Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 23:36
Static task
static1
Behavioral task
behavioral1
Sample
5441f0ad6362ffc66b6e09e58cef1d0d_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5441f0ad6362ffc66b6e09e58cef1d0d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5441f0ad6362ffc66b6e09e58cef1d0d_JaffaCakes118.html
-
Size
19KB
-
MD5
5441f0ad6362ffc66b6e09e58cef1d0d
-
SHA1
f0717c6eca71e795233623034bda3b0ce6ede60b
-
SHA256
aeb28f699eb8b8b4e7f144019c311cd38a4aef667224598af3be19746cf4565b
-
SHA512
3101e6ef1b5b8805727aef0ccb8a801d15003a722e0ae2262395acb38b07eb22123642155b6e02860d6d432f012b364fbc0b163425d1f55fd97b454d9e470fc1
-
SSDEEP
384:zimKhBTESRLVBD8cqQ3ROpyEemLTXucfIk99he5zVc9N:ziCSxgcd3IpmmWOIk9SRqN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435370052" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000006427dd72297fdba3d46bd6986d6000419e23a52f1c4b5951766dde9cf44de66c000000000e80000000020000200000002bec0302b0f65edfb3cc752b245eb9344112aeccb721474af9cb6c651a221c6e20000000a21c83a97d064f558abfe888c9cceda6d7c83a723eac9aea3026104e4e908ec94000000039f5efa72265980e0deb933e0f2e8bf752324c8ef7b8bf5cb5c909e17b45af5837d5df408294b764d94ea4971fa9d1828b42c3f9ff52311f0ac8ec48876dea20 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 801db28ded20db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9FC334A1-8CE0-11EF-A429-7A64CBF9805C} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2788 1760 iexplore.exe 30 PID 1760 wrote to memory of 2788 1760 iexplore.exe 30 PID 1760 wrote to memory of 2788 1760 iexplore.exe 30 PID 1760 wrote to memory of 2788 1760 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5441f0ad6362ffc66b6e09e58cef1d0d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f181c39604a8956e3b9892c5ac6e8138
SHA1308b525827f24297c11b9018ab75e151d85cb9b5
SHA256657f0c977c1541ed5309462566acc9f7fc5666fa7b2960b53504a7db73d0353d
SHA51288efb2a629c7e6b35ed0fd553c97c7586436170e28e8fa93178cfc32deb4c467d353d237178a488de3073330c8616eb63a1668a3e9c286d001f0a07806a7eba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e9c76ed4e71523386f7098335cdf72f
SHA10706c895d3b3788cf2f9ac6f2a3f6a675db1b60e
SHA2561c33277d9a00882fe475c205d8e6ba35a1384793a620d727c42f5f4c743dc418
SHA51246bc4e20354f8bf044b5c57cd6ef6a1825ae894dedb21494a99cd219d6b9e9549e3ab93d33843ecb3d980ac488c3a56efeb24b51bfd8585ef142f9c27afd7815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d178a0cfac245cbf825f41c92c9209e6
SHA1bde253b5821ea95ddb00842ff2e9966510e28592
SHA256c754be2ec30f93ec2c31563dcf612ee720dccf821cc45f5e432a6841f352739c
SHA512444a5d6ba86ef374735066f95c3bf0adbaae251d88ece1dddddc0552c9d521ba4deb7a031efbe5b12a8008ecd87fe9b446bc5922ce488d721f09e45d3e3b0fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566273fb90f979aaf19e8b6a412c657e6
SHA1934c2448854f953748646a394d57c8cee674ec08
SHA2565883cb47f9447b39ac9ae60f746bda1ba3c846acb1f7815b8a9bee447450884c
SHA5126e0d4e8d5c3c9fbbbbce8a3cbd458eb8a487757c506a5f43c92f44ba4e9b2eedfa57b8ee233773cf0902b50cfccbbbd30e3c951a5131e77324ac4f1399fa986a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5986ed47f2cc48473c0c396f93e73dd46
SHA195bf69710911c161c62aecb2bf722ef8eb503859
SHA2566a89bb7bbfff7484a96b5eb51a31c5ad2e893d236ff895c083e162cb0b031c8d
SHA512b423ebe1fe0a401ae03ccc13d647be260a01d542a0539a670b9d64af3cb806edb02d0039028a4207cf9a34b2311bfd2e8999a5e89e00204c57925023eb27928b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee28195c7c6bcdc1c27e5ab3d917d3eb
SHA139bbf232134ebac5ee73a5cd5e1fc5e5c93348c9
SHA256083e787439b36f6edff9df009d8f2797f862fba674189e8459219480ad43d4de
SHA5128943bc5b69fea3c1fd9653c15a2d2e8d80865d59e520291779bdade06b693a7e29e8c47eea6f3fca2f9349e780e7f99644d1105907c9a2ee03cd1d5d7da0e032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547254f46c6827f95326a12ff547ea2e7
SHA1f74a23f024f8f35ca4c9df0f6f211a77d17e7c74
SHA256cd405de3267e6fdce84ab3974889ee563939deca91b41da3df3e9618eb4cd0bb
SHA5124d596ae60dc7ee2085ec418f21c7738f1957c3d797a3844fcc00fcf509f1b8c8a96c581ea1c7b6a3e3f8369dc4297bc399877de8f8258a851ab3cd1bb402810b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e67b47230980afbff88061489b562a0
SHA15e8ee2eb327072bcc25341743553463a102014b7
SHA2567bd42a413456190cec3bb918b50b7c80bfdec4e0a1d8123a45f5b01dc6370ef9
SHA5129fb492cf4f0a8d5944725cd82fc41f72a1859c89d4d5052adb39d311733ded4dc804457a95de2ef968f8faee88e90e76de7332b1d33b9923dcdf9b47206088b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9ff75f44710f248c4f181c565bf697b
SHA111a12ca12d0c628befc1aea1b819c2ff6a8a76dd
SHA256b918f66e8cf93f744af39be1a5e93f2b5f95fc36ed8fcdc712c6eaa31c3b47f9
SHA512567a3fd3a473b394a1d63a26db80d7c3924f45ae3be8109da50da3236f673e0ca7ba6b088ada12ae05012b29bc631eb7b63520992b3b4dd5cf7e175c12848362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb89d86310294b78a644e2925517a04b
SHA12eda133f184f34b4d2945a520424f3f4ed38602f
SHA25627ec096009ce6b03d74eedfd37a95385e471de05722ca40d308a8c84d89906b8
SHA51240a2a83a5f00ce17e493689493beaa57e5683226e2c05040b7e4d774ff5bb36ddeb81c0de85aefc48135b96e2158fa6f7c0c66fcb7415121566be93a2a2f3d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58257e3c0d9afa36e8c1043a83c7d39b2
SHA14023dbcf9e83e1c395de1bc9423a7c042395362e
SHA256f5bd32e38becf4acdb32479e0a00fa717953088fca6cb8093f87c09eb2de3957
SHA512efa704240480c7387c99912cd3bbe96a3fae71929eb5a400137ef18e71c674bf5bf39a27eb5012a6b167035228febd1140c69b88f38dafa8ebdcdb8339675472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58091543b0ca3618a1451229aa2c87333
SHA1cd65ed4e22025d519afb95bb3238d828d82cf114
SHA2563875ca792499f3222fbf78a8ceac2bb3843274b5af83bc06e97d315ac3ee7004
SHA512443b71a8aa36cf548039ccdcf16d3f181cd1bc21fd7430e49b000e93556a81cd238d5bea293f5ecee23849ef58456c9f5808630d9c0323d5db9b0ef18289182b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb27d79cf2dcd30facf8d6eb6e903dd2
SHA1e59e40d67aa1c9b7e9d08d79605cf7ddbd99bb58
SHA25694e68d871ac7a565a529f3d4ee4fa09fbbe4b3827589c49e66c008f425aa1c02
SHA512a60862442bba41e4ae9b4824df95ea9dd70bae718aa14c5de456260ff4ae34adde26516e297b3bb12e50a69e219c796bc2d1f827d956639202922d500b55df44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530e5d8f253ee07bab92ef369b8d21289
SHA1a038d5e667e891fbefadbf79779a810dd9b4e03f
SHA256300831b59bd1b61e295157ff8304784620c657783a1a9a3dec23e6882779b661
SHA512899efd0275229c2df104a57a7109787dd5d832021315cc25cda366ec236961afcd109e96c1c2d57354b8ca0232223d90280644ff7e904befd6f440af8f16efd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544831c388284fd7e7035ab5ccbcaba22
SHA1ae668cb1cbc3a62fe304b9fc9b8c7ebabc89367d
SHA256fac62125fdee45a3f4c58eca2682419d03b206672e6fdf8c687e93f1d002a1ea
SHA512cd93781de5cbcfeb255c9505f2b1e7f600a9ff743d3e6661749ffa374d478d3aef33a88bcfd4db22750cc89c7b535e0ce7a79e51c75cd3740d2c3a2155634ebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54126f7d6072bfaa10949d9eba4b4ba19
SHA1c5298153d6622533f3b96cf236839a6862480ede
SHA256e4a3878290b669ff4f4f19471260bbf29c4c8e6ad47f3e7a03554562ab08a77e
SHA512d4ed694febae77cdef2c9a123cda27879abb9d929a243bb89346a91945fbd533babc20b8a00f12be491689e92632df7ff83da37fbe066fdf5629cf0c2b22ca9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e331e3353392421646198b80b9f62952
SHA18cccb1e372f5d28a10c549bb378e4fdd2d7216af
SHA256021cd5e1b12d19202eb954dc36ac6129b04163ef0be410339ffbd9f690cb9629
SHA512855762a5a00b374df2793316dc7cb9f3e698d4a00e0ec8b3fc0af87f6eb9e0bbfd38e67ac5bab42d76f6a6b2eae0c8b9c120a33c5bf39742678ad61129952fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5742ffb326b50fb39608bf9e120d49e8f
SHA18ecbe24ae0ad98723da6f69f89550bed07e9a06d
SHA25602c0ad97c74552df6132ed5d883fa27464a8251dc0a65c53a9d1ae6b0b6fdafa
SHA5123dfa624afdaaadd450f1847638155e30138c0d153cf8636f177cbd4c01b63ccbec69d1fe97621bcece09b5de4d96afaacef519bee9020ea51b233f2a30cf30f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c53155da7dc7d6abeae1367f2c85350
SHA10f1b1df4d5dca46e078a28474bef5a6e2608c4fd
SHA25670a6146567be412dcb0462553c84108c8d64912dd41d482cbc12627d873b266a
SHA512b691ed0e20f53ae6769b668982b0277d75a80b10ce3ee6386b5542c1d35c6ec0ddc4618d3555b7d084a11b16da017e8e6367d62e62093b77933a6a98eed62ce2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b