Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 13:54
Static task
static1
Behavioral task
behavioral1
Sample
403924a9a919d9330c5a9b8d410af724_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
403924a9a919d9330c5a9b8d410af724_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
403924a9a919d9330c5a9b8d410af724_JaffaCakes118.html
-
Size
69KB
-
MD5
403924a9a919d9330c5a9b8d410af724
-
SHA1
9c0e98d73cb8f88af7f69abebd659ee78c547ff3
-
SHA256
e0cebbe60f06a6f34f6e92cb947e4127006bb396ea8d8ca6f0a9db92473f0fc9
-
SHA512
93440b9fda6a9f31b08698ecb2edf1de60ddec252da992980773393a9decc6b49da95e3579592e9a9aab8b7d00095736a6903e8474aac416738af338eb412744
-
SSDEEP
768:Ji3gcMWR3sI2PDDnd0g6jQ5jIIygooTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQS:JTfTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434989510" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B0F2B41-896A-11EF-8BEB-4E219E925542} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0123771771ddb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000006865e23e456e17f2c0835732b4c0e6d06c2513a8cc696b0684bce55417a38369000000000e80000000020000200000008b3d8912ffb1a2980aa09dab0a608688d58d91428a031bdda0805779c973a3db200000004bdbe6f9da8382cafff73b1839a3e8d92f5e5be017567362a37ad1db272873c4400000000e24649bec595d6a061a97cd226c02a33dee7912bebbfca352099577fcb67e150c862e435565b3aa0f11d9e7d0919b2ee5f4f95bb3d954a62d7cee4955452939 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2264 iexplore.exe 2264 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2200 2264 iexplore.exe 30 PID 2264 wrote to memory of 2200 2264 iexplore.exe 30 PID 2264 wrote to memory of 2200 2264 iexplore.exe 30 PID 2264 wrote to memory of 2200 2264 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\403924a9a919d9330c5a9b8d410af724_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b64eca6e8fdf679fdd432a9083663e4
SHA1a4f7b22b24fc3fe60e1cc3e8b798354204f4a351
SHA256a178d609ce726f2aedcc294357385ee4b3764bca039f3e9c27c1d23dc2bc4810
SHA512beff9904984fc60b6a05bcc4ed304cfcf7455bf540f2914d7f80c97dc4b6dbe71ebc72fab7dcfc8696810e11b4c8ad46bce88f5a6179acfe6c73cc1e789241a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ffebae214ba97759e1cdd2d8b79a235
SHA1ada8dd0382a4cde016dc1863f16be85a08edf38c
SHA256492430e566c0c964cdaeeb93e653a62e742f0c7491dd6cf3e14d03fc65d60184
SHA51293754ab7a1a9662f1c2b1c2e718ffc77ef74ecf52027450c00ca0e2094975eb04930051a84ee2d83890ebdc058114176529795cae674c8e0bd1b3004cdd37be5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beb467e8991ff0e687ae822145ae9471
SHA18d994b346a9dc6b3efe20c17cd7d82796433e182
SHA256b12eb997a9c61a8de5197df51a09276b4128996088e3d178df36ea2b8b767631
SHA51298a58a920ccf6d217fffc79eafb96cfa9465b1164faf6c264f90b1136a2bd0c4ae54be3ef8ebe218ec0b4730582ab09cb14c13ff39d8383cfe3b50f59eddd2e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b77b8e773bfd9cd9107ce38dbd6288e
SHA1b2b7d20466847ae58f1605bbeccee2b5874ef1fc
SHA256ff1f81d6bd6b9c9635a83754df53852168e301df4e054fd710187b51f2372962
SHA512399d646113abeeb5cb4e7b885075353bdaa990ff485e3a9a93804cd81fdc7bdba79100d2b06f1434b6ad8a47c663b4cf2b7727dae80a6eab4cebeeff26e4e0cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c095bef079c96d76187dfa9b44dc52d1
SHA18bb41554acaf56b695bcbac7116f57b6b9aae3db
SHA2561c52e34afa5c3d5b2ece4d87e9f9addd976bd710a01cbbdc282ffd9b16b0cd7d
SHA51209a82a58b585aa0daf7cf5569691eb51131a5216d059009f17eddcc746900b56a05e4485358a81e3e46b06dca432aaa4b9a971e2d116f44de1c71719853adb9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543e0e7941ab9c94888a6f9d5cdab92e2
SHA10eabeeadefc0ada820ac017ce9843d8787fcab55
SHA256b1e2ac0fdd2a3329a05fcefdfc11f08ed406ab0260b147f193ec1b8182d333aa
SHA512e648f9fa14159d80aae64965a981c5bd14ca584a83975895ddd59f8511069d092cf05de589fd93b67403d2902b82b780363b9cd748e7f9071289e65a40944cc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c33866a623c431f9a2b333ff5a530f5a
SHA1da0c732c183aa42f6ad1ef6f97ffe45bd5aacea8
SHA256e03b2cacb30466b3a0642dc71c32159cc23288799da9fca5c98031f4868b5521
SHA512c80cb2fd5dbb13bd59fa8374293b2e7825d50803e9162b9d47c41f0e1db6a496dcf0bbb14fbd509407def905d19bf0dd2c4ed592fb4e544978cd0b54fca014a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57141bc392b3b4f840a0d9860ec1836b8
SHA146aac6143ff123aafb90dc0adaf1cbc3c821ab92
SHA256003c421bddef9582d3e9c7a19a1de8697dad63440df8c763d6f4190044d89381
SHA5129b797b81f1900e4267a92944b4cf35674e35247ce14dec16e64ddb48ca39d9b0e3feba7890b380203afcebc6700712d5a8c50fea05b31946b316d71124c91098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bd4cc8771b13eab66693e9e9d688d0f
SHA1b232632dd6816f12ba42a4eedcde3db29bafd536
SHA2563104c82daaa5246813202ffcf9d2c9b8b64a2f90d6c29b7e49eb7674d06c7049
SHA5128696eb6d040c4d1dfeb435f5a4ba32f4a98c3d1c520d782acaf3cee2b6fc0245f405f96dbc5c09caee582682f2ffb7da4a903a993c6a7290f817d3e2017d461c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5357b0485b4ccddaee62a535c3d9ece49
SHA1d6957e625828499fce39895751e36a3674ddcd72
SHA25659ff7f22090f9fed68489a8247444304900d0849f49b47a25819a4498bd8f0a1
SHA512ced050042905b7defbd34587cea82949daa44a7f9fff210335e15f4152e7c0712d3ba7ec584b567e07e9301ed866406de04c45839943accd945a6efc69411434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50655258a1bef91c3f2c952f0526f6d6d
SHA152205935e4b760ab6caee706d872f0e6a0a3675b
SHA256eb0463cdcc4a0da2b22ca6094cad7b3ad9cb247238fa510a1d38ef13b718621b
SHA512bc6a74162ab3d1b924013b8c2a42f2dcec32c945edc471cb13f79d510e6d64fc2f9fb56a6100528e7e4c6b5d280092a544ef3a37ab3b5c4d53fcf5db764c0d20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512da54bda19a14c0d167ab452429f2e8
SHA17d5905eea633f23521b6cbed18a91a19159d1007
SHA2566467ddceaf6ba4ec436aa84b1f3e66a296f6b0c2691836f6cb6100ba09cc4c6f
SHA512c0244875ad11afa8cfe63a1f08742d2dde361868bcb2bfbb1e146f30e6b5a4b31c1f68f321050822ccf5931cc5e9c9d4e1ae95a9ec22727bb713e0a08570b3bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e25db6fde9cb02e1df34a8a6e98b0f73
SHA10fa0574228e7858b47aa0f8e165593a6967d40fd
SHA256b32f3f24397adbf5709f759feed5539c61192e56307d94ad66f25ded07dc1705
SHA5121d479241731cc889e9538f4aef486780e5f7fb5f81bfab7fa3a023d2a21ecc75debf2f6916b05e918bd765321be4f27686fbc16f33010153dd196f8f714adcd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2549584fccc1e9e890c3e3ba4c47be3
SHA11c2e0576a99aea2a0f0cbf5cc574191d4ec423a3
SHA256eea9b5b902f980fe1cf8c2bbda90b8175382ba12a48a31d37d38ed0d8d3fbb09
SHA51272921736165f52d3ce31fbec1a65cfcbed424894b552f85935bafcef6d36b57eaa9c55326287c450f0f2686c1871e42fb6114fe7bda175cba125a06e1449ef56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522962428f1791fb45b55e778213cbefb
SHA1af4659e19d80ecef108e178bfda6426c11d5d973
SHA2568e06f9c9524ceda6c60b03965dc79c3c61c81221f80bec4b3c9b1cde45c762df
SHA512458279484b469797ed82172c87d23f073279e53c15b333b56721a9b368b749ed86f99bd55254bebddc1a599b493c40ff3911d5b854637e8df447a4a55bf6f7e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f898fcf61d4fa96ac191efc4dbe5605
SHA1bbf8e54612f2b4502985b52db49fbcb260e980ba
SHA25694299abb2b6073658ff3b26864eda2b33aa2b75c7b9718c5ee9291f237f94177
SHA51283509350d9893ac2cf13fe7d3ebd9af9b943777c6201edb7bfab220ec60ac47b62da417271c14ae3c40c8a3032e4e808776bd8ed3bdf849f4ca342fd0f16e5bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536e0337d1638204082ba2f4baa4d2532
SHA1d03916f58e252cbe467cfcf4c852a1845b81c156
SHA256fa60172b6710fd842117b60468a0dc2b96bb09013aca360969dafe51214a2806
SHA5127f564839c693ace9016a0a952f6a1cca97cea305773eb5b469600c1a98501068252e6aa5395025e94858cf9fede46c24fcaf07f5d4fa7cdd9d7b355f5ed05985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a5465b883758225f14e173b7f0fa10a
SHA1ec36b7b7482159d7ffb4e1298157fa1e02b15f22
SHA256a9ff8cf878b658e4f8505ac51cd610e108b2648bb138dbb28b3df9ec44211848
SHA5126055b3e4848b6c2b793a67266e043cdba14e78b0ce0fa284ec6214c7e02218948a718d9aefa9dde4dce010d2cc2bbda5aaef8a3f07f5fcb2a65388ac2fc4b9e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c00eef685a533b897f50e80de157324
SHA141d2f65263381f2901eca4a645bc5c0bb055ee61
SHA2569eae88268e3037fc5f5b0d93544905d2dc522333aabee522e799ab8d29a6a650
SHA512b3b30f0e9ffdfa605dc7a584d28e2e5e9ecdb1fc1371b48bec045e67a4f35bc635cee9b512844ddb2bb5c93aa28a74d064223d8ac1b3cddbcfa8bf826829c16a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b