Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 00:59
Static task
static1
Behavioral task
behavioral1
Sample
37aed35f5bd8f106b6265af365ca0418_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
37aed35f5bd8f106b6265af365ca0418_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
37aed35f5bd8f106b6265af365ca0418_JaffaCakes118.html
-
Size
18KB
-
MD5
37aed35f5bd8f106b6265af365ca0418
-
SHA1
fd57426d3d1d387612957b753624f5f418f5cc64
-
SHA256
150ac6a593ed5d0724c475f3af78a2c45a556da8846288a783129c781b297873
-
SHA512
c5854ba239ba67fd8b162a8febbfc5420dafc07efd6c7e2be3a71ec94a2939871607fb9778b9de06a3dc03730a6a71e7475aea2c15956626690ed6d1f3013f5c
-
SSDEEP
384:kA5WccDUFIkp3mu2JdFdegDdLIRow2TJa/L1Uc:PkUuU3J2LHeU8r/d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40a5480f421cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{39099421-8835-11EF-A7C8-6EB28AAB65BF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002c3c484aac15e04b9a6d649cf271b1eb000000000200000000001066000000010000200000003f903b581ca1d08d0496322efaa4dffd28f68eafccb8b11ab49038ccb401e2dd000000000e8000000002000020000000b3e8648a68b86796eb855910d50f51f3186cc87cb4edcccf77b602c2cba21699200000000bf406ea29073d764facc724dbf453dc84bc31dfd9f30cb0f10ffba8f9e6dcbe4000000031d5fb078db76312125912d1fa2a4e3822a1f7729fc2915e54390340e4f3c3e0f9bb7e6ae98f1f6f47d77c101f886c6d380428fac6949cbddea26a5414633894 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434856631" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 620 iexplore.exe 620 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 620 wrote to memory of 2352 620 iexplore.exe 30 PID 620 wrote to memory of 2352 620 iexplore.exe 30 PID 620 wrote to memory of 2352 620 iexplore.exe 30 PID 620 wrote to memory of 2352 620 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37aed35f5bd8f106b6265af365ca0418_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:620 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a2defd7cf52d1be31c5b76be771f1b3
SHA102893d6575f5d2c4a99beef637dc7e4650363139
SHA25639d8d74cdbd5f06a1a94557a8da3a0c801fef28307655754d1c8a458ac5d1528
SHA512134b2ca84068aa788e0a271ecce6910b7e1d3c611a222776b6b082348131c380979e5833c212162d37f22f0c3abbdbda2e7582e878bb1d843b9664cb026db617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58958d5ec41a2353189602c7619f6b494
SHA1b77312ac89f1778b576bd22b3fe8babfef5c40aa
SHA25675671ccf680bfe0cea1c3056e080cd50323cca79fbd2d3cb0d54afb1cddf182f
SHA51296cf7f30ff0bb49539cf0862a197afb6a6577cea3b3d1978edccdaf96653b95d1e74a654d91802c6325ccad3170c38778ef93b21bef3fa04a2e7bd2a9967d558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520cba8cbcfdb5bac0bd491edc75846b7
SHA1ccc8216e2589a22bca39cd3b085ca9024c0782cb
SHA256299170f29535e09c95cbaffea959db814ea0b69158f5a08c341f55112c77465f
SHA5122c5aa4b71ae0e9abccb793d4985a6589253bc976c503beb0c76fbefba9974068161aaf6e77518990fbe1e4e8351aba9efcd8cab18098a72582a4b59bed4d1df2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58955086a6f9344db28e87a9c55a5277f
SHA1c55e6717e3473c50d103ec3e4885e50d317a85ec
SHA256ff3d325f92b18e3ea638e9cf5a5170d2b4d4df60346b8986d69d5308c740e661
SHA5121b7058840706577a09b98fe46cf7dc431630bbeaf80e1ae3ad32d4c3a7cc0cc8b19cace5634d30a196831351d767362d9d5a67e12f191c7d0e9e0d6e5d954d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc58a39f26f00e8011c568dde7941647
SHA1fda219b68f24fd6472613725c76dbea14219d5bb
SHA256cdc9295667e456bd52df3a9ee0389e3896f1f663c48c2a5a46857f3724f1089a
SHA512677c2ca0e76f88c038ae6adbc691f21c1ee3e0a1c7e2c9e871a64a77cd774f2875a2aa427e9eefa40df5657e7285382a50c3b0912ccf800d9a505238ea418c05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597b27a3b645437e49c3f8dae16407dbf
SHA1e1f293d5ad514192b650f8f567f6c31ba80273ab
SHA2569c603d4556e16de9b40621d983c696cfcf4b263be421d9aa61133afe1fc1dc8a
SHA512fa59c5decf118ec511a63d86ca530c07b9f04f3b8a22a337dc7d42a2f77199db57ea71812a916ce97094f20638c095b3d428d779ffd480edca65c50a327231d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb65028fb930a154aca8bf78152adb8c
SHA1c4b51ef1451975685627b264fbdd372003213313
SHA25636082afebe29b8b88b92404a6da4cdd1691971c623807f42ac9cafacdec10f58
SHA512ddef8b97779aef49469626f8d169a0da842b6fa076de6c13cdbf481b5dabcd4f49709f3beba7dfe31bd492fc62e351a28c91cde46a0a18aafffbc8c6fdec9af8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555349308cefedb88cd91cd4dddf2d5cf
SHA14635f440f3b875161e3296f13aeef115814b35aa
SHA256f5ed0b8f95bba478c0b3b34baa71346e532e64577c1a195bd2abac508b38353c
SHA512a3ebb675df86a96fe0a1f843e37c5b4c1a546a74c717d021a8c58e59bc675f09f6f97db377de6ec4fcf240bb53c059d9da0c6d6ee7e76fd6dda40b96a668b184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51096eb918638298e68be701b0d52d956
SHA14b10a3084b49607eb23d2ad4caf9374adbe6eb19
SHA256e1629b97b08a5733e2e8550a7c963b88ea43ec062e92ae51ca6676975e983721
SHA512bcb8515ab2d0f94bdee8643b2ed7055d44442ac6861a93e08ab28ec8b35d4367a0fb24ccab1273ee06dcaf437367278291ab596783dfba59b9c79716f4b54d06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2dc2804e5228d444d5a83045eff3aa1
SHA1f4d2b165ab55b7124fb06020c6f7fafd38dfeb3d
SHA256d52dc1aa0b40211d3205ceb85bf108d28965b1f387fb4d393d819f10af1f3869
SHA512ae2e1020dbcc4ff3e3bfa9dc9ea0d9f97df821ebab95733781fc3290cbb018fcd684e391335b98599526582f20a409de22c96c847336aa43e6010e69f82822b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d51c3440bde80ef9528fbb641a8f3b06
SHA1e20cba77c731dcb22214c25460ad4ca6a60746d3
SHA256054af2a622ddd968924487d8d9f1eb24309a8cf7ecf304a937c9c4c7d1d57b8c
SHA512a4a9387938cca0f7eb836ba2916badc6f45f2a635eacaa92947cd31728ff808692856fd8630f302699c894864ea08cb418df216c6faf4ff28a3dabbe4363afc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5653a09071e5ae55092ebe4c050b6ab97
SHA175691d72f7b92ee8887eff110c368ab654eddde6
SHA256d24c72683e514a257701a0e5465792b0f9c0cbb850d0e33b0544b5859faf75f7
SHA5124a4597341146f428ae2116913c3ef616bd5d24be4aee850d141865aedbc55b8d75175c457e8e5491126954f8fc33ac7c9c7ab39a0a9d58fbd099ed91349235d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cb61f484ffde41a3b0929124d9d938b
SHA1908a3b7a73a3823a133155b0991050599d8212b2
SHA25608447e9947f4cd728fa0214da86248d6f4f7ad72228633244cbc35815cfa9b44
SHA512437c0cbbe8ffbe51b917731d6bd05ad28b2aaf031dda92fbf7328bb1a7abf6e46623873e0877e66ce2bd69ebc86b9e934334274df96dbb1e6406e571d55744da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593b2db7bf9ecc73091b1f340af477bf8
SHA1702619a80f07109f6c41f85af0433517a06c7bee
SHA25679775481893a6b6a0f7399b36d0166b738272299e0c5151ef206ae97a7aa3896
SHA5127c10d7e1035d4eb48021cb2b22351d3594cab715e56d0eda02fcefe4dadbd97bae990040dc17e58f7a50cb1191f79840c9bb947dc219e9f5d5589faacc081890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2e4feb7a425450acf747b67e7393296
SHA17049649a966ccc3a8f8f7c8129159603ff047478
SHA2567b935b9bb6459b3743c0271cd7be8ddbe0ef148ec88b8b47ee8be97bb4214449
SHA51214242b420ade903c7226cc5d847fb8d3f13796483ed9d7a4e8760c05929aed0c513b2e60b575178d43250610177847456465a3d7038062d103a3a3acb2abff34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b1e14188f54e95be1ef86e6608cdbbe
SHA154c23e85e643795070c5239e423106ca399cc0c4
SHA2560e7dc5a173f2adfe1f9d94a83ca19f59a83c61aeba496f4e617e29e05f263f92
SHA5123f795b206865faecd1c4eb35c04aa2e34081eecccaf61e3729ba724a704ffe0a1a34bb7c96f910522eb5c7dbf6868bda94cce5b5b041d909bd9cd8cfb900c77f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ec2db559f6a363037245f4152126e8e
SHA1560572cfa5a2845f96ccb82099e64203a7d976e7
SHA256174af9d762ddba7a055e25b852a69a118ab70e729e0480709dcd5062ae71522d
SHA5128da0e7259b1d51f5b723a76bcdb16750876026f8449c56c286bf13d38d5515c547f99ad1bf5ffd7f27c7bd7d5959f4b803025061ef736558a9b4be50d3297afd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b772105b6bebc313fe1c7dcacfc125b
SHA159dcb95ac35731492b8f1af4c74e013a1ac4bd50
SHA25695c890dbc70362d40c60ce2638049074d2d54307d660dbb638ac2e650cecc65b
SHA512479e70918155da93e66b86dfbca6f65911981aba7bd516b20864d07acfef32fe6762a0614c2678650551863dad6cfbd270ca5a777d4825fb615f582099340735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fd1a41a80550da2c87b4c182e7213bb
SHA1a434bd92181b40713e73109444271238f6cbe056
SHA256591876447d1e2ebf86043101f34ccf6771341cb49e70b73f0ab8d8403a822f4f
SHA51244c0c8ac361032231c6299a701526a46a58c02b541b1198ef4c218d369c61644806ecae7a9af35ae69fcd298809d3191cebb162c3c5acf06d23b978ce5ebf18a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b