Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
278010c76ec9c306762b6bde210329e7_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
278010c76ec9c306762b6bde210329e7_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
278010c76ec9c306762b6bde210329e7_JaffaCakes118.html
-
Size
91KB
-
MD5
278010c76ec9c306762b6bde210329e7
-
SHA1
1c9e68ab3feeecf17482b09fb8fb094716489b74
-
SHA256
a438f07246a83d82b247916dbc5fd7261463de4199bce819751f489c8821e46f
-
SHA512
bcfd602f3c9ee14cc4ec3e75fb8ef656e75e66cf4104cdb1b675be5e3761c8170328641c11b6fd781ba26b2915a1129342cc1321d338e21319a7b969dbfbba58
-
SSDEEP
1536:gQZBCCOdTafDe90IxCw1sAhfeDKx+oJaFbOYTgCBGpHTojElpKt8QNN4JE3An64z:gk29afDe90Ixt1sAhfeDKx+oJaFbOYTS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B73CADB1-860E-11EF-B0EB-7699BFC84B14} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a9cafb76a646fa4bbc548b84119c5fe800000000020000000000106600000001000020000000c556e0515f4397891484f8be2fbd03292164f9bf05d96ad9e642f20c4ebe64da000000000e8000000002000020000000537a60ce211af33d57cf71975ed74558f5972be1584d543bf9050a4bcb409b5a2000000010852d47627b223f493580e0065efb4dc8c8c74865a5c2808f87ef09ada8ac1040000000914ee6094afe45412b11b72f0c009d9a12455e6b796cc3d93abd251c6209eed2f3be6be1d39f72f20a697ce7682ec75657555d6fba1e24045fbabda2f96527f0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434620192" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c2668e1b1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 1580 IEXPLORE.EXE 1580 IEXPLORE.EXE 1580 IEXPLORE.EXE 1580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 1580 2248 iexplore.exe 28 PID 2248 wrote to memory of 1580 2248 iexplore.exe 28 PID 2248 wrote to memory of 1580 2248 iexplore.exe 28 PID 2248 wrote to memory of 1580 2248 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\278010c76ec9c306762b6bde210329e7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ed0b5bfcbea5716b134e03631aacee7
SHA1e3ca6a6d886670997a515b46f064945a6bcdf49d
SHA2562cbc2d963baa8b2091c84363e6e4e5867f857eee2e94774ba230dd465efebcd8
SHA512db1a2cc04094c2ca6986a6f0687525581fb7da6449cbd42bc6ffb5060c7f81b4de06bf3f7070d1d50589789dbd3d0248212d3eb4d321d1ac6775cdf0d2238f82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56296b69a44d75bb580e9831a2ddcc189
SHA15c50cebbf20668830e3a7424528ad0cabbbe708c
SHA25662bce29f55fef2828ee6dcce93f71226087ffe55e8e75bc0c85cf0a4cde19853
SHA512c8a4cba1e7a1f6fd19a5206c2dee408e5a9e592c10b5a4b4a28e405315fbace8461209b5a69455be81efa3235c1ec5e344c2ccb7673751f43c18a2a92bafaf2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c44a1b9e4e3775d22d02cf200c2ec1b
SHA155e438e09722346bd59914b6e61c0180f0716add
SHA256e5f6fd8cd3465b2b86f5446213708f38bb3982e33f8312b26a1e349463d2de0d
SHA512142020988b9868e28a9e92d66ccec9741beb60736bf91cf7bb03b0ea27197b40d7be6a10a7b97859b14db4d9bcb1f43c71db4ec7da9f469df85d0a6ea8181f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e636f8b7fc656f0c8d0854844d4ea331
SHA1ca3f9a25018f8bd9a6caf20dbb6ab5a7317970db
SHA2564ca4838b8a97ee1eb848cf7d638b03fd3c7494f9d37555cd9bcc93786d713743
SHA512b14ee5b8ee1421080e8c97df4385b4a13a3851cfb2a41fcd26bf278dc7b7032b73d04ff846e3671f41afe22c4b7d6b8165b752c1af3136da58d205cb622728a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565800d99c47394b5ba6007c7d9727af3
SHA15a8025b9d45f2ff40c986b4fa9d98f61daa8cf93
SHA256d092dbac5df1ff9c8a363df19fb3f35a51cf8064468b520497cddb44cb995c3e
SHA512af002b1d34d5998100f895e0a1930a20dfe745f62da5662013f817c8ec873f3234611a5c5ca0160cb8d66315b0bbf998ee30594d9d5ffa06c3e77930c891a718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b7e77d8e4c952ffa71817198a938c48
SHA1dfdc761ad975c857ee2617cd487ae28c5f4f5feb
SHA25635f2e33a3de27ba620dc8926060b1764bd4d274c4b478a25f677d2fef7f1b458
SHA51248d479a8026a2d7a409bf9414ebe665952d502591ac6e6c33b2ada080d258f83d7c5e0d2a6080d1759d8b7ec3dbf01ea8a71b8d05c07f6967ab3703a8642f4eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f37432027de8367b787159bbb9508068
SHA1e9b0614c1e3cb3d365d6f56985bfec4900b4da16
SHA25674c19ae1edad0c1c8937bfec975b8ba3a5dc806dc4d00cb4d7699787015ddaea
SHA5124581707978af7a20ab820b2bc37ebcbc82b0d465fba30b5c66f1a5bdbb5867d9a7aae0e356f3f515ad1862bd5210d672bcec2f6eaa7069953da5f2e7ac7f15c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c658a27cc65c1cc369d04b64355c1852
SHA1910f06622bb392a69f7dd8b63f1f6d886d6e0e57
SHA256ab1fdec2ffa4b007079d16b9a5bd70a99b958b0baf30615981e73b287f1d5f4f
SHA51230a2ef5bdf10d1bd829d147bc9f70d2a156b8618379844c6af425a66f027dad90238422756829fcc28b23ad24ade671b4c11d06ed34739fd96a74f9a3a611b49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55969da935d10352df825f59ecdd4a66f
SHA10516eb7dc2db2c582cf77b97d4e89cff8e071f22
SHA2564359a01bce6d307585a4871e81bcd8f7dab4faa3ff20e5a7d98ca3b721d577e9
SHA5124502cfd09512df189367d242b627906ca14b61d662c1901e128c13f1535578e2ed9f43528d3dc2034ef0b7ee150d00fd47a9b551f0738bf860c0d10e709af2d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a717c56ffd41f5486a80f510048f00dc
SHA1667e41f08a8659f16170a83dfd52efad1ea7f4ac
SHA25688ced3a6a47da3829c17cf6fb2f63e09824ca222d4c2e92d36d68a2aa311f06f
SHA512e76e6bca32a8617ddfb5a541272247a967d089fdf8d75b4b593c2837d61171a88daf37c489a4e0b4a888953f7c6372103d074f0ff68b6d4324c169e5b675be7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4520afbe049baee1bbb9d97ae3545a4
SHA13854bfa47d4fe2f402874d15f27df26354842f04
SHA256bd11f2424d7418748ebdf984b030113f0ec3bed77fa5574580406c43ea4f8f39
SHA512e4d89d20489a1dbbca05c41183303850e84960eae83471050db5cb7ef27b764e8016708388bc8e1bd6639fa9896bdb7be612b5f64db15614bad568d3ddf854bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ff7a332fe0da60792540e9f30fa1537
SHA1541933044fc817e62984cfdfe88097759fd2582b
SHA256378a013c0c57c7ff862d18ca15a49ac6e8d285f1b12810bad690c6edda6ff129
SHA51266a962a35dd96366a4a9a4f038c6502c965a14bc56041416c5ec285f2edfb73525c8ceb0003f8233c48c676dfd330e7f05ad581e41eeb9faec4c69d6decbd5f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5028dc847ec71a7fcc1bc68f5a87e29e2
SHA11b18e9902874e559490486bf11b505ceae5ebcf2
SHA25696afab1803e8232a095921b08155650a5b312312e071413fa091830224dec383
SHA512e05861519117e5f8a2cd6dbce7360dda9290614b6e73d4dbcd071f1d68038d323e42ad9291680d6b67ca29611ccf6bf7476185c5f8773929cb95a49bf9d896d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de1b04efb52109e42d59a5a652dd17bd
SHA1c35b4f4641d6619dd17567dd4f1aba558c7b6159
SHA2560a02bc3b6b54ea977cafedeaf32e36469ad956913e4b2a0093ef576fca8096fc
SHA5121fc71583b1635f278c8da33cc7534d8815e7a5b57b0174302be4adf7f98c37a2edce1b9412b5d209c042c80859b01747ccf1e78208459495f6d37239df32531f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50626f70b5df3ebbaf2357aa6a616d878
SHA178498a127ac41eb6def2db7e25a459bd26ca659e
SHA256c5283a51ce939423ee6a9a9105750d0d83f31018d90eddc66567c0de5ca52809
SHA512bccd1a188727e0a04b02e1c7cce7a41dd1d2cbe39a2a23a3c902c2c6c48833fd283ac198b4be53fe49db37656a52f9d439ff8e30a42f207d90db9ebf637e006e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aee6c3fb83bfa6da32c955b874495c1d
SHA1ac530f2b98a113c682a4be18fc6a976e30403997
SHA256210238c26517194836ef6fa4b3197b1f1106cc12dad471905e95b419e45a07c2
SHA512c81465ce223a96cd32a8c6be4163b4dce12a95d92dd66ea4e00ce7fa9316f849338b7273480995b58962e5cc1d53532d2cd452df75ea2f3695fc867d3f01848b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5349fb35e6c9b8f8f8c534e36895060ca
SHA109fb154e6dbf2d97fee83ff711e46bf358f0c2af
SHA256eb52de2f0c9d21f643ffc7e1cea899a8e0f4bac503c8cc98db60294c2e66be87
SHA5124737308e4f39194e8cd9bb6caa39dd053141d138ccf149ea391957b479763e759864946fbea602bc70c02c4123da525a2c34f0299944d4aa894a2e91a7e7bddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51504b061e324e383e05713d29a0abddf
SHA18412e4bc32ac9a07bf0c5df31de3b53e3971db2a
SHA2566b4b876d7fdf8ae960efa7fa6f3080321b31edcca0cc2886b74690c156d7ac40
SHA51231c7119a01c8beed2b20aebdadc2e11bcb0772ee7c283b52193f54f912c293b4a4480ba20c5ebca5ff7b21d02cad500c5851881f275df8e1561410635181208a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9397aee4e71ebe81e6a524fc0cea91d
SHA19f9e0a77d88c4942c63fe52c9e4546bca004fc98
SHA2563a8323a7fabcbcb68b60f2cf4076113d3b34b5bf701a35dc84b18c4855fb8c62
SHA512f4280033e2fe12f7a3c9ed792de23462c25457c76c3c82433818977732684ec8f24f27a483a6f600727986aea14208b2cf45b30e4358e9c2a34bc6e6a7da660d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b