Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 14:45
Static task
static1
Behavioral task
behavioral1
Sample
52662b655714231bf553e27f13bdcfd2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
52662b655714231bf553e27f13bdcfd2_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
52662b655714231bf553e27f13bdcfd2_JaffaCakes118.html
-
Size
27KB
-
MD5
52662b655714231bf553e27f13bdcfd2
-
SHA1
b62bef0c1aab2306eeff3153ebe5aa828eecc4c1
-
SHA256
5282c1bd3dccf6c823860a2684af5117eee91991e6521ffa9f32a57869d401fa
-
SHA512
89a1b34b509893e22a5fe009843cd436f1222c4d41db50dacaa164cd3da3e2d0c36394acb627654bc2128547a61772deddc096458d215a849569b5cc51173414
-
SSDEEP
192:IB/+ImZX5NaqxGthCNA1AMysYxaaHLnyRb5VzhIiIcmI8njRplLGYHx03O:IB2LXxGjCbxBLnMbdIiIcmI85JmO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00cc995da320db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000008888134b69cf1d7d403e8efa298eed0122e3e73eaf7b25e5ba412d02c4154796000000000e80000000020000200000009c5ae72b83264f0f69fab37bf16a8965552dd8abaa6633a9e7105918233e616e2000000042b9c344ef6086285f2327c4b77c9ad044974927aa0b71d6c2eabef0619489fb40000000509ea34697a62a3693447170d0f4139b483476031e8b739784772750696769d7e8bbba86536e1c8763bee9646a98bc92f9d75a80a0a5b1f67982b7c90c745893 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435338223" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{83A246C1-8C96-11EF-9C5B-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2788 2112 iexplore.exe 30 PID 2112 wrote to memory of 2788 2112 iexplore.exe 30 PID 2112 wrote to memory of 2788 2112 iexplore.exe 30 PID 2112 wrote to memory of 2788 2112 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\52662b655714231bf553e27f13bdcfd2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1c8da2e0b4ff189a699b4f566d948b1
SHA1168e22e51a5003153247a7750e862848506c22bc
SHA2561259d6122cfd7d9af44142a88a8587cf71ba49aafa0d8301c88619168ae24d7c
SHA512c54ea9cd29d6493f64c7877502bc28c759620058b4f6463d60cd337053545dfc172592bbc052203b348c54b953e793702aa3c596ced9d442e2db55c2ef96c602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d21a835824072d33553ad8ef53c9075
SHA17d06a022a0eb5e8c38aad23eae919687edf11709
SHA25681f65b3bc5ab299ef26b35399519b87e62687dddd36bbb66d0b81cba7ccc8884
SHA5125a3831d57596cbe6a2528e7e960ebe17115d1affd443437abb9983501ab2f435628848717ead05966a83115b232829f3444ecf37cf5ac80ac950e36d6ea1154c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd8c68b85c2c0ac050abaf7744adbc78
SHA12df9ffe6984689d34b6342e62bbe65ab77c0dae6
SHA256e919de3b7771dccd532f58fe34bf7d8edbffb170597b7a0c09688cb5f6b83aa9
SHA51230fe31d1484c6315cd74b61b440f1d7dd3e1d8cab6118dd2463a12dd08a73b93d8907b7fa9aece6b9bd46b7abbd41399cbaf41581698e413bab06d18e7d06ce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542df133c656b9723ddfc8c96120b8c35
SHA14cb7e3ba88461313222f905ef6d36766a36f1436
SHA256b109fd311fce5d3fe19a76c5bb8fe854781227e71690f11ffbb423cf63a320cf
SHA512dd72ee40e6d932e8e18bcb5b69385287964b8840e12ecd3606ce660c503ea9d29ed5b2b608fd4893f0b5818cc67e78b8f5ba86bd521b61e1eaff7a50adf7d722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d123c25d90f8343ede6cd3c3361004d9
SHA1245c47b296159c5a24e4a13a1ee19e2beabfe60d
SHA25625682d7e22d23d2155f30186fbccfe357d3c0e086ed72c5a9cb4b9af03b73b62
SHA5126326d068794ddefb3b65d9a47873887800294159aff657be0c8263726d6010b1e8316c917049af0fbf0860816bdcd256f67d3ce6a6666047dedc48afae0b27a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a700b943c788a78787032af65a3df75
SHA16974de83186ec9fdd4654232f3c780bb4bc73212
SHA2560b1e294525ecd6f4c1fbaf48e168abc53dc0cb41898368aa3af3e0790f4fe10a
SHA512152072ddc199357892b9b3c703e12a628e6c5f3287b56b3cf3f69d608b001afee3401bcc10bb74417299d2c610f1e91daf0254418d3d72c567ffbd6f4021a63a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542c80132280b2cf2ef77aba0cac3dbf3
SHA183c49b729b558c153ef56e37b337f253d84ec7c8
SHA25672fe1734cf6099db34c958fd0008baf6626c965e4e4964c8cd22d379321a7c08
SHA5123c2414e5b80de96d65fd942d8595c59a752e3b5aaed87f58c5e8e5856d0b853740c160a8d79ebeed4dbb5e50fdc676c9c5f44af40a12674e7225151132809996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5441155362febba5fb127dd0757ef583c
SHA1bf9bbdb59767dcac4b01cf84c1dffd7e3dab1a9c
SHA256d8cbca38acd74c52a0dc803b4c6145588b7179405f24ed6ed89e814fd96366bb
SHA512f2d16511deb67508eab420a1afa23f477f49be8c0980ebd65f47291074c261febd74ba282dec3ba66c7c7da824e9af0936907307b21e16fb0d156eb7ccbfc8f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ede6b008e37c0f5845c04bef576596f
SHA1fe0cf723b27eb93f5190b0c51d38cd7a278fcbb9
SHA256e088cd5e565cc30193c75142c51af13e432145866056f580e0627d497a4f4a68
SHA5129b3bb8f478ce98457b98839e80cd228b7982528ed8d5e0548fae2d5a598ba5594f1efed0b15932fe273366d775eeecef831dba57f4b9fef937cf14354a5f101c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0212d8a255f5ecc2bd9009197dbffaa
SHA19540a88e8d1a4447b5ee5d757d328038ef04f36f
SHA2569f894bdb78814f26ee937681dd2d4a30f3c60c22707fc31e9191e8130826c9d6
SHA512d8c0a6760204697dc26825b7828a807a33e003d64db5cffe50f30ab789e0e6e78e8d779d645319970e46bb495e5ea32c39c7d8c73423555a4ea7101fbda9023e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7df334019094952d62b610453a1ef0c
SHA168433f66e2b59ae5c2b953607c0f8408a5763096
SHA256b189549631a197225064d27d568fa4f89dbeea764df55ff11c6729834f23df56
SHA512b0b846d70efa9c565f14cc6382da0fe52028b7f39a80c67ff38c36238471e21400d727bbfa6f1dc4c0deec91c1fb701dcd23ceee665a027e6e639fbddb375991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ae048b9b463ba5b171afd4f798f717c
SHA11e8fadd5178b0a44bdbd79e1efec6ecd9f8b1d75
SHA2567cb6011ec729eaddd25167f09095c761f0856f4970fc2b6daa80bbc6380b8287
SHA51251a3756252c9a138d1b0e01bb6a47f3daa951c4aeadc80ffb3d04f12f4c9623a6542be0b94080f683d75cda70a0c9b78399bbe1f74031f5096996898273dba28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e6c02e893deec73163484ec4c01c7ea
SHA1ae795294509ce3e048e5ecea49ee2ec105cb3419
SHA256a3684c7c9ec026c8168ef90b82dcb4ae718f88b7d2a8e72c85c181fa47dc5a21
SHA512d29816a5c3a9e908e997580135226d92383fd1cdd77ad38ba09f717ee875f19f1a00be76a4415c2f111e559356039a8e629245201fbc2f0fc042ad6581c8faa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fd3c948a4927aa5f44a404d9bc8c71c
SHA17e744beda7147f29c250c41f1237777497c299f9
SHA256c59cb495d04bbde10e42e665d395a54d1c233b44f40ffbdca0b20577472f7d35
SHA51281618ebd7b034f005b474518208451022a68474455608a28655e965cd916c108cdf9fd433cacde9db11bebabf9a0f526c4da312caca07f91b95eb1690ea6acf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565be4c39e1cce0c3aefb101bbd5c842e
SHA1eed01fd6f4ce03adc97938f0218db62ae220252c
SHA2561bd7005937ad5622d7eb6725e67c7a8807531711f4d584a99f6c5a8ca4a54d1a
SHA512dcf6f92ded55be139ad29d7d9217b9a16c2789cabc14a1f475ff24465871e1a492d0d12a3eca843ac71a26df7c2a8ada5169c45afb17179db619c482d52e8c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8718777dac6f415daa3ab14f14e4b7e
SHA12565dfcbb40122d05cd22af88fa2f8fec9b7a6b1
SHA25694070fd16b921eae83645f595302cc91f45393649c225545dc26a72322abb8cb
SHA512d87c5879137187b2da5950150d635eb8da2cb31d646c75310212450076d5f99dbd83ff0bd9a0d1e5bcba2ef3ea5a5e12b5ab4dc63a0a278281203dfc4757f833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522b70822a0b2f9cfe059802d9ccbb658
SHA186db81fdd08f339140002aaf712b7b4a1ce81824
SHA256b9d78e528e207690833e823c204ab4ffa772c1738d5219a2c23f143f75771570
SHA512255a95e42e813cf08d38a6af8250805fad24d0c2cf8422bf9dbd8331994b3856ffcdd99562c03a9034154ac84d7bcf02744940968241d9ed70d92672ddd11518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580d9a070bf418be7473ea4f1db5a0c2a
SHA1c4868f19ea7158c5947cb95158773f72061336fe
SHA25625e3cffff327440d0fa39a424fe69f9218851ec5c8b93cc9449b38fc69a96121
SHA512e651d557a318e35fc0a5231af0d37ef2ed0ac439ce7846fe5ff5cb8b734c7fe9ba8672bab0cfaff634e766f22ec9330392b96d77c16da2a566c9602f067723e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b38398ee90516f7bebd9a08078ae7b95
SHA159ccdc6cee75113b35f4793e9f1355509ee83b51
SHA25635a27bca1f78a75f111699796e2446bd2c944e38b5f49617895efcc6dda7b8a0
SHA512062fb9687f8a55ab16a95dad8c66e73ce0d958a52e60b8fd0326c9218b34b4f1c9b8c7d9709fbc94f4db53c6ba085c2982cebfc835256dddb1c0accff4b3a5a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534ec288c44411bb2a9256a8fea82f9fa
SHA160b9a015e5613f8173b082d4a366ccd80a5c6e99
SHA25698efedbc7d70dcedd5289bbc23d8ead80fd66fc19145ecc5cc16cf52fe844b75
SHA5127cbc43252956c825e8b2d4efbcc45603c86eddd9ac5801b7042c7c6337a0f22a2181a0fb85272c3d39fad44a1e828990f5d7785972f195473b951ccef48a464e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b