044ee277bc8c5ac5f459f04464e50b2cc0bf16ade60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a194eaf0ec90b5b2d0d500fd7e80a254
SHA10c72374b97092b5af8485497c0de068746869ade
SHA2562e361e36dfdc38a077d74f465f9dbe44b1aa9aae898659f61c2441166658d444
SHA512b09fae0a4f1934c74e4597407c5f2868bcbbb19aa2808fa73c181a98e7617ba83839a60e2343ea02ce00e260c5efa59bb596d7e43907ea434bd7c68225df1c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a07fa4e628ff9684a60ed691ba92cab1
SHA128219d19e1d49b0c687faaf5538a272a18f5c5d4
SHA256e9f90281355fbfda5cf4bc04706cc1a9d1ab2b89b2b09cdc3838a310f5772d12
SHA51272fe325b02778df7b3eff321e9c5f0f38a212ff5fc1a7a989d1850e6c5d8c8d7a3dfb15097a233c2a99e7b7390922e70c07ffd004813354cd0e4b706a0f02214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5696551c147ad6d79ae4ba22397c0f84b
SHA1cd5007a2f8d925e2fec8d743a3c7276f8b23f381
SHA256dae5a1f346a7783c97958067f8938becd0c9c24fc4d49bd9f072a1e944552e7d
SHA512c8eb5a194d3940e6fd0bfa7078de7c58b092bc6bb8c6081ce949faa22f279cbeaa05335a5ead7e091b7eacf7564aba4958d2cceb8a45ebf4bf9425e23120c6d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad542c34ccba655af2ad8508f2ba2f80
SHA1ef5e46b7ed530429497ba795edb9f7eb92778f88
SHA256b13f22046269faa9719a3ac1b805d47b0f6efe2251da0a2e5e9c371a3c5a3fe8
SHA512cf5ecc253f7c860f7b334e324471670098fa8a20a31378fddac4cdd48c92526020e9fad7bbc1fd647898ea8f052e176fe1668ad91019c7a1aa8350747124d63e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52db9d7658e85ebe18ad83abf003f73d5
SHA1339d821400d3e5e3531df41174d52847cf35ee9d
SHA256c797c3b479c2c08d625cf1a7d0b09c37cfd735128584469c222fffdb14b76cf7
SHA512010688f4b8c208fded0ce3beaebea2a8f12a46f31eae4756f0866b879d6c607137a47ed139330ed1e51045ad9badbc947cd155b0eec8d00648205980fd6bfec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c06e85bcfa5955248510ad745b8fa76f
SHA1d6285719d5a3dadcbc04304b3747960ca84e6507
SHA2563dc7d40282815d20b8518d684dc3c8016866b34937801e779a50758ac0e7ff41
SHA5128daade4454f5bed48e769ae43dc1d7d5e5784722b0fd7de988454c21e109ec0930dc9a87cf5b74cf07cc5322682337c5f25f28b7f2bbe3eed2324c961748427b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8f9a528105c2e9354c39089964a30cd
SHA1edf56d67bae929f84bccafce166f9531b536e9b6
SHA25612e64f75776acfc4721d404e5b45993c12083a25a27da9d825446221b508534a
SHA5124f5ff8953688439f488248f9b42369e8dabcd904af60af0efe7d791b1ab47e9a9a86ea6859c184aaa93ddf3ddf66a1deda23750d5566754f6206c4010de0f5ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51518d228174a979c45a2858b1f5810d4
SHA15ceda0a95395bec0055a014a51c8fceb8e5f0cca
SHA256b97720d03f3d1fed7aee8f06fdfc37758d188b15da80476da7c24301988f57b9
SHA512a281b80ad3ed0925b4784784f2e84e837f72e87e4f09220be03ffa282c69945c08963249b86015d1c0510080478ad750d0108462d56b6e8cdd05744dc6912d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51adb8666c55ce3055f03e559a33bd4f6
SHA161dcaa98e8eb2c54cd752419788e4de5dc72dc50
SHA256903af43936556ed71e53d7e8dc97c0a47741e8e8b3f3f9069bb464f528cb1321
SHA512722a8139509fa3c9834279ddebea61e77d3833c33ef108f15f08502980bfba31c8b3e6cb1a011d654f9da8060fd717b8380bac6e0a5c9ffa2ebf68e61fffa14d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e225568ec0d9f6956e9fbdb8365e6975
SHA149db46843f536ba68188d95bc347db7c5c1f590e
SHA2561a7c64543adbbc50f25081b5599465c8f6fb56fd75f7f312152eda75dbb26ab5
SHA512ed64aa66e58f6589039575ed96bf9cedafd7a4f0799f75250f76c8ec7d28926aa209dce1cb273002348ada2cbb5fa8b355879d6b572acfaee5d0b0b8c0484465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9745d7fc00702f3a56485fca4e2c767
SHA1e5e28d6bda03f71f8100ba0ffc833cac7fbef001
SHA2562f7acfddb31116496abd47f03f6723f86b7a292febd6328c8f015155c8d00b79
SHA512c5635fe7e588c6d72f2725b9cedaabb12ac059db244bc4c0de938a617fba350e18b7454628b8ef95a11fa71c6b7d9c5b447053a93bae1320d04acf57f56246c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526e43a2d88fb443d9e82a44ec1b4258c
SHA1f671e39880c505d11348c94c5b93986819460ca9
SHA256be94a52c29e59b62d231ede31ab2044ad7a1651b1cd7b640a539a124df29ebe1
SHA5127e00ead55b8eccce5633af0dbe4aef4cb5ff2be5c895ee68868d8abf74964fb18d60347d0092cfb99f74acf3f43c33cb720a2ce490260ffd316ced7cac6e0905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abff15d188d41c3bca2053151e527350
SHA13f9ef0c937319a9bbfe931ab500c8a7565cab1fa
SHA2562a0816fa9f134f4d507d5c01d093be2d1807addadaf2c26c8c5fd6d3c0ccd5f0
SHA5121aa12c458db1a8408aeb292795bfe4b26d9cd5e2c4c2edf5d5a2482228f86925f8b23a6310ec420dac4e98979f06ff4b4bab3bc4f77c4f0101c7c3f4690c8915
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b