Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 21:46
Static task
static1
Behavioral task
behavioral1
Sample
25e841bc7f16778dea0f237707218018_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25e841bc7f16778dea0f237707218018_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
25e841bc7f16778dea0f237707218018_JaffaCakes118.html
-
Size
7KB
-
MD5
25e841bc7f16778dea0f237707218018
-
SHA1
a0c09e923d98822a2474821709a37ac6ba40c6fe
-
SHA256
dd3b6f494ca49dc890106aaa2b516f5bf645ba75f182274c278ca18f5cbe9f6a
-
SHA512
b279442c6e7e70b05c8be537e24732056a353815be0fe9779fec21d0430470cc22d38432ebcd5b170613e3039edefb10140889e696e96e1885ca084007aa8346
-
SSDEEP
192:tIkX1CJudZMeeY1qhiyDJyjXIRKDvo/nymbt:tIkX2MwDUFIt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000081a4afe2d9b4e0f37888b525de3b108adb41a9577aa1dc71b7d61cf8b3576077000000000e80000000020000200000005833368791bb554a5c9daf8d548c12723b5895808d5121a7abff18b02cf9da9d20000000e46172e07dcdff43b499fc33326f5bd0bd5fe1638eeb99ae3ae4d958aaba7eb54000000068ab690e6bee154883fafe135c40cb60bcf2a97f05e5c81c63b98f281d60657e8587884e39f3c8d331191061292f14009b6e746703b9595343ed570599984e11 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6060bf37011adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434608833" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{45E2BAC1-85F4-11EF-A7C1-EA7747D117E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2400 2512 iexplore.exe 30 PID 2512 wrote to memory of 2400 2512 iexplore.exe 30 PID 2512 wrote to memory of 2400 2512 iexplore.exe 30 PID 2512 wrote to memory of 2400 2512 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\25e841bc7f16778dea0f237707218018_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8e3180528269634fbaa4c85b083feef
SHA132f2023aa1161320e07155590919cab050950c97
SHA25672adafbf656540105b7f4c6ab2ac352801e708a5c4043bdb31468dac8dcd0542
SHA512aafec854a9850f8eb1a99b8db342091e1a74ac220f135cd8443c86cbe9bbfb295f7ccb11cc8d585cdcaed25ead0219ccd2186b172cd2b10da730804c500e1e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523d9f83e43af1fcecea6d4a3f978970a
SHA138487b99db1ee8b32dc840251dbb5a8de1db2182
SHA2568024d2ecdd26b40d1997d55a36f2818c5267857f0b5aa046d435d2034de4c31c
SHA512952d439ccfb94dce01d06b9eae10912fabf471a35563b37d0bc1d9ba6aa02ccd54e2362ed92fd8040145c0029efa531d40fad2d6632915a05669fdefedcec28a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1706b7657e39faafe25adaa2a7b7bc0
SHA18d6fdf31cae726c9ea9d488085c4d2051a0b247c
SHA25689ae472176464c0bf675093d0a792c1a91f073adcd225352cd49d57d27b229e8
SHA5129ccf57ddd88b747d853b8eabeaf8c1d7bb15ac0f7ff3585047c25646ec838a58829d1dbbdb1fa08f1641787fd4c0eda9d6f67507284b910193fe0b6e62b0a474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e34c3f66bec34e41aa3209b5aab60fa
SHA1e4f3a9762edf4fcf40ff998b394cc71331efe964
SHA256a879144a1d2884bc35f9c89094ac2c92c510cdf132c676a638b2b6f1b8f59748
SHA5124e2c297e3388c9ac3272d87f6a1aa97f72c038f39b742fbf213c01b89733495e183ead0c1138f899dc173100985d03c22ddab4df00aabf4896b65cb20de1ba42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cc782f3699c1de14f5e8a1ad5444fe3
SHA137d83b3b2c185e78e3b1d269653848f71fe9b42d
SHA2565b5c394b2e87e66464dd702cefcef719b63bb1c5fd4f8537e8343a499de9fbfe
SHA512bc69f3cc6bc4286dac9d9e0ea62d1757880c49b67259704649e55e1f717eedab321b9dce859d9c8fd50694299275096214c4aaffc5247276bbd0d4de85d573a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544727dd2622e2d5aeadadab4676f4882
SHA11768eb65fbfcdba5854fc0bf1e0544149ab57ea4
SHA256cf2445b7b4af0a2056a560d2c6ef689d320803cd051b400be14759678b83faf0
SHA512f4d60bb600fa59b42b34d3fdc66ac2e1cc8a8cf941342175dbb1cecb5f9dfe1dad9643b8fdc12f71fa46958a3f642cc257539d44a88f007090a1e7b01e5d7285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5774f7d5dc12882428bb4738f08716129
SHA17a18ac35060c1c0631f3737d53236063ed8d52fc
SHA256ea2ee0eaaa1af925ad46043081273cd2400265e1cb44d671128c228b43def5d4
SHA512dcf7da732a8ae2326bf8fcd6473ae85971904813eab8a97768b98fddb26ed89f273a5e18243cce96f18d4288d5340fb91c92a55080a6ccde2cdd3a7b7a7021ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b72271d5a1d4bc040a09269e92788f1
SHA1bc2ec337c244a94d9911c7752d9ed3dfb5a46d7d
SHA2567ad327e31f446254befb191f52237d8bab360d9d4f1778644dd9854a19defb14
SHA512a2232978914b6448d8931b51037cb93e695bd04a747e4c61c020be7447d7be7fe3a7e4d8ad527922460ff5b5890203feb95602f90678ba88cc40ec3376efb8b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebb4b46949e3e7b12f4bcd280cc4999f
SHA1638e7957f69e63b8db8bc39ec93be7efecbee986
SHA256b0956e312c1b542064899cd5e0b891c17e3f247174785aa664e55c8452c7c572
SHA5124596729066f4e716deb4e8b24ff13b8ce3b9e41ac21e043da724ba67435274f70cac93fa915fd6ff8c86c1f5dfc7b9f1e16a48342edfb97e0e1174cd079eee3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514eda231b49422fc9b08c9e8d0434988
SHA152a4975c64d8891f857ecc81f2dcd6f8c4b621ec
SHA256679e6e5b105df957d494f93bc25b273b7c93f5d9615ac1b2d896eec731431de6
SHA512dc5b72889aa7417fc8f537e4aba75cedc816bbf4ab49c5a61ffcb5ebbd077a5a640e8fcc2ef0d1d5f7de32bf536cb319b42e273a78ac2b0a0d3c7a90e49235ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b8123a4b9f46bb0344e8249c295ce40
SHA1852cab06d1b96a1853d7fb9afdb335e59ec2ab97
SHA25637ef4120099c68459962a180c5f14c6dfc687358944ce08009f7aefa5215b1a3
SHA51207ccae35127ae732661496fee0c673a19bbb244901b7abc4bc0732e5c2aec22132763874b86a21606a3a4949b85e7813c369a0021bd0d9549b99b5dc1c7c1c15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deb5a7c6b468c36f66ca481ad014773d
SHA18816a6c44560ee0c73162d436c92ee3f894f9ec6
SHA256e33456eec66fbf1da105df9a924decfa1f82d1626de8f2eddffc79c9a09a956f
SHA512b2b38f213da700f20a73e0dde4f8ae9a142552f0e249b26261e3959e48e228efd15dcadc36a90d67f8d2c634ff5529b1ac78dafa5f4a5e5b9269561d8ae00c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598105b9885f338045b4e15d41798bd63
SHA1923f0855bb672272ee4a3d190489f8b100ac855e
SHA256e6d092f01ffc6ad6fd712815467705658d365df93896493cf8d60e542f124bee
SHA512b38b44bc17947e4f9c04d2b0aa1b3ffcb3d0b13f4f003b0061f5b3595e7b1dde924b11125e25a9d02cf543ea8188ac99d64e6b29046994dba7316420051f1fcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5291b8c37c6c2bdccd8ab6562cafc8ab6
SHA17fb5880530f352a7bc83404e3f0f210e52ecf4c0
SHA2563cbcd20eafbf08f6a8c9883ea36127d1bb20d619ac743b72bc54d015b29887e0
SHA5126c48c82471e68e25af1175bceeb8787a5bcccdc09aae7bfce26a993e04aa0c7c5e660ba76a6109f94c3e8224bc42bc66696eae3289e3939e528803f82fca1430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5face8fc79b8309769fa5127c2cb673
SHA19024f2005e3ff7ae65c555622f71f889a10120aa
SHA256cfb8e89e8e069d60af686e95ed418d05ae8c402c6dea81fa5ca8c3a7187d8a47
SHA512716eecea38f8b50d37a6d146e2ab89a352ba9c19376a8dcea48829011ba540ef90ab8ec7218200b73f02c97a604dbe8fd38fa8252792fbe17c505601da02638d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2596d1624514b6cea0db59b734b9901
SHA1f89366c6978398ed497325e871118bd7d63ed9fd
SHA2561738b899ff27871f33978ce8dfc3b4c8ce3c6133114c1f1f2b8fe3680508d7a1
SHA51251eb37836228a65613131783d589fdb91d910820b711bde2656fead5885de6b3feddd6818130c87cc24ae34f08a9158d79ad88447d7ce8b98cbe436d28ef31d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54451655e8a04dede1f3872cbad5c39f4
SHA16334d23b20cf60d0acfba828db340a2456c54188
SHA256e28457e97c6068dd5c4d09f0d9b70e7f16d907a0655825f4acb1ab572642c428
SHA512a852a8e750e884252cb65d9f9d7606d0265ff75c3f0c106311dc8d2fd99e4d44a1e6ceb712762862d2c287785aebf88d98e50741e03758742b7827adcacbb08b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcfecdf8ddc89be4d65c6b81f5fb1187
SHA1110dac10bbfeed256fe26bcdf5e2c9554992ac43
SHA256a262008a21eb2919aeca368be4b1efcf38ddc0c7588d1eebcdfa255e8c9804b5
SHA51268f9261d3f81d4ed9323c4d1d41d66c8c7cd642842fd3f7789b944d5cb74fd411147bd2b3dda777c072a0169c84642f3789862736f0e5307dc592de28cbfd87f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533eba478f805fbfc31be6e4a532514e4
SHA173c08e042e478a12baa19bb27892529c647c7141
SHA2561f96af18835304be1550acecae23904e446723c111b4101fbb0eda237c87f1f6
SHA5127bb711afa7cba8e6025982e20a57b9cfb55bbccb80aa5b211eac6afd301efa06473eec1d9970d258e8e29070dc112964645f11843ef039b25c3a544d5365674a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b