Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 14:43
Static task
static1
Behavioral task
behavioral1
Sample
42baf9ff548d09e608db46811a6ef809_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
42baf9ff548d09e608db46811a6ef809_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
42baf9ff548d09e608db46811a6ef809_JaffaCakes118.html
-
Size
3KB
-
MD5
42baf9ff548d09e608db46811a6ef809
-
SHA1
bc4e1dbaf5ea633b9a71d80401dcd764f48a86ea
-
SHA256
ea80814f64f4a935608f23ebefc9e57553c9b5d517886867c7879daf47627e8c
-
SHA512
915ca4a39c99f21bda766afb2965faa11ccaa561fab739e70a6753ceb364ba72b319455ee9bead11dba8c54016005292ed9986963b1d366547d165e6e4e72a4e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC24E4D1-8A3A-11EF-9AA4-4E0B11BE40FD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000004866884bef519775a5008a33157d39c65be8aab7aa6be28e2339f4249cbc2a34000000000e80000000020000200000004bb3d63e7b5bade8fbab85386f8ebb74f5062248380055e8b24d79afa905396e200000005a5add77442553fa1f15d848c0d1951df9dc58e03f9ceca381f5c8c10b2a48b84000000075f938934afaa1c30802062a82ee0f73cacf46d2ec5b3c7025eaf90122248afb870caecc9b3f1e6890b6a11584cd3dfe92898c508a4039ec4dc726f177a3ed83 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4014ca80471edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435078874" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2460 2280 iexplore.exe 31 PID 2280 wrote to memory of 2460 2280 iexplore.exe 31 PID 2280 wrote to memory of 2460 2280 iexplore.exe 31 PID 2280 wrote to memory of 2460 2280 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\42baf9ff548d09e608db46811a6ef809_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541422352003924f4fe75a7cddc63a98b
SHA1f79507b37a71d1867bc7e3c8a1e1156b269c7c05
SHA2569e7be2b8e350b2cca90fc0a51961fc9e5b2615e7cc0500122e5790a97764c521
SHA5121190deb571ae491518e092d5cd65f88c56f743562aa11e4a001d2037241acbf06ee82a888242c8e6640f475abd20e514184cc9cee1ba43ea12a2e30052496483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f20ae58ea756522ec0ae338999996089
SHA1586ea6c1adc9615ba81665e95de623ab9249d055
SHA25615b80bc164ccaa52c7cc6251db0eb4247c1ed9bcc15d92e068a677cbf5a74061
SHA5124c5d287add56b3192fe7b829ba118f25423e7c30ad4f0dde51497963a6842469c153e7b152c88790e1416d433549c98a5dd83d41870f9e7f289540cee27f7373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508f8f3ba4116255c352f99e795027747
SHA16b96554ac6f3b52f71d3442057623094e10e6b8e
SHA2567474f5b5dfb93458dcb27bbb5c8902ceb2b5b033b967fd8032c4bda5c209af02
SHA5129009a8c36a40fe5ff3c7b1a54caefbff8cbd2bbfc22d5732257dc376e1fc51ee443957af7fdaa60dee4f2895b12f63ee6a7e3cfcbf904487d346bed69e76352c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c3614c1282750bc05c9f09312446b21
SHA153058836e7f1d185b1defadabe6ddc79e4618690
SHA2565553b0974ab165f5e55208f8556d8622a9fadfff6e85b0cb5057216863ce434e
SHA512caf5e8aa653875989e9eb54d0f49423fbac21665458db55680baccf09ba890a5b3a4fa5296d47afccfef1c087784a03512552478d9eab407ea63e32ae26a0623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c62fe5f7a15443307fed99aaea3c05d
SHA1e4c21d044eea64c2851892aa128c7b9308df8220
SHA256bff93a32c7edd06766d971e91c8d1fba5a69183f65fed3dc6611483f2aea8209
SHA51244c2e746e58fc754894fb03ae3faad9648fd70beb143a73c84be83be5e1942d587cfb729dddaf405da63c18c0a9dff110bf0b2639ebeafbfbcb00e98193dac03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0c2839294aa94dadc4b5dc7dbfcc460
SHA105e9a378aef4ceb8efcef1f00ae44405c5916c2a
SHA256494073930933a199e22dce22c2f0ef3ce12022a5bf6f8f0b45f3f0ecb91def02
SHA5123b215f84d55ddfd6d8aadf4edda0899ae7c8fb65b0c24839b20aec387d2d4b6e0265a59ca1e4785d0169c9822d554f2f13c365fb7f6f902056a61c630b9e0767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576fce1d0ad0fbb6dac35d7451faab1c0
SHA125f9616bc44250f38fc9c9ac9662db5268f78611
SHA256f021e1479a34428e6ec60ff37cb3756c2600aafb280cf06224ecce05c1f43ca0
SHA5123b83390fe157a21488859b364da0373ef735adcbb38d40942af01523dec14404e7d0941cb4f314f79ff3f4cccba07cd86636ee5c64b860d3669b04226a9dbf45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f205cb01f0736e8ea6773e6fbdb2b7fb
SHA13ba3e1473f841b4171d03fdf6297dafe57bf03c6
SHA256109992f8fc5bd12af8b07f6efde9d825bc612350e07eb49d5b423db83c946b6c
SHA512c81fff76bf4642d33818713bc67550ba38ea1af7eb311de6aacf8082f985486cddbd3c4c8774dcad5fa9e1d92b4f5f5393544b3a2881332033b4d35d2a48a876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d85ba823c20926277cfca305ff70827
SHA12fd93b8faadff013b8ced84d8a7acfb0e12f4da4
SHA2560b171ca7f8eb785a6df51b9e1dc7cca421dd4c6f96a27afe74d421631f661f76
SHA512ea2e9328182f3e18f6849358f22196d3ce0387d4f4a123f71ad83e6c854e76a99666c1fcfa1cf0cc67d5406fc85951058e88ed35978276cb1356539c818af23e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a78374e0be686635d6c1ca6039e59144
SHA197be11c9c3010f749e43fef27bdffa3353e6709e
SHA2568a5ea4eece42ee57f6f9597fa0b9d4302035bd7d606c29a151e65ae1023e488b
SHA512047d55b001b90cef38564f47f69f112533d772424343beb9427898088e9f2a34a5f708d9a0dff8321d1ec42a76012f3bf6112e3cc3e53be20b1dcecb144e915a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50438cad13324dc29ec745b10c6c1f55e
SHA19e8d070f66da5a3c4c19d9e04ca209374c1d96d8
SHA2568284f6a10fa31f775b700162374c69a2c49eb535978f33ee9c818a3e8002147d
SHA512b147c715f7eb3249d80f8f2459bf120f6890e62cb36057903a240886fcd53483411722a228f001252f126668cb510875a41b3ee17d685b13e1f198c1d90d10c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507ea883a2b4fa565e1b3fc726bdc63d7
SHA13ea83015912d433bd32b439508139be759058076
SHA256071151400f16ffb96cc89df36701f7b641aa895ba908e3fedc0fb58e02964e91
SHA5128d59238449b7d885754a0cf1b2fc23c5024613441e04ab50393b2de2fdf065b683871ad2c29efd732d809ed36cae4fc12836f8355c6b5a2d7916ac38fc4f4e86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac573aadda66b9f517aa31ff03dafd8d
SHA17147b769114f3cee0a4176eff737392edf406d9a
SHA2565fed46a9aae6e75e1133690c1f011e84639df4a2d7681d50a8d81c0500bdefc3
SHA512838b619e51d4302974aa7c6f8666c6837e0e6f57824a697b25faf252e29162c0cc5b0f7f55288620b4d4157783483bf08760096481a55056abf451e7d7de744a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aac0aa127deebb2ef7edcc3c05853813
SHA140eaf90a4d496f92fcdd4f10cafcba17ef742faa
SHA256e1aabc918b9e462193b97b9f275087476347577245d02d0fd55cfa4bfe018fd5
SHA512f09871915fcd3bc453f374ddfceb0828ee8e65e7073b8678225a02cc425ae33fcbe7241bdba88b6d5d78ff99c983a1e8a28323568967fb6267236e5e7bf36f82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9668463cd23acdb4046e5f1639d8fee
SHA1d2debd3bb66d4beb625f166b29024425373c6fc1
SHA2562ff211a66451b250fda9f19c7d454752e8d4d1f0e5bc588f92016373b6a53724
SHA5121261e398aae1c3654fc9022cd54ef488676c26ded8f25049ef61ae450cb98c8c7196c96e41fb2bcd5cd275a04133d8d2d11b373d839f44f507ffe1128085e7e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e79053cdd415e00e9356da2820e1cb01
SHA17ef91aa7f213c00121ab328a2cdd164d3258c876
SHA256bf70542f7c11338adeb6dc49d5084b15ed3698188ccf5450bf9e1c78f004e0a0
SHA5128c817113c7efc4d4a1a4f84bfd2a47881ce2939295d63db66a094007b3747f3e67c2961ddea16fbdff3bea295e3d709c2856057326d8cc8a89b005daad5f34c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d695b667ab4b1ecaa46bc7de6fce01a
SHA14100b13caf18f74329312e60c5adf15523456b5e
SHA256834522095f8620bf33114b6bdeaec95008ce5b2fc3fa2e71f20b8a49712a4c2f
SHA51209bad26b10f20525deb695076ba5774847db0f2e108b31ae25855b6493e8b631c13ff4caa6ab38e480cee6f01b8b5852aac03c1de9081f66eac458066b848aba
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b