Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 00:45
Static task
static1
Behavioral task
behavioral1
Sample
37a206f4d25360e1923c562a09c0da6e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
37a206f4d25360e1923c562a09c0da6e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
37a206f4d25360e1923c562a09c0da6e_JaffaCakes118.html
-
Size
20KB
-
MD5
37a206f4d25360e1923c562a09c0da6e
-
SHA1
c2a5b80da5691e8bbc6c8c6302c01fa444540a08
-
SHA256
fbcb7c9836b02c47ddcd2a6875b671437358096cffc37e9909dcca8e824dc93b
-
SHA512
7dca1e0a6d1a34c50a88fb66c2c6336ad6e51ed5dc83431cf5a03c727d2eb06f3f90d6c87ba0c0c447854352824e52c9bb0cf1ccaf27a54a0ca9e9ecd46bf1df
-
SSDEEP
384:M4lgAgCbbt17kri+Dap+vQQ0MW1Up75Y0VVqEO2OEJzmDUFI5:84bor9LDB59VVqEZJ2Uu5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434855797" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000007615ebf3e8908263989f903af85e57b4fa22ca65b9d0ce313be8a4f98c7fe4c6000000000e8000000002000020000000413699c5c023d2fa17d5530bfef8e56c78fce5976e89adba483fd59c695cf66f200000008c52926e80ff2fdc1f958df83cdf4b8c1c4e51814b416817343805e55f062b8d40000000584f32d45ab9062497ac26887f71d970408715d467b2e6387124ee9f28e0b6ca5b615ff5f6d6e9ae909d5536b81bb40f5971afabe4af09f739c4452c3b3d8f3f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{47EE35B1-8833-11EF-8D6F-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 105d6d1e401cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1636 iexplore.exe 1636 iexplore.exe 644 IEXPLORE.EXE 644 IEXPLORE.EXE 644 IEXPLORE.EXE 644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1636 wrote to memory of 644 1636 iexplore.exe 32 PID 1636 wrote to memory of 644 1636 iexplore.exe 32 PID 1636 wrote to memory of 644 1636 iexplore.exe 32 PID 1636 wrote to memory of 644 1636 iexplore.exe 32
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37a206f4d25360e1923c562a09c0da6e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1636 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dc90f2dceb1ddf08c19401b0965724a
SHA105b1af16f0682dc407c402cb1e54e1b69878728e
SHA256d4e6b868fc55c8685f9d92f1fc1b1a9a4d2503a472db35e3b7a7ab825dd08edd
SHA512eadac3d9a0c41bd86de6ae53220cc8547c64e38d6f0966d749d0b105fce7d4425b51b960c3bf2fe883fa42708f96191082b8069061502e8fe04a17ee453591de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad0a06ef96947ec7eb34fe7e0d570556
SHA1131f7ce0119ba8f142933901136abbcd0d0b43f1
SHA256b0c58f2f21dbdbd32cd489827ae9ab94afe84c233f7bb6129dacc1106e35dbc3
SHA512f489ff6ce0e665b9f2e17592446ab4c371ae72610fe2b2c277316097f7b54b24fa361e66ad5f232bf04f4cfee87065dd4ed1005dd3e0f2501a7c82002a203db6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dac0717070ae0d0cce18bf5468a1ad3
SHA1bb130788405f47ebb0ea7cb8e4f0991f4fb38a69
SHA25674b69f71a644fd03fd2ac4713f81c13182373fd9cd433ad30ae06068b74eff3b
SHA5126785db0bdd8fa0ae8dc659693aa9ba7c765117dca49958ba7403abf4cbcead90cb6279333e91a94c3319f2dc04cb346dd7f6543d61541e666ff72efdd02f96b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb7e07824853225e5e6bf8b84cfb9784
SHA14f523cc320f0fbd16a98d6ee970f33877f6e3f77
SHA256a7db27c16ca0bddd808ce28c5bd9fdbeec8db89ea88a5ebd2e3f09db48343913
SHA5125bd1cf5bca65cc09a2cbd7ce4be7d0c3893517e0cb8a6d34a0bfbaf1d6054afdea2d73bef3908cf3f4ac6e44e5dac0bd81bd22afa4f73a5211a5bcc566550ed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7cb06d5475edcb630e26b2ccd42ca3b
SHA1e0b0ceedea91052579ce9be81be521838189c1b1
SHA25662434bb15719b32013a9710eb5010068fc0d8ab8ad32ce4ed6309305188ba7ec
SHA51289bb5c7524d01b1d30794897a1340c991e8d89cfc8e9f9e9506fb306bfe86ba216304dce672411df30be4f910a39e7e1c3018e78a280797b6c12d287c95b98e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580187c2b6e94869525f8184e0c97f12b
SHA10266448a135b1209507195444250019a6a582630
SHA256cb0e6981b7abab3c4803749d18b14671043300130ec1171d978825e0226bbb08
SHA512f03fc1e2a5a7829a22eeb87dd5277ef0e0d8495cc658688ec29fb7dd91f6b1e17e9f1b6cd34ccd59b50b8879e2a19de9a38abe41efb20067320af2f3f38bddf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5203772c895b8022ff83abba7eb9c9e56
SHA1978c66e51b96c0933fc16f1ea31e18a6a03a9d06
SHA25670d34f2dbe271f82039544de93b27ff35fc06465149e7bf2a3488069e9a15f92
SHA512fe7b8623df7e62897fffab01eb913af17ecc0ed1e0965bbf94338a804b1dc3c9205d64ef9980adebd012d6fb857488af57e55bb61bcb8900cb61e437f7356651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcbba8a25673a76c06eedf49bc1076b4
SHA13bc3193df6834765563a68e009c72932f98387a1
SHA256059b12b455870f50968f7c9569d6c4c3cb8433da2f9d0335a80b6bee5931fa20
SHA5128a2d87127b471c0e024bcc1dc9c8a0d03378206bb169f17b2b091936ca51d6b7ac0b3d274672cc910e294ed1e96b675d884912e7f51b399000c0e5d06cf4b4a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558ed244aa332f2101f22931165172f69
SHA1bfa8b8a9ffa3a4683d9a08afd3f7275ca2d43353
SHA256bf948e531199e5f36658630ebc00a90df27ce572398609e5bb177a033061e809
SHA512edca477a8c6696e9e7fcf5a61cd7bbe6ef4243093d0b9810e2d8b51017392ed60ea0c22f72f37c3f51b322de8321c3deecbdbfa8a63fe5bec6413c188167c2da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cda5789fed4609bca492fe3b4dc71ed2
SHA10094d9cfde37a3331dd73de62d3d221c017258e2
SHA2563b194d7a04121fc003701b833e2d52c72c96cae458bba2096bbdbe3735de65ba
SHA5122a4b5f01fe3ca2b652ae1f0bb0c51a1073178cfe55dc6ce0a7678feea926d3005a14bace4cc1aeadb511546163c200d80b522a8a9cab55cf32cb24ac7c4b65aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5981c78143dca6836f5b3b6e735520b4b
SHA1b77984a1b5151f9a3ee11d6599403c6614f254ef
SHA256934925bd209303b6bce7cd57024ba39fc386d7f90f48a0da70272c74c3d8745f
SHA51277dea6e158b740c4fedc85eddc3bb3b9015fe7621274384d482260b92ecd53a83a88cefcaf97bffa91de78dc3e78ae83732883f1d944807f748df0e4ff8d6a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cf6bda1a49216dab599a2d62a8fb6d7
SHA1ee6bb0abf712578db7c559dc8393d72a35f98930
SHA256ec02b9a1c56a58e44597eaf4eb8961fe3ed98b6ec9a0aacd9fcca5b451d490b2
SHA512999e30ad14b84c52dc2008d7c33916af029ab263ca20e2d66e241eea601320cabe5f66aef5749e92b25ad61470bacc1a2c03cf23e4847ee6746c1e5439d82ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534cd0edd583524fda05482b0adec2fcc
SHA11cdbf069dae6b31e74c86e9a828b8aae872460e7
SHA256dd8207c9eb5c265a306587eb64a819649597f3a7975306785cd33b78943b3ecf
SHA512b0bc2552fb0608ffb2030bf9e889f911f62dd11f309dc6ba199ce5a47ca67f2c3aba39ee2387fc9502d2c782e13442797d6e6c60c34f09a2fad9da2c0534f79c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2d9b2006c2e7bb48ff384e1919b58ea
SHA1a0a2e833b20dfcf1b7aba12007835e22758166cc
SHA2567cb1b6dfc931415d7e3846c66c43c1e023774bb29620e4288225c106180767c8
SHA51204b8b6fb369ed9b7334ae32687a1955d8ac077df41845f246df5c13d23d678ea4923d6ecedd286f2287c1d611450b9d47eeb7d1bb5b2bfcf590f39e3276302fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d82ef3a46ed31a274bd8ad5c73cabf6c
SHA106a153b8633faba0cb72b5c5707048fae830ce5b
SHA256daba7994744f30bdaef482c9a9a90aea517b882ed0e4f61031ded7c1f332910a
SHA512b4e26871e9cdc18df2c368ad52b49561fbc78cec483a9bf59bb9e78145ff8028952e8fe2cd9a0bd77b74f7b852e1ff6f4f131241750b9e4d303e2d504e1a25ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3e9d7c878f9a4bea175c56c5695ace0
SHA18928a5ea0898ae8d8b6de49854a944daa9042ba5
SHA256d93870752c3b7348b2460e99e38929a2b0c817e0efcd4babd1ca16a1b44bfaff
SHA5122c2207447207b50d5af637125b20e7da15b0e9ece5c24eee7686795ede87a607574bcb2851dae6fbf396ca798a3f60adfa850b4b861e82252b867366937c6cca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5179b6ee62aa70e6c8117619313533980
SHA113ba2288a2071f0fe25cc2d44e75685b0a2684a3
SHA2563488fdd0005a2b2974a3b2ec55ab82ad41f1372f845d09fcae597aea7f17890b
SHA512f40cd3036f89efc655758ed6e7439ca694c124f99f4fa59a7dd1b9b8efaf9bf3c91a2de95c7ab9677c099dabf9066887f86eb55456f56f6e8d6958fd8caa9b9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b