Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 13:48
Static task
static1
Behavioral task
behavioral1
Sample
3a5962b07c2ab234738750870f174778_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3a5962b07c2ab234738750870f174778_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3a5962b07c2ab234738750870f174778_JaffaCakes118.html
-
Size
16KB
-
MD5
3a5962b07c2ab234738750870f174778
-
SHA1
470ad9ae3402f175ed3d2af702c959eee55117f7
-
SHA256
3868249b7773a74c644486da8318d2857389cab667e3a55ef9ac21982dd0ef55
-
SHA512
e346225cb047a772901cb438ac5963c748fd4b26114d84d3db41dbd59ab0abe7ddd528c0a5f3bba6e9a0938d1ec09eb73df7a6a5640472d0e3f15d6c6c01c300
-
SSDEEP
192:SInPgFbaLwlitmcGKAq+hizKjXyE+aNVSAHZcS4GKXCVkD+FQCEoKN9a:SI4FbaIJZq/zKsazHZPL6D+FQCEoKN9a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B316AF81-88A0-11EF-9747-6AA0EDE5A32F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fa0d199e8aec574980e1210d6cb6a2b20000000002000000000010660000000100002000000041d488910d91fecf49c0d39ffb6089c9e68abb9fa7c1bc0f6bde03f9ccb39254000000000e8000000002000020000000ba5532b2308af2c81cdabb7f02c9aa4b7dec31a6eee91fe1047bddd86057c97c20000000eaccf43cf4f85c6c0dfd5b8d85c3c495f18e3cd59ba4da90a3651e9923f25b6a400000000345752070c43a2140be0d540c2c65928db5ab158875c0de9942936ce1a66037edd89e5e424af13ccd243525c85702f4a3b087a5f33af663ea078ce8bdc2dc76 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00f77389ad1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434902794" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2496 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2496 iexplore.exe 2496 iexplore.exe 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2212 2496 iexplore.exe 30 PID 2496 wrote to memory of 2212 2496 iexplore.exe 30 PID 2496 wrote to memory of 2212 2496 iexplore.exe 30 PID 2496 wrote to memory of 2212 2496 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3a5962b07c2ab234738750870f174778_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8c9756fbabd947882f7bf4b6b518a2a
SHA1f581d6d5696319a19184f8f127921e67729a14d1
SHA2560be7decfd0423eb2bf4362a31ca1a2675607a13d17b0346de4eb9d3003cda884
SHA5125ff07642b5af0cede9575e613a911499cc4bd0cf075b7b490dc202cfc3b1d8360fd245c86ff6a34d8009b43aae693c75e58e85c9fea64110744e4a63a35d5a32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569d3d90f82cbd93021074eb7ed9fd3df
SHA1fe6b610154fc6c12317a2ba71e5d320515cca6fc
SHA256a354c28916f3b0f8ebe58e4fe832270f0ea37aec6c1fea8cb24718c156acd231
SHA5126f5283aee52838b143e199e72bfd4b3c5804ffc745efc548f3cd1244d3506270f8501d63271f616c5a0c9c31505b10f7d7bfcc1a8d25a61c0bb4b429a8f48285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547b80f6fff5dcc5ed95bbf2cdf537187
SHA172d2afdc4e76e5f55e685c640b667a26f2d9fe44
SHA25644833289d5de6d7d1e0288b0029186a906d5f5edcb0cfc13f883d5f36332d50b
SHA5129f5abb8c156881808653285a7c1e472717df810016ad75533c41bfcbb3ae30e5761adeb5518c243c348250e3cb27af1b6e7b10107341d686a362a8ff8cdfa752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1caf25390436c29ed08fb04059d2967
SHA1db6302d12fc11788ca497e11cbbe2734e26abe60
SHA256f5acaf2c77303000556b2fff8d77c726ef6bbe115fcced35ab0ac939b9048b9b
SHA51233c7149970ac67431668cf14904af73c19a95c990ac96bd8aa52645a796db65b5796f7d867833183d0737dc384d1d610c9e3c225cbed38140fefc7d26af48676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1f1b008d6e9e3d4804ec582fa5dbf68
SHA1d5b785bb8b76f75610a0e52df7c493cb1af23b7d
SHA2567087ea4b64955d2fab05114dc5d859d3fa73ba5ec134fa38f5d4a4e26a31ead2
SHA5125b1e6570c868e47167911d619c925e9592a4de292ab7d79de4ed27e482a41ae3fbaedc8b9cbdf2020ab949d9e9a9051981ef6cc5b0f22dcf44d8eb60fce9bc75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510918e4316694af438938665f89b1cfd
SHA15dbbce53db8d4a73405cc83061cd1544ce4ce49e
SHA2566a3e53bd7311ce35bf8bb58450069f52bf044074c2aeefc28e91e646f620955e
SHA5124809448ca174f2503293edc20c61c63535f226e637e9bb89c1696ec8bde07fb8b4624ed8e27eefcac86ae641a2bfe9645e2a3fcb50eaa62cf397617f3fdeab7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514e2f02fadf61544be474f0df83cd8c0
SHA1cbacd54566e4c537ac8b3003d4caf365991768c4
SHA2566f41b532dedec82d78ad9813059f3ebf7d73441ed04193ac00e6cea762abe912
SHA5121d1a4b2a4b0b5da1e3d05a88a38fc5b79f18f6bc8607823f4ea19595ae9a47f7b5e8db6d85dc9383cff8139661eaf9803a4b62067babba3ed24243df0d68080b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcd3eabdfce2e478cb6c391d99e0cf0a
SHA1ef970d9d82bd52d8ef6b16c7f9866afaf926925f
SHA2564cfa8bce7c797436577aae1b5463ddd0fb5f4b7ad9dc584e3cbef40719f1a313
SHA51284c28b2617aed983e045677d59727be3e1f7733020bb01acc065490d1983921fb87734d31a99c8d36db716105acf73f49557c15a6265bbe2c1d0240c947e0a43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea4c11f18c65538f821ae0bf2f39e50a
SHA15d38b7444b2937b350fe79b1d4da48aae75f6eb8
SHA2565172fb626dae479c2bcca5808dca3a9cbce97039ac4fa3ace1c3fec70e3c9dac
SHA5123861dd2c2209b824da9f69351a4f05b6529e35a87537af2a4c200e695fbd4cc6f5e4cdc34b858dc0ae050c182cc152c6413c1319a7b248a0d2cc23c5001f4c48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537f073b173ae689dc40351c425e6c96b
SHA12c07afcaadd1800b2d1a29c04f9f851638ae52e4
SHA256fe46be78db4ba19b4f7bd81bc6284ec38ce970bd438df993c4b351493127642b
SHA512d732bca1e16afd642e4f66a5c8ecae3c884f193e0a034d32a18ad3f030568913e69ba57f524f70ffc00c191d3f028f7193774a5bed346c75103c1c2bb55c5f22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f8736f31e2ce4109c2dedf828464cb2
SHA168016d57996b7f2b3ed952653d14ed8f32bcc41a
SHA256e060adcd13fb8212ab4826fa67c23d056fd1816a525e3d951a96cb64326f0014
SHA512891b06a13c4dd524b8b2bcad2c99c5d7a0b411faffc28ad263e94e3b1f3124d47c7d84b079dbe4c09d96a9d2bba017013671acbe1b2d0c6dc88ae86b15148675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b88b2c938976ea5f03efd4e1fb76bcf2
SHA1967306c014df29e9001b7bdb4f7320d9982cbc5d
SHA2569eb509b3d08cf0877adbe79a2f8c2a5be0028ca784ef1c366042fdf4b94640d9
SHA512084f02ee235b6bb2451b25b34f7712a2cbef0bd470d53942ba593dc051d2955a98bce77ea9896e5adc2a64e8c4f0e94a44b90ca7e46ba2cd85d884e637d52676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd70969d9d8f1df8e9cc4a6640d05779
SHA1fcab3f25c16b2cd7e898801e84627ccd5b91f60d
SHA25675ed06d0246371a2769fa1b85eba98275982d45f5d8370e48b98c8902aa01c6c
SHA512ec072141666dc7c9ae43fba92f5c31fca804759c01fd2dc3b6ba55ef113ea75aa0386a286cfea1129867397e9f9844f8ad99bf70a8bf3ba28f807711f779fe36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fac5947172ca04497f93a802aa54f2f
SHA174564444e5828fc7eb9915f259ca7ccdcbf2a380
SHA256f428bdbafddddb0d01fa07f3641adf309df8e9a5b8fce21a222f8f307aac7bd6
SHA5129be7408a65e55c1c2c3333c8d5f886a7dd54ffacd78c7b2b4b13ffa80056c30d73ed3458ce84f2e28256b7ed9761fd26e8fe0c63d4a13558b99a84ac8a9d644b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cd25652395291b8db9ee5b6285033ba
SHA18b16339a143d483c0d7b19159d7c84b7ee3f8ce8
SHA2563d8f80eedf294628815398ad10e2fa6af970d4f44348e9624fca5e2301d5237a
SHA51231b90100cc9a3e6e45ff810e06196a7e373e90640cce303007c4b5db4d5c6321ae4e2fa34c817e21773b971dd8e8d481048d4c406a7dc1883eb863d9e54051c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ebec79da21afbdcc488681d7a368b96
SHA1637fc48306443e90d0c774b9b92de10058163458
SHA256889b9e496f413c65a9cff8bcdd83c683e8626c53f2eac26bfc63d62c9e4543a8
SHA5123177124f9955d05c5d6f830eac8eb0e092fa209b03d70341a86f61e7f2866c29f6617cf94ae2917613eb9b177b7068dcff93c1d64f2171e2f9ba63687615d63a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e03fd6d23ca9479bacb27b720066f11
SHA1b605e84c58c4206907c6c00ebb9b92ed467844f6
SHA2561073c22539efcdf05e4837885effbd52ad7667ec6d1be8e944358e08c71a1b21
SHA51202b7831da7fbfe643f5b6149fad8ab0c864884f0e110d1e1cc9c451e3037dbfa2bf5704c33cf6df2dccc6f8641d07058681324dab81b4492ab03b0d0c5d434b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5579615a5dbf9bca1d1cf839d5023d34a
SHA1bdc170ce042c344e2387b1d971c588815169ffa1
SHA25670a8640a131d042c8fc7fcd77693864097e8e6909569608adf031f9d35fa1954
SHA5122253bcbfb65fcda39d4f8017eefd5435b048ac8fbf8e6ecc3d51089c85c5c3850bf26e851d9207cfdc2e6df439dd2ff6df796e3605ee78afe40445236f4d85d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a1f2ca14962626c4d2fbbd07d9bdb80
SHA12384b70f2ec7f366a91b20f6504915dff110567f
SHA2562f74835d21ec1337339dbf83b7319fbb1acee46bf3cfc4f32015aa4ddcd10ece
SHA51285c6ffc33624b385e75505d9dc4032c079b6c975bd1aa249ec542a04dfeab8285cbde4a8f374a4557738a5c53bf50defe0cc4b90a02f6b4a4c806f8c337a0c03
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b