Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 00:01
Static task
static1
Behavioral task
behavioral1
Sample
3778a450a90eba78b1be4021470d45c4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3778a450a90eba78b1be4021470d45c4_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3778a450a90eba78b1be4021470d45c4_JaffaCakes118.html
-
Size
19KB
-
MD5
3778a450a90eba78b1be4021470d45c4
-
SHA1
2323a856b4325543258418d94b5198b67b45e97b
-
SHA256
793116ee4a5f6f26725006f016c9f145eecdaccdfdeb9e78c979d09ca0d221da
-
SHA512
1456e24f800828ea9b61730b715cf2bb8c357a6af09fdd468de057969a7f6c6a7b6df71f927718b46c3ca785d12927ec7985b69445e22bc3d6706cd470858f4c
-
SSDEEP
384:4+QfPFd9QZBC7mOdMw0tKfpC5IgSnbmFe7AcZ868FLAPd:Zcd9QZBC7mOdMwlpC5I9nC4/Pd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1239E281-882D-11EF-946E-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d029c8e7391cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434853130" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eb3acc67c06a354295ca59e2927e123c00000000020000000000106600000001000020000000950dbf5420f6c493f9ba499882a59eb39e9009ad7e918226cb9e8e94a441aabb000000000e8000000002000020000000123e30dfb137531a578f94c28b3f24c84c5e40f975c3495077c957440c15815320000000c54dc150ca6cb34cc14a505722e4540741408589641341d6eff65f73caa6eb5a40000000405703a187e9ad6a1d8ec18c92bb941e3f9356bac82ec3030c23d629e6e548d01af874d9237df65f270ba73ff35211287fdc07ebdca1e6d48e2ac42f6b2fcd27 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1756 iexplore.exe 1756 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1756 wrote to memory of 3068 1756 iexplore.exe 30 PID 1756 wrote to memory of 3068 1756 iexplore.exe 30 PID 1756 wrote to memory of 3068 1756 iexplore.exe 30 PID 1756 wrote to memory of 3068 1756 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3778a450a90eba78b1be4021470d45c4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d50dd2001c9e8d74f2a5d2efd8fc8a3
SHA17497eeeabef0c610aa6fc150fe6832129b7ee232
SHA2568c8184b19cec1aedf2df743a12a1adb0fc389562df9bb26e3a08e4a148cd35db
SHA512efff0973d14e8e0f3e49944156311d530a3a8a66468707849df4793fb5b56ad0e24bc78a950676a47cc232b8ff169dae04099ddd8796ebd03f7d459e874e0e38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d96cd6a52747367fcbbeeb5401f22af
SHA15772098d17a39044abd4dde258ba8c338aaf9a28
SHA25623c3ae142d4c1719e979eeec3207adc894cd7100a6cdc43c1a0819b515e07cbc
SHA512f2e1117ec354622bfe59abd0e7fbb820503fe3b87e6c27fce16b7709a523fe00afa706f05260247a32258e42e6acb806b8efeebce1cf883bd9e82268f0126ef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574525e4217eaf8af8a31fe4af4155316
SHA1e9f70bac92572ccae93121debd4e9c4095b62cbc
SHA256a2833f77198930e75f42d35d85ae684dea76d70f9dfbe1f13e6777536da1baa0
SHA512dd16725fdfc827b2b6d192658e9a17c9c633d0d5dcebfadfc6c60c57c794aefebd04523085630c866544464f1db2f3e6e76594ba87b51c7ca5af8d351a8e7411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5774de01989f6713ab3b21db0900104
SHA1817fdb7eaf6f03294a85abb8d68c768687349e1f
SHA256f41e563cb65ab9d2b3c3b79c898379f209ff878248a105c4c6011de738cc22ea
SHA5127a90f59c6fcf17583e061e81e4c38ee34306d70925789b3012f24fb5dd782107cc2f73b4057c2478568eac4b70b1aba6a2e0bb13dc16b89b9bf55e899fb4108a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533439bf853fdde0db30447867ed776bc
SHA1c62a0cdf04a3498660fbeb9585f013dd44c11c5b
SHA2565a3e631fad15e862fa7600136713916ab08fb46e8499e1d4f1ffd475146cb166
SHA51232c69890f1f29dbc2cd1445f195911db1fffd00b38079cc4af901cec5ea0a06e4898f84f1ca4b95340441ad60802dedb4de54813990880881aa39038f305371d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598a2eac042d2f4cbbc38b1f5deea9448
SHA17063414eec5ce958b535c75c432a3948befa8205
SHA256c81b154bf61b9b2ed2e34643ffab61daf57eb1f2a3b3f326ae43238afab75947
SHA5128b33a1a7978e01e97e78e48047683ac815ec671e195018db4865692d96983fb5dc5e023673766c048156e9598c60f28c2ce919f8c35be57dd2caac0afea9d881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c41db2922551ef795389648c5e7c33b9
SHA1e7b22c4ff0df9da45940cff2526a236eb95ed768
SHA2569bf9a7e65e19c6f546b9564665d48ab75ad04fae6d7b4d323de0e351b1d541b1
SHA512df932580f5b2a2087433ad4c9b479d1b03bd051515d57bbe133013f2c6d46fce93f839ece8c773562ae695fcfbac64158b1e05a6872ad979abfc5f664bcc0143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d6aa2e9e9cff1d1ab4a547425452e63
SHA1fa95a048efebbab81e9cae8d193d386d1f247125
SHA25682afae9cfd3506577131f41fc1ade7f05a4b60d8694fa5a7c820f28a118f3a10
SHA51222d99a61558ed3a4e479cddb7f6d103ebcc0c711d90a5e0fa0852941d08f1901702fa468c4ed7c83e180f9f2bf3237cd07f12bc1511239133b13ec8ebad20ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5bcc5012ea49f3d365348102a52a9e8
SHA1772bacbaf25c5a074c17a76626fdd670741c4ec6
SHA2561646791e1de747fb1b947032151b7970f810bbbe5b490a47a3d1654e83f4d62c
SHA5128a6b92f1cee9fa38ab538ab3cfcdf682562bb0f8dd2fd73205761cfeddf9db1ab3830bdf4699b7e78c44c0dd6aa1357c4581963862b7b1d7c0908dd436edab1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5505887240b1f57a2346892fac1f7b3ff
SHA17e7bb16b93f2821f739ce9d8f7ab327d065fdc93
SHA2568ed04dfd315672170cac9a69ecc61a8a1f781df0c821b351ced73d114378855e
SHA512472267643e6cf852d71ca193f11191b3cbacc88074a84c372c5d22073ed7fb733efe9b153ad817bf145dff3ddded94110bdfba019cabb3fe6374725f4c4a9f29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5035120d25e0f70686ae7d6f1d1cf3402
SHA1df0f551c7e109f01a8c88dadbc7bb8cbf2ba307d
SHA2560ac8175c78f20004c89ccd92487c9d846373c751559163f09db21f3e971d992a
SHA512f49b08e681dee4b8745354c932cf67b9a8700180811093e3d075e49b7cdb0d6b92830e19093e5789e919c350052a061eca6494efb099e13801f573f5b4250080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a18c980e83b875cca87a3bb364a6f0dd
SHA13f0ec13d32927c45b77b2fa479d409fe910570bd
SHA2564aa499052868cbce3b3c30aa08b7679b47f34b8650ee46d447d8fed52f9f9ad2
SHA512dffe8eaaba144945db370b218d70cb2da8a29c00ac00ec1a05d30d12c1d3ed0171e5873db3463fdba45083778e3565fee5f7c128ec570549108790444dd34e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe5df1195f6beebbbbaae55c494e283d
SHA1895e1c910e850245d4c2b48a584cab03c970df85
SHA2564170dbe39bd39ba85db1b242b6b04068f9968b9d6c85ebdce48697839e92ee99
SHA51278e7cd33a6ebc25aec15de7bfa15e0a4736f99d950d50f892d39b18dc7bdd1cc15efcc90774c4c9b775a7c6be49b82e20bbb9b92997315c75bcf17d112245f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5831d418a8ccd78e9ee3ecb9bb0750bd3
SHA1fc521a8436cc9fdfdf91c9854d2c345400ffc909
SHA25670daac5334ac4613b2cdc8a536a927fab48f0fc4dc1c802f91b9b6f7f55466e8
SHA5128e6cdd38baf7fc13b98e8faa0806dc2bbfd5c2e5e9e18274a29bf7e27e412008178c9a671d58cf412109894277800952c74a061c6a339e4cbf55f8e62c46d65d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc3ebfec01aaf4e020beffa770435ae0
SHA140c4759c04b1a7d22816a74f07635179a8a762a1
SHA2569aa950ad9e74b3492e9b2bf5779dbef41f4afdeb4c47aff91db29b6f2e99a446
SHA5123b14f13fb52758a146bec9b23f70f0b8c4534f1d86265fe2789aa3d9074c023cdd5059f9f8b798ab7e7180371289ac457c7eaac3c0e45ea0f4dda6425750b29d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4d7014224090b803b135d9c47fecf6a
SHA10feb4e0d7be109aa040eeba6b7e57ab1b11970a7
SHA25602a3338ec2fcd601a2a81b82c6801ea0c6e4d33ee9936af08c526e2f92076046
SHA512fdde65398e587474ea6c72340e885f1a6e50baeb2d8e65230e051a011d9d576323bf23fdefe9e4238031ac303b14a4372264298add88ae813627da30bd6a238b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1637a7d7cfc7124c017a785a0fed6ca
SHA13078db6a3b0d0f8bef434bde68b023faab74d195
SHA2561ed4e4b67a05b56172410d29615dd75807658bb436a620ebb44f1c454aee0e00
SHA5123e4370e6242ea68296c726fc75537c7822cc2bee195914c7c271e30d469ba79d3d5751000a4db3d3ae9f3867e2c441c0acb929d5b5f8ebd5ee2ad22f75ebae58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584268034709a831549fac418814ab853
SHA192e50808e00d8f6b96dca73dadbcfb19c70c08fe
SHA256cc2b6c59ff9c267c37f222efb547a3dbf2a2dc396e0b0fc33c4ea53164c76e40
SHA512795c9e9917d5180c142da2e5d015d829e2e1641b394a2e5a67cdd1f134e5c292556b2a8ace769e91b2a2dd71f7e805e8279e3bd0a91e30b3c709d35e1df0f4b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bc4479234e48160f1cd505a41c1c9df
SHA1e656803baa5a51af71e59bb5c9bd41250e845e50
SHA2567618e918ccaf3ca516518baf3cb72db814921d7543673e73a6a7fc36e6cee806
SHA512c4a10a0f6db4d1cedda6703a26a805b44e84c91c7604c01bdc8d59b540788740f8564ea16755c64b7d6a76f3af9486a9d9e6460cc1487a6030f85e84ffff9da9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b