Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 16:15
Static task
static1
Behavioral task
behavioral1
Sample
dc96f6454d28280966647208dc57d740_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc96f6454d28280966647208dc57d740_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc96f6454d28280966647208dc57d740_JaffaCakes118.html
-
Size
18KB
-
MD5
dc96f6454d28280966647208dc57d740
-
SHA1
0f619d3ddc9ca4763625838835fe4828b431bd2e
-
SHA256
ea11b3deeef5e3e28d69a809ca8eb1ae3700a2649adaa363da96f712d5796722
-
SHA512
8831054080b03fd226fa697253c72a2e37b2f5ead886a48f982244fb1238291fbbfb00541984d8e23bf02d6c7454e58bd2db082bce87297f53c06427d3a147b6
-
SSDEEP
384:W4lI5NHSYKmmmm7mmmWt1eHp71rnha7jt1eHc1eHc1eHp1eHWqi1rn3A7j7mmm9n:WLNTKmmmm7mmmqeJRrhabe+e+eXeor3F
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000002a4fdf00c65b83e141bf980f77a4cd3304aa9d65d444d1fa5d84adaf5a0e0fc6000000000e8000000002000020000000c079b810d88a682faf28d2aa11d8e18fabc09edd3d8f43a73e957e4d915d73f22000000089f1b7a4ef6ee347a62cb74c69b73d17dca6de592d0752394ff0c29a7490fd38400000003f706581575d6b1407e2b4007dfb3c2c77081ad581c4f57dcc61a5f7acf7f0adff5607ff7e46ea00103143d313fc4c6907a1193e3d54670016259c1f4008c075 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432319591" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000354692eda9e4c0b0b2a5e84ecb5e904f17e9abb38a9d85781d8ea8cf83c7870c000000000e8000000002000020000000cec5dbba06e546b5dd1849559b43d01f063d7a1d06af7379f506f07cee063d4e9000000014653df8b54dcb2f1f2274f7204182b84f40aea46b609aa6b6738e1447387e566696b3fa7dd626873815350fa55bce8efda67899d14c5e9bef75937bd59ab077ffd05a6efcf4f656132c56ae2b2ba4385f465cf6f01ad31f4dc934860595113e7510a02b457e239f23b0acaec341c4557dc79df2c99cab437970ddd4c329f20bbfae3cfa254fcb29c23b899d9d4efc9c40000000b4238fe2bbfce4a71dbfe4bddbef9e9a635a979eb6375e0c2f9f34dd7e5d8933e45981675e485edf378039ffaca44b1e1a61b6cff47f858ae35f322d054c23bd iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90bfb20a2f05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{362492C1-7122-11EF-A5D8-F2DF7204BD4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1564 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1564 iexplore.exe 1564 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1564 wrote to memory of 2660 1564 iexplore.exe 29 PID 1564 wrote to memory of 2660 1564 iexplore.exe 29 PID 1564 wrote to memory of 2660 1564 iexplore.exe 29 PID 1564 wrote to memory of 2660 1564 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc96f6454d28280966647208dc57d740_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1564 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efedd3c2581b51e3fa87024e0cd74028
SHA13eed308fed9a595cf57752034911f2fbac525f66
SHA2566dc8c2bb99355f58689a404241d6881f2acb5d76e4b32a5f412ba803bc5a2671
SHA512c846d2c0bab2ee042180e3dcf4401a613fd82104d85daf61c3b334c2e53a66214dcecc82f149b11dac9058b2f3938014a861c10e0c5a59acd2034edd0ddaa26d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0b71bf8d93b0f7c2b24aeeef149365
SHA1b488ea804168f7d1924237e96d67b6cffc4871a3
SHA2563d34149ed9331f00e5d0860afb6e2065820c5f0a919af43e868309bebeff041a
SHA5124cb65718a2a907349301578ce5172d7a81a407c60d960ea4abc93fb1c0e926bb881fd60ff17fa2e93695268d8a528d44b8dedc57cd9a785da992493a46583dad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2eeb092c2a0e8e2a7fe814d8eee9888
SHA1a1ac8c2bc543c6d9e04128eb3e4d9e7637e78267
SHA2568a77276f820547ccc5b049c4dc885a1d7c1a4a16cacf3609fda1039a60ed587e
SHA512c9d2db06ce7c790a21ff71bfcb9697645fcc1a78ffdd814bfc09c278d791d486cb3a4fe4f001240e09bdbca65be872a4b762994c191b39e8d37edf97766f8307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f410cb85092d0e6759c11a332f7639d6
SHA1aaae0547c32aa3773ec50b029ce374b33b1d5329
SHA256405fa664049b82f6190ff5b5f7804ab11dcfaaa31b543ddd96e359c18428f8e6
SHA512f65d613a000338daa9a7c0126eab41cb9cc59f491d4d4e5f18a63a2f48c41daf578aae124fc2e5275f5e72e9b5b6aa1fa8770ee80d0530831b648c54246c94a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4a14157ebf4cc2a8a9c1f028e94030a
SHA1d2684c2435c3de6bf4986ba27e11ae9910bdec48
SHA256d487f7505dda03c4f9f14e83cde4ed7674341da4c0803b91f84db94e638d944e
SHA512451b896675ca9842958374601e3482854d9c06d894e8f16cb3557706ea1810387676f5a7e71f30a7e4a9079d77123d4fd9f846fb13dda2cafe757e76db1a7d97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8f98387bf960421e920d15425633555
SHA129981e5269ef647b9d8d6607ac0343502faa01ad
SHA2565ef125a30e671c0ac9dc7de7a617b2b3364de02d837fffe05639de9f47c23ca1
SHA5127cb05e494c2fc726de4c694f7adc1a4f4dc624d980de14ab190994e32acdca8bc8b9f56dd958101f39b5718e8b1840e97cf48061366c95e6e65c076ac74335c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9084d629a749b05591e2352f0532af5
SHA12f03824049395b3be2e91f90ef0453c4387efa8d
SHA2565572f28b27c435a77fd94188db826f69b0ce56eac62b5e863ae1d15883896aa7
SHA5127449b25889ed7299370bc19209f061c733f9617f3e7705426846279c1ba75d424c576e21f6f838deeeddc8f9a20dda188786c2bcc36b902fd2b876d6157010d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b87eefb742f41004da78a49864146ad0
SHA1c20933606a35fb87244af843c295d0e8a9d55c5b
SHA256e980a0f51d07486fd8195ada780aff48e03081cc05d0e02562a4ff44e2429dac
SHA51219c2c94b594d9de077b155c0f22c6ec0a2884c111003a9b2e3f27b6d77069d627c62e89a9760016e0d0c3ab9eb7648497f63bc61d4cbe7c81b07870ab616e463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9839b00c59618ccd31ed589f3a23c76
SHA1bba3c715ea7ce47a4eb0d982a6efc5d03aacec2f
SHA2567a8636a37bffc05580e087c16c8c78f9b711b1341c33061a561d5a1cab49d2a5
SHA512daab5eb1318b410277ea695300f01d0e6980c6aef5f2c0ee2635c213e2fd5cf5b73f50171fa520e27351ead4b75707a8087a6a79720b752524624be88f2c955d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe49770da1159a9eff46f47a6804a140
SHA1a3d3eddd64afe8a65624f0e2e1fd13c714512c96
SHA256685be7f688c97ed088bdb98e7fdc21977e9b01da7616768ea7298d8c417a70cb
SHA512a6a6685ed5facc7f52b967975eb2a8c83b1875de4e8582b63a28131594ad44756574e73e69a13283cf1ae908754c03bdd181ca5e1f57d77c757800881c433b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581f836f124638cf8c42eb3427c649919
SHA17acb105dcc4e4737612c16b23b6ce6a71dacf2cd
SHA256fd56af1ef11022fe1967a1c097810b5b6e000bac449d68bff5858acbe89d89f4
SHA5127513119896b75b4c7a28a33bfa17f5ebdbd4ce991333ea5fa20dbc900a7bf07f1f0d90ebc9a7f094545a56a2bad597b36914820844d20b3554356166963d5fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea04dbab1e0ae56808cf7b5e904f2e49
SHA177383dc2ff61098b71c64e50506c1029028534d6
SHA2566e085437f0f8daf4a68f6743d162ccb26e0a4c15f7884d96464d7a283897c1de
SHA5127566da908bc5f834e11032588de5889bd077868b51bd0219f6db35615dff55130d0f5db82cc26683f97ed55dbafa220386dd4f3c1f661c3e7ac66d5a3ab88067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd4a9a056501edcf9ce6a47ef15ad38e
SHA1bdf2ad82973db6f88662a7622ce663474e4f41b6
SHA2569f7b782bed3bbfcc88d5e0a975d2c8864a1d3708f2c49bb6e638d5f8ad9062a8
SHA512ad834f4ed55dbab10aef6f9fffe4361bcce57773436ec08cd0f084e6a33d4e50d21d43e27d68b68f004ae7d2c22f8db8204aeb64363fff2a2c5ec58826e03b01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b33fcfbd58f50acc063a34068822cfe7
SHA13a1acf7285b762a02ce81e7e408e09aebf004d65
SHA256f0df95304101ec0dd0d4a4ef42b5ee5f459455ab5996b6430e571aafcc28b72c
SHA512091e330736f7688ea0f5ffb4e17834a2fefb6c27a182969d9913296307f30c773f369c85419af99e91f74c9bfd88c0959a0e153186da88ef0c6aaef9ec0d4a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af942465e2e76fcdf45832a57cebc19a
SHA1ada5a3cd8ddd92bad86ff1e4d69e2e9f49afea60
SHA256ed54ad910e39b2760a8d7909cded62b4cc74e6ac72b05dc421161e282fa5f894
SHA512951aff1b564e80f643311d669d29589e1e43f8cb8a909e8df211b3e16bc55d73e5bd66d067bb72876683ca26e4435065c082eccf1e67098dfdefca51bd4f6e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ad097b96ed28e3ef366015524c69b3f
SHA1ec2085ccc4645175e666714d1475aa01c569a2f1
SHA25686472dde5fa3970a9422782a9fefb78ffbcc715d9cd0d61139ca5f41c3a0feaa
SHA5126657c32d3e09a26a942d2b1f9102afc6642dd027e70c277375bdc7fcbf3053f0ce7a1817b23b946e38041d7bd9b3b109c23250654430e67e9339dadd64a23522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5facdb4454e578caa8e3ca7d550250cea
SHA140aba6c333d880e3b9f27c006fd9b7379b331426
SHA256cc1723512b58f250cf563a4dc619d8d1e793199a4c423b585d5dbd239efd954a
SHA51218c050de67db78d6ea508d69549d485bfae294e918d1c1db398545be6404553b20d5c001dea9c5c41e434276e75c005cbcf12358d23f0745d904c15e4ad6e0ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569c9daf45bc9c28a56a16938c0589d39
SHA18d4af909499eba188f5ad47c60919bd1088c4559
SHA256eb8b74e89b01c641a808b5122011e155fc7b0d8d9801788903229f5e245c95d3
SHA5129f86177fb1b4024db3293405d2352d44bf9f6d1d71b01959069aee8de7bf1be607b3dcee4059939a309e39b04452c035cfe2ed6d7aae661601dcf4107f7edd37
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b