Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
db197debef8ca5565454a921d28fa264_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db197debef8ca5565454a921d28fa264_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db197debef8ca5565454a921d28fa264_JaffaCakes118.html
-
Size
24KB
-
MD5
db197debef8ca5565454a921d28fa264
-
SHA1
12cfd4eac3f049355abed4a857439717f2f61ce8
-
SHA256
7a84f0f3acde29c48f94b3df761c0a0e504c36f34fa2e034b655e28265ad2b2d
-
SHA512
e3d6a14f8ff32f3080fd56064b4ef5ad9289772dc42b6becf93aaa0613dd1a63f51e081b338f6f42028a4bcf92c7fa53d3d97b66430090ca622b02c0af57b7ff
-
SSDEEP
192:Hqvl596UxdvWCxYsVKRNbxE2x8NjvWIS+OdNVMjP0kuV:Kd59FumV2I3P0kuV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d08f1b348304db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432245774" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{585DE8C1-7076-11EF-82CE-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000004c6da9227a510919fa983fa7f630ccbe9c70fef9dbe0d94f26e2b8ed3adfb8ba000000000e8000000002000020000000995a29afba0fd437d4e3e9be4cac747ddf69aab6d54d92412797667e971e8ec720000000c70a74c1548333c1b490e839e563b132dbf24f4c084e3c4af763001b58cae3ea40000000d8bbbf5a35a799c45f166c78cc5bd52bb33a47b0fbc8991cb34773b2274e17d5eda409b3c8050fbeaf221a91ce401278f199fa984918526eb6bf07bc37a3f544 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2948 iexplore.exe 2948 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2480 2948 iexplore.exe 30 PID 2948 wrote to memory of 2480 2948 iexplore.exe 30 PID 2948 wrote to memory of 2480 2948 iexplore.exe 30 PID 2948 wrote to memory of 2480 2948 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db197debef8ca5565454a921d28fa264_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2948 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d78841cfd6ece7f3d6fe877ca4026e7
SHA1d16da5a5a26fcbc7fdb1b3017827f1aad4691b80
SHA2560f426f402bcf0cfd90fa52c1f45780d1e3d43f3d4b43756df680ee42fa3c3e4e
SHA512c573771a266498f1ccb773c0e1cd259832aad9850e1552a82748c5e9d7a9ca786cb760c8958cdbbbfc8ed0e6bf3940f276e3083be69673838962dccf249de9fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5298fd7b51b5e5ee921d494dc482ae82c
SHA106d8440540c651f8558effc35b8e8e22ba112a4d
SHA256bfb62ce5008cd8e381ef09175962abe25537eea81a2957e509d55cdd816a1778
SHA51232c7d232c35a74c830af33f8a083996c0a24b49129f5289116c2845acc68e6b5632112bfa818966bee28c75e4815e00c6e073abfa42715e6c3385ad0719f7654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539a6f2481ca98c5817a1288719af0146
SHA19c773d1c65f2cf0ef1b1384c5a7f01e97aebd862
SHA2566710319fdf3909f6e9765db353892c0209fdaeedfa49a010c472ee1cd508e870
SHA5121d43bfe8bbf217ab60907e65340a69dc8f65aa39fc81db6af22598bdc8c76a704fce9dc87f721b19b300f9af3d7761e05c89988787c0d174dcab6ed895c55ba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513e7091cf113e41d2a8ae33c4a08f25c
SHA180909c829bb228e188cf7d89d12dd8a0c42665e1
SHA256f7b88f1c6f2019facfcc8300806d7df8fc9389c4cecc4cbcb6309f15ee3ac14b
SHA512d9dce90e556f671385d7ad04839a16c9ba3356ab6dbee8270297b7ad162d5c6167a273cba577973e2651c42cd3d9da53a7227fa6a18b17c3b6df190851fa4234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b17facf7f8652bd51f3838cbf93fb769
SHA1066e633638466cbeeefea9eb4c23891e06484790
SHA2561ed6925f321fae158334b9257804ae2dc8c08bb12519bbf3f343b4bd3b04ba95
SHA5124a9247a7b22da98f6756bfe57cfd74cc301fcf45d5cf6976eb2696c1cc391ce3f311ef1aafab51aca08dd8c0d7c640aa1d87603b757cda32c5d7c52fba1fd6c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c9d9a65bc6878aeb3e02d4e2aa26f89
SHA1015a1aefa2a920d266194b51fbb2cb6b9164a249
SHA2562063b1a6024e862258dfa957ff9913b41cb69e3c8e75bb27c14e67fcd6dc1d2a
SHA512c2b4b3c0c5d3bb6ffe7119a7e44b809d3b6d998da13253c6633ce2cde6d55985d519613b37c2431da5effb5e7d2270ee8ebf04554337eb6ab55bd2a308b4a051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d827149fa84b1de60ca6f4df487dd1b9
SHA1378e936aa990b9582994cfbd97732a9113643a25
SHA256d31a83eac523c2493ea1850b1097957b94c4b089ad84f62cf503b72f7806f2fd
SHA512248860465dec0dc281aec4e7160fb2a4d7383cebca00cf08019cb55739791d9c4460bfec81121033111c7102172b13edb8f7f767f9e7909502477589c2872e87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59316a51bdbb6d5c2e553249e061d188c
SHA18a4c40dcc3bd3489d1d464501abcb97b947cf11b
SHA256024a7495c937822b26cbb3c78bbd04551150674a59b4d5a8acba8333db2fcf6a
SHA512f2ce9ef7a5fbcf44866b624288c7d3f6242efb1cbc360965f40b84661a066c7ab9e7c19f9600a36dd889b6fbec4171589c3253df9dc50051581d689e3acc2114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e4c5f976f8c309e0fd95d5feb7813d6
SHA1f321466e22a7c2d3557e3bdbecb9ce8afb202dab
SHA256e3eb0e115ed4f47e525298bc62615301157c621421be3c94850cf71aef0fea6c
SHA5127c4d84153a18e3d7c063817d4b09cb5ecea8557f7dac6c878a79c4cc7884e62a26d267356e9022371700d9713c1f56061507d72d4b7b7e23fa794da2295cb6c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cf5ff9ecc3ddda69170e7b9a88dfc8f
SHA128d52b3aac1b3ba1b8838dd7d363b62646173195
SHA256553f9c25726ec4506f55865bf82c092a374bd4fac8d241c74a4134101ac5268b
SHA5128aeb199aa0379d75180ac39dbaaa67bf175520ad1ce4c8c1f7f663d5118303a0e7afbee9bcfdacc5187027df32f07ff5705880661830d7e2a95b7d97cd235def
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560c735c6b3bdf96fa362d5fc2ce06d3f
SHA18b6f6d6911f57fc6adf1a37ae698f6f1f4c67d57
SHA256bdab05f630900b774f9dc04ef3b31a4a74ae8c181fe296b0eae52d00ba8ec483
SHA512132ada4c16dba2d2422ac0e6e3ed02eccfc2e75271701268358215db296a48c10367a9089c2da537f456e9e9e44669956f870c62866fbe02f2a7693aa9e01de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527a7553a1ce48d2b712d33b8792114a6
SHA15ee3b619899e8b5a144a1dd2f27c2cef3c38e1d7
SHA2569be85cd6fb22c3b25b5ed51dc4aa805a4d3f38bf24e76e3556430b531f0aa94f
SHA5128c2c107f65ee843e70846fe726c16a8121b237febe088dea8db52eac6c08283a6fcb2c4b9a6854d1e0060fa9ec1896b6e6f2a44ec33f60269af5331af0fbcb90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7f5eb77c4ff5578fd3e2a17c5753ac6
SHA17fa413d36b30e7d9bfe424aa359ac92e02425286
SHA256bd9721a70b1bc937a25b337f6ebadaba4edfa206dcc76967bd2f104da60caa84
SHA512241b0c36498337d7845ce76d9710a6abd27ab7f691582f089cb9d18d989a336a274f12f5702f005533c1099b16ac857dc610ecf21706d74b04de3c4bc5616fcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545ecb58d1fa7dd9c3b75dce3ab530e42
SHA163ad140ce53ef0c0e02f1c61309cf1c7c0c4b00b
SHA2562978e9871dc187ef8c65cf7d2434057e44ae6895b244334f20d6f5d71843d81f
SHA512ffc8ccabdb49d11a2ed8a83f360d098acadbe1b20e7e3219fc414cd43a26ef160b36689fc23aa6cf7bc789074591f419fca33fbb12d493eefa69fb200aebca79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a614c39dfbeb55c5c46d4485f615f70f
SHA1ef5e4fa5f74d19114d52cd4e41e0034b6f9162bc
SHA256920deb83d8ab8225f4d0441e0de6740807e233cd788d68978533902b3a777414
SHA5120aad7c993e2e80435dd2f1d8062bba8461ddec9779722acc5a7e2918c7dcc9cb0d6189bd779375d749650c32ef11ac85f6d65e59239c9718fa1828c278aff61d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3c39ae15a333fa5acc28756109164d7
SHA1f428afb97d12c8e8f6eee2b411fc428d64ee69cc
SHA256e7ff7e7a9a66d17071391e4575b83e1c2eb2ab9e6e6cbca45e12709f10600fe1
SHA5123deaae5bc0ae97cf4626481fd24c269762f0410a9e52359ba9fc814bdd7bc9c2fb23741ebf517724fea56e21c8ad0802b722c63583e69a497d0261cddead27e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aae7cb0239f45a5f86c4ba02e1f34089
SHA11755366ad8e07529fb15cc7bb47b1270b9b1c404
SHA256f4e7e1561c15a2bc30f62b69c05cca4f5d97f8addfd7809ddf4b6e890de62be6
SHA512424cb490d180a18d96e3639c22a4862761cd8969800cce8a4a2b8ef9e151fa1d05bc9eff7924cfe7015f448eeb64eb11e673667c506b62258db44cf16da07d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575cb63c7b925bcf2cc84ad52097582de
SHA14bdc16b75488460e87e833cab152437e6fd596eb
SHA256a58641e607386535f6e3672d9544478f71a5c9027c0b04b90f272b9ca7cfca5c
SHA51286178a2bdeddfa3af2952664cd4798f964df1ffc2bca96b4a44960b840aea2b32deb84cc3cefb59cecee27a9a659bdc6891938e823418ea23c3836bfa0e51711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5faa2c271bb0950e73cf970ca09fb3a
SHA1ef8431ba07e74a3eec033cb4009da81cacd0846b
SHA25648d491ff78b3654f874bd7258a860374cb053eae55031882b436be3232ee28fe
SHA5128c9882a028fc48326123e8fe7cc4d1dc6e24b75ef335c935c173198dc7c60f6783157e9032c4282b563320ee84f2c0d0f8931d4e11400c58f479767a2470de0f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b