Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 12:40
Static task
static1
Behavioral task
behavioral1
Sample
3fe8266e131975e3d9ed62f65a34fb43_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3fe8266e131975e3d9ed62f65a34fb43_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3fe8266e131975e3d9ed62f65a34fb43_JaffaCakes118.html
-
Size
19KB
-
MD5
3fe8266e131975e3d9ed62f65a34fb43
-
SHA1
0d79c1c1f5e010e01e6267881a3eed8faa07f139
-
SHA256
fadb7d4188a72a7186f8f68c74549d9c131971dfabb224dd15416eae57e8fe36
-
SHA512
d346441d63148fcfdd01cc3e716478b2582ae57b2e430d6fd7ff24f0d2090fcd293ab4e179cf38a40dbf6d4aa714c1075cdbbb0b9584653c063d6d555fbbfc2c
-
SSDEEP
384:zizKhgES2VBD8ckQ3RMybF5emLxXucfIk99heizVc9fJ:ziAS2gc33jqmQOIk9SEqfJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80623d2d6d1ddb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434985101" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5716EA41-8960-11EF-9A0C-EE33E2B06AA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ae903d876858b448bfd8acf2319bf5c000000000200000000001066000000010000200000005414ccf63b0c32e9b460fd09451781aa82bc44d989799fe3ae6b7ba2f0d400e0000000000e800000000200002000000067e593a05611984483f36d919ccaf55f02a7b880a40b2c4c5f012da21db75d7e20000000b15e65be2054267d8dd155ab9cccbabad5e29bee04445558849f10873211c9c5400000003f94a92d9a760e78dd6b86467b39f0e4dc04bb0e20ff86e742180f616edb9b024cdcb661dfa40ce6421637feec510195219b34ac18de9b1e5995eb35a7cb29fa iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2556 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2556 iexplore.exe 2556 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2372 2556 iexplore.exe 30 PID 2556 wrote to memory of 2372 2556 iexplore.exe 30 PID 2556 wrote to memory of 2372 2556 iexplore.exe 30 PID 2556 wrote to memory of 2372 2556 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3fe8266e131975e3d9ed62f65a34fb43_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2556 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58082415725e90c85c94a22b18ca4d4db
SHA1d4b536853dc2daaccd37f377112f212081de8e1b
SHA256f9118cb50d09f04c2ccbd95ccc3e6af4a66c3510de730684482b2024db5acec2
SHA51231400d2c1b92741a0b516870187d1faaee491c1dacdcd09880ba3065fda601e9e0fdb50a7ce3fc1bdac5ed5f2925d33384276341870ab1bb183b9c14e9096d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fc077118982b07ce8362186f9892382
SHA11260443a78e1273ef1792280f5313d18a11bd469
SHA2562056db0df3856e4178fd6e55afda97ef0504d8ac6c7b9771fc0e9f33743ce725
SHA5125e8f7e223d945f13003bf68155b070ff855ca833f471bf6765121d45ac5cc1dbffe222d264231dd606960a46f545de8d882a9a7abf16c844be29faf9744dac88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532bd7bc3b5bf2e416f751a158a6292bb
SHA1f78421ce1e7ee970a138abad034abe55035cec8d
SHA2568f227fa5ac5856c031f0ebb83875237084bbfbdcf66df35f7425d539650196a9
SHA512a8b11978541dd4e9b62e63e73b573771e9721c9b84c060a8041fa153b71cc788e123d13e8129298bed4d4ce7aa97296bc449125241907caeea83d59cba67f952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd71a37c53d8b5efafefdc7fe268d2bc
SHA19a6d1142f18b36d01645db6f2af1aa2c4e516799
SHA256e665bcb51b7ffc1f51f677dedd435a124d449370e2b4c79688b4a2cbbf3805ce
SHA512dc23ed3df46e67df528d5652602397a4f1476077586574a1fb8e73efcab596d84c02b908fc3b1a64b3e2fcc5625db750f7542b348452b10bf79b629263832c61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582bdc44b7e123b02e04ef6d39d02df56
SHA178e4f7c6a6883ff9e5d5c5ba97f6cf90e13b3642
SHA2566538d3b81c84d6808b64d141a0602ae3a481aa2139690f7282867cbc079181ca
SHA512a3347b2f4484b1a915edad65383c1301b115d282575458ba82b090f9b758b8ae0f6f1894c41a6bc8a89e6e37fa27bac0e771252e15b7b7b3feaea9c29737fd51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcc983211c08f5af57c0052c8a7eb6bc
SHA1fc8ccd2a628727db250f09493f1c577837be646b
SHA2565f53d937d9e6a7ae2c4123f3923e079691100076ef4779f503f4585a8313005d
SHA51222c68b183caa1cf02cb5fa463fa7ba18b20349cd68a11462b58eb714273726b67d008d740dbc5bba64c2b058dd0b7a0e0ac4a209179db3d7759ff7263e2fd578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea01761eceb03fb21b516d7cf8401918
SHA1ff9742758ec2c0697487d2d713f14d47c8d6e88d
SHA256694ffa54f458a0fa8c9411361acb4dc42e371ffc73136dffd8cddd09ff7df3a0
SHA512937e7cce3c282d15c51e58f31e0f62f1cac7d9191c6c398b0fd13c4ef65d31653633cccf2c86b0b8067176bed76f45bcbf477c08f0f4027a37209abda12c6482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc4497fa7775f365c9a3ae64c2bbccf8
SHA1a8faf188a2bb34edc44dece9721ae6c842b55760
SHA2568d13ae647e98e9cb3a9dd2470595450475582c2d95b3b78fd16cffd283a2ba09
SHA512c213075607633de8e5cb76a76c9d3bbed869f92f84ee2b4dc3de528ad6f70594e254b9ceb2bf5b9d8e2dbc2046aab8ba036f4c0da705c452af95ed9d870e8ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b43e7190de3f3d9013e96f15b35421cb
SHA1f779c3a3ddcfbb47919e5f199f390d540fe161a5
SHA25690dacd65810fcb13f87046510522cc2478cf614b865555a36c30dd0d3e014224
SHA512719a8d052116ad82598ea41c30a46a0cfc5388ae833a600c1daae41392b3d33ae966adf9aecd511df883e2fc68e2f27329fd593ce9b46f5472d6d3026edb13a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d620cb9cf39dad7ee22cf9126dfc2ef5
SHA1947108dfb108b19f9d62609dfed761304f0c5689
SHA256eb7e95d6d2fe459e46aa444a38519d8a83f88d32f387845705ad5cbe9df19f8c
SHA512217ba42349e966e6e4a01d1a9ec42698bc865a482716121107b23e292fb9afac3e6607904314b995fddcc83ac5ad2643f78bb2bc669906c14ea2603f3f56ffd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bed0dbc51082fed0f9f0a3a5fe27557
SHA1e686082e8110fef962c34fcd18548938888d50f3
SHA256314e8e6490f92a0921091abbc54fd09116107f605b9f6886feecad9094240835
SHA512e49bbe4d4ddf99407ca72c76ded347c900ad8bb9d697f9b17b6e2bdb2215445a6aaa786698d533f319c19f7c2294064e8c279196bd752a0ec935d8884d169831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e46e56a04135fbf903d8ccfffe8ebed
SHA117cf443c9375bab02ad6ab843def0c08cb3d176d
SHA256644f2691cc246141dab1c3619f9bde1c7c91f793cb0aff6fecb84715cfd0c6df
SHA5126f19d9c9d53f574572bf1cb40d39b28ce8c9c09026a1fd36ca46327d57825712475d283c63617d256c2501ff8cbfa7b15e18cda1e1d4ac1b8866d0f1a7c0f4f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537fad0093f26f1b63ed73903317a1d6e
SHA189470c4920399a9a95fad13abc28362c0ea09c36
SHA2560096c87252244a56a2d6e91ae7650b77e8d56f2252779a39e30ff1af9a9943b7
SHA5127199dcc164f29b17e07fb77f3c8ea305987bf185dedc7cac3f5c7cac7815670651b146501c2e63cf068d60d580441d8eba4aa86535de8b26cd6511a59abc7cb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5741ebcb3d97936da8289aa78e8da7cf8
SHA1c8241695c5dcfc190e5289a242f9a4fa97b05e6b
SHA256e5ebe4568edd478cc1e45a1f614cd8d64c337e34245d991b4b72cd8212d14c59
SHA5123ecef219f5dc78d8292f9dd0c043b7accf1c308a003386168dbda20f0ab3483b2e55ebb24afacaa2fbe29a93e0ea6337e3e06844aafc5e8ba3f976d14605e9d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbc8644eedd9be08b4ec89abfc24430c
SHA165f9bed7202436e87f99ca0fe047f6576df47cf6
SHA25607728c7b6661e7f38fbefdd66b68169fc032797e99b309ca5c1891f3a0bef753
SHA512709bfe4b72ac5c427f6a0bd5f9eec3497338b35e8ca0ab2de590b03826f2b42a96605b2627d9a6cc7c21196c9d4e8e5a412d5af9d5cec2c2537b97b86b1f6b0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f46352908252d6a3519859d73802248
SHA156c449662d22bb77fe8c03bcccaf70d2e3205a0e
SHA256b3825239ddb283685481f6785fb1ce3c6460805f67c5a3336dd5bd0e63476323
SHA512ee987ff8106e6fb20466d9106294d048c1ab60139a278f4a51dec7af6025e110d4c1da69871403e1b2b214779d750c099f07ecc32b7196eff8c0591a691b9823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52851df9a9f552091da8f9828a26c3627
SHA1639b28bef1862c67ff61b16474918c97b55914f8
SHA2566b13e0327c32159c2d609b2109773b69b7514220b6aa34f5c9e0229c7cd53d40
SHA51223fb8a3572d34a9d1f02337b53f17d92be2c3c2bd244f843f1300eeb54256c75d6754eddf9266f8184c024a7ec84758c1c30a1f3819c0f7e427a955c0ff5858d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53250cf1121f9ebfa55450bc71d188feb
SHA17cdafc136960c31703d9bf6f584b72007d7769f0
SHA256318c927a146e0f73683ca7ff1eb04bcf65c2bf0a36692d8845d0cdcbaa2dfe00
SHA5124599151b0f63e0c5400b156526f2a49921741dbf1f8a673b1f7bec9271f30d0bc775714860986441c8a93987860a3998461caccdb353a47e52eccdf74a3e0598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f448a8d1cf62a2f64e87be902ac5f5ee
SHA1db7803a146bda94fe0351b5274147a4f2cf98ee7
SHA256cae9551e281ebba9007e3e9f77004d42036345875b4c90471e7f9f50790fccc2
SHA512dcb2ede7694c137f0f4c144800e27025e5386623bad7e7058a802c174c2dd30eb8ee64be2f911217ca13f89d30935df7c4d6a3ce1c09ac91518861fc317cd12d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b