Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 20:58
Static task
static1
Behavioral task
behavioral1
Sample
255a7cb2f4aedf408243e002c94aec16_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
255a7cb2f4aedf408243e002c94aec16_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
255a7cb2f4aedf408243e002c94aec16_JaffaCakes118.html
-
Size
9KB
-
MD5
255a7cb2f4aedf408243e002c94aec16
-
SHA1
088f0da28b113c6be0b9d1c0c015a2d28ad7ff7b
-
SHA256
7ffa1fca851a63fbc5ef716bb924b1042444fd80628e91c77efc9eb2a0768011
-
SHA512
58b4fb3efeb1c502cbb3584fe6008d0ec6f72ac4088aeba7b95c94fee47993ce7dff68269a7f4a4824f99afdabb4ed4138328629b61d189562d3e99919b85e29
-
SSDEEP
192:FHibWIyN1Vxyej9ZmKhtt99/rwceNonndZkpWHqZTc:FCU1VX9UKhtz9/YCHqZTc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000d3692ca9356e8107237dc70a2588c5426ecec96cf6c1a7f2c1f7a662f7fce72a000000000e8000000002000020000000c0d6d1dd509d4510409f7026b97fee2213655aa82f06eb6afd5409b7e21384ae200000008ff5711e5579ac611e396f46f3426b171103d81c10348a085a2d82966f57cc4540000000b2f800a1f5d15a20fb6de426bd8359ad5f858ca4bdfc634c4fb324e92f84fc7c1d7fb7df0a3c6f6c3a063a67b32c5cad010217133e17a9170e62152b001e68a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{23F25BF1-85EA-11EF-949F-EAF933E40231} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434604482" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70e28ff8f619db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 844 iexplore.exe 844 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 844 wrote to memory of 2828 844 iexplore.exe 31 PID 844 wrote to memory of 2828 844 iexplore.exe 31 PID 844 wrote to memory of 2828 844 iexplore.exe 31 PID 844 wrote to memory of 2828 844 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\255a7cb2f4aedf408243e002c94aec16_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:844 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d301392e4de67d89cd4b15b4e99319d4
SHA14705f13d039dc9c5c223b366a4c34d508a6787fe
SHA2568b9a2c8b330d79eea61e9331412187eaaabab81554d31812a0e06c0a8ac2ebbd
SHA51254bcb0e6bfc6174e97993519560af253ea8d4ed210a698620000359554305585facbc885b1e8a81e2a788dc3d25a2259d17b9b79b9b14c12c3b89826fa8ea94a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c5447257308bf11e417cc3906069115
SHA1e1f92ee9388f2e30b40c25c457662c2672b9c1ad
SHA256ed393c5e36db0b729f8fef3419840fe955c552e499880badbbd8831eab2ee44f
SHA51233c4bb31e3fff46e6e8792075e56759e8bc13cbaa626095027c93e5801886f9eff73e7d88e0a3ec9d2a0a226c82404c66fb7fd4263d6dff26377817c6faa7c5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d63fc4d9179b92abdad65651f6193f74
SHA167fe3993fc6d3e0411fe751d5f58fd592bbc9265
SHA256883bf46e94e00f41cd14bc14ae8804e92273281adc0ddbaf6a5f38f65177e5d0
SHA512567da41db8446ad5815b099b97ec85e3c1995b006408c8aa29df399f598b8ccdb8232a5e6c694476248f99e804975fcbaa20fcf505bc8772f498eff2df14e6b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f7eacec7ad2834c815d45e83166c52a
SHA19d954ff78a932e9ed3fa7a9e7146dd1f6506bd54
SHA256fabee38fc82fb06b5b97cb2268f94cc83a90c166225005461defafbfbf9f060c
SHA512aa6533913b0bb43c17a3563e97f84e2db10106584ecefb5a6ecaf42159f5860440dbf732b4877a0fa855ed715d4988b86c9ca5182436439e28e32b3ad26653cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555dd344747815cd23f6b0476e48dc90a
SHA1f4da5b2915844425689d5860475aa6e5bf9160a9
SHA256337957253f76245b0e10f9892ad326d81c4ba1c29f2f8c446f4d3fcca51baaea
SHA512253f4039878a3d901eed2a57b089701572913edf5767dd27456a4bca1433c5e53b1893e4583b9648dffbcd6a4a4d45d8b544f11d63938b3c8384f3aab6bb0adc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e49a76c25df20e7bf09135d808b6aa4
SHA14184659a1badf1f5647b91ea8cc2adfce202a995
SHA2560b4ce5d60d69b65ea97acced24b4c011fa5440bb770fd5aa251fb3a0d23fce91
SHA512d6908223b22f5c76a99af7a996c6d60185226496f418849150f52152646aa590beefe7f9072504748a99e959852ad9fd7714e3dfad7e8f804981ab342edf7434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53017a2590374b6f9fd9d351ce3e3f5f4
SHA13f80169c486c2b22b17530c428adc2f91adf573e
SHA256e4f9f902ed5929a55c99ad213733aa04002d08ef10383a67310a86744f3d1999
SHA5127017e4044816565ee0aec7696d6a99cb29b9c3fcb99b5a477f6bab6df066c72df1d715e9ffd4966499da8193f777ce0ecb543347c4132c0081f7c03d81f68156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531b4cd3ed2fe5fe75e5e84879a5fad3c
SHA19d89483edb13d4d46dd81732fa5bae488c8b4e91
SHA256210cac06115c3570c01fa59a969943b9cbdee8d9a8f6e99233412a3e185a8be7
SHA5125c886bada07e9d0dbc50579f987139356d53e652da3b7ac386f090ac44ded9e995db2c0022bd6fa48c638b8a073122c4b6aa6be70387ea916ac2582e645361d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e08bc3ca5531f9950293dfa78ed57462
SHA1f2e7de6795fba782f51366b3444dc8eb598df1f3
SHA256c32c0040be095847e90e15d2fe9a9cd761a769993d4dd82e50ae40fc5611d2f5
SHA5123ed9154aee9218f57a79868ea07ba9606abd2cb6a0fb05a13df60edcc03ffea1ff93a1ac6ab3d4ffdf384f52f3a891d0399cae5fbdb6a5a3398c78d536cbd1a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f334e5d1d0edd442cfc456b4f0977ba
SHA17728c8c278a8d1fc504ffbcae3d535a0344a84d9
SHA25643e7e4c28868213cbd06557e406cac9ae593d6ec8bd708a9e164f8109b0d7ed5
SHA5121f7ed3d9f0c62535694df50c319ed9c4bc57be652672dc85bff3a5e955c96f5ba7b4bc322dab356c8738abc573650e4c8f92ef8efdf0af0cd6bfe860e135e98d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519901a7e29077102ac4c7036601beef8
SHA102e356f414ceb617a9061849844a3fbbc91cc9bd
SHA256506467f81858915c9d822b04bd8bcc275fbb4e7952d19c69b5ab8386e3ee479d
SHA512dfb7e21f1138cdde1d922c7c5231375e5aa492f6b029dffcf76e1c01a2900866f4f20980cd28318bc13c30d5af3b435d0d2e9ba4d03ebaf2854e404c53608a3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59551636ce35b9ef324a565f81c47df3f
SHA1aff77aab6d8b77933f90fefc0397a60ec6cd8968
SHA2566e867b44051f5279ce08ea3e93c124cbbfa6c56dae87bc0618e66a6665722006
SHA5123d857f1472184a7f9f973661e942ea92c00fdddb635bf0c7487cf6ed1599bdcfa21b6c3af9401329a887702ca7c0ee6ee3fdeba31c6b5c6779795e951170b92e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c299f853be6c9e7b1b63bd0cee1bdc49
SHA1eb7620c14a65a57caeee140efdd5602da613c357
SHA256613fd206a3e2528b3a3ce14285b31dcdbba691215078be29748b1e2c813f6de3
SHA51258eba6ad8222ca7b787ba4427908d74fa295e22b3f36da63f50210d63f94f9380dd169d0d70d20f5aea9f83e3d96b713912b626034a7f36d2a5c5eeaed491a49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578138adf643bf533059c7b43dc7d835d
SHA17d01aee4cd9f762743fc14898f38a324d1a1c376
SHA256fa80c2def1d2f6b27ea4fd13e1e1baa0940906042c660a8eb44e45fbb21b92e6
SHA512d3df17d10a8e59bfc1e67ac301c6ef5fe88602475d4e5a5f1ed012ea1b8f712c52838e664622fe8cb1221635f857221fd68485b30196098dfb72ea0dd519114d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0eb8d53fd4e69e3b6f2991267931d92
SHA1b02e29ebbd7c4c85f9cd9a99c0024184a760fa38
SHA256df778c872e49c77a2149d6f134c30a962985a1816115f745bca1edc03ed247ff
SHA5124650b90412de6c74ceae71b33df88900f08f53fdfc55eb80544949cfecc5d0ad379bceb22970863030f0ce40c160d5b7db12b9735b4af86a89b7ba833a7b42e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd52778598c5c879fef8d6fb4fa0dc49
SHA12dc503ccc2765f2f965e978cbcb9dfe52236babb
SHA2565e03ccee1ebfd240b27bd16556379eaea90ae9c3309ee78a1631fe40edf58654
SHA512e41a39d1a9467d773ba30733c9f37fc4d289d9dadffc43d5ba628ef3869cd438a8fdc6a0fbc0015ab13d340767d1c58971030844f0d2bcde60aec176d10edc36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f93457be89422ee739d1c41dd9d5c1e
SHA1be0d2c9b29ca64fcfac8ac99b2319d4d15ee994c
SHA25695d1286f0ec5a832d3c587bf7f835419d9c7d13cc24d3cb301e33f94479e8286
SHA512846253a68aeb59adb55ad19354564019258a85ca57ad8e72fd55fd792fb20ca33401d29ce5bb4dd8516ee2313c37b850c827846c5d3874eb955b61ba624f3e1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555302a348bfb16ebe9637ac16c13cd1a
SHA1bcba13ebc28175e14b467c91e5fe6e8dfd73145e
SHA2561b1f4d5999c9377db0bf56edae97a0551c1a09edb80a8c584eac6792a33d58b8
SHA512de43724e452b79f3df758701ef4fba2a42bc6aec6494eabcd2424bcf38104cbed45ee7174d356717094831f352fca4d6aeafe3514b5d0acb2e5a13316f2caccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544fac57f90f911c5148f48bf8eb5aad2
SHA1db5cd57051632c7a7febe674f6654b19e6389b0a
SHA256822a2da453763ac20f59641a57e01db337f88d0ab8b88ccf9da8c3fe59d7d6fc
SHA51216230a4909d59dc3d4ef9962c17214747f549662632efba50ed3bbf86badf34908693a37984580f86afa2343e199f66f3b3fbf8dc837e81ed97111a2f4662de1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b