Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 05:18
Static task
static1
Behavioral task
behavioral1
Sample
55aaa8f5f6d1f5b212f498d74dc12cac_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
55aaa8f5f6d1f5b212f498d74dc12cac_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
55aaa8f5f6d1f5b212f498d74dc12cac_JaffaCakes118.html
-
Size
3KB
-
MD5
55aaa8f5f6d1f5b212f498d74dc12cac
-
SHA1
422cc133fa5a3e3a029338a0d42f1682e0d7748b
-
SHA256
d6f223e766768bcbdfd8160369018dabf51eae987ba608cde0d5a3def29376d6
-
SHA512
becd460d60fb37656c334632bcb0d2d5a197de33e27100b228495fac164a9615795901c7e00308d06e8e26b47987a66d8c6e8654cfb36b88b993f909a2cab222
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435390589" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7030FAD1-8D10-11EF-A0B2-6AE4CEDF004B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fe35b181728c764789346ae14ad44f3b00000000020000000000106600000001000020000000063ddb851800240a2f2c3ae67228980ce098e40229ed8192123cf0fe29607e3e000000000e8000000002000020000000857e24b239b6c37a76a5d5066604b7ddcddb3d7a16c83399903a6de88204bbe820000000cb3388ddee1ffddcc2899cb27654231efd67be71284c4472a4c68688a04f88384000000014474ba3120d47d6dbc1bc5239766df585df725f35ebe4b765062178cdb499c2c3c42a2717632bf91bd5a8d936ff5b04cc877fdd05821c32c5e33ecd033c8468 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 503002491d21db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1392 iexplore.exe 1392 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1392 wrote to memory of 2104 1392 iexplore.exe 30 PID 1392 wrote to memory of 2104 1392 iexplore.exe 30 PID 1392 wrote to memory of 2104 1392 iexplore.exe 30 PID 1392 wrote to memory of 2104 1392 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\55aaa8f5f6d1f5b212f498d74dc12cac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1392 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c632deede9777496ee7e7f41f478474e
SHA1f39feaee22abcfed2b4856d1d0dc65eea34ac06f
SHA256fe9264a9073c47ead759b9259a90844f8538bbb413ec5f29eb141355b09e705b
SHA51220a92e19b1b34c77da34171f53227cb2663f55f45069c666f85c6ed9ac0a1b6817dfd93aa48f3c209ff13b2e5ac510d9a86394a09a49fe97fb16705546244c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5029ca64e0aa8e3984a39db938c53669a
SHA129dfc09407f6893fed2cf6a4a037d0c89459d652
SHA256ac65831f03bf91bbbb56d0912b9bd361a060b2e4ac9d9d4f1ea714f063686e0b
SHA512004e62855363ae7a936737909ba6b4ac636853580a30fa7bb1bd6ed2d408418330c44a3a641e61559f23f0dc683c66fdc54f5146d7cd95ed176a296bc9a7c001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a34db614dd18b544e5f42576a2002dda
SHA1faa43ce36c87d6a87861559dd75cd1fed040f264
SHA256328e1bd469c11a069bc666d5a9c2b51c1f6914340eb72be97b2b6b4f34107770
SHA512c10241ba7c7a0255b92c772dc1c2fffb1745d0a133a8562f5d787b7f9701418d602521c420f4448deada19f574fb2f0cb326e938c3e88dd1b5722a9387650c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3a8a56bb7b1aac051480a47797e8c30
SHA1d5d3c66ec19f91aaa1ede54fa8baff6fab702fdf
SHA2569f005c43d518bd099d6637226c2db3bd89f1abe6319383a9391faf7721b13449
SHA5122351d37fc6a665eef983d553bfe1b357c3f19388c97634ac7825baa964109fc885d4a98b84efa2fc52bbe22720f87a570348b84462eb945ab6e4c8bbdedc7629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518029a5f3b80949fb306fe44f54dd72d
SHA1811f5ee682d581d4c87f09cb34a356c4bf44a54a
SHA256423c1fa805de43833cb111c1683483a067eceabb06d602f839bc571fb3e71e52
SHA51242054623ac41efca0dc924945a25445b2133a33f374c6a78badc07e22c5fe7e9970b02f2e0650e97559e8ea77bf0efd10dc766b33302478b4ee09225e154e35b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570210d631188b581ac73441fd36802c4
SHA1d666fcc73c144e57f3b4b8a3965ff2588ff7abd2
SHA256b6211f834a66fe6717790a688e2f6a16fd82aa06fb7ea97893da69dd0c82c13a
SHA51275d2ec153f8478cd1800a11305df502aba80ca6753eeca2f1860ad2a7caee9b8632b6add70ee667b76195516a8c078d834da9ca6784644468536998788b9901f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddb76ccbcf59d906f6849c8ee2d24a7f
SHA17a7d04832da61a2fc93d4d7e6d3893842a4fed06
SHA256f54ea9638652f1522eb84deda90e3ff1ca5a9b986bccbc552bcd011255a0a872
SHA512522ad476176b58073551c1437d0fabdcdadbb37045bb56a1f21a040db5d3a1fd032e57bb8f5446683b8ca12e2abc28b97cefaa725751df5618ffcc554b2da56e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c59f0297759ac63adc0efd36b1669c47
SHA1d941a32b8f14996d1d6b8e56de8ef3dcc9d5dbde
SHA2566b8ba8b3549dd3f1352dbf0ab4e78ebcb9d7bf06169044bccea9d5bc4820f042
SHA512c43bb11e3600d4f9cb8ca14de4257e4ac6a7aa8e75ebb139592a2671fa86d01c5148b286513090c20ec1d1ea6b03bc3af1b8f0cccb72e8620516297144d14fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59edb637a9c988ddbbc8187a6e54261d1
SHA144c896c64479fd8d78f22db812a2202aaed10ada
SHA256a7d9f534946250dda93b7b8866ee558034d30e43ef127557f2846bad2781772a
SHA512981ba48221761db8b4f675d7ac2822fb8c65cbb3139abe3aee3b82bc41d3c7dd5d755e77ee55afe3c998ec90b01dde7326459710d9149fbff2cdf64000bb1a88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6ba042e05c216e0ec63f84562608cf3
SHA1df217ca2b4041ed372c8fe3dddd6bc469898abe2
SHA25694b49c0eea1b663dc445054d710b2c3e013a193f6e90af5cff1fec6cab72c3aa
SHA512d454a5003a966735f89d791df8797da79108f167a96008e4ab8a143acfb2d2cf2988287dda1612ceb9cda26b2439882580979f4626fdb2b772bd99b1dddf9232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ad62be5fd97ffb105f7fa5d0a2a0051
SHA1519dc37fdd9cd07c6c25f864fdc51d960e67fad1
SHA25689f5d349dfcc26f627be2dd7db3f3dc7fb8af246763179f573195f039d5d219c
SHA5128462507f6f27276ff4f033a652a9dc95c1c287b81ab0c373c522ae072643c14915af6ec75fe855df66b988a3c693f2b634ff84d22849c4557c4c02d4a58c046c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502548f3235b5bcd17ddb1b48dba3ea91
SHA1e21700eca89ee0b2fc9248822d5c1bb43830725b
SHA256fc283484ebdd130242ff24228a4ab98d9fb3ae5b19804c98ea00bd5bb6222baf
SHA5124c9368f6aa634b5cf91143b7f44cf72e1e45a8cb50b3339e1efd6d43af3514e2f0b7d23e6c94ea84f57383aeb5485c1175909b97520f2edb2d40d69eb6fa0fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9a541eca75970c6cfed83e23b20a92d
SHA11a4e74bb6848eb5a08ba183a71b0dca010e473e2
SHA2562ed0c5b21a384caa1966657a5a3638e3d7fd15ae16f1b7145b6809e2b48bacf4
SHA51211472a9f2d5116d5c4f56fdbc27c57fce1c028bc2e605ff3d8e6bc78c012245acb71fa77748a3fa2819f4d2b8866fb2e14a21c82482dbcd1789bdcafff3ad0c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5055c43e2097c01c6cebee28c161718b0
SHA1c8ebc5947cc3625bc9fc579d263f38ac3e15e69f
SHA2565dc0850d5b230bcbd77225c8c8f8432d8d788cdedcdca12a15121f1fce243fee
SHA51245bb126ac526812ef39c1d3d42738bb59c14d86297a52bb4163c456b5143e4b7e8be07c51dfbef70ef993125d8048212ee865dd8f0473e9274fe2f83df49b2d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55554717763480afbbb8b0bd4aeaf53da
SHA1611194eb5ac467008dbf65c098d5ca6ce6cc46c5
SHA256f5c2ef4c52ec0aa645277824f85d32bf8b5dd20c29d25301c9a89dc349e1b1b3
SHA512696f5b173813d975a475b81e2140ae1b0ec115666676089c27bea07f4a2f5e27245d845fba19dc4d48e0efd1b14365031e8910cacf009827c017459c0349aa7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5889159971ea66808822913eb83953afb
SHA1164e0b4842b01303d71163c3fcc33c6e147afbe6
SHA256eba1cded06e1adf2bef5339a8e5905bff72848e2830ef705c3ae7b7ad47f8c75
SHA5120ac7f215650d7f5c5746778104a656fd2eb0b01e953e5b988bcdf5a5fe349d3bc0fbb7419384935783def8a176c03e966b1fdb253569fb897da606a0121220dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515e63b7348f2c9b31561a3fb77f07e5f
SHA15f09f69ff0895e9d0e5672e9606e7681eb2a13d1
SHA256de4be437a03e5f563a21205a779ea3d65a8f134dbe1d17f9fb0612bd6f3f9b6a
SHA5121ddb92830b4b13f284f9424feaefe9e7791c35f1cc06d4d25cc0cae8be63e5d60e939b0cdc96e02cf271dbdabda6fe836f54a30f44f1f690172e5f897fd8c974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5c0236c6583436206bd63250d79ff88
SHA1e3692b29ada0a8a0af5dc5ebe4c4ff5bd13ebf8c
SHA256599d14c2dfa66a182d598ed24270a338c5856016fd5be113f2d4d731d8b45ed7
SHA512ed48859d4fb5635a29178ab8e7914fa3c803d2cfc9638f1251af01aaa946cc0da93fc5b9c43b7ff95a11c61a7b20e8a48711e3ee6dd0727fbc46692598751e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59be62622c5de58042bb9cdc28d9532af
SHA173ed746242f27471f795622f568036b1945db959
SHA2560764cd37ee856ab13e2a7454cbde969a827e9208f082ac343929cc416eb7e73e
SHA5123316ccac242ec969137538b5c7caed02ac5ce94fa520cfa6f1ab9a9206b1ca7c05687a07a0a2693b6945133fec75be765870ebbde8e2432e68dda7bea0d317fd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b