Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 07:30
Static task
static1
Behavioral task
behavioral1
Sample
2d3e105b1baa92b54f4e20b30f91f186_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2d3e105b1baa92b54f4e20b30f91f186_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2d3e105b1baa92b54f4e20b30f91f186_JaffaCakes118.html
-
Size
67KB
-
MD5
2d3e105b1baa92b54f4e20b30f91f186
-
SHA1
9f55c10f2f398d69d42faee2a27b3c04673d3911
-
SHA256
09969a90d2f306cf433c9b9fcbc4d98ad272aa0e8e0c9c4b437e0d697941c293
-
SHA512
b3ee325e94a7b1959c7dd5e13d2c33a41dc8fc3f78612141009b77704e59e97f89402e356099f3b250e221e68eae5899e75414ccd1d1d8cd84ab7df3e3fcc369
-
SSDEEP
1536:U+ZW/mTEeHuOvFc42NMkh2oDsJBctOiKh44rEyXG2KYMwfmESBUMrth5:U+ZW/mTEeHuOvFc42NMkh2RIwfmEOUMt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000007ff68814cfb2954cbb5d829cd07ae4e32cf46f9362dd6004780ff602c5e36954000000000e8000000002000020000000de11ee8f8c6a1456bc28a381cda80b8a7c400323cf9430b1780b132b0533668020000000e52ed05164c8471e15eef2d30bc6250e3f7fa83eb2c8995acee1431d964cbdd34000000074bf3b23830e0cdb853bfd1acf5e0fac5ac95f77a0abac7f9a150943e18b8040d06dcebde82e7af9c389332907d7b08dbef261962ada1fc1a1c6cc2b7e65311e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c20c457d1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434662163" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F63DF11-8670-11EF-AD26-C60424AAF5E1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1452 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1452 iexplore.exe 1452 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1452 wrote to memory of 2732 1452 iexplore.exe 29 PID 1452 wrote to memory of 2732 1452 iexplore.exe 29 PID 1452 wrote to memory of 2732 1452 iexplore.exe 29 PID 1452 wrote to memory of 2732 1452 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d3e105b1baa92b54f4e20b30f91f186_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1452 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d14eeeba5e7cc72a2109e0f31d057ee2
SHA17fe4712ff0ad3c8de3a63d1c471c28ecf5a303a0
SHA256b4570822f6aaf787d402dfd7c1a991699cfbbe85c050f0ed7ace3d734d22229a
SHA512f5acd719fd2276cf41cd213d9d62d99c99cbac5c63d63af82d8bfa769b3c721b34e21a9aa077d8b16a6c2dae62678d0926417cd19e95859389ca27c858f82210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b09ef5eed48ceb73bad4057cd4911bf
SHA1cd95131b1b7a82afce622c981bd8fe0f27f4b407
SHA256a318d326c2359b58dab5e32ef29947b2969dbb2a25abbf196455c306de0951a2
SHA512bb85672f40906691b25520f3d6450c68183ac2303d818c22adc4c3b909fb533ef21cb2cab534fe99e43bff532c575b8580defafa4f2fdc84d51c08b60dd2674e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54749178e07687750ecd34571e2ab8d9f
SHA1259e595923a7d624c3d04a24a306e0e7191ca436
SHA256066c437961ffe1fa127aac04ab5c236a382f100c8473b83f66495f4b2d53816e
SHA51294965ca72567694b99a96de267af77676e610f9c3b602b7dd142f587290a4602e922ed544341177703fe955b0b8003ae8e3a170d81eab48718a60cc5d3945637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54896ffb4510cc8d37f76757bce50ef90
SHA139c29fbcfeca1bba4d1c5745806dfec13cdb9528
SHA25635811035d89aa54122cb188c0f6de41ceb82611d2e2502e84efb93653e2ab75a
SHA51267f0bbf280c0bb3bcb51a6ae8b98bc28cd4e512e27a4db65a0195b451a75e9736b2a0ab16c2a3bbe40919a23f96719fe080cdc9db911f79ff536d04145e63969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580ac4e9faf0dbd1b126b02005ff5ce43
SHA12ff8546e3cc8b58704c116e79cd21220d306ec41
SHA2564108de6537302a77ac23c46ecabbaec8370ec5b64ccd1c6f8aa496318ccb0d88
SHA5127fd88f0385bb20aa4e98c0ee7b06b3978453e1a32cac7de33c2e78c8a575bc8d2970d655ed8dd222766510a5c724fe25ac797a4b0b571ef464dd4bd26045bc96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57515b5f96b381a873188d4baf9f47349
SHA1f907ef3b0a1db174b5e8e0265c1e5733234b5409
SHA256f262ebdbdfd5c69aecf30fd534ad27514968b5f25a9ce9a9a095a689b74a8bca
SHA512840b532fe74be4960ad8b391e8e962ecb0e925201ad8131757705090fbb144fb29ac9f3101fca36efd43c09d5510a86a0da57d7461b8cf8f99dad311f5bf567f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf51dc864ed13680eb3dbb2e34341fa8
SHA14436ec446f0b53d6a8eb4b1cc7aa48c92ffa5657
SHA2564289669927fe3eb0d278a3878dc0be762557a3625034297df198c2e8edde7959
SHA512421c7422dd3d2d0b51d481034c6684ead22851faba4847fefb43cab7d7107dc7651979c79f2f1c5d872779c2018c051f88f744e56dfdd9d78788eb33806701dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5006403f150fcc48a845a6f2bef0365e9
SHA1ee85f6d08b94d03d228f21f6952ef74bb37af7b2
SHA256ff81e3f0a76022dcb4ea6d36148594c26876085a75aadfb4ea56bd7a7f58aa20
SHA512a176f86a67e9129ad46f6b8c57597b256fcdcc155f1b0903ab956ecaacbfab8320016d8c1f7955b5b130187a0acecc23a1acf4a45f87a0da330f56d531ff75db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4b27d1708ec6d2978b06c5399857b1e
SHA109c449d629b760bb9df226f4ae4915c8b2785a53
SHA25661729be262257bea97d880edf30a30e16ac9e18e7d61b6ce517d672a6249befa
SHA512ac09d69946910a949da163ce92d8cd3fb2747ee4ace165170a02f52b762a3ea4cc47245242732e853b4495591e05b7f81bee6b5ab5d1f587471c648ef168a697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e0cb232cfc420586a87de4ccc288049
SHA16c6f8f493f82500f2f89d2e14f320c62e5cde584
SHA256f685a2245db87f7adef594209c8aa85c6dc8dfe2dd22b55fd1206fecb90b2580
SHA512b3eb92b5af0a64fd7a67a78502e5f12cf4a962ebd00cbe808328d3429122a4ab004b07b33c0e3b20a00d65668c7497031c2bf034e1879ea5dbb113b685d338ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ca1b5b5d9d66f981d84f2a8ca9b9833
SHA172f3a12faf2c2c85126c7894a8bfec52c810e407
SHA2567e79d7f1c60f12dc722ab22191b6fd543174f044b2d2d4a93f42b0748ccb4c45
SHA51256082ba5228a7a566dc98b6e074a2963a1a0bf18adcf4bdfceb858dea5812e03b9430cd265a7c9a75a0cb30b368fba0cf505cf7a1945a812a3f2a97189749c6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fea552da1d5c2ce0eca57c8c20d4fc95
SHA11e7f2030e1ded45c2226724a71c27ab2d4af8fe4
SHA2567678cb982133da45c4242c2c42722fc6a99771f987ec643104736b2c75c612ce
SHA512ba38dacc57f22c158902341ec48326282d76c23abc482d55d87d82cef6786784ce4223f0c2e083f0bf70eb87bef3a86dfbc97bbc8c10d8381d52130f0ed6876e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508983244bc6dd67c8d50573d8173aa0d
SHA1ee123442b02b9ef6109208fdaed84448403b8272
SHA256bc4bb57a4a9ae0402ffed1c3123ca798978d1b850aa0a88bb98c19693458e2ff
SHA51201c448a375d00f2f6fe7cc3e8c07cfbbc9f320cc4ea64ef0a66c1c6ab890fe2006636842b26bc782fc7e9e0e7266403accd6d880779062d8aa7e17cbf1745897
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5300a81839a6fd122931852727ffb2192
SHA13d5b37dd4c0cd58d3bba19ac4cae3be1057f4e5c
SHA256e874b49490b754f9eeecb5ee674f129e0bc8d247671f48062127c85a4bdc196b
SHA512d0e7c711bf3da00d999f9dff90c866ab9bd036f37bc0894a86d70c8f2efe95109e4d745cd5eef861e2af0bab3213535654830bec06d03341f77d288c6b5fd8a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5361103231a49040ab48c0cccfd32a831
SHA1cafe7b49c300358b9f63777a9d27660504f37aca
SHA25698d4acee6e22033454852899de1ca40413402a02e84ebc900997f3a450489e5f
SHA512646b4c089d286986fa77085ce5f57f0143ca3f5b717b3c09d65cf16020a662d40280078caa23effc13e0ef47b6566598bd7de408734442be3422e74e98eae201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b784c5c95a96293d670f2c137df2096
SHA1489103654f733043e10268eb7a95fbcad6bff279
SHA256061521935fc77858afa95608294cd006111adee16262990915d95d4eacb0c692
SHA512f9b6d48c6f529e302075b303b91e7a97337aaff54ee7866b3c11869e2ba23715a518da7183b4004ea72e4675d401d0e00bf801fb0710cf024ed51db0973dae3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1e120389d52ce11285106bacf1cbaf1
SHA147e202925673373e33ef7aef922c081baccfd6ec
SHA256da31f200933892b1706ea14be5a37087d7e4602ea930f13306104e87e6b8f275
SHA512920a32d9dcf11e5b981f17d41ce3440bc1fbd345ab0df67f1d2792a6615714602ae61f6b9d63b947b11c78a3112b5aee9e7294eef22dfe668b2ca6b4962d90c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50065981cff51345907df35c138755a03
SHA133bd4a76a518b1691a42090da8ebbafb5129e18c
SHA256181dd4eee00f8437a5d30c915da4b960b10b48d9001b451eb79f2619eeb4930c
SHA512f11d8cb983c846c85ab214ce1011f6a6a01508cfbccb970143ddaee5277e32b15b571a4e140d2c7b881c9a65874a3a736d97858536b6b044b242f09b8c50c5cf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b