Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
29a9d38915a0722132d15d9df927cfc5_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
29a9d38915a0722132d15d9df927cfc5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
29a9d38915a0722132d15d9df927cfc5_JaffaCakes118.html
-
Size
37KB
-
MD5
29a9d38915a0722132d15d9df927cfc5
-
SHA1
5fa9d35f29ca47fa5f86b1f595f49ef9cb59d810
-
SHA256
81c74375455c20449731f8f081c6b04e292c038d0fc89fabf1466452d4cea8a7
-
SHA512
01b480714e548debfa562aa6ab051f8fc84cf2e227684743b7bf29638499dd788d515230d089ca1bfc677ee06eb2254a61915258906f23501a265c4a21fd83ac
-
SSDEEP
384:2ytmTLJYFqdpUO8CufxMMWDQgaUBmrFD2UCUk3O9HtrmnGlhyrk7vDi5ci3fNOTM:2ytSXpUlgaUBKFDCOHQLrk3i5VeWbxj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c534c13d1adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434634881" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB1CBCC1-8630-11EF-8EE4-42572FC766F9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000003e078481fd01a5f836afdc0ad6016a1c374211e95e356c6714e361abec7257ba000000000e8000000002000020000000904e3afeea1c72638c10b9a80220b7b6e7f237cfb14752601b0b1799519c9e3a20000000a5e27efb9327fc2e4b5cfacf0aa7aacbde79022b2c3661e21969d64d58795f0b400000004d1f086c097b002f26a73657401c51cd9ae33b83ded1b6049827711e04f7fd214df9b21f9845440d973fd0b023a68fe3949b03b6ea754e017be1e03231f166de iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2036 2372 iexplore.exe 31 PID 2372 wrote to memory of 2036 2372 iexplore.exe 31 PID 2372 wrote to memory of 2036 2372 iexplore.exe 31 PID 2372 wrote to memory of 2036 2372 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29a9d38915a0722132d15d9df927cfc5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50787dcda23ca988c1fe6900d63e47bf5
SHA118556831943693527ae9d087a0f31fc57f6c99fa
SHA256631ce4add7f20916f5a1b22e4eb90b909d2a2159036f931d32ccf211b311ba12
SHA512542e60c7bf52670f6a3b53ced2b521e039e4ea1ee60a5e62932d153c22f0834ed18fe1b0a241f22043b73bea5cf5b40516db1fa00cbe8fe2700b88b89a47409f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b517b321d8aed5a1d5497b230c3f554e
SHA1b68b3c101a5928e3e2858c14cb175fd354003bf5
SHA256ce8d8efaf1dfaeea90e3f3a0cf01b890edb739d8abff0fc2363e288f01c1c9df
SHA5127b75d45f7df07d009179a92694693c111623af6e42e6aa07d27c19e5e428f92b1e7af20b557eb58bd507522014057bb58487cf1152807105e7fbe870bc6f7b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3dd64f68270b4aa86be4a1fbb0fc933
SHA149288120d426a7cb575f08d67f1e3cea2dd352a6
SHA256e599728acfe2bc5e6c371e2c2db0f64b5a8f84f6c4606eea636b4f6fd778aa0d
SHA51299d67e75917e64bab475647af3ecacdcbd5f7b85122db0938bf6c2dcf6d657dfc27c1b7b253a80fbb50683f565f8f1a4279c70f8b796c9d6850e0cb0dbeea910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585b2ce5613d345eeac47f37490bd729f
SHA1f410f7fd853312c1192724a27d810484085aa77c
SHA256893b628f2d444bab765bc7f3eee027ed88da62d5cdd24cd90f0d50bbea3ebb20
SHA5127011ab5c05770f3f08f6991b4910def545461b53500492c03711cfb33783dcd3009f75dce48880e45d5d74fd63e8b5382a323a3d49b2b2a57fea43ac88569c03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f28e20ff559359a1eec05443af7142ba
SHA1b69ab67294fcf4a67a89e3e438d55683314145ca
SHA2563a61e26f029954b8e42a91016baf3577b19a25c3b93e4bf4c85f5f084cafe5db
SHA512f27e23f57d8564069cade968e5b2a9e297c8e6ec994dc1eb3f067b91b675716b6385c91740936e0c27a2bd6da2d5abf0f8ddeea6bd619da3fab98f714b9a0a99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5055450f6b9100143ee7e7d903cd0d76c
SHA10bfac97777a524d3fe2e84151f5e8484b23effd2
SHA25640cb9eda57c078142bdb89c50bc8eb64af55505979deac388f372f0911203fed
SHA51289c0f9a124fdfedc11213c220566417e4d17fea5f7616f1bdf7c15df528190073f5c6dcc9c8c508f098d1497930c16e847412dced8729f098490283e275513f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c7651bb4c620e2eae8b3e0d5e485098
SHA1d74c448d640deb2c20b6171b9579be904594b319
SHA2563ccb8d4356756f41656bc1508fd148623ea5c5ebbf2c1a4ab1a1c1ab6a08db6f
SHA512cd3a942de4f32b16efbca86b3fb43c0fd671de241687c33684fc5a5ce8fae250607f874c739ed5d9888e4e228405c12de3a04c952759f4ccdedb102c345330ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9b24172f2cb3d28f4a678b4ae75d539
SHA1ddbb094da55214a53487ee7193be9ddd64a7b141
SHA2560d51cac55b9b0138a3f7e97cbd8c17ac8e097b7b4cb01b7001b4ef428d8432ac
SHA512e2917bc7f0756000e6b0fb98b551a358e8c4f97b592c7d79e217fcf51282435bcc522738b606bc93bc9a7444c0d6f7ceb545abcb3283361079427acdef28d7ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573e8672fedb108958a2dbb0ed1f8fccb
SHA12e49b2cdfee6ee6916dbc806458bfb0c407066aa
SHA25636999964e057dab7f78024835091d20f5644233ae91c552bd52dcfc0772c60c8
SHA512ac1f843925ed5333b8e7269dbb8fb8f5b7358491fccf715be36f7d4f85622c566269bdd7901c5fcefe8b47002c1d7e9c1c79af16fc573eb13e4e2a40000f8de2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ec0f249dffb83ac6b93fbe448b4b1d2
SHA1592f62a9efa610a380988a6e213ca55cb7cfe84e
SHA256748e3175545bb89932311c6819d0d06fd2e888eef1e107e770c0541af2463327
SHA51211f4b293f2b36e51ea6688a928ebf9bc08069b61ed9b04d7b1ad1b2afd9521ed0510abf25bb069da7e38cffa3ea7012eef7042845ba96aca440a577f5182e07f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574e81d8917a58b8f63490be73a7ffe6d
SHA1bcd360e3c1fa7063f444748bde5b10111efd604a
SHA25689e0bacfe68abfa819ff309de9d98c12484d51d763c62e85b09a322ca62e7fe3
SHA5122cda6f207cdfeede41dd76e524b71e7c76ee0a511b42ecdd1456a74a45a45a2ac4205c796dc9cf87afef5f018d1f6b3d15cf26d42c3ab710b676ff4ecf9d53a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b538131697e071b8b077ba99c9d7d87b
SHA1f3ceb9eb92a1e46ce25e07d22026534f18d42271
SHA25635db0c2df55548e67ede836ab8e9d578aa9ddf2aa790ee44281ed234a486f5b6
SHA5124c5516e8d7ceb10288e5db9588ed0a4e6a707ff370875433bfd0193b99591c47016242886c02724ae797283a47396560f6b073da92d4d608ec63a0b6640d9780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f892c6a01bf695f394da0780fe5a153
SHA160e309a9dc62f6460e3f526b5e3ba641fbe13fde
SHA256179ee4f761d117882cd25583d7e28918fa0444c6b2fa9889f2f854fd3f28792e
SHA512bbedfe5204a50665ef4e8c6e9beb889cb5a718d69d0bdbd27f4865fb954669eda88aa3affd9c0ddb05ec0db50f96b64d14c0e3ff23df03bf596d1987d575cb3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bf5adc478732d196a1388d00e02fc0d
SHA13a82b3cf21f3509e402a6d0c36dfe4949a338cf0
SHA256d2cb3e43e9d08d8ad64d1f9847dafd47347c4f988902b1d201b061be585ff3f8
SHA512db5d9d89b582ece865d2d522aceb1d978ea3a4dfd03f16b139dcc6e6d8167914f3a678e7d3e0361858dda1f531f3575471dcbf878b4d8ace304e091587fa6975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b2410a8546ec2314fb18adee1ff0d80
SHA1bb320c3b92812facde65693810d70e254cf35353
SHA2567055f5be5bdf77bd34f59b81c52ea238caf250e6b49c583d92d8476aa4aa2ab3
SHA5120809566d2e9988795614cd530d156cea15583576c5ec774bad5269f8d8f2e4a1af69b9253f22622f842f6bc07b57f27f6c24e1d44819d8f985e312e29a9523fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d55a235ab3dbf93f35ba29c84e5cbd3d
SHA1679b8401b5151e74ecccc10c120c9d5e629295da
SHA2563202f3843cea9f0f098b587e1caab3db23b7f2a23431301cd4fb190a173b73d9
SHA512646feafaa3f7a9fe5eb08837fe957933651f5d6ba6e3ffa3f5c98b66d5d783bb15394f0bf0c9933859ed3a3efca430ded4f74a1286ec88a9af1a34bfaebbf574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53acc3c58c1664f207b0ce82a7cc1593b
SHA156515f88bb1b960a5ab769580d9c84b221b3cebf
SHA25628a21c9310107a63193f63d424f766f2a761e72a1acc80d52a8485342c15bc3f
SHA512012a98d07fb622acdf6d2d5058c33e67e0a2772c1141f7f13da63bfc121771f98570286696685ff3a155cdfd92394376db3eec082cedfbe4ce586fb425154a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb943425701673dd2e481c859545c426
SHA13835ef0b91edcef37cc7432f1cf2e99bbd65cc9b
SHA256d3c0f26171162bf8a383069b5b05c4c973fd34002ddd6ade58162a9f0e6d24c5
SHA512695f0fbe3aec397ced76a72a3ab402e0b9e100acb5ba057847397150a49e6905e4adcfff10ea6435d02a14c7735a8b11bca5a08d6408deb7c47c6f0426c90a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59176795be5668496235586d7ba6431d1
SHA132a01d94cf61f0e60bab08c6f7350fea0ed9bf6c
SHA256925e26b4ef49f7d8aaf534a788aaad1afef3e26cc00a5cd3294e551434ca7938
SHA512c6fa77012be7d2e2a2a160dcf74484217330906cc6e4f8e11feb55dbfd1b8dc0563da37ca701373f4ef601bbb82c5f5200fb92ea254da16eb81299bdbd2fa5c2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b