Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 04:56
Static task
static1
Behavioral task
behavioral1
Sample
2b3edea9d4278ae4769471292bea31a2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2b3edea9d4278ae4769471292bea31a2_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2b3edea9d4278ae4769471292bea31a2_JaffaCakes118.html
-
Size
6KB
-
MD5
2b3edea9d4278ae4769471292bea31a2
-
SHA1
2b3986a3234d10b2f35724a079aed2dbc290b777
-
SHA256
b1840f5570fcb5a14cf5ff96223d524671a3a04d2ccaea959ee7d0839e1a5f1f
-
SHA512
476c014db7076c70e5c09bedb348532c64b6eb03c2de187088b39e06975ba25c23112da89ffd337ef24ff42276a7e5110292a8e0fa5bd453790f66b790546ffc
-
SSDEEP
96:exDJ19ml10j6xjLCmais+CgsO/LTfcc1nkqE5z9IfyMzAUhgme:OD0siXb7cankqE5mfyuAUhTe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cb9f58f1d82dce47aaf5710e050ea1f200000000020000000000106600000001000020000000b7126e18ebce542c1bc6d09ce973576e9de854d33ab819a8ac916519cae67485000000000e8000000002000020000000d578cd871d320f95068f3aa54d9806625a6d4ff72faf235da18fcebe2202aa9720000000294c52966a7b9e8a1c044534cf9dcb8407d0c0b8fd48b02421375967c93964a740000000637f91b0fa41adb6685e8168a13c06e039b450c8aa389f59c89c92cad2bc15b76c881dd7a8dda12e63656783e416c75cbca5631ff5f5a62b65fb91e5498294bf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15410341-864E-11EF-A3CD-E6140BA5C80C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434647407" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0073e7e95a1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2720 iexplore.exe 2720 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2744 2720 iexplore.exe 30 PID 2720 wrote to memory of 2744 2720 iexplore.exe 30 PID 2720 wrote to memory of 2744 2720 iexplore.exe 30 PID 2720 wrote to memory of 2744 2720 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b3edea9d4278ae4769471292bea31a2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59881ec88ef6b251b91be9ecab01f1cab
SHA1017ff0a52784c9c5b7659a629da0929fb6521fc1
SHA25678ba995bb5324fc88fa6ab4e1f73f4d1e5e57da45ca6ad43c6478c21a5cc98ba
SHA51287e41db37d7152b8d02f8fa99e01b86d38709716d2a92401c66825184b5330354a6cdc2fd518078f125ad1f5f54e2b90065c0075ff9c2e748053aacadbeded4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8890d0ecb840194eb1d7b4446d53d2c
SHA1eae36b2654d2d0fe0d62e8d7341fc9ffd15da3f2
SHA256f7ebc3abad12bb7f180e1aa131a13db79b634baaa4411f34ddb18003edd322c4
SHA512a1484b0f105d4886e9bceb9f0e37893ea6b5171ea2a4f6c2191da2e397f8903018aed96b92e9cbf5e0375e0f8eef0e2322be1932130f3c02c9dea150c0d97138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdbdb2866c184f1d491e6cce9fe74d59
SHA135bbf6a9a0c59f1e01c2e7dee274ae9988fb5afd
SHA25697353a6f0aedc56fecc8a02966d4803266607fb06737451c91ec25b10331ee3c
SHA512e91c5683ceef9b2c4c19007946d8c0ca1bfc0692db6273b17f4c72d7abdfbe0837f31d321100f0ec75f9dbbf39cf6ede29a1a63c3dcbc46a02468354526a8197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5759b46c1c356baf3e344073b8c99830d
SHA10252b4ab776141d900eedeef80945959eefb5bf1
SHA256302f0135569967f503260c02b9af63345272a70095d3e631dfb843822a818d53
SHA512f18af3ec79dc188d62126be81ccf47d9d3c5ea866a2ed1b9cc3e06cfc458e3d1732754295cdbde43754eaa1a07d90fe3a8a0e75654233892256f7f64cc33575b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500bf8c649a7fcc53290cc6311406ac87
SHA1fbd4871386b2e533ace94eb6aadacc39b65a856b
SHA25664447935282a5d86fa989125b590800e4424337f0e7e760fbc412b3dde0eccf5
SHA512ca8274792dbfb067d03127273375b3694a42862afecab8215a56a3531a7fb321bac6bfc966150a6bef1546ec66ffd50a54273dbacda4e639a7e0cb3c91d6441a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516152a490e4d1141b6dd6ef4cfa9ff60
SHA1ac9440f171b959021eec8344e5d98668ff575c3a
SHA256b3e7231f6b88db0236004708830f25236f4881e4d5ea8ba3182902c3f5f48e07
SHA5129b119978c16f91e27e8881196ce09b1dce016309ba3c553a9e49cc6791b61f583e630581682d642a82242ab0446721cb46a0fb0e50bb962fc76e8bde31dc3e3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52659fee3680d6718d39f26037c3c1eea
SHA11955fa084b3659c8a4043bbf4803a4a73e9b8fd3
SHA256307ba17d199fcbea2f12ffb7f60d343a91f591d9d7c954ee66f19c339ae859a6
SHA512afd2c99647992e862bc62bebae06ea47561decc19a08ebdd2b1be53475fa1cc4f858d511ad439238cb371c8d2543658ab08f5497cabc03bf537bac26c0da392e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc81fae1be3c77d6ab76caee0f03c40d
SHA1cde54dfae306f314e665654ac34ab24b7efcd198
SHA256a8a086c7a2ae4d3358afc75574da104ea8b251d3f9d696fdac6c3db7ec85d59c
SHA512f7e05667785aae93ab068568989bbaa5645a1f44acf50e40e157a9d91e7f8f38d1f1882a344125c796edd4420d0284613c2ce5bae7b71da7d1cc87caf08aa3e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5219944e55729b996e83eb2463f119a52
SHA1e9d17660b06e841b80d0cd461689d7d6e1fd80b8
SHA2569720ab898665db02e88262c1fa62eced400b4816195044540b4eaa4ee9529c20
SHA512b9b05a5de3364ad89e8e09783b3e395017be30f2bd020f16a9a8f860fd26c26c12ac82b6df93708f88c5bce7a0a67245e25a1e55bbe5a47f8349d7743407575d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3f60a495a295206745ddb6ae00267fe
SHA11377cbd27710ea224eb99c750f753ff5ceb99528
SHA25692d40afa228cd70f6929a214fae26490f38d8c6d1a3b465ef974df537b9f47a6
SHA5121383c974a6669e20d384b6358dc8c61940ce6c3c7448d50d8468642a740738c486cd32d0366b2e2988f5926be6b1f896568420db3b00486b9acf803b93e115fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578d64a58b1bbcdec438e5abfb2b3a6bb
SHA1c004bf4192fbcc37042610da977128c856f30970
SHA25633969220f3883ab6c0aa50f968030b0557ea1580b6fe4a85ae365a844f0bc764
SHA5123f04c320979e176c19faf8ec9fc85d81fa886a739f62351bfb8286e250d7be453a2c4191d386173c3d0c5cf040db5fcfb8d297a837c38b7adabafba665a0b8b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9aa20638b996ac58a59046a49336624
SHA1ffa4611bb9dc06a77b9fdf28d81f68c8f09618ab
SHA256f58bd344a8a2238df2ff4ccd0820cfea4c80fa0e774a0a5dc524896deaf1d32b
SHA51286c9677e11c6787a65361342261a037d77947692499201deb8b4e31ad244fcb300c16266bdfa8b2642046a011fd440931c3b7b56acaeb9867c4269ea10b9e427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ae6e7203e6f259b22ce23b1176eb748
SHA1b10e0e2d37b5b6228fd1c21356613c31c1b3919b
SHA2563ed0a16a4ecb22c7b1767afc2ddfa3883a521df2df283adad93cb7027600312c
SHA512e6744afc6e90d3e20013f458815d38e007a8b86f92a7f4152a5443fa46c300cea209bab58d74bc911af69fe454469bc9cb23373b41eb0b645e292e118bdd22cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ae7873346784c042dfca7cca29e687c
SHA1eb4f6216a378d5d579318d3731f9002975f9c723
SHA256d12246de809e0112aa9e47ff2269a1ac4bc13275ee3a6d86f433ed824f717968
SHA5125ef440bcf078a1c6d8e206a6ea506b15344e5b5e409f69ea25bd2d17cc6d2d13de2281940ab4ce6f7aa07ddbdc6bd435c31f37c0be51f3c754889aadf4873997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513d8d7ecd99b07bae809dde85fe7b143
SHA1e8bc81ffb0d3e6530823d80b8932d7e529308988
SHA2564d48f520858d003608a724294a2bb3a22a55509f75a8e219b9dd13e5c2997b7b
SHA512f134aa12d0550510d30f6248941bbcb39c5114033e6ef69a0870cc4349930c1e5eac8063664469cdb9cfd8519c3d829b96a42a9fe9067e03cc3f4d8f41b1ae31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2c5ab215318db9a25c7623a4e7f0343
SHA1301df72f96ce81295c35d403f9cfbb1397426492
SHA256e784d8da36fa227700996bdaf847cb3afea93c6dbff303f23d6ccdac568faeaa
SHA5126f33875785cab2d0ff0556a8b80e32ca094dc69a4bca76d4f54ee44d56529810008e4e0f65a54a2ae0fc265cc86c1d6957efc81c54abddd4776efbd473628703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5799c653bcb30da2d5c2aaf5dabfcd0b6
SHA11737aea92e03b6832b7770f73bfba060197a6536
SHA2561391ae7f26b8e3eea647e66bbb06d192866036a2ec4e9f065a56e0652b7fc174
SHA512a2a926e2c0ebd91d0a17f1d7a3dcfa1e42b6a976feb0551a200e4dbdc0ab2a589e1a4fba838409cafa51100764ca78d55a1f084b40a98bb66303806ffdbb319b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e790f3f5b3c532320075cff6c1201b6
SHA1124f499c9ca1fdeb376a95cb7471bb74817d63b3
SHA2561d8a7ab4425ec183add3c9a78171de1ce6877955a34a475887285c933dff34df
SHA512ea8843aea3bf3c947e2cc28e84ad32fc83689fe183901062f4110047ccf115f9d0c36ee0c528cea0330da3fa5cc4195d48edcb1baed35188220e1371ba7a7aaf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b