Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 20:26
Static task
static1
Behavioral task
behavioral1
Sample
24fb86a6325a95e192fb376c92014d47_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
24fb86a6325a95e192fb376c92014d47_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
24fb86a6325a95e192fb376c92014d47_JaffaCakes118.html
-
Size
2KB
-
MD5
24fb86a6325a95e192fb376c92014d47
-
SHA1
5a392bb4e6a997a756e91d916e1fb861e61a09d1
-
SHA256
e2ae332fe1231ec6b3ccdf78be5f80d25b0e854ca026257707ae18687d4e35be
-
SHA512
f29c865ee13de697a05e30f03b4041e8c23f870f60e6e2eb50991db58a7aac812a2aaf05120933ddfaf6b35293d52493ea9a787e97a221cb7ef57da36a567756
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000000ab21df7a2d949bf5b5d24caa57ed7d74addc0de7056584b5e3afa5c6faf5d86000000000e8000000002000020000000cddb6646ff1b6d1b65ab394c5a5d96fbdcfc06c01c444b28667f48ade3f044af20000000fc8fe9a56e07866dceba02dd52a552883f8b56be0441b861c294526ec2c15492400000009e2b1b8546d49b2d684cb8c6fb6c47f0ce076328981b307969b92bc61df081ef9a34b01fe50fd7441ebc6f869c12abdaf71c8d72fec5371c0a35d486c60229d4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7068bc9fed19db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434600464" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C9921FA1-85E0-11EF-9081-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2088 2688 iexplore.exe 30 PID 2688 wrote to memory of 2088 2688 iexplore.exe 30 PID 2688 wrote to memory of 2088 2688 iexplore.exe 30 PID 2688 wrote to memory of 2088 2688 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\24fb86a6325a95e192fb376c92014d47_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508a8fe2dd392640530437505b8b2fdd2
SHA1be39908bbfe957f9d6fd4d163a141a89e28be86c
SHA256b25edbf02836b7e06a0a887fc7dcc41e49beb73e518fba29ddc3e7aed6bf5cda
SHA51291cc3d3655473c86abf96622aea653feba768e9803a4a20043781473f59c02032845047b636abce367a2f7ca9375e363e8d5f8bcf836b006f8b92d56232ea1c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5427afd367b288f68fbdd9487bcf6e7a1
SHA17f64109d1f315fdd6deb485247e4bc00855bf932
SHA256a9e24c4ac21f5a9857acd5a260b9d8156fb00b3a80cb66adbbb1229e60700d38
SHA512762f22af375f493a315483a10a48726cf1e150ee0bcb411e5435172839214c03d70870911c4a31e6d3656644df6a83e568238f044fd1e8baa7389243178a390f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cddce15a25a0ac4e920e9491fb373c6
SHA1c6406aed7e9b028e1b73a5f11f6534b465e4f3ad
SHA256b3cfb3ccfbf99ae07f383fc51f8d5ab3719b285ac5e3e3c381d0bbd69991265a
SHA5124854313dfc9540db72206371bfa3cba6089a37235305e2632eedd229b98d7ceaa46a45d75d77d0c5802cd8baf88c699d70bf9f3452e4e40288367435c6927187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5160475faed1a89554e5bf9ab0c17f5cc
SHA18d8a45d5dc5a918e4be7b1161cfbac3b990f71d1
SHA2568d1fc5092b6db4349b413ba216f0eba3aedc7a0b7c28708ba9164dbc6639f42d
SHA512be80c27cf363c2937c6deb2e61363bde315b5b91dca1c87efbed118b7349010fd496f56d3269eb18594987e20eed17f7b0723eb7c3877f14fc3b37dcfabbf7a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5637c2422244d08bd2fccc887d7296ceb
SHA1f8fbcb78fdea51c8346db596c0844515ce50856e
SHA256aef4934077ba33365375551f15704f9940f142bdc4350b95b458a8e63e01b383
SHA512f5950dd4d1db3ace8d597d9b95ce012a7436d85f223289b33809365b64b0d7db7bfd98d59a0fd2aeb86800c3f7f7a205b5dbaf8e9df214706cf84ae6437cc4ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575d1278364f692ec1e8830692e77b569
SHA13c06fa00148da5c71d800d8d29b746f8896f94f2
SHA256c62110838c63cab9ac4834510e22d82223f4c3ec66e43326c6a498f49bb06352
SHA512041aed7e7d2f1401dc0fd40d5222723f0cf71d2721d15fcaa1ec592f2c1e8e2f74448494c797e078ff635741edda5df69a307047836ac47cb7e8c50b300bc2fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e0fae39afd41b2f07afd82b85ac2321
SHA174eafb1ca5355bf00a80ea4045c434af22bacfe5
SHA256e245cfbeaf1d1d38db26a670768531e4aadd4b6c07fe19ff939ad1fd3ac74839
SHA512c941ff94bc75b0b8367fa2fd8901efb49199e6a49d7772c7631bfd91ff131ee0ec0ad7235284215466af314de033ba7dd3444e80c38f31d34e6e56482db47865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540162d68f589654adbbf70ee0b7513a1
SHA1c17232cb60e639ad382f25e7f358981b9acbad63
SHA256e88c04ad32249404a6b60dafc7cf6b5e4ef69cab84227d5bfce4ac7704aa3ea4
SHA5122ce259c1817d14acdf2846337d1c26d8a0f484adbdbc4a8cd83ce21305a9165954a2d313f15b2587fbb8e8d75fa659d41d4654da31c8430cd25b0171608ab16b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cada2ecfb8f8e8b950019b785d3ac231
SHA1986ad438f47e9886e7878096616c00d7561a4c0a
SHA256ca05153177f568fd15aa75ccdffe181a885dc4b5ead5cdb170c6916c5f986d0b
SHA512352981c6d4505840d92b123609928838cfc6ac7b8fe4b2659757f370831cf8adbc1b6db8d94c4001c428dc4bd621348e4f5ded44566053e31c1a0738f1146115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e45e3ff5b574b44ab7cc46f78025948
SHA167f29db5598d62f9a2961116e095c1fb666dfe97
SHA25698fffdc74ccb769e06b37cd30bac9bc3f47285f4cbf3e88dcaad2544a9f50a6a
SHA51279743f26fc02186d28ff5ed3c12cfc1b44eb9838767e98770c66fc5aba331004910cdb3e54aee3ee43f3e53dbd2ee1cb1e1832a0e1f9fe96caf95530a2e6202c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5756501caac9e1128b29ff94a81539f96
SHA1b6c5b16fa203fb8bdfff8c49de7b6142963b6086
SHA2567ff9433089b96c7138587c5426fc9b0b18e3efbcc54feaff8729ed7115dfb8d0
SHA5121a845bb635239fc61fadef23fe238fd8b95d560e1e648abc20123fc9e4c205456f21229a5bacc9e925b5354c329cfe1d309a78106e2a65739a8ae0cf67db8c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5054629cd40b9165e080c6d1b30468f00
SHA12537b993730faf5afcee35b30b7767a94b44479b
SHA25602259b02df650dcb9c37a0d44e29080b4ab7ac904cbe97e00de72c55bc6a5706
SHA51237dd0037b28704b78a924a98ea13209e9e2c890167cf480f5067f579de300562d2062839bf054f1d703791416e9bf99c4339edba43ab98e8fabf6eba855235f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a7f7a05bde67c92bf4bcddcfc0bf8a4
SHA1e82cbd81a52c3032462f03a3e8e4465b8931bb00
SHA256da739d3e8525887add8a5f34af2c1ef1468c3dddc19922f59dadef9edef67213
SHA512c54214b7dd6f23613edfe5335ab0992cced4f31fe676ff708bc341a97daab8a3b5b29c938546ae5e9c4f577003610051b5479e3517076ff9b8103b4c162b496d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aae8bd8abf6550b33b0f13e067978a64
SHA1832e32fb09703584b313e63c8ec28af61323df82
SHA256ac5402aebec125c83161900fba356edb9ac44ad1d7cf125b9eb0d0fdfef02d4a
SHA512e73e7bb5af765465bbc86acec2f6821bb23a742da9ab0343154f43b21cd33760b4a80a0db6a61a2e4ae115c6da3d94cec1d2e5b8643f85ed55e1e58eeb3e0461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffd95eaf4735cc85d329add8bfd29c8a
SHA18cb146a9ebfdf2a277b6f073a19b29ccf1be0de0
SHA25626e0dc4e49d268ee8ffb39003baedf5607934e7f5d9e09876b354cfbc4c84a26
SHA5120f4b96a6f70b100c27550e6ba556449591947e28450fc765751c957320ea4630d5209a27fdbfc05d9b9ce5a6229f905b189f731fc695641446ee4415e8974e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569701950dae06502d0c781bc8e1e8e77
SHA13cc6d3a46d358a86d741169737c057db4603b0e1
SHA256ebc73ede73637bb79b2daa444d500f1fb4bc1b239427988ede8277c5a37fd487
SHA51245b79de6f632d63a147e9775df8940f019fcf95b3a4964d59c27ef5ba6e59b51424ab15f5d4bade1d0c0c26fec1216c18a47ca5d23be5b9a148a3e0716292f9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b460b9448101261cebea0197b79f3590
SHA12ce9d72c2f37a32e3f19578e6e8ee90d0bceae50
SHA25670813c78fa75c3ee70e73496be6fa229435674798559d35966f555315d3f35f6
SHA512deaa8860ae99fef4232355262c673b9045de8fc134610279045d79f99839fb8ea60e78b67ec3979eb0fc42144bc0a2fa94d1c603ad93f9052be319c66e6fa3fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7f16a201be7e18e87bbb47cb45f7576
SHA16d9f9983e04032b2cb2844c41092f2542424b0da
SHA2568cccd433b6ad1655837fc13f3e0d462c91bfe20af627aa82f426c26ba26e73ca
SHA51257f10cf642d89a23548a5b8986e0e6547db9f2d4b77babb76cdf12aa68b18e08a4863179c49e9e9c51225461d657a4265933949c7ed88eec29ce0dc96f9c748f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2e01253ffb9ac54a4a6956498e0af2b
SHA150bcd329a4836052dcfdc091d36ad0226132b960
SHA2567a946a05d6f9b0171d1a924ded264d3d47527ea08612b6e581fd940661b5079a
SHA5122590fc677edbc4872bfcf52aba112e3570bb082ea8bc1fd017250623b14bab356bf8bd4ce90fca2125cd08318f511bc889dba14ae6a7281e3496559417daa46a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b