Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 16:20
Static task
static1
Behavioral task
behavioral1
Sample
0f9567feec478345b1efc880491b2e0b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0f9567feec478345b1efc880491b2e0b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0f9567feec478345b1efc880491b2e0b_JaffaCakes118.html
-
Size
4KB
-
MD5
0f9567feec478345b1efc880491b2e0b
-
SHA1
7d02bd7cded8cab4884dea43c473e6014970786c
-
SHA256
c58c0c93390f5f0d69f4ba5fd13909d96b3700735ba895c746c8ce057476bb9f
-
SHA512
8e412bbe980b1f8d40d4f9c30400264890fc63a155bbbb679bb1e14cd60414c660efd110b755dd70f48246bb580e616b68a4d5480a8fd2587a6084677ac33e48
-
SSDEEP
96:xqFc1wYv+9R3M6/L6aux7kILv5k8V2+FZ0dduXdRdddTddd/JV53ByLkiXK/KBxq:4iqYv+9R3Zmbx7kIT5VV2+FZVJbhKBxq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000e012970d92fd7e6482da2aa3c1ed21cdca602f5d222918295029f53fe891927d000000000e8000000002000020000000623083242133764c1d0d1ac39fe8e8f82956b3128bb7a54bf5835920bbce07b52000000063538a146832ad7fbb7156599f7a266d1f1bf5ac061e933af7882f245d00f08340000000837c68724a784551495adda6d6182a59c4026c30ede954b87064101329178fd0a8c24a751d2fcfbfe987200dc5eaf27c199d268f732abc74b6e951355153fffb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434134311" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 501e4347b015db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{70B82F51-81A3-11EF-9CC3-FA59FB4FA467} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1836 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1836 iexplore.exe 1836 iexplore.exe 1476 IEXPLORE.EXE 1476 IEXPLORE.EXE 1476 IEXPLORE.EXE 1476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1836 wrote to memory of 1476 1836 iexplore.exe 30 PID 1836 wrote to memory of 1476 1836 iexplore.exe 30 PID 1836 wrote to memory of 1476 1836 iexplore.exe 30 PID 1836 wrote to memory of 1476 1836 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0f9567feec478345b1efc880491b2e0b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1836 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c97a5016dc91de041e7d187fe0566e50
SHA1f24a415e87c3ec8e93f67d14dc4058456a2fc144
SHA25666d97965a055c7c0d8782c8845cecf92b9376bdce7a027ec0028684bb2443638
SHA512611733a13768477e632c9e098cad702f1e246692e04d9a6077a968c65591b478255e47e953d025abe0e9b2dc4e7ea348a6a4566f9f5ba5380b807b5cab966035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa163c8caa369ed7efec407b0e055b73
SHA17d26066d874381ba07820a079ea15669607d411d
SHA256744c390b1c2ae08248916f8c427c0b7e6807a9951bba8418a5d7a469855426d1
SHA512446dfcae6c0897ed16e68d47c3de236bb4b032850278c6f1f6db8385b859a99cdbbbce735750abc74d6b8b321ce0b0341f8db62554dd026bb59d0042406bc4bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1482d81b2652b45070a596f3782644e
SHA1e8c6796fdf139b83e3fe2603cc011ffb06524017
SHA2564b11bd239ccdd431b0b5966eedfa28c5dc2adceb0f9d06a11a27851df858893a
SHA5129a17e4760dd86d6055ff455ea2564b5d2e003c8efb1383685b3522a13c4b644bd902663d7f7bf2c0bb79ed2acc5013b6e090787529321c8167f76306bb97022c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535a514f0c60d4bc2c95123bb559d6046
SHA160769235ef173d47185f6395502e887c8d746fb0
SHA256d2682a352dd975eaceb91cac139e04208bfbc212a7d45cecb3f7754b46d166f7
SHA512286acd6c932ddecfb69d72feeea573ef43d5144fe74bd9659a632cd1072ec879d193b3a06f747002ae33338f190d9856b4cf462d65b9f78220f7537d1a6c4990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b222643fa875a7841d359232bbb5e051
SHA12f85ad7927b39530a7c0be7e7f08a12cd1d326c1
SHA25644a5167693772305277bd23a06b3741dbcd24267c610ed6c75dba5dfa9cbc058
SHA512059705e3986302828b4a9068033363da1dfe113829bef6aa14f35fbebf6b28bd68383c4dcb36f9a1c4517f317e1dd28e155e4f5217f634e743fc50a934aebb48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571ba7deebb13474da6f72d191e74221d
SHA14263692a0acbafb2aab8429fe883a56fd2d4ec62
SHA256cda3e31dabc03166ccdca8700321a279e588ac97aefe90cc4705e94b838d6289
SHA512a38ebe2fb36c1102520041a92fe27d0e1529716b0a1503720fbec87a512ec496831bbbb4e43b800f93a18829707b12ad1cbf3bb7381075ebdd845e41fa2c6981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5fe242e71432c83dd27eaa52a9798f4
SHA1a387318dbb51bdf0bc5e89c63458cc93e405cd55
SHA256454f9432f430e7d6c45ca52d73dd6c052b02d01f4a0ce4045965811388eea57a
SHA512c900346f6b0750e4be92b4f488647e917d164e5fbeaee0f8dd649787078a805bbdd7da16f8fda548e451f302e22e13caac4c9f2b2f841dfa1ba210ba12eddd28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6bc64dc99e22189e0d2ae0c7b65f8e6
SHA1686576f867a2ea60ed8bc172e330e9831ab4aabe
SHA2565bdfb73987258cc642936ad12cab8c285f1d07e6fd823e2032194fc1764c3a88
SHA51259496f395d5bdf425ed2ab95bb837dc048f9e542811f3d4c1e877703ea99d564734c6f5cfec0032bb638df0b54bb11e6b0f2b75327cd0436fde26fb501a6270c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b5a89f05b9ce0425e77a8d64a6ae101
SHA13efa10c94d9dd29b7aeab022863c543a76f6e60f
SHA256eb2d39a123f9e8f4bd9a3cbd148bfc46044e90fe2bd9a6eb2b1e7e6dd7cb4ea3
SHA512c547ca57a9d2c07f22969b1cd3e52fc9c2356c0e7136f43d8834df2e5f0b2c2f6c3162f92b5d423a144ca358a8676f7664aec08ce7485b3eb98b0e0040cae33d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524754457006e72f678c5aa70c8c4aa61
SHA1c28a3e086b80ca70c91a92e8fd9db5ba35df0220
SHA2568d663f85f3a4b2f94a982f424269230b0667dedad318a7201f796fe59e8bba88
SHA51217b174a86acf54ecda14b55d122ea56e58d67c1343a1ffc1dbf0248fc572418ccb866da8a9eb8bb868c9a00f72d81894a2d51a7dfde7f4dced656dcff26aa787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2dad6905e7be6b33e2f80e8927d6134
SHA13e599aab58760dfcc72e8623fee3bb276375c684
SHA2563318d7fd9bfcb69f4844716962c3430d3ab423be65745fe28d599b2f98e5f39f
SHA5129993b05f794a02195dea4d199c139d99ff92770e1e56867e0c8ef6fe9de172172d7efc4112bc2763f350104f511b598ab7cb46268576ce1da70a941eddce6ea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5696dff370225940877ac664b16f8d105
SHA1b7cc25040b531c7b4b961dbb2bc7ec2f1637c677
SHA25690c56bd7035a1525938374ab44d04c28f45bb8c568f001893a834b8c4eed6500
SHA512de438f6b6aaa6357fd9d1a9a88b1dfa9d9a8613e015b69e2573ebedd9aff808d8bd2e1e36aaecb983fae901d7bf3eda28ed7ea24c0f6cd293d1a8a43cefdd721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5885b59ff0c976755818cfbf6b4e990fe
SHA1ac5187001d62fb9870b4d78f34a9f6e49b18883e
SHA2560df0fca05f0e715c1067b3518f1330a0254f9720637615b06a1fb35fbd14da04
SHA5127d9ae80866a7d8f5b470ba6fcc0e3968f5f8720095a39c85029c1ba0a7b54a5067940f180ff165881b0c37e01ecff6c4b21081faf9d1c64eb8b48d662f0b0735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5971193358eadfb7bab15da6009a57db1
SHA168f06fd7ed7030a3e642f4b7184e5e7c65ec9715
SHA25646c5120e851312d73da6dd6d070887e23c8c0acb59dd07ce5421f10d58413c3b
SHA512f61d7ca0efa509a79de6029a14f67e086c3ca37c4410742e1621d435955ebe37ca6e9e91149ecef1b5593af21d2283991138a39b4f6d48fa1bbc625dda595d1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58250f740d0e8597fdb383773c9af7844
SHA17a270040a770b9629306b317c4a447b2c9661b36
SHA256559abe01e8595f983aefb32c52bcea2c1efa94b5cc3de520a58a26cdeb7f746b
SHA5120f7d94ffa34cd47966697206ef9a113a2a3e0eaa1af774a699651dbc57fc968bfe55efe9f56fe4576433d8024d5e6485179dbea0e6a5d210fd0a800ac776e726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ab2f3329a8a32178546283b25cb45a2
SHA1aa2c5a7386affba0b2fde19f996c5da7e5f57147
SHA2561971791bf97280a1f1416186a2d3c65697cac2b617b56d7141a9eaddedae5b5e
SHA51254c7bfd1008e24595550c3e320c773b1ee660a7ec3feb019be308a43081395affa946144161d9f8daa2c0653b6864612799e2eb95caa8815dfdec630f36cbbb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3f199d22f08b159e9f99408905a0fbd
SHA1be9454a2e958340f92a3d329372758d121bf4576
SHA256421b249a1146d7844931b04507c02b6b61b1ddaeb0c1c901c73b1db60147496d
SHA512b4842f900ffb24a81a042833567b58b1e9295c987bd75682553e7c47c2a91a635bac81d3120acbbdeccdcf00c65cea64c5ca325e6f6bdc3a16b6ccd44ddaf923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8149897e113d2eb119aa69cca94f840
SHA188c344708048455489c97ca40a4089b425bb43ee
SHA256c55a186b5f54d7a41c9705d88e3b1feb69a0fa3a9dcb1dd476b89cd27eb3cf4a
SHA512d8905bc2846b8cd1b538368be2663e78536298e2b98618ddcd0b09fd057bc831eb602beb685c657665c1a7275be2021f6a14682da850bf46f65888e15dedfbf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50011c80db0dc195952d9e5346eec780c
SHA1fa049bae1fc01356771431d0903ba3e2ba0a11f4
SHA25605afa06d83a13e56cdfb146d30c3180943f0ac782aef990496c8c09e097d196e
SHA512460478e83ed800a26408368e1fb47ad3fea91eb9ac71fa4ca188e10cc73908b6d550a8a8199b13f025a39c64908e0768064de13e1eb622124db6badf93cbb2b7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b