Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
db1e53836be113863303f878399fe000_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
db1e53836be113863303f878399fe000_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db1e53836be113863303f878399fe000_JaffaCakes118.html
-
Size
70KB
-
MD5
db1e53836be113863303f878399fe000
-
SHA1
23031e224861a6805254c7b58cf9dbda6546add0
-
SHA256
818d3a0e2405da35b98ee6b079fb174691beeeb92e7d723e7eeef1a877002c5d
-
SHA512
968028f568b8c8c49c54460a61c948ff5477846dfcdeadf3c417640e8e3133fb593ced8359c23a1139d1c956c3d0a3e62a5e825b185c47251ce193dc00d9e07d
-
SSDEEP
768:JiC8gcMiR3sI2PDDnX0g6sg6RvWjGtoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:JjUTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000001c887a993f0ad8fcf4db584ccc1aa5bdf84dd4b1cd313c1a69723d40ec1118d8000000000e8000000002000020000000948182f9dbdfbf97e1928fcc4ea11005b9cff795d51017b03c1a080ea4543eb890000000f1ad823584f0227a7984b15c31e879dea15af05bac10b4c6479429c79e73c1250e6f93e6af66b4ac7814e7b4567ecab75513058761a8c5a7f4e8623744aee67c8dd8d6565de083ad90218daa783c9a732a669e97f37b3c56385d22c0600ab16c5ced74ded24eae5461a49c8088d2c6f947722fde0662c661b8330eadb5fa995246236e72bfdbf480724de3ded5f06cf140000000cb79a57fbf2dac8862c1eda990587bf5dae416589f54c44779c2f6baacc75b245d50bb29c784931d601b42edb829a53c117772fd9ecc125892107c58247a5e92 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C452C61-7078-11EF-BD1D-D238DC34531D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432246560" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000006da1b143cceec742c03d0c48e388b3e4c3e1227881e0e6e79c2cf727543639d7000000000e800000000200002000000087ea6610f16cb41aa7dfad09bb6ce5ba0be47b1436bf0b104f01b77005862e6120000000879137a8aeeac6cbcb4458bd79c47f03c9d63221b5bcbe0e552842d5e8bfd765400000001e722a3228360b173d27c9a719c55033cabb378feb5c7204a3bc88eda96731541f6e5dcba56e4b63250e7ea3a22030ee2241c1aee91790ced4d77643cc5b5747 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f70c018504db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 3016 2876 iexplore.exe 30 PID 2876 wrote to memory of 3016 2876 iexplore.exe 30 PID 2876 wrote to memory of 3016 2876 iexplore.exe 30 PID 2876 wrote to memory of 3016 2876 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db1e53836be113863303f878399fe000_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa185cccfd23c4b63fc8c8b058ef5beb
SHA10b09b121921a5b123b6a9f8403ab89cae81902a7
SHA256f9b3e50eb87dfa697a6cf0f53d84724bb2ed8baa85f30757d7e2675daa843c3b
SHA5122e81aa60d4acf691eac7e9bc1eeeb2908bb17c723c70eb93a1b0024d9040b74d53db857de9185ba7660aa43051533a17b4b083ab729f0362c9ffd5ed8889c9f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d0cf61f24975c706fbabd89668a9b1e
SHA1a93a2da8e2c3eb16c167ed16fa59387a69101518
SHA256ad9b4a5f0abe4798b682022ce18a79b341317b3e3aa07a6170dc13324fa7ac70
SHA512ded049fa1777142c3dd4c9925503b70a14174d8083324abfe4360202de96d0c28b6e645d5d62305546ff01bd544a8a0dd4f813f6571f5eb55d889a1ef2290285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c81e3087ed818bac437e3179725e958
SHA1c87fbaf917422869c4eeca38a45f76905e1de257
SHA2562318328f6c311a4e09a21bcce02f9ac729aa0cf8b5216dfbdc685145318e0c06
SHA51242347614c42f228871db605ed18d5f30f80b106cb18705b428676801a6629f46f79bac339c0e8c7ff4ee71a58b99c475e2ecd91ef23428a96fc8a99630986adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5337bc70081f6bde7df17e34215a024e3
SHA1cc7dcc94c9c26a63790d2295d25d9aabb940a0b5
SHA2569441db1b69582d32be2bb4f912d6e05db8126b74845d50999bf231b2a00a43c1
SHA512436505d86387824c66343cd106ca8b25bfee745bccaf03372fc11a53c7a223b0e7bd831cda4006d7bfe4f14b4d8de1a2da8b68de1e0339f856496bb2a3c76204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50970e3a58653a8f59612d9932afa97fe
SHA14670309213973a35853c05e951ba299e5a13ccd2
SHA256499d2d190f5128395f3c47f2fedcf920b5082e97014ffdb1a03bc8a990c635fe
SHA5121d8a1b837843bbc4a547f62fe3bd62c2e4b8c7652b54792be20892a1b27d4d6739bc81f7834478cdadc61bbe980a5f766c9d07298c70f99904f7e24aea255fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc60682db6f9286b3add9a5803103158
SHA17e7b1fcda80a560ad7a2616e7a70e048bd6d4e51
SHA256e33c2cd67be78001e7f3fc81803a62459c3ff7968d5d9bf8e9624b03a91f6f3e
SHA5125e8b4490ced92ba1f5b2c80671d8fc866648bcb4c760346530105a44011c28fb224f21cd36f782e520673a2d180d3c8a9b18097d98b917c7cfe08105c91b1b1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4135576b71d6b12731ad4671a7238bd
SHA1654cfce526f6d41cfd1ed049e0e9cbff6ea5b900
SHA2567886d62309903de0bc0768c65d3d7362ecd9b66c4c1506ca66c8ccec08289692
SHA5125cb2dfcf68bfdae7e0909364b7707f11a9d402d11816dd7253e2a8ac310d94afe745be696f7fd8702ba3f7316b58ef346627db23170fd049b6c717b3f51494ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e85c27d255b2104479df8296051f63d5
SHA11f01ae66cb4317a1fe9d37faf395138b57f684fc
SHA256e858e9e0d3a6db38835350d5ad844722a0f64f15172a6707b65007905f998e92
SHA512dc873134d073ec349479d6185881b88a0f3fc4dc02c5badd5ff1ac222cdf7a8a8e2a756bd04cd83f2149db47a157667fec98ef77a3af7c050bde9b5645ef2323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57171cae9fa2954a35b4a27fbf56ac4b3
SHA1afe919a9e6129ef06bb904f0ce1e80674bdb71ee
SHA256550d3520c728a1bc92fd760bd47f389567a5281f6440740923a5ffc6efd91f10
SHA51203de63872ac608b04dd9d0d49688f89836df92092da58167910af44aea323bc70f9c2d09013e7e3e28284189c9da5bce75b15d1581dc40a1c964cc19b39f4158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d0012a8332cc6b4b0d34f204ee00b23
SHA137eaf1081660057927e9f6d4d31f3ede94c08436
SHA2563bb819cd12b9ee8a5b63f15812437f99035531bfe1ccb2778a6e8ac8dd195e44
SHA512f005cfdc17e2a9e49675ed567fca9da7d4da8df31b45f88e8eeac344e2e2ebe44ab1068166716b73b6c47c585e236b4e290b3166d7667929e90d2670c3af0564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5676a99253abe4be2b5eb1b2917e88719
SHA1a4f19dd23412389d2120563b422c0452680e1541
SHA256ea70d716bc0c5b715ffd9d464c48f484462a53d1cb59283caf5a60d5d6f1b8c1
SHA512439c07f07b48987f45d3bfb8da4670dc0e08a50337d46e53f98b8c5b28871e4bc922bfb046ac5fabfb15f351a0b2f21b43115ca0ff1316411072c1739196fd64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5446b1bacb42b8e02b0d301e13e65dad0
SHA1d328f0f3898fdea442b698277988156ea9fff172
SHA256889afcb3c67e35990f98d3dac4ab45a9d7d750b08a94443333826af99ff4a7dc
SHA512fc9d02e0e3eb36a0558545658cd56f76466b96100621bdcd8e41077ffebd11e6ba8153e4e8ddfefcaf8f0ef0d29c75cf909df4176101e203ae16eb2886217bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d21729fd3ee76899a5191e7a993bf63
SHA18b137fddc6698435d7cd39ba18690664bd6ee83a
SHA2563e43e73a5cbd42197f820cb9f6c67316a82d67e72e054dc1f6ff0651bd02d282
SHA51229efe4b58d42e8682704bbfb497469dcfed379f8e15cfe7eb41f9580afeb673e4da993b0b6f49e02f466d45bbf6fcf6a87987043d0fbff4bce92b8f7af8dd157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3ad612cabd2fd8a8706914fb673653e
SHA1f7d1deb64cff8e4c7f4a8b0057b0db1606fb5f46
SHA2568616673dcb21a23e1e821909a8e5237d70eff453c77559fe7869961715395a43
SHA5127d30ad7e96c73e19a67b797a44e5630a6f3657c2d313dc3cbe10cc6acc9fcd47ccc60c54c33644de390438a6f90390d7d9e658567921a7ba4e02caeb3a1891bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a18c474193a8db137a74d51a65474302
SHA1c1cfc01460a6d502c3a78acf6da2fd5c3413aec3
SHA256c516b538d8eaeab4a0ab45fa0c73225d1390e6842fe37a3ddb0583c62d97423a
SHA51201c0ea15eb782d438d50bd580577b538268a910e11d1165b4112d2b7d5a3c69979dd786bc22a58fe054d62a32a14f9288ff834e0642608ace8cd68fec2d57762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55865ad53af3fe829153f30a0b753a926
SHA15642f0b9e4a1441d99b71674944e87ba0823d278
SHA2566fbdc5033d4b34716d0f2ddf3838482143b7138bf77c7f1c552fd1cb8ffe6ba3
SHA512f9f5814c39e523e3f7f70214b19cdcca308b530da910fd7333c028252857ac2d83b88673aa62fe61c08e3586a4efa26d201daf977941b2ad9a061a961946aa24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc5e949b9cd2332ce11c4d87d5e604e4
SHA1b97628529f1211f7404f44c4c57e8af25df501b3
SHA256ad8d69b3f24cb28af3a77f8c64f3e6c24ebc951bce8f6366dc4bbf60b7ce666e
SHA5122d53c3194476755e2e526e58d6a1ae3ec4ffeb7bc73980f08a69d0aaf3f75aac527be95a30a404e4f270e124b9d39b3a40b6dd0404311e16e282ca276862f8b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525f1e40a920e01c1eec699705b8e0746
SHA1034d4e48485cf786fe41b8739b5057e96f6a18e0
SHA2567ad3896d09af066b50fa10b4b477f230e5dbece874c44c786a6198371fe392e4
SHA51287d5697bf95b95a35067ae30a7e9cc6d7b111075cd0b1d180df4a5c411faaee0f20895030b90b2ea59a61992eac60dee37421c58cd9784375922ac5cd142b98e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b