Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/01/2025, 09:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2570f7bcebdafdad18112536c14fa3c.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2570f7bcebdafdad18112536c14fa3c.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2570f7bcebdafdad18112536c14fa3c.html
-
Size
53KB
-
MD5
e2570f7bcebdafdad18112536c14fa3c
-
SHA1
d26147ab8997c3a5f0554ec35896aa7f7d69b6c7
-
SHA256
66adb6f1257a436f40f3c84ac1de234aed8cbc7683cbdc5a035ed4986174e53f
-
SHA512
928e78f1fbf259240b9881feeac3a6d3b4443294e4d9ef51cec86cf635e129f4b95ad64462b011d283ea51c93256202b555bcf7b0f3969df76ca593624971cbf
-
SSDEEP
1536:CkgUiIakTqGivi+PyUDrunlYb63Nj+q5VyvR0w2AzTICbbpoU/t9M/dNwIUTDmD+:CkgUiIakTqGivi+PyUDrunlYb63Nj+qa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443525477" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005121120fa77f104fa875c9d92540385200000000020000000000106600000001000020000000f58c541ee6369b8edf2e1d6a225dfdc794d78bf5925ad40d8899f055e1febd59000000000e8000000002000020000000270e920634c4a58d3071fd4a643978fe23d5de48ab6f2ecc23bd74ebea43b70a200000005f949cda3c03cad88894dac090e9af6c47e6519a963540f9d9dfb46c4b8ca6a440000000481005cf4125045dcc3d5ad96e4537d85c72df77a08e86ec7a114a7b1cf4f33bd203ab13e8efed113d20b7d6f07759597a901e7e77672d3c33a95d0198b6aacc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F34BF6E1-D70C-11EF-AB3B-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 601075cc196bdb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2124 2076 iexplore.exe 30 PID 2076 wrote to memory of 2124 2076 iexplore.exe 30 PID 2076 wrote to memory of 2124 2076 iexplore.exe 30 PID 2076 wrote to memory of 2124 2076 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2570f7bcebdafdad18112536c14fa3c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501fc73b4e302e32e83595b65cdac8847
SHA1c65269c1a78777f98a7f4d3f1dcccccc8ae62239
SHA256b3fbc94c25e3cb55c40c2ed89f9bbc000ce999e0245942af72d34147694653de
SHA512a2e9bc0cc30c0480c34e927a5aff4164519ba38d62172d6b005b1f6e1364263efc92399c92b540f41bd110747d1131b487aba6beb90dc71809c11043d7ff4887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c139b849c06b4085d73ed0f0c3e21c5
SHA1f570e4d8ad3360214c1bdf48e23410b3508b3518
SHA256c995b9a7b6410308f0c191eb31b09b77def25355951f4c94edf4f36843a6537f
SHA5121c37948c341a4ad948bdf9280547c6da3112b575a994e9d62f081b40fba56489ca03f11b3405c7421b3dee862d32d5e2d256d918a14e4796d9a4c25363f3ba23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c4b70663b26e37b08b1204fb45bd912
SHA178cc72937650e589045c2b76d67d97849270af9c
SHA256e0385a3c874d77b18d7418301437a746ffcd6a7559ee92c68fab61d733fd4b91
SHA512c87c7aa288fd9e2ffa13aa7ad74a0e46e63e749433d769dd2c3ef2616ab6d6989bde879c54121a42207b5226261d72457fbdfac4defd9a270bc490ea0a73ec2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c95f060db78632556a31e1481c0abcc
SHA1a89c09e9a2fadd1ccb6b5572206c646d9e822525
SHA256426800e9f0a8b64c3d72ec71865a5c432361f8b84022fa6cdec0ad5070f3fef3
SHA51291164f9192521998a496cc8f3bcfd739b3a2977fa1b9dec5dec266b3e6d5b8bc2984a77a424304e9c3ae729723333270f3899e24e0d474f09a2497508d8e04b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501ae18bcc509bf9377a20886e48da941
SHA1620beafc0175b74a69887fc320d6af13e41d77b5
SHA256745ce0d5fca690795881513d6fcc852cea7a967dc03a934634ce7cf64b991de6
SHA51280cab107f10eab2bb235c46ca40d5253a3fa6cfcd5a6e86dfff45c21404574522155eb97c4da3bfe730521b3e9400ecad95a501f1e097f098f14b25baf342009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57035dcf9df8d050cc32f0d87e860082d
SHA1e1f68b0f1f9632d7f5fd1a47d67f0d14ef80b29f
SHA2565843a6af2e512da5b66574b279f7714f36f68ead5e86a0605067c76119863440
SHA5120868c09a969299c0ab58d0774590c56347ac10045b070f0500a3c0d3c0e9c744d83811e2a6bc5b5a7a3549d4b07603318699211db62e6a422ac425663f6d6ecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5335a48899e1ba2f3acc24ee6475371c5
SHA1c4de84ed0c40aa29f0a7c5774d1a12b83ea54a65
SHA256710eb61bf4ecd4235e6ae262468e8b3b4173bf354a2ac6f1e3dde248124f731b
SHA51239532c1ef9b44502e49b0731d7482effc3781b856e22c7086a6c469e65e343a6034488b4cafd81116b955149e2a3669556d41e95667832fe0e1fdf9ea7f0b4b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5f743999cdf68f28e50bc8699a1524f
SHA14a7e849277b19e0ce878fc60efac2b1cb61e18f1
SHA25689f676b90db44a3f6fb0fc312e4a2891ad8cbb8d69f026d098aab71e70bd5e2a
SHA512249fbbfbfb11e94a35ed6b382e0dcab9d85d8d875908aa9f0e8431bd5b4f3cb54d7a766e2ac6a5a4eb11792c4bc369c48110043fefa53b3ae177aacaa7541e3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5753f0b8e7311974d5f35f5611154d74e
SHA1317e116671fc2175f5a5463ad34f6089d8daec9e
SHA256e51ab21752166a5c635ae1aeab3172bb7f64742102465bc9705d5bbd34be8485
SHA512d1788aa1ccb4f6a6dcd6babc6c7eb255202aac358dc77106b01d8edf01a64390cbed906a6855a4bc9396337605497e522e855c12112f5dcdb34cc9b5c37cc872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e001373d3b8d595b0201c8cf5aa12f4
SHA1de350db5314a8e66bc7eed231a274e4c1c20888b
SHA256e9b42a09f23896e321d59fe502500bdea3a02a90def0fa333ef9a9522f321a4e
SHA512d42fc3d40782fa72b91b2c39e3eb2f30958b50ad4737d49ccca1f689efe20e1a7862b7b136d88f5d5326eafd2cc79feea4f6c5ecf85ce363f07e19a608a65d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca2c9fa9f5236f1600788997ec8caf3a
SHA16f994b77f5ca80272e40e4d0250e2e1010fa5288
SHA256767bf355ad74db04af3f110d8569d90f8d411a35c3cecb3f1c9549b2dca0327f
SHA51284c644cb581f0681ee207b326ab7d429181574a44497268c766a0726da84d7464809e0e5bd919802808a290fca62d171f252b6ca99f079ba96bf66c6efed3428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a51019ae53a69e192144251134bd363
SHA116e2b8cafa64aac5c9e55d82a991307765ba62da
SHA256b5075197b41e83609c1d77ff6cd6e3d09418bb48c7714c12d04e6e86a8501e74
SHA512e4fa3a9f67ed3496a31bbde7383d1fbffe7690297d7a4e795c7364394a815920a6d61e7b4e6e9f4afa215396b5889a0379cc7182f7f32e49a55124007bbfba63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfdbe24c43667b7f787bf948ace2eec0
SHA1485bb423f957658fa9a31c693d26eb360fab5872
SHA25658ac81e79d77d2424f53ecc12d5e5148be8e7c547a62c4f516941e2737ecc70b
SHA5126ba21560a9957145660d5eada41ebe16c5fcd7c1fb594aea1b2d675dfef3ac91b1cba76bc50508d01e4b2195babe85a5328fafeb9246ff13f4d7a45c54138223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524890b76d7b80bb835bfe747b0d8b5e9
SHA163f5d2b1deda30d89e869eff5f756f3d37469fe4
SHA256ac04e3fa717fc2a96f12a5541a421d84e172331c22e8656c2a2e6e44374eb427
SHA512e549a9b27424d680e58f3d6ae3903b517fc6a7777abb3e35177853048cabd5102d0483a9a1665ab60cf180cb1fdebadd39fd891fd31660af89d88bf0193a8c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5675f9d9b55abaa03d80047a617f93542
SHA1eac7f220bdee93ca2141bbf09c9a35cd982b8aca
SHA256d34147ecf98a1ea44e16b4fa345f3958a945c2fa06abcc05c25821277bab9eec
SHA512a1174f44d30d69a97010a71a81b33f82838bb3eaa0f0a41e780c8e8e992be25d3dd3bdc73cd9801e097f2230a0720ee1ad1ffb1a354c68bcf6cd9075714a7ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591fd80ccb389c16ef32b0cc8b73631f4
SHA11c9d2ffb7d42b7fc715f75e206a85698ce53175f
SHA256554c91e206118be195d2776588164c9c4879a1246d052b0b29784431d523da2e
SHA512e6019555e8895c03a25da01b8266148702b5e8b926f161ac4d0642a699011ee8a45c208daf847e0ed0cf71b9b98d5973da82475f3e32e6152275b092d43335fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576b0899035c16e2b91f5f44083688fab
SHA1f44c833af4f72a775474c09b0057dcd85ee96d53
SHA256659c79635b2310f31fd1b5ca30946473a2b6001dbd222fd9453d38e179831cd2
SHA512ff66a9993a7e6316948548ab38aaeb43e344247125aa255cf78814b8c3633806fdbfcd2d36f5fde436996cdcd22ea59650c11009cc286b66e61eb86100343d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557529291d81868462993cd8b54c8ce6d
SHA12ed48fdb00ed1975889aad764dd7461ac955c0d1
SHA256102d6ff6ade53da0ef9bfc1f662dc297a295e773fc537ef1199ecd2716f7b240
SHA512f91ff3524054aec26bfebc6c36bdf073d9d6c418292b0378dd476da2722a97f51f6dea0db5fd7f4dc6e138dda1b7b1e32ba8f7a3366b910778041a114090d19d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5351b67cc3dea35a9325878a331725afa
SHA19b1005a18e8ea384608b816c6b8b7d34552d5030
SHA256d7dab018327fbc74848e4c11159d8e8e712d284118031cc2af6e4f30631579a5
SHA512bee364c81a47d7a9e888ff40c7333d20dcfcd354c3bb036952e3a1a79de26c2d30e746874a523a4e345be49e0a87d59aa00249efcc6ab782315f5c877190fc17
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8UFEBH5\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b