Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 11:59
Static task
static1
Behavioral task
behavioral1
Sample
3fbaeb0fdbe4a0dda1718d9128dc2351_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3fbaeb0fdbe4a0dda1718d9128dc2351_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3fbaeb0fdbe4a0dda1718d9128dc2351_JaffaCakes118.html
-
Size
11KB
-
MD5
3fbaeb0fdbe4a0dda1718d9128dc2351
-
SHA1
10e871aa316bab7d1b62d0a01588b2330944fa51
-
SHA256
7001b7a0a91ced44a481b9989deb1e9e69f7925567b9fab0658f3a71b8ebc7d9
-
SHA512
56739ecb3091a43a12ba093010059e2d0a742fc78d1b797bc208c379afcf45e03e86bcf37b659de3cff95c2c901805180db54016337b0a2c6cdf83860d3f221a
-
SSDEEP
192:2VtlIsr03Vm8k/w1wvqLkZiBqxn/ACYbk01PVvLuBuLbdU8d:stlIcuVW/guiBqxn/ACYbk0PVzguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434982650" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7070d4a2671ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A19BFFC1-895A-11EF-8B74-7694D31B45CA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000056da3cc359dafd9f73bc64be230c8fb4fc4516efc4057ac965db0a67a21cc280000000000e8000000002000020000000e73272e45b78ffba68d955f5bac52c3bef08515b63dda4fd65d5a4ab0b63d4a720000000ccc47d94c84fa885678ad9e61af668dcdd8af993ce5427e70bbd287cd1f690bf4000000081d46f14fcfa44632c99ab97f5fdb3f5196f2e8198f41a12d49e12fd1867245f628d95281ed2cbd385a198fb36d4e4cb45b60bf27fe9814d661f210724e37a2f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2880 2792 iexplore.exe 30 PID 2792 wrote to memory of 2880 2792 iexplore.exe 30 PID 2792 wrote to memory of 2880 2792 iexplore.exe 30 PID 2792 wrote to memory of 2880 2792 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3fbaeb0fdbe4a0dda1718d9128dc2351_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5913a991303b9d90983fbd60ee70195a2
SHA122f226bd99a87684c7231cd5d122a386ad7c8d7c
SHA25626df0692b3d68e7bc85af8ffcfcd0f4812ae8a411b8b58f53b3847a4a075cae8
SHA5125e37f09bd2f585512000400fb142565bb5e2d61ece69f681a68db134486f11911b6f8ffa919220212c6858b57032848daa02717c6a00b60a532a98a3cd8c5a51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e85ed7fa848dcfd463e6f5c2e6ad7c6
SHA1822b773937a995060514a15151d73390a98becd5
SHA256db5ebf004ddcd8b83530da6718a8bf258aa51336392050aa4aa37fb0f72be02e
SHA5122faad83ca9636159e114ee2708c2fb3068bed34ee7fc287335faf592aec079823deee98ae9a8cfa83c0349497d22f4612b7c1e1176810664690bc9fb09169b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e1f0e674b4003733b2f5a5233d2b505
SHA1b71b5a265ac28d10bbe65b1980513c89ddd38858
SHA256870dc34912f6a1ebf5700590495fc8e194de6c0020c8bc3db60e5e3839407cf4
SHA512f1cc754243268a2103a39e2a3600fe00df00d242ca8c005865c797c53421351b6f41c5b8b29dd1687ae0e05ec408fc5e1e8b92628414aee3366a47770a4fd5d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c121678ec32ec51ec3417cedea2b555f
SHA146ec3a59a9a863efac3bc8fcb035ee9f6e23a67b
SHA256eb23686c949a0ff645504b6ec6f27ab836fee6ad570b70a57a05fc772b908771
SHA5129953cf0e47f3be1e6018a861cc6d815559e47f14bdb11f779460513aca20834edda98b4eb25052258a5fc378d1f38c285ccbab62dea260274f9f838274226141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ca4118444a645b805b723409b79cacc
SHA10dc17c064a54b6edd3b288bd5dafc05c81eb8a2f
SHA2563e19e8c9fc8155af9b4b25e83a5070f9ffb2842e563436d3158a61062052bbe4
SHA512887d6b96a5ede40afe1f765471cc8bf35d062726a82825491660406936469c5585d45fa274b3d6aee03a74c5c8caad665ca0f52fc8e21d7be6b36e28279839e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9458d21de10c867e183863a9e36ac31
SHA18591290bde72fb46dbe74bca192ba9cfb4b536d3
SHA25632d56d06cf2877475708cb6f4be99f75b8bf906b3c8f907c0940e38529b68b08
SHA512adaeb78f9e3bc2f8046e20db16cdacbb1b780138e77cf04e9caa6326228f772e1b8445fc15bbb77f46f8f911136d84182eb57e541a9fc60ab91ac6f347a3dd6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cca72c2f3d148460a3dfcbf7bb34d9d
SHA1606b610585b8a8d04f7d863dd64ab5e4cbafcbaa
SHA2567be14a18761bbdfc36bbfc0a7e996ec3e3a20bbf4e57f1b492aa2d5fe7f5b19b
SHA5127d20b986294b55d800e8a09c14515848109e46176a8f46fe6196ffbb9ee8d303ea1020ece29c314a73a0517a1afab0987d2c036e9c4dca3a5ae24e56a0ae49b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c5fa54ee97dab8c3a1ce96eed48fe99
SHA12c0819a3873ad61f215a1d60a6d012d4f0ab73ce
SHA2562d33b0969edb38a49ff73200d8b06d3bd16768071fc175ccd3aea70793155f39
SHA512ed45d3e6535ae16da8fbdf335a135a48bd92e7966f95f56ba12534baff45dffdbec21895abe306fbf63ff2dd379bddc715531c0cbfcece5394c46eb245d890d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52368b6068cb7d4d3e20a0896bae80a65
SHA10852a6a027afe764a87b547dfb56f33877ec9b1d
SHA256465302a4263dc959f462e0e8992d7a2de132abe102c6df9f1bf6882df7f7002b
SHA512e05712ad52f05f7f0a6be4622d27b93ff87db29cfb29f4be832e97d0887d53a18bea4fb19a7d69ac0155ccacb7e27ab13f7657cc9d25aded275a65334d9a758f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51005e4c22fb7211865ff083b6c9583f2
SHA15c268a57109a4b2891d2621d8c54ef1fb5bf5226
SHA256ca18d954b9bf52399cf141ef88d5d5aac4979a531709f3e6ca85ddaf059e7f0f
SHA51253dad34aad2d0b0ecaea11f349bfeb2d94da2266a4abb2dbd27d69902f9477bd979069fed7a7236c8272ab82266ed1f9f70d27e0db19db298635deae81eaface
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d035bee41b5085c9fff7066235c57a52
SHA180f0fab43e8785567750e428f06a35c0edc446e1
SHA25616a5d921c8dfcecda87a741562daf5a88967579e0db981d32dbcc6637984a976
SHA512380679677857fb6aa58c4f6e0af831ca17bca3bdc661959f9a2f0aaa91fe6b73fa888bf59660c326cf20ddb39d96c0e9e8f9531faf81581aa59d9d0590e9a3b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cecc42a91d0062ac75286abc8c2aaf33
SHA109cc97e0c1dbd3e0517e76f06e7c2ece1f68a756
SHA2564528998680d56dd276fc9d502c6dafeabf6ce56abe71e17dc89c994c9b0e8082
SHA512a55cd4ffb37452c692ba15285eefaaa53ba277c4b4547d89d184eb6bf04f9a8e58753065d3bc97e7f85c58fb7c9e47cb83e6a079378c535bf0b08aa968b3d037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdcc2a600f77d5f7f4589efbce97266d
SHA1e469c1fe221d60b9afbe7e1f22d7fab69ba2ceeb
SHA256aa0a915040cf93f5e4ee90761c5be79c8466d2d20a42ab108f9aff0ff0899531
SHA5129270e522403040dd843d559c6a80d8e282c0850a7f5af208e51f0bda8020eaaaa22f58c63ac1fa12ba11b0eab883218b3c864be1b6459afa834287f4f3051f7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580173064f7d86b4d06edc07f2d255336
SHA19fe0ff1aba3586cdbac14e49a01ddfa36c7e97cd
SHA2566d83f3b948cfa514863ccd748f109b060c7693e4b14f4d4b301a633e82cc69bc
SHA512d4c51fd8cbf6109c7c8d0795cb8f831bdfcdc16d1dde73eeb88eae36990ba4f10ef99878b124d69829941ade48976eb14aa4fb55831baa65f675b82f4b604bc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560ab61bff67d63832793f8e00517b0c2
SHA1f0a3902c8cddac0b4a68901cc45ea9d8a0150bc2
SHA256113815c70ea7b7c5494f6ebcc2fffb6b5cdf8250fd850b89b992f11d06666c7e
SHA5128d638f36fdbb811c90cc15c3ebc2e864479b74277069af4bfba0de4802c5aae67a7ddeb8e96e77cd7156af3f3534a1be1a039a53daa9507622410f05c6090c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d39b394586b185cd9ed27546f37d9b11
SHA13ac71ec071e588f8b1c5a2d46fa7bd60a1aa0d32
SHA2565315f75ae939582a5e29fa2fce4871febf7ce39ee97442a6691f283e58aeafd1
SHA5123b4aba84322faa51338b625d32aa01507363716cd70569048c5ca250fe0d615824fede425754a8f56481ed258e3314d4e7bde2d0b5ec50058d1f317d128c6364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a7d4ee1bd9fc781f7156a197304c781
SHA1703768624a0c2706ad22fc1d3eea171d49796538
SHA25647fc1439b53214f48d61ea396dad6b02e0958c0528f4ce64e967fb181ab427e6
SHA512966530ad8ecc50824a236075f55788fc2411ddbb03792acca069259baaeffe7a33713fd702cbc45ce84484d23d38019e786a2377c45969a7ca0325c41f18aacd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea9b89bd1b9e374b4fbbce185d7a26b7
SHA1a99b06147c1ec1b022b4cef8f1a3974ffbbbd909
SHA2565397c912c21a0a3d7a46cbe5b80d13a9f6348546c52b35bdfaf73f9a7adf2d34
SHA512d7ef49f9654038616fbb7e2a1e0c1076245bd73a433d7d6c079b9a23a1a9ff7791d6381a58132aa95495b542d536b1589df62e07a8a3433da306e3c4ed4c30ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd24a5ca7e770dedb392fe85e96e45bc
SHA1fb10e13b49b195563d8210f23ee5f6cedd742b8f
SHA2561e1da520b8f359d32451bbb0f711cfbfd6e4262a9ee6124b21d450bcfe64c8db
SHA512d57f55b3b60d6f06efa635b40479ee3628bc2b753a776ab0ac5c1868ff3be0591272b6a7437d7737ef8bd961f5e38d277209fe86e8d44706b6ea81e10983b835
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b