Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
56d10f4bb638f96b382d871283176021_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
56d10f4bb638f96b382d871283176021_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
56d10f4bb638f96b382d871283176021_JaffaCakes118.html
-
Size
19KB
-
MD5
56d10f4bb638f96b382d871283176021
-
SHA1
0bbaaa79bd6ca4e903de10927ba66b3bb9dcce4d
-
SHA256
9552c164b017088cf93a3977b3351f7cc62aea9e7a74fec568a2b4a857c91f69
-
SHA512
1a48ff261dfdf5ab112654ac16318ba16b318276b24e8135b29f5466cf521edaeb407ea70ea4ea55618ce219a78d23daa00dcb97682288c982f066a85fc3d655
-
SSDEEP
384:zieKhgESFVBD8cWQ3RNTeMTezxfemLxXucfIk99hezzVc9ah:zi7SFgc53VmQOIk9Svqah
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b231630b239ded4c85fd52ab510d701b000000000200000000001066000000010000200000000ca276e9a1da911ab6f3d397003443225731ad6bc57735cbd413be0393dfefad000000000e800000000200002000000081fbefa696e0120e74799c8f9d1149c7cd108dd4ba5445b0043af584b06c8d2920000000cbbaef08419424ccdff8278f94eff020027ae9dcd98370c330cd6bdbaceb0007400000004c53da2b13e350a27b4d0e2104824cc65b169dd458744085ce3e50883ade10f2dde70daf9ca996e2e448352c68e4f076e4bc4b4584cd0a2fd8056540c93ce6be iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435407500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d7d2a64421db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CFF396E1-8D37-11EF-8334-424588269AE0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2832 2972 iexplore.exe 30 PID 2972 wrote to memory of 2832 2972 iexplore.exe 30 PID 2972 wrote to memory of 2832 2972 iexplore.exe 30 PID 2972 wrote to memory of 2832 2972 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\56d10f4bb638f96b382d871283176021_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c46ecd408d6d7b4434b9a29ccb5c83c
SHA185dd99ce8f2d659a2535b92d7a0156c42877ce69
SHA256dd1b8c47f3e4c80d95caf25918e95200386d0faea96d4104b88032240a28d4c9
SHA512ff0bb5c48829e2306ec383df0a96ed7265fcee34b6cba3b66d091e636617587a56913c0fccb88a3c60f5de5c2cb3a4af7b6f3dd7ed6648007eaaf374701c0282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdc62f4a4759366934760a2b85ee90df
SHA15a765388ea8dd46e4978e4cbc05ef6fe709e6fb8
SHA256f816ddd77bc440a478ae9b55549b2083c62397683b7924c86c427ecc1f4806d0
SHA5122304554a5b238991d37a8618f2cdf5fba3114edf2a433a8e2a28c2525374d4f8a726bd6e164dc7e341ea175b8022048eb8ee63703a0b337a701a5ac76672f8dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b07e0519011f3eb1c01441056e79c2e8
SHA172b62f118afc1fe4c56e7c645796b87ef7bb4886
SHA25647616362e8ed54f31b2602211a0c4b54437d420ff569dfddd67b5484cabff2f3
SHA5121923d4cbb0a6cef48d25b4ae9651dc9b59b4da85a21c217eb1f624062f22f120f30fd92d1f0a4000a051e28b7ad6758a585591414a82404783bfcb5900e9485f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cb0c4851ed1ffda2f527c43c785b342
SHA1ef29214768d06b8915b9615214135f6a14343993
SHA256cc538ca302e6ccfc0263724ff30f365dae31f2fbfe5004a2a8fdfa1055c23b1c
SHA512dce5703959d436c3db57f29c87a1a742d8291f3864c99b75228965b8ea6e05b3b0f7d2e765b02afa76be869727f42388877aa848daaa2c7997e9f7005ba5f441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f72bdb721838b5cc9486a95e310631bc
SHA19f01a63d7327febfe47fbe81db497daf8b5aade1
SHA256987db623d20f4698d7e903c80c6ae29a2c06a57359286de44186481b6f187409
SHA5121a7ccaf9fd5cf4c9aa3569c41cbcad1a423bfda2a026054e976e4064a7ba851ef05bd8b12e94880afb86adbb02ea4aeb69570f0dae80840e4c04bf35d3874c81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a575e7764362d662289195287e55d0b2
SHA1018bd67ab7e43110941449f461b571fa19e386c5
SHA256bf57679fb1bb6d06d62bae4d3e499130bfc57798df3a63a1384eb1b4a88509e8
SHA512fbf05c678501a42c1688f60ca7fc2f3e78a501daeb3c8ab80685982ef94ee20eb198925d6d81d68820a2d0cc9ad8bbcfb44a10d71899bcd1412485da949d3bf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589a2bd71239d30297b00517ea2950e8f
SHA193d7e57d998084951b648f812bb18faeb1374bab
SHA2562a38ca62e61ffc1dc699d20e2e7043a81b104fcbe42a10946c4ac49c1cb370ae
SHA51212b701d9ce6c4224c07570a8ab49cb3ad6e51bf5debc23900eb8a41143307f13136d81bbf67c3c46eab0c52d96f5261c7fbac94a35609f06a93acef2e5c887d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555196e687cf2799f9062148d81fc948a
SHA1a6c7c91d61bbabd0afb36ce2bef573c1c1977cbc
SHA25635ee2c3d3f03e9bd614ffcef65b17e6a5349149fd26dfb50177fbc9ab5c50c1e
SHA512fe5ce922492897992f7e8964f1db19c87896b3ab85c61270d86066eb5e4274cf98d3a002d71fda3b2e47eb2f9f318f00fdef027bff5e2eee4d1c30c29b99243e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503c276bb7cab642f586c0186b3502cfd
SHA18422e2297eb7c97f733c666bbbb9067b5e28f20e
SHA256ff32c427799c15bce92fb2a159c70c44d1fc803f78134e76274ce1ec7288d53c
SHA512acc42eba88acf3eecf914e62e9ef3052317d6cd3df7402cbe07221c9516b4b147b178df4f281a333b9720b246b7a06ae1a30825cd66dde6e0dd82d7c62f2beba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520c3b44da222a7770cf893adbee3f880
SHA1c84539edec6e5d9250a11edb1e6ba6264b16893c
SHA2563457f61dcdb56a4853c89d7d65ad3ee8a5a964f0d14f0a4ac49e0eef901e5cbd
SHA512bfcfeb165e046378a59e0ccd5c1eaf8e8816b74afec8b48c9df62956c3b6a9390a156b08cfe1df23bc4aff9ffd0ece4719f39c042d3f33c625cd5aa4f0b64d5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52662ebb9bdccffefdcc1963265ccea4a
SHA15790dccea97345925244e5708dfde941a882d94c
SHA2566fb3538645d2a297a9092ae89c250b4a54ef839b0b5890e715281ad7a69173c0
SHA51266224165fabb1eacb7404908ef4cf1b6ff671d835e06c3ec24ccf3984d0883a093439b659a2df7a9d83df917e68be27bbdf37342fbba35b1118785e65b6e24a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e733b9f920cbe69ff3857d030d35578a
SHA12ea756bead47e16843a0b268f4683c02dbad9775
SHA256e04f38f6b1de17f8f3a863157359ec0b13b1c85ebf8c60d8b628c54f158f7cef
SHA51242cf376eae701c9d928f6fd8a3aa4692278b115de873072d59ad5d88e4dec7f6f7cbf8111b9abbb89cc1b0d1a8423e0eb8c4a9299bbac82ca2828cfea7b87705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa8e4819776e6a51d69bc17a521fadc7
SHA1f95eb4950722aff11f2a5c337f188b0a017f064f
SHA256094dcc55800b88164cdbebd7b278a2c630236aa459342101e21d9a7242bdcfb9
SHA512c8af4af2cdf98690fdf830c7625b34fb6d99cd744a1ac0f0e571bcd9fe810bfd029453ccd76b1b6d94527e4be6a5694fb0fb7465397c2a32445deaf60c48643c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561d1f8c87e38a1b9462a66d1d22ba612
SHA18bf5d41bcae70c84257318fa7e510c4e2b868f71
SHA256f06600432349f7e8a23ddef4eabd70c6ba28b85e086d4483ea2416d792f4d4b7
SHA512ee838908d0fcbb69d919350ed9b4d67cb34324391781fbc37c768aec1888211758a99f435f26fcf3b3dbc1f57f8e3976edd46b3df889488408ccb2c27de637fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595aaa313ac97f8cc0284f3487ebfab1d
SHA17b5b77922a0df43f315d166c8f6a5972f421f803
SHA2560e99da93979c8a5aebfe401e0726c01c41438daacfba931bd44afeea0e12b357
SHA5129767b8558df19a95144e7ee41b1aec352d6c5813f75fd1ee60def1626276fa98d57bf7cab9cba3fc5dd274a18c75758a9c2b1f406dd6fd464e9cec08c4227e37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c46b159e058e6a556b64f3180792251
SHA1994114a48fb3350db5e2053ff61d227e27f4615c
SHA2566189e650c030f858a8a47201fc93cdf8214083bfdadc8bce059b17a075b73f5b
SHA5128d2f6936ad1da190be5cd117d9a00fa4c49dd6d91404edf0f8af3aaf49b30b45a5215fcfec213f2148a828b5939fe9a8279eb945760fcfc187b62a4a5086125f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7451cd6f75cfd2e2be369d5d6538c12
SHA10dd658e4ef268f57e98a52b5985fd21d6aaecc28
SHA2566615a4961255d5669d898d4b891d58f52e20cc3560d4b7bb28e7a0c1499f2591
SHA512d148a39d7375195e88893ede2d5de603cca7faf5f44d2ea949e2094a38ca99f0a4c4a99fee3656e29cc2e5e67d3f4b257e7c1c5280ecfad7edc057e6b3a8fa83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba0d49e01239a13b4d12cc571f32d1dc
SHA1f5e6f86ad7877e0d1b6e7e40294200b37cc9042f
SHA256544daee3e59c9ca4697be987c0f088e18783cb2577e8026bbe3aca4d3d429c72
SHA512323fed203a8f26391370b611345df97f6a3d8b9c3dc318b6a2e51b632e4a92066ff45c1a719dc8edbee7a1341f1df3cee149f5ada4735dd85c2cd08920754ebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8d78a3e7e3f27bd11af93105aa9c630
SHA1e1c5e8776fd9b62a528fb3eb77280eee2e97f68f
SHA2566c27e6fd205abfaa390e5e816468885f17e029d2be819bd9c4d89179982b9e4c
SHA512d87d76726779ee9073a2b391e316c3853cf9f1a9a16db2494f45392cacf8267322de2b33f721030a2fe34ccd5650b0ea40f3c3abdf4b0ee4be003507355acefe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b