Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
96s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 00:32
Static task
static1
Behavioral task
behavioral1
Sample
547bd2a3f8f0425edf743d6dfee925e5_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
547bd2a3f8f0425edf743d6dfee925e5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
547bd2a3f8f0425edf743d6dfee925e5_JaffaCakes118.html
-
Size
8KB
-
MD5
547bd2a3f8f0425edf743d6dfee925e5
-
SHA1
7b5e999364f8c233c3334ee7f8e531c60518b9df
-
SHA256
9c5d94a01fda9813b508d095185789c821bba8d5748574f09ae5fb71c5f72580
-
SHA512
746414da1c9002fd2c6e7c7355eb83245329c6ba1fb08de289ee2518b31199270064a3e0166aba4d34a1afab710bc1cbed87fdbc6bf39d02b2a02dee5a767f5e
-
SSDEEP
96:UINpUP1Pt4hHe4KOVCtpraOZl+iENwY3c+JjWxxHMZsBqG4frPzUwd08wJOB6ij:UINpUP1PMZKO0s3eMahmzVd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0531371f520db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{75729E91-8CE8-11EF-A429-7A64CBF9805C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000003707a8713bff40d24762a4a87b7d5895a192d7abcdc22ceabdd999de5ee5a707000000000e80000000020000200000006fed80912a9a484e3285c4ba1326dc2615303cc309ef651c11960e1a0cc4f61120000000dbfe94bca41e1a95da68316be7ce3347aa395a97316a4c78548156560b3ab97640000000f9599d3c5a01779ba2b96df24d7b61d7672a1aad7dfb73b0275cc8a960f90c75242e058d63ad72f35a3de81ea22afb7d9083286e93192f7e9f5e062b5610f2ea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435373418" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1084 iexplore.exe 1084 iexplore.exe 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1084 wrote to memory of 2152 1084 iexplore.exe 30 PID 1084 wrote to memory of 2152 1084 iexplore.exe 30 PID 1084 wrote to memory of 2152 1084 iexplore.exe 30 PID 1084 wrote to memory of 2152 1084 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\547bd2a3f8f0425edf743d6dfee925e5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1084 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cc1fc4f087f3737fa08bcb61212e04d
SHA14ee6d35f103ed8ce5a35d9b2bc98121112e0d121
SHA256c1d1c745fd4c151ad4e5d671fdd942272f0c460c2e553c44e1cb7082b2be0375
SHA5127cb1bbd4f63897da78f7251d21adb4baf9ea5b47a92d973d0fe13e5ce49b387007174708257d3fc1f06b8f67d6509a07cf6a0c503bb7b6d0217a0e6bf4bd178d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5438b2fc8a7a9de4e707205c97e2db833
SHA1ef8ec9189d42795f8546c055ad8d2a8a700d3e88
SHA256ac9fff94057e4265e252afe234363bf525b40e3b4d8b72595c46212d4aaf53e4
SHA5127bad029b6c9ad865f21859156fe4ea517f2cc8733b818f487f4f596415fefa7a34c5b39a311a07d925fe988566759fbefba8b78456094c00e99574094df57f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524d54849bc8f57fb669f5a87af6bb17d
SHA1f3665cd1bd317156c275cd595f104f57626c3644
SHA25683003a5bd285a8fd15cb57235a0a8ed6b03f783ff5ef5272c5b54757007e08ed
SHA512541003d9b4ea192add47914945d729e1817408bb814e35a482696e1e95b763273bcc68843fbb4b5ba3654b5dcb6503b574aafd54858dcba1eddb976e201dbb8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d881f05dfd01d6bab8ce7e451df9180
SHA12b7b067792640532aa7755e87af3d5008ff7e54c
SHA256a267538844fb712fd4a51d352ad4792480f27c534fd9cc4fb61e6276f4a7db11
SHA5125642633b2fc6dfcbc3b8140433fd5d314faa383175b2791ddd471f3b8e28f4c9e1db181ea94c2c690726ba8f133a9e12678ad66646c26dc6bb8ac220dab13cc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1cf39a87ca9bca8f40c6f13942039a3
SHA1e97701bf435f445a4a04d97d81c4eb2939682c2b
SHA256b91812d66401073ac7bf21db2124f6f53bc8507044769bf2d68524fdd0892ea2
SHA512d509ae2d992f1c12f08b157e7a0b921da697039f5ee133856747caf92b23b3f5f8064038441ff179691693a485bd057b0dc2b3e7b1d0018c93956fcaa71ce157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5733b62f91c599aaf64b4b7ef3ccd54de
SHA13018419032d79c91e3b3cde1a4d55c51cb06b105
SHA256a68fa067ee5920a3d25cdb8077e1e6de8e15c38002d2e7e34b91e4b6f23c0265
SHA512256e3c30e94d8fb9dceca7d9b9768d7685a6a4eae90cea0ea17e2b6656b62bb69b53c8a4b7251ea95fb0c0c5c2c49a46e2ceb396c4d8edb860989a1182da3e86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ecda3b3055005fead89804772c390a3
SHA1bff371e4479593022ef1eef7cd115ccb21b3a115
SHA256032b80b7d0b6603672e5196626ff09963ceaccb8e74932d656295b52144165f1
SHA51284627c8441fcde0304d26479e6310b88b731722759114dbf1c3f7a5febec76e42fdc29792ae5c22356fd7634eb18e8c585dcafc78a0e0bdf29dac4c43ec01771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dccd51a316ad5dccc48a2ab011a8ad2
SHA11f5998c36a2b96313bf583514c6732ebea8574d5
SHA256e8677474144970cbb71b96c3b621284fb98857c87492264ca44bcd02acd5fafc
SHA512d60f9158e679c505833039f00b6932b559a50dabd8e5d69fb62475372b66f73719947eec24dd16d4f85bdc326aced1041b0ba66ad39ee86018bc0e38a686023a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5043898fffb702e96e349e945027e5a74
SHA196dea2bfc7d0e8050f6b1dadefebf022f785a0f9
SHA256b268f092eda85de4b6c0f78716e9d6119973a3f36c7c0f547d62d35baa3c8d47
SHA51225698ecc1398909a05e994063e3777a0170a43715ce2f4e9fdaa3d39d02010c52a3a0ddf3298ff6e87bc179e59b70ff95bd4e7e07ac03465aaa8f090392320dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eda4a390aa64d55960b10d73c724f7e
SHA1edf05bdab80ec4f1d6731ac95e8582518d448d86
SHA256491e098f8933a8372570803b3a7bbc90477ddb82d4f6918514dff81c0f0b80d4
SHA5123afdb3a59153893eddce94ba1bd3c089363c157518bfb4c5662aa1823d87b3c83e540ea1b07db77c55b529aa7200f5f98de16d8113fa5bfd3ff8e4deacba8178
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abd0e83a3007d94d87ddfa48d815ac00
SHA151d87e01f9a32d8a0c90ca6193ce79185a7dde1a
SHA2569a15818252053c8bb299fd7e1bbe602297977370028d885a8ddf53be4488ef4f
SHA51272c69b10dee8491474a052c886621803a5895cf16a7a36a6532dbb5669814758bcc3e2d9ceff1bfdd8e3486b4ada35f638910623df9eb8d2d975988409814c2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5205c09bfddd4d2a450663cdb6e9e09f9
SHA1aace99a8f881124cfa1546caa76f9b433bdbbc08
SHA256751e881227886ab98fa5082af0b935b4c7cdfb25f9530aad2a5d313d1d28ad44
SHA5120c52fd7627a95c985e5af5bde741c6309f4fbf4d24ed2bbd5f72dc042f7d8bb0e4d168f64a1873f6ffc1f07fc0900ca5d435fca8baf7244b0826e9eed87f83dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51259a338a4afb58d2be5e78e410261f7
SHA17eedcfb916d690bad5f96cee0112a54eaa7e1ad3
SHA25666dfd99dc807cbe641f9aec615d82a2402447a27147c34cfbdef9fecdc24fc59
SHA51219a77575758831a37e042d69a241a3f16c73131c61684ed3d8159072444e10b512f3327760e4891edd332c14d6d420487135959e824c0994dc6e47e70ce4b35c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59716023282fb9e17e56236d9f1df73a0
SHA16a632988a1b278ef75221c8db0a4c2566b7b012c
SHA256b7ccc469e370db209d2364a56a8692a5dabc0a0f9ed670fcc5243794802c7417
SHA512ddd075169da52f4dab2fd12a18355ce3a56aa3c64ab164180e2861494a2b1ba297de2a87769fe0d6f030ab0f394ed84c5a4e510a26a858ac9aefad6d61062abd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efd76fd3e2cf3f18c3f979d5857c57a2
SHA1c04fbc03d4decf37d25286240eef9fd071738349
SHA25652d0889d9139967d5006ea311274153628eec03353e315d437714db3dde12c79
SHA5128d78c292296ff95e5d9f7c6cda31e0c442bcaa4e06874bd8de121c83876ff8d3d08ac83c90cfce89b72b3f319fd85efe55e0023be4e1dccce3d0cf95e47123d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598cbe36e75162234f30d3f86f4e7d8b4
SHA1a7da3896737ab91b71aac89b8d16665a58167b70
SHA2567c071320cc26fd6f62396fa8cb2695d8617375b1a9f28f56578626a0d30c8aff
SHA512a82ae8c3c355b2d8694b66b566db68bb08f53d2c99c0756ed20dbb0da27f2d6f1056b1ab7038b9da43b651155ac3eaa7f7f63f5d674c7cfbb44947b9d04c08fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfb05455628166610e01e2cbe0d22f8b
SHA1e6d2af43da989e6c6955b2fdb9f253eec890ccaf
SHA2561d4bdd6a4a400ba656b71d0268a744a684bb651647436804ad3ae0fe5a79b529
SHA512b0e1dc49b33800f38a83e193c8c15aa52ec0e89a2a641b84b9ab679004ebc95a42ab56f1b91ec4942c36604631a91b65d8e3a659057e00c020206aba87d1d352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521b28e49e3acc1649db054e5c0089a03
SHA1854d173e0ad798d82fe4f8752b988a939c6e324d
SHA256ab9dc4d31e0a887c255955f9e70f61f9c81920712d56cf9e9e6bcfcaefaa1f00
SHA51242c04a4f34dadb13cccae415d228b06d49d4503bf795936aacf7164146797d4d9549eca266eaa167b492d0be0dfcc0c820d527591cf40d56616560b64d698644
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b