Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 06:50
Static task
static1
Behavioral task
behavioral1
Sample
2cbf2c095cc16ceb22d51772de070121_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2cbf2c095cc16ceb22d51772de070121_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2cbf2c095cc16ceb22d51772de070121_JaffaCakes118.html
-
Size
17KB
-
MD5
2cbf2c095cc16ceb22d51772de070121
-
SHA1
4f4f1f8ebeebe1c27a738f1827099733ae3c3381
-
SHA256
0c479616a6796d2741dd9efe6c9df5383de86cdf375d91d701ebb3afba0fa3cb
-
SHA512
cfd2501c465fbd7adca2aaf95729482a6df49a66ea7597e6ba7350c10fca65920ee4ce0d1385d326894caebd1567e8c55a9ebf4435d91fe936881d4c65d2f8cc
-
SSDEEP
384:SIwA3ZE2Og7MZhaXxcbBpmn5m5hjuyQ9KjBjS2w8nFbYSG9jpXPEOfCWgwCTBgW2:SPinObZhScS7HkEcCtd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434658196" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0f0000f741adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{33F914D1-8667-11EF-9A84-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000b9c747f83c57f4c2804d65143912938414f6140b4338e27012483aa4b7e01c14000000000e80000000020000200000006d3d9b1aafa549d3bcd4fd276c9c1f2096388425224b0c21095d6887bbe48fe620000000f2defc9275608bd6477b9e016a64930a3b0368623704d5c9d5ee089fcb89b30740000000eba90b6957d6637f6034098fdb850d7390f9d122526d165e268b9f21171109165c78603f836349da4be7c8768983310288f1015df059c34d78a201f5f3643d55 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 1844 IEXPLORE.EXE 1844 IEXPLORE.EXE 1844 IEXPLORE.EXE 1844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 1844 2380 iexplore.exe 30 PID 2380 wrote to memory of 1844 2380 iexplore.exe 30 PID 2380 wrote to memory of 1844 2380 iexplore.exe 30 PID 2380 wrote to memory of 1844 2380 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2cbf2c095cc16ceb22d51772de070121_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0edbe7af1addd3d5fdc07409c1fd993
SHA109ba3a32b92b391b70c7292678b2f7e708effb4f
SHA25668fbe3cbe6121cff0942c099d6b31d9966d9e6f08e4776532a21d438be3c513c
SHA5123a03bcfa736cf58ce138eb686fabd5894105b56ab7afcd4d076ae1f81ae49a0901ddf5366dfedd3042d7ea83208e0c5df2204f194edb88f7b4db4c9e859b38ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d03f35a59a49266bc2e49964501d7570
SHA109e14db05672ee118706ce3227aa43d8c9a0ef58
SHA256a5133e764258c5ad16a2507674097df0654aa9897caec65c1460eac1dd54b8c4
SHA512f1486bbfda294e3e21cfd64305a018eee540e8aaa6ede9aa6a2e7d7c55530b997435186bbc3641d80d0c5ffcf3a394fc3dcd4247d3d068f5a99250c41cbb2e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59379303ed271173eb3a08dc512710b42
SHA1c30d1f7bd6c6cf3f84d0293da7e39a7deb13d677
SHA256ca3620bea8e449917d7d0652de9111554462830ca3dc7ce90216f1bea56840bd
SHA5126a1471f7966c071c649193b5fb974940aa2a3c490d089e893ea5328ccf32dbd52c5b6a557327d753ba711b27a5cc9373fb86588fdbc062afbe3bcfa9d8640c0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3be2e48827c5fdaf56809a360aac322
SHA157bd97228b38e288571333b9c078a649567f8dea
SHA25629d39219cdbc4326be78168fd94cf0cbb8f1d018b90e2a58fc7d02ad437b5ea2
SHA5122be42ca806def0a60840fbab147adbc8b31bb563efc3d28a211d28ae541ffb10321467b63543efa708ce056c30d8c99fa8b2779dea01cacc54e63381dfcdeb2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c78d7bf20e8f5d215066576af8a68d5
SHA1560f95f79b81f9f7004f6b8b407dadaed113d7ca
SHA256abc28bdbb062cb461560f0c8989c0e1252712f019583dc50c29215d2135ed680
SHA5123b4935ad1511f6d85496c8ab47dee3220bb0ba6ad42d63f8d9f6be5d8ab61f4b1a03918a0a9fc361b5938ce103e3623a5ce92c6b45f703a2b5876be3f7468c15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534b6093c80cafea119b85897dd5e04af
SHA106af9dbbd8d33ac958762c2461ac85dbe8fd1d76
SHA256a13c03059fc9021ff3db8c2cb1ea2093a9ee15297bfd1741d10434a81513c600
SHA5120c3eb81ec1be1d1e8eeee5355a8c123601d8578f0b333463e3a896d4cf502204ae9bef2abdedbdc84d77ab6bb7ad48642d607972ee369ce57e7f31c293b1c503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1d3d685a442e15603f6caf5b01aeb82
SHA154062dab5ceecc0bb72dc661efa3c32cf581f880
SHA256296f60259b3dffae41bf8b75327af8bb9978cef512852d3225b2798b1a29dbc1
SHA512d59b2cf2050036e96515b8a6fc499fadeedeb7e3a4f1607b1c7b78c668a720b7509cf2c600a5b26fb8769e3579e824527934d5e3a21b53dcd331a3cc92650117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0a15f8818a2d55c27b966f4c0105fb4
SHA1e386619ddd64713f8a094e3173046543127824f5
SHA25672ccadecae17405c76a7ac0c0251c12d7bfa52869a418a35d04da8ae77b91d18
SHA512452119b7931bb7b5056e29d205f5d22a0a125eb1395cc45d565395b7ce1669ba86f0c1bfe556655484847cc6c7f087b9365889802853ffd09c0dd8e71da7df75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55999fe630590aadaf9c0628e689fc3d5
SHA1c7cdfe2ec9e3a5e7062e46298778824c49f98d79
SHA256c011d8d55ce863324deba4b9d0c05bb863c09f0719a24909a9bc8ddacc875586
SHA5127f7a1f645d76dfe8be90e20e934f642dacf11c289838dc4df2065c0189dcc4b7c9339f41f96146d58fd7ee948d71a72ef8bad016838077cd1f2294e00ddcb0ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576b5f4fbed661a812ade8f57a863cc42
SHA1812e8c751edc8168e8238b781561ebfaeed0f15e
SHA256a5ace8ead285c6646c3cfc4caafbcde151ed7ae8fab3c7667f04f88d01fdd7d3
SHA512a38e2f88fcc2aa5e10e77dde83fb023a01123beaac77078ee9889d7d0b04ea28dda9603e285891ce99f41dd4e31a86532df41fa3558731eac7ce3876bf2e0e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eb9ad8d6bac360bb35b04249acd31c1
SHA10bca25227a66326df745882c52e8598cc034041d
SHA256a37ee4e092c7aacee12da023ed7ec54e6c5473a7baae8b9ec5dab6e70f11fd36
SHA51255107d3af6d9e5a9394927c7216d777405e76adb61b8f5963d21829e316811c8bc230596fc959cb8803965c6a28380c86745ad45553aa7c7ee1e93e71ca241a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5306ad7208d800010f1b8a003c8fdebec
SHA18745d737ecfee89231ecab1829cb4aa99d98f59d
SHA256ede4cfe47a9de39f0f8e7ca465174de62545828a77268d47345892d942b38402
SHA512033bf09c5d060ec0d3621e59aaee5b11952290aad8fc31016d76d525b3d1f91484880131e78d4f18360386e8ea1481f4b7172da5ee53be87282d1426a0323eb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c127b4909e06201404cbcf693d5681b
SHA10d0ef43feef6101eea04b1df3392b83cb811fe33
SHA256af5f327b7b047bcdb53d57c0b598b6b6c72c1b7fb67e9d8355a6aaeb4c4e28bd
SHA5129da6295856e718f4263a9f33fcd92dcbc14ec7da5cb5394273b7f09604bf3c5d7e0b85606141f0df45b6475039514769e8f8447501dda87fc0753fcf5a619e45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2ae6db1baa653d87e0b73b541135fe5
SHA1470e16a9f6cc774c77f423175bcbfc695f9d2561
SHA256f43a95081757f42f39443f1ce882a76d0fb69161d87663a611f93a5cf732c134
SHA512444da231faa08f5aa590365d3d724f7b028e96ee0616c49403b5464dbcbab60b50d28183b3a72bfaeccb013aae7fd728dd700d40eb1543e9d063e79b7c710968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee9664d78899404d9cee5d387daea72c
SHA12ad3fb5c1c6824710237d7a9d622d6f2b6fb18e4
SHA256d27e0c56b3911e112e41aa27e55f0b76ed5a8ec81cad8feed7fc51a48126148e
SHA512a4c12170b8fad25c91cc2ce5256e6b0583368aac453d00e264eb276f26c3fe8f83148d8e18b7e7d5efba71d2f8231f1fd2011db2defab7984bd3e20d02ad4742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502e0ca15f0b5ee6e7bc973e432d389ee
SHA19a6144f40ba552f93d6912acc6ec85b092cb0fb3
SHA256da41b99f5f240d71461d3d2abfb6d07df6c40c81a93549563f07220b5335b3b2
SHA512c16e59bda234713370e6d7840984f88ecee5841480c2269057d5983ca298b48a96ad3ce94e80a39a38ae1ab7e940f996c6e0bfd333f0708d44c758581220084d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53691e7ca4a421cdeb5459a776d2cdfe2
SHA1db816b0a8695c9f04dbf84b5f4c860311d7f553d
SHA2566ea2d91675429a344dff1cf63e2f53f8e00f6dc53ae39508d2cca6dc4820b7a8
SHA51263691889112512543c165ec9170a3c07749c81c04642ae76666368495f3ad602b80339f0fc0ae9dff0578b79360ed7ea26b11827a03e9d2f0c837b0d1a32b3da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5905ceed7b0deab4449d6b88822c90f23
SHA17ced67b9b7ffe56b3b70535f4970827ac66a4f2e
SHA2568eb4c44b6e84c11868b8240d51ff6aa9dcea5cff02cddf2bb0624f3c568d3043
SHA512071f44e48e8ccb1ddc083b6ed232dfa5cbf47ee2d10eb8ba624f3b95aa2af032d6dfac8c4f7dff4470612cf7eee18f38f8670c684ddbd74612a5d8c3bc43ea0c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b