Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
4453474c4d5435882bd720592e1e8a16_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4453474c4d5435882bd720592e1e8a16_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4453474c4d5435882bd720592e1e8a16_JaffaCakes118.html
-
Size
17KB
-
MD5
4453474c4d5435882bd720592e1e8a16
-
SHA1
735880137e7a2086a67186b14386f4c26fcc8baa
-
SHA256
d72841030fa62564767addff129a3233c243cf28cc8d3c07ac92994a20ed3ef0
-
SHA512
eca46cdfc84d8a798e7f791473edeeefc38e4fedf7dc2e1f21a6e77858691659d11fe759f774ce5c2b6343992d7f0d081b6bb3915caca596eef9b96242f32a00
-
SSDEEP
384:RIh4s56CfBMUouTrkotmJO8XbalugCuS0rLNeiRgNEqc5Eoxy3zGEt:RIh46XCgToot/8G4F8N8NEQDGEt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000008632c081b85ae27aa9e2473bde9fa634291de3cf14c8c25db9b7f13387ebb61000000000e800000000200002000000047b04973abf40040782face608b7b57666394822f496918c4397d12b53cf496320000000e9876cc2fa2d0a054b82a7da606157794b526a13c75f3988c51cf4ee1c158b69400000006870c6ef271123779625631d5ca7910e3e0f40a1b4cf96af9043689f80448489e31ea04878e69501c3e256782848f505b319bc26ec8ef1e6450723be65c3716b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20a7652d821edb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{58917871-8A75-11EF-90A9-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435104075" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2944 2068 iexplore.exe 30 PID 2068 wrote to memory of 2944 2068 iexplore.exe 30 PID 2068 wrote to memory of 2944 2068 iexplore.exe 30 PID 2068 wrote to memory of 2944 2068 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4453474c4d5435882bd720592e1e8a16_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa70aa83445def4a032d62cd00e9f0c
SHA14fb34b80c4667a1e430ec57f87ef4025d59f6a5c
SHA256562b7d6db7f6d2a6b51f1981ce5f57ea5578d88ab5fc37cc1bc4a35dd4b9fcd2
SHA51219a3c8dcaab670a72f3bdd84ed18fb55791078a129a8a18c274bb517a639d90f7e0bac4762fefc475a52b37552b9a8fd9e46ce0c2ed524825afaefb2ff800965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eecd555f2fc890bf221eea445412a9c2
SHA1a5f39b705dbe5a8db7e9799f22472d4a4cf44c44
SHA256785bc49cfb0c488dd8e794cb082c997d402be5554c89b1b0328d418c9626ca4e
SHA5120cd366c60e8ebf35582284c006e3ddcd7a8bbf2ec455766baa0b80e187f934359414340107083404587aeb08810863d41a4945e8579e315dcd9dca486d235581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5befc96c9873083c2509acee59767634c
SHA180a4e65019dce2934400ad2a4f995cd9e29cb512
SHA256cccbec7b9796940fa3e536e0e60070501b09749f7d175fa5e1c51853870895e6
SHA5122becca4f9214fdd056b6af63014d31a23c36fd13707ce4b7b2f5dff91e0f7baad38fcb8297c41b39b6f7471bb8b0d09fad9b5f60dbdf1179ec1f2ba08a87af64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5051e3af5167028b4a6272530b4ba456f
SHA146fff0968f6b5f7d5ccf852db65851e6396e7b55
SHA2560b12f9aa1121d6dae5904494e4de8e2764f7718bbdb1c68c673643467d110005
SHA5128246c5a3ad23d5e4d209fed0c4d73479653e9e682d796988348317912e08518c49ac5308c325637ba69cdb6d06297e006a727d6f6dce90b1251f8902b87fa375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5379a1141fd33a02dece62788395e9ff2
SHA18a215bc7a9b3cc49ff2359a10d36cfa78836d894
SHA2565d9254909899436acbde4a61dde945bfa8ff785905db4a22ca7b837c932f0ec1
SHA5124505c0bfe2109907489ad67836203ae393bf7b6b27b881061421fcaff7515a6bdd7fa11c7fef9cd453694e5c2b7299da0eaca3f8ca844a308e0fbd6b75fbadd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598abf0c5e06adb3340524a441b73ee08
SHA145dcc95571ec4f8ea3a6a7a14b15e32de709a43a
SHA2562dda6338d13c2a606d9f9b024d3ccf72840f4ea63ec6653076c54a6a40873889
SHA51257c6d193c4d6ae0f8e2dee350a2807b980a19a0c5ec639137c882b050afd381082d6c29bc941d5ce0aca7fcb09386309cf25b7877aaf35c214e56aaa21f0d0b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f47f892a4eed6bdfabd5985ec5d54f2c
SHA10267ac3ce70a558d8a8925ecf53dd6fb9780eafd
SHA256984e3a3df165f26aa20261904852c40439e538e6f29bab4ca99bbc7f78bb6d5f
SHA512d96aed833b939c27b36277a53e1198dafd108e5399c0396c2baa4a5c98656b550c35ed9cca775c59cfbcd3e7a68df0d0acdf0edd823f6583025a19cb4f974fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e7f7c4e4eb0731b4cb35f8f8ab8bf13
SHA118736d26fd87410fbdf61e24f5b27dd98f44c9f4
SHA2567f693b7820d1c8a6dae67d869b214732d2e258abeeac352b7b4a9808f96ebc61
SHA51226d2bfc985cfde83c204101ef3016dde09b804edc425040d4ec1ef1a159ca45d4a352d6746736d71410430556c6896293adcd473e6564f43b5283441953a8daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed71ad9d461f24146cdec9d4a76f6f6e
SHA1219800fa2eec5c61e37b8ed52c3a441a17d19c0d
SHA2560ee00643ed117dbcce1e5d2753209f307816a19ab25e2691813d6436509ccc44
SHA512f62c459c0c84edb29b192c837d8cfdfb908d6ec93700e152d58998236a6afd293b88c002cec161bd589337f786bda904301fb68301ac905311814e93b33efd24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c73b3f53345fa3255d7f9807caf23a9
SHA188eb26e65cf1eddff03c31161fe0ccc85c090079
SHA25614267ab1fed350e774ca0b925091b575dd90336a9ebfa2d22461ca00e5658e1d
SHA512b928254abd745721ed2f1194a010553d5517447e25e51b77d1f549d4e9ea73ff16ae806065af9e0f0ee5ec9187ae73af289c3f2947cc83016286a1e25773ae04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbd52a64c3aa61b798ec47fff8e730c1
SHA1adab573ae3f0bc30cff500ab1b91fdd4a6895219
SHA256894c145ee4343db3f48afbbdf7acc243ea4e6bca36e6b0c0286b0470cce42d44
SHA51214cabca89578a8b90c600f2eacae4aee6655d89a13082d40d51ba3eb3e13c0882937d95a7b3b2151868252dbbc195794859f6c4c3bd20a7196c80e03cc763b3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccc04c0dbf053b70d0d5a0505266f44a
SHA10632cd9587857d83b4cc314c28f141e9e5ad7e7f
SHA256f5068e856be413381cf6157fb1cac135c1fec3a6609a00d77052ac0793393e98
SHA512955803e04be9bcf8556d02d407b24dc60972132dab2226b4e0f4d6daa7a7a783d7f8b243e66db20ececa90cbeea802835f45445f216d9556d747d685e8233fec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9ff326eb7faecf67a87ebccf898f4fd
SHA1268f6d9c89297e477829c979c8a4730ce8cd2e2b
SHA256a8b794fab70cc16163e90609314e15e4e2b5032e5e87b2739b03c01e19ed7ef1
SHA512f744f28799dc280e390d947969287fa804af1422e2cdfa40d06a9ec92e0ee932e55ad327ee6f345998637f3c890e4956847f4f965ba51c6448e7384dcc744aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e4508258de576dd0685a9baddb1e5b6
SHA1c24a2cf9b7eaac143b53560e28c7e13ca08a71a0
SHA256fdb295abffefb2fe877a4976c377808297f1cadb031df0c05dee842ee1791d38
SHA5127be2b068e803bed5e51e3489b2798011e41bb14feb99cefec28b049bce6fb2e7fe231d2b7a1d9aafbd5512c8a5b5bfce146605eaef309b7cd05a33ff9da85f51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a3de81afe9a9126a711c348792b239d
SHA15e7b741eb0844c7d4823a2e5f78b31a9068d3893
SHA2562c58b876f59fa3e82ead8e87f835532b12c5dce6206adc3a6a36a0b29e46ca9a
SHA5120bf04d8310583c3d6015e0f5752f62829d90ffd812b1cc7bea42757ee400b148bb84dffa37383d14608ed9cae58635cb87b9df8d342c742962c5e8ab6d14b83a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe9c136fb0fd0cee8a6983945e9ba6f8
SHA1eadc2ca124b6c0088d15ef88484215c2e42abd00
SHA256aafac9931266ed4d734129aa3499703d0f3a35ad681ef25bb0a053c2c70897d8
SHA5128468c2de0e7cb36479678456d639f80bfb762be72357b8235057e3fcb1f76e926bb3738d0937f3cc4145a99266181e2984ef6b7dfdf8d37f0f4454329f2f3075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554c2796bbc34631337320a02fba6b173
SHA185d7f12f7d45f3cf5949dea365f792ce97cfd9de
SHA2564b10413792fdbc0a834e183409ff017bb6c5b9aa518fb378c52c8ac578a30794
SHA512b3cc3a68da22f53118813d8e98ab5aa5a96b7e0895c6311ebd56defb43328d1ae03ed7f242726ea5222b6e62411dfa0eb7647489aa95ccbd9a070aaa8b2e2b7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535014cee8c9803862b08edb7b29babf1
SHA1988c919932fd15a2228d797d59c0ba06af18e35b
SHA25603aae5c0c5b63467be59415fe7bc8edf608540431a4807ee5265aeda9f7e0242
SHA512136bf7c49169f22f528c730cb1fbb00b2851af071efe5785b181617e578a5af6f0ad8381af9018d1ccf4bcb2f203306c0f936bd13d90e73c6fb18e23ad683a97
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b