Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 15:36
Static task
static1
Behavioral task
behavioral1
Sample
3acc4ea5e24ff6e98eeef06040cd0965_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3acc4ea5e24ff6e98eeef06040cd0965_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3acc4ea5e24ff6e98eeef06040cd0965_JaffaCakes118.html
-
Size
1017B
-
MD5
3acc4ea5e24ff6e98eeef06040cd0965
-
SHA1
12a2d7b65ed55d2ed9aba12211310a7dac64768c
-
SHA256
72ee5fa1e1f03fd35ca56908a1f1254ba2328aac86b965b5925336b2501562fa
-
SHA512
6d02decadb948788bd3927e4cf9f8ec9ee773bb04c3518e555dff6500cf814342abc9145cf959038ed95273d8386e789b3e0cf01a23adbe72af56627a64d01f5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000007e5832301af79734c4f2972f03e1ed44f12a7da26e04a6490c435f124207b3f8000000000e80000000020000200000006b716003dab35f295c79dba9d6226a27ffbb770be166a74beb2d8d87a166e36120000000065e8e405d61f5f5c23b68a38bea24e4f392dbb09960af51921454c69582b9694000000049d5c6ba5946538f0b8bfb5fcdf654c9796d861e0ccc76ca00da0e67669a2668dee18e8a80a5590815eb19c9937a5d72a053279f06e7ab32a5a05cbe634ce55f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434909269" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C71CCAF1-88AF-11EF-9B14-7ED3796B1EC0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c89d9bbc1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2816 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2816 iexplore.exe 2816 iexplore.exe 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2816 wrote to memory of 1228 2816 iexplore.exe 31 PID 2816 wrote to memory of 1228 2816 iexplore.exe 31 PID 2816 wrote to memory of 1228 2816 iexplore.exe 31 PID 2816 wrote to memory of 1228 2816 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3acc4ea5e24ff6e98eeef06040cd0965_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2816 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524e2856f08aa34e0f631c56a43d037b6
SHA186921d5a668edcc74d61aa20319f7be663136cf7
SHA2566a96f0e25e5fbb2a337bf29879197fe970135e34b9e7b07ca1a85ff835c6b9a1
SHA512000bc580b2d6602c7dfe06e725f78ab9c0d76276a360c24f35c071385f4dd28ceb9a7010bbf9fee06e39499d18f5306675c7d80319fc78b155fd25b34965aff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e8b4e940d86b5d0d1290003c02d9bca
SHA18be3c8fd184db52ad08b4678884e54b6746fdcb2
SHA25641acdd2b9baad4f47f93cbf9b7c8801730a5883c2e65fa9feabe5105c619f41c
SHA512fd16efa971622002e95fac3b00687a7554b035dbb8d700d45969f86be88b3d7dd2a50bde39a0ffb2c040acf168241fd4a01092a4376521e4683baef4749b6615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff57d0635137f28adf2bdcf509b11fed
SHA1314074faaf1038aa78db84b517ba808ec34e4e63
SHA256d003b8c2e58894be3d3609d8dcb7f9eee1f87b9c8c85d9b1261c28afcf56e2bb
SHA5122f0aca7e236b1efc4ee5ddf66918b759e1f423047770336a67f574745263909d29c0c11b690803fcefaea648a880d9e925c2389d176d16986488bfa061cee396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7f5fd3b85bb377ebb4ffb7abafbd1d0
SHA134c52d824dfc6e1bb850de502d1e0456739c63a0
SHA2564840ba29b28f337a2c13d63673803b0737dd479a41bce7d052a67e3c41d0de84
SHA5125639d666e64e0436cda5a3d87be3b33e741612038e588f86aa5ae82b8b9a636150a1531277eda4b18eb0e2655bb5f21f0697baf32b6b8b776a86ff9d824386a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5889849986815ec1f968860621c70b5ed
SHA136f968f62306c6d1a92d272900239a69de42992e
SHA256e712bcbeb697cf412933a5fa222fba71b4226076009fae6fa2bab2a8244b9108
SHA512c8f9ea09ac2e5765ae261543d634360aae312a27aa005ab8203c5e532a1be5cb02fe3b1e3d0378d49a4b84a3fb481925c177e7aac1b7b020a8e56e07e0f26ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587f178ac39d4f9fb331426212b14bd95
SHA1ebdc6466b9c23f88b1140cd5bdc354bcc7ec059e
SHA256f3e3ae53877a9595d8ceea9b0e88cb8290fdafddbc8259e84ab5259433e3ae47
SHA512afd50a460ffe0a043f142cfdae3e5e705654a4dcbce623663fbc6b1f5b3d1970984f5951dbe4938b3cc4ed5d3e1f69092223f119dfed2d09c53cf6cff497e645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57facd21953e96c0259cc1f1077592b75
SHA1c853e1117903263a117efee4f512e8a62f22306f
SHA2563e2282d59e434e9a7f99c0e66215a593c6f648bc467b3c3d9a170e0cb0847280
SHA512ca3993e661052ac5b4022a3870f144904128d235d33915f1de662d67ea878f6e5779ec5d485024e73f6e585f47e756f9ed734cdfc7c65f0fafaf87f4ee36eff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2a549ce4af6131c8f8bcdd15458eaf9
SHA1d855c45fb52bc959b68019549bb601a70a685278
SHA2560737ced3a39e584e800885680dfc27243e70ad9ed01f9f44803e162024a2cf9d
SHA512cae8ab29df9c5e9c3e7ad5428d664456bd086498e44cbf3f0b16c2db0b6355aed1212df566110d42f441a32f218d8f892c6bcd2c7919155293a44da69878cf9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5155206a42c6d45c63039164693ed9f35
SHA19fa267afc21d138848456cbcee101eea01f94419
SHA2565a8e0519d0e394774765a16a8ce85fd42f89726c8ad77ee5b71872d2fe258159
SHA5121c88280a5bf6d4d7655e68143e8e448b1701cf3811894c4f4e489e2360fa5340d913152e73cbf8f158548e98016e291e6baa78e49a8414925cdf52d3deadedab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5694dc05d4043e4c00c55d46a47fd0c0a
SHA103130569e012917a56d0bf3525d6f408ee8f3cae
SHA2562570e277af23cf4a07ab35cd5f4b9a46817ac151598f67523c3b61de6c3743e4
SHA51244ccd5a0163b78c89c4266bbba7a89edc938c5b87db81844f5f505aabcd7daa04dd9b6b00f74032769a58ed70bf00ffc8aaae7e4dd68b6409ac0f6bb385da2b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9212720174318a80d135d092ffa8df5
SHA17708bf61dd56eaf76629d48c969ef3d466a44d20
SHA25671d1444f39bf3eea4344b5fa5013f8a512198d1dfb83acbd07c6887907766c61
SHA5124f63cb70a9b615949ebbf915ea83d5ba100f0b85a151b8895648c8fad7a44e6f6a42950b21819e3074d462c57d87b197e948b49f8aabe4dfb264c4718cc6f7ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d221edf314737263e758326cb174d67
SHA1970fa08d8ed43f9288536e50561c13ade4960578
SHA2562000adb8124a2df6f55cf19005f028c196d80dea2562278706f75c02425a8930
SHA5124dd0376143860545145ae18f3aa288632020ff0281a0fa8b666b1ac0d47c459c7c86eb7c07ac68a4e3cc1e3c6ca3e3021ca9c968e2909d574e5488ecd8fb14fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596b08d7c33b0aeabdb6cb0c6237c3caf
SHA1027f9db2e41a1937460c458261f5141a42d15c19
SHA2565e0143f0f4448b88b11af3181e27145a9729a760e882cb925b35bf20eba4cca1
SHA512267030d33ac7293929dc33117353eecadaca680a3509b5da0699c03d319b48445a8c278948d6fc9cc1d4ad73b839f04311d14a98b1afa0ab0dc534f1b8622351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0c0d3cec5aca6fdb0fc337e1978296a
SHA1ec43b3b140e3cff04d6db37854d132ce8eecdc95
SHA256ad7a06bf2864854f9c74ff450bf72d8d753d102109fd38765e14b8c06e6e40e5
SHA5123f7879a0e59982692cb3094ef48708ce959d8f93647b57e5dcf3b48daeb1eef32ef6ffd5806cb254972af887e06f78b68b3e979ab0ab8f2ef0029c6f07ecc72e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e8237b966f1ebdd3bfcf121b407a69b
SHA18748759dc1913efadaeebd121aa5d7f5b13c0b00
SHA256136c5fcdd119657229a9e75ca8acce0a67dd74112558f1360422205ce981e4c5
SHA51290cb524d45b46d54c98eb6efbdf0a5f124b26652a1aedf9b2feb93b8f4e287297cd3075272e90ffda15c2478b65f60617a39fb5461145826be53f2b929022e23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54200568c0ceb0629169296e35753d91f
SHA1e008498e76cd97f8e663acf8c13a2dbbfd1e0828
SHA256ca42862dc317476b743e0b2cd328e3db96236f05b5abae0b8e68cb57644504ca
SHA5125179b755ca763f639b03922d1febbedd711d3a137bea589a6cd25abcdd19e3c7470ad6080962601bef04d1734196f6f7befd991d9a1a04d9307fc7e35a4c0801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db2323ff9f702704dea6a494d47331b7
SHA16c4cef23453d600ae3e1a3a4cf64034fea2f73f6
SHA2566cd5aec89ee5ffb62f3d3b91d76d3653539381b2cc96b98b5750ff79c0b23cb6
SHA5121e943df6f84c10bfbc59c4efa53709e819425f777065be382cf8faa38525d62083ccc66560c3bf7c514223b208899c69e0a7419de5d954449e083ead3f79b571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a35ea34412f5ca86572922950ef143e
SHA104ad352f9a83dc967e4593c5fa168d0bf1e9b344
SHA256b1953f430a0be774eca1a5f073397557ae9b08cfa31bda252c58fc7766efbd90
SHA5128a96a14f37d75492bcad9e3e87308b4f8136e8de272eba1e4afedb582555761c3425bd5f7aa5642e16ff580b8c56f7b5b1c861030edef30e12d38bc0f6f4f4f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5058255721adef413671306c477bdf39c
SHA10b82890bd3600a5616776073842cb53ca3a49cba
SHA256c22605acd51298070287f52b289432e0b5e3a52513a71208dda564fde2372e71
SHA51210e99d4989125c08230c468a360392e9e1011173459483bb8c94ed9648d5a1eecc7e040d2c9770e0e50cdfb6bb42f5a710325ad253305cf30f5469ea84372b0d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b