Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
424afb6fef41c13ac98588f9d4bb7539_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
424afb6fef41c13ac98588f9d4bb7539_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
424afb6fef41c13ac98588f9d4bb7539_JaffaCakes118.html
-
Size
12KB
-
MD5
424afb6fef41c13ac98588f9d4bb7539
-
SHA1
1b3c0f408f64635348e195936ff83c9d357967d3
-
SHA256
9d69b5bd3a9a22d05ef1f125dc7b9f0c9e5933cf00c0c7a574e6851bbdd27f19
-
SHA512
ce5c26b4fdf30d2dab4c3204e01d6124cadc15bf6e7c391bfa0163002c47b4bab81a315475b56a188919f58067ae3565adfdff39a69d0676bfab0fa6a83d159a
-
SSDEEP
192:2VdlIsr0KXyJwVC9N5tu8k/w1wvqydBeZ+nyXluV01JauBuLbdU8d:sdlIcPVCjt+/gcdBeZ+nyXluV0JaguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{35E66871-89AE-11EF-B30A-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435018551" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40c36950bb1ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000017d8a1692cf9231b63e212968dd4fa1b1c2a289e0284f1a1b3720547461dccff000000000e80000000020000200000001cb9091a9fc73841aa4c2ceeec7492271d8efcaec79e6f49eb7d6bac8650c4e7200000004b85fef58a24524f9e4851cd431d99022ef7957e0c1d4535cfc3072dcf5e4a904000000066f6e6f077eaab4fc1470320c2348c866a7ffd2596027d8293dea522f415fe6b9d627b90e1d0e95de5ca68270959e6cb051aaa9014e0c0b480409fcc5d138ea0 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2996 iexplore.exe 2996 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2088 2996 iexplore.exe 28 PID 2996 wrote to memory of 2088 2996 iexplore.exe 28 PID 2996 wrote to memory of 2088 2996 iexplore.exe 28 PID 2996 wrote to memory of 2088 2996 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\424afb6fef41c13ac98588f9d4bb7539_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2996 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d671db2d298ed1cca8261c9c19892f5
SHA14fb74e1e332268023c30e23d50a0ba3efaf70492
SHA2564dbfda57e49a0d5e83b344819fa02a552b0b4ffce3a04e3207611ed268046dca
SHA512da2140bfb3588a77196c9e04b2ad839b9e96f6927600b72a09e3f01917d9d3a274b93c91ecf251d4ec82ad8b3628dab873d9c564227d7f6c694122dbbf2a49c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59508c1184cb7bee454c02c8bb1e83756
SHA1f126a298227b3f339dae9272445f00a1aca32ab8
SHA256608d9af01a3217dbcccf99158468cd1412871fb9e9a535661a300480271c7fcf
SHA512afc9726311be22041a69b5f7bc1b1bccc0ffaddc23b8f055a26db74ac38c3ae2678b2474f3a5fccfc8f0c19cee3afd7d5df65e9451eeb2c19e05d5b4b45e3116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5347e6ed4579916f9c10598088d3e2dc9
SHA1fa675b03624ef8ca4980b5a5b2fb3aa94dbc8877
SHA2562207c9b142eb84c9cc597ee4e5729f96e1d43ed383c2cfa90de8231f3d28a21f
SHA5129f5c93bd5ecfaf2d7fea106fb4ac46da154535e6ae2a98958bfc161ea4f5c944b4e8061536695840892078c5c19d7b8dd2f8a95af4e59f398e1bd22c5a70c0ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552c45b585ee8a164aa0156c52a9b97c7
SHA14e37f8b9b5d437117e19f7a2c3348ebd3b73e8ef
SHA256bab9b33065d507cd4904abfe78dd5c83d248dcd4e821557ffed001b8ece29293
SHA512091aa3b0d2a6b520b1173938015494e849dc1d8fcbf518bf1b2b32c8ef9e0f9d71c3f88b8135e52b934b7967f2a7ff33c22f069e70befd897af09ad9dd4b2fb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a151e573711625db2031376f3099dff
SHA1cc5dfd38f1c05881834a830e0f143e1ab664d123
SHA25648edd62a8b4e6ae2943911430b2d7fe1690761e5a5ae126c10c7c43d2d1dabe9
SHA51230a7467aea61e89708c6eaa82af982e12df9b53dcb2ea59f2f10e34d37869036d060515c13193b137184161eab0d57591ed41d5d74bad277f88e98582c8445d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57344d5531c9b4bc5cdc6e88097d7ec6d
SHA1f60f37fcdfb66864908a30108eca0952789710db
SHA2568c0335317a28851aa4bd79213354219647028d817dc632bfc218f414c19465ca
SHA5128a97e9b9ea5dc0232cc0c81e46794f75139c9d0fc598e45894eb5afc6fcf1bebb053edcb8254601cbe3d9f160b1b826d800c0592338b9e5e581ff8f315f00890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5844730aea5c9d23442a72844b67ef770
SHA14f322b1aa1c7f6b1435fecab6f3675f2c52d018d
SHA256e57c08a399f58a9108ef22560ce21b3d76a5589a9c456b62d3867e125eeac3ed
SHA5125a757c5f4a834be7d36d6fe29cd306ad0b4b19f051a211408171d212ddd87b2adaa4056414d9f77fbce391ab7537c3e3d23407e89f9489b618d6bcaf32ecaafb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a529956649adedc717dcbd92015ad0ac
SHA1564eed58ff8738e500da9bbb4ca05329cbaa503b
SHA25626589996eb325761c92f65f99db8f28e73e3ea241382eb9c98817e3582dfef22
SHA5125c5e91907d6be0199a41be54cb5db371108b262f1b0c7f8edcb5a6f26dfb16c65b671ec352ac655030ee19a56bbbd6791db81d20ed57d298fef409e0d2a20b5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52de36213785c784781b15313596b0360
SHA1ff0ae5545f52bc08974a53dfa7dc608c0a5536ba
SHA2568eeaa4943efdfcc40467c73c615a3cd0929c2f44fad785959c2c20efd11b2397
SHA51225ed3569bf5355ed102ad8b0720d85f201aeebcba24c873f6665f02bf50655576770cfddb6a546083ceb0d57e23a9d195895c1cae46010173b49395378ea9361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ea2c5520ddae761b81e9eff2f8c77ce
SHA17c4e284d6e11167a037328e1ec1b6ebb3accf74c
SHA2566f06ee595c66589477cb4b6256291389afb4f545e3a4af4c61f5764bc2eba06e
SHA512d977a5967403e10e945b8fff096f5ee8b9ee4f109087579913bfd95e03cea83da5081836375497b6254bc0488a58c9960f403bedf8a78f33bef696de7ba2dce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f23c71977e40c419985c4c538ed655ab
SHA1f3d7f82f8f6726643230fc1916034ae505fa6bb4
SHA256193b51940c7f8795adf39bb6422f65416a256c81049afeffc26605c14019f397
SHA512a762e87b4219d51a5a8ca7620211877f5a9abb237882b25ecd316b4f4b9d505d653cf57cced2b0da5bcd98968c186e2ab2d7cdf1d996c85d99ab37dcdecac85d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561e46891fb8458656c63bdef4f7a18b5
SHA12d221d8eff96231d999d18e32669427c8b61467b
SHA2563a19786709d5076ebc392c5bb6b360789f20493264547a60a919c06e73900c82
SHA5128d947aa8f84998c1887d0d5e12a94393ff5cfab2b8a65162d11fd37512b6d96d8e3fdd6735122e146fc33075eb2815bc833f5dea51cfb8252d390c15815c391e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5998d972303e20b989646d463ca25802d
SHA18ff2b4dd7a504e7c3e655bb8e159a1eb1a248958
SHA256a28caf68fc286d66837283fc824296cc5eb05b8d1300f00a5d005c28fdc4a115
SHA51237ded98e75382e571842d5b345533791a27cc3266cfeb9ea1a36851ecabac25b57df4871a34c73b356b075c40aad41e027e46b76fb4ae6f0985a34f6ddeab087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4d7fe9f99187d9a43fcb09a8258679c
SHA1881776da28f7afaff194ac2731ef5a0c8602d09b
SHA25616191b4ef9bc31cd51afcef95594c4855db50451871c6bc1b22863c3867d8098
SHA512bad0e8565e3736fcc6e4172d44cb8d7acd8bf6b9533b833bd7a1d8ed81e87f10b698a4b0b956c06a3dde979ef4dc45d7be59c70e8776efbe97ffe10cebf5deb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549d408d9a295b9439a1f63e05201d1ec
SHA1c04333154b554ff0b0387ac09bb049efcb6fce7e
SHA2562ccf71ee96b0c05bd3baca783f0aaa5187bd0bec0332a56c0db4f41ecc1a7fd6
SHA512395ce7c92918b39eb304cc0ef5ad9854e7391f559e1e16a8e5e6962c0ba44c9bdb9d7e4838808c8c28c01488655f8fb3c8534cb02b57f2271fa18eb0e2d7d1b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583dd95fedcb5e70d13071bcec0e24886
SHA172ce17e9f802f250bdf1e25db3a128d66467100d
SHA256318eae7eff7195c4e3a442af823826e5aed6b37e37059f16c6b24b7d014fa3c6
SHA512230fa60e168ee85c5aa9523dd46bf171c47d45715052a1e3d74cb36541369c1226bdfd69a32b7ac4300a6bdd294debd7ff56fb0223e6661489f16947e15464c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f3a2d47d26d68b99f32d92ee205b7d4
SHA1c4af87da3ab456fa6438454d7fc06c272d75096e
SHA2567612610cf32873a0b5cdf62aee50349b7741aad58adc9cd548235eb0854e3f0f
SHA512e6237dcd5cc657f9862ca6ef8dff1ce3e672ed2c0908a6a9aaab662bafd67e1977c0aeaf4efcbe79d916e2412f063f007b1910f761b4d5073a37cd3052e126a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598629c2c2b922e9f1843e0d8e4188e90
SHA1851666874b5c9e3c818dd21bb2f47224e3cd77c4
SHA256ba231496791fbee8de446a2c45742e3c13a0d6494b6b46915aba2460a521386b
SHA512a332217204d977d16698052b5f4d51fbb84a8d99ab8140fcbf59b862b05e3407d8904b6cf37c717065e72f30ee54bf00df93c1c18b2e65105fd8ddb177ca961e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eacf3e1b68648b42b4ef85edd7397d3
SHA1bec4d5ffc483aae65cc9136e089e2e77240e80dc
SHA256316abff925f3cf9841f93de8c5670e44d90b2070707fd1a177ab9c21bc2a2997
SHA512f4935a560c96683c16c3573680999ef5845973eba88fde18d9f4af9c2012d180c35da6d2001ce6da78c2f472b8890ba88d165de76999bd5ab98fe9892eb73472
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b