Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 15:59
Static task
static1
Behavioral task
behavioral1
Sample
de771dfee575035bc84000d4b23ea199_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de771dfee575035bc84000d4b23ea199_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de771dfee575035bc84000d4b23ea199_JaffaCakes118.html
-
Size
58KB
-
MD5
de771dfee575035bc84000d4b23ea199
-
SHA1
7d57abd8dcc47cde81acf83f61f2319a7f9eb15f
-
SHA256
2fab3e67ce68af9ca1afec6c627c058d0c54f2da46a3edb65c7511f227939ba7
-
SHA512
3bb37d2406b16b7ec62573387a96505f3cebe7cb730b149c7fcb087565c4562fec65ad0b6a6becc2f33c94b8a332f7835b49baadabbfd1ba174480680fae1158
-
SSDEEP
1536:gQZBCCOdL0IxC9jOOf0fFfxfKfsfhfbfefyfff1fNfLf5fWufLfdfFfUf+f0fmfB:gk2t0IxYst5ykpjm6HdVDBuuj1NcmM+Z
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2B835281-71E9-11EF-AB7C-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00038b02f605db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432405041" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000003799fdbad8be4cb7b6e406cf0f83b940fe19f5e149b6045492453932d0f5ff84000000000e80000000020000200000000992ea2e919c777509097972bf1dc4c372db78857428cda0ad4aa1c60570304720000000165d3bafe5f97a0cfd107c8b0e3e7348256b5bdfce9d3fd1ca97f00761f8ec3640000000ca28bc3ae801ec67c46048133e908c553b98b46db252187f55d467355a5378aeb2294d7d225f08c389e45d187f63cf8612d787ef8c453b81ea43f69f88097be8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2328 2512 iexplore.exe 30 PID 2512 wrote to memory of 2328 2512 iexplore.exe 30 PID 2512 wrote to memory of 2328 2512 iexplore.exe 30 PID 2512 wrote to memory of 2328 2512 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de771dfee575035bc84000d4b23ea199_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555634a908e14d203c071c4d4461d83d6
SHA1aa006fb00fb2cbddb99e60a0d8df9f9250c8002d
SHA256bf542cd1acafdee6ae69d725a978bf7b3420a94da2c45936ae255d613be30d31
SHA5125c19ef536cc3f3ee9d82167a2125b0a9c51dd910c15c1ad3779f637e59ff2ba503000cf3741fcd90bd831bc4cd4f88077e36c48bcb42c93c883ce820c0fc7045
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b95f0bee093af06fb462a181fb36afcd
SHA197ae734b4e096b841034a3ecf412c6067bba31b5
SHA256fcef2a6aeea4cde3cba6254b1c49e1e03f3cc552744ad1a32efe95937ee0f5c6
SHA51224bf852c89b1a92aff1eed30078151a4e561c6649b0cd97af83bd5d5da0cb5ed22d85c233da446f4d35067d0740358576f481c954badd94a1fa6e16b1a928672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dfcd07e361a3f25f03f41a02b3ef6c0
SHA16423737ea41cb10a0d58005179bda37d085de362
SHA256e2e69f5918c1478ce828a8a6fd9c7754bde5871bd877f8566209486029b5e676
SHA512324dc9ca2ce166181cd89da37450d5f59e1cf20cd4420161ed1ff1085d605fc341764a1b70b0680e86d4701c11d6da988ca90529c9141e54636b842bafdeb771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576386df171b695c5246eeefaa696546a
SHA15809368b6ab6d4d7ee0be9174c67eaf334533ea2
SHA25622de1688345112ba2e3cfbe1138bb680dec3a011edd318effddf22d73f7c483f
SHA512e146d0b24021995caae3d903a891a05fb3cc3c571009241df16ca8b1f56d78624dc7b5a0e414f78dba77f0eb9132d7fa58df8c330c4e6d70a01d87a0ef4e4608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1730f81066d00e0f5c23be89f1c76e0
SHA12975937246def3024805066638ddf10bca0fdd20
SHA2561354f49cfd520d1c74cf36a81b0783e17be442549176322c74842ae7b102fd9a
SHA5127eca8141be2c30b601eb753bab22d676ef304a0469d71fc37190e9149bbb0a00d4e08ac6eb22dcc08726a69e3aaaa4d28abc8613e4065662d33b70bfa5ab279f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5385ee0cf3ffb173657fb464a67ec914e
SHA169735c6d70b0e623af68efc9f1a8d9a302836f50
SHA256c459e7a48e14e8cd7d066d08434be700cb708f12812cf1d880cb4722e701e323
SHA512151559eb24ccd33e81050d9111b77f6f8c75736d2f56dd614d00bae8bfeba44c3bcdf8de40cf42d7a1e8c7d5cc238b6ebdcea9601dde2c18c872d4b97f3a3970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8586ad44a9bcb688a0b1e68da703189
SHA18337362d8b173821d607e54f0b8f1ee8d0074e9b
SHA2568cb14e377adbcfd4e889e7aea19f6125a3b9da11305ebefa828ccfb34dd8b41d
SHA51239cba1772154eb83386e3c7ff24607ee57e2585aff70ce4df0d2c4348a73f0847420bddbf89d8dd65e61b7b359fe87652087502885c220f345cf359f0c8464ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab97c6d5723db954fdd4fa0b76442fb7
SHA1c15d515162c72c56f03b643cac3ddf836ad542c1
SHA256626c14299863c6ff5c4d4669997acc2b2879657b6872068e12015ca99e8a0794
SHA512da1f0c507f8e73d30ba78a6d1c3852c4be117c7263c14891b9082eef150a1fbd81e735790937f14d2decfe71bae7f123b968aab2930bb8c67ee0bcba2f5318a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545e1d9b0cf181619ef44faba68d59c86
SHA19716d9c11eafb20b71e90c4802ba9a73c0bcaba2
SHA256a75d2c7f533d93dda62f1477ff4b83f99d4f4bbf386ad8792d3bd708316ace9e
SHA512f1b4578a0a086488c3af191db895238dc55fbcc8a518ba230d130adc3f977525d33910d2f21e0f6a5a57743427a112f5992f9fa87de033e8e68632447d84f1b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c66d9a36dc2003d07d5ad95239df7de
SHA15781991e635067e659f6f617ca9536d5d74473d4
SHA256067b4361582c359c9d8df336749cbe1c3f10967eae9c613d5a7ac13426ee1e45
SHA51258c885c7b00837db3237f6f4d1e403fb5d7bd3ed0cf8ebee25c3b9a21193aa2eb8d9b316484d16e708f35fad5cece96e2549e89ea39bcd26a9a18d3f3e5c0132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e339bc541c7d3ca4439f53bee58e25e
SHA1bf8012f37f4e0ecdafaba9c097c1b2156dd570cf
SHA2565e0492f59b7f3a3ffb3cb751e1ad5d59d5852859802ca5dd2ba57337e4779363
SHA512efc89588d2a69dbb5b4edf60ff69481913001eedf25c0a545a0b28b6e89a674a16f1d7af91759a327d9d53acf9811d02daccacea166303f1ceb588c71722e2c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55031c72582a15f23554036c9d4595a08
SHA1337457a465355da24250726df17287b313a7588b
SHA2560d2ad05128bbc00466283205355ee40470d86a0b8703cf0bd9890a4a669361d9
SHA512f5b307994a6688f875e808660705111556206bd487dfda5c4be0c9c793c07e7e30b6c810d527228a86a658041cd6f757a94987a973ad048c624d4f1308a973a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594d546475f95b1b1012ae7ed0600de31
SHA165f77f3a19ac0f002e95703833ca17360b280238
SHA256486afc154e11dde574472d3750c7369be1c3dadc6076491e67bda68253688bb0
SHA51275d61c42b517d2b84dec12cc6c86140dd4072f8e8d64025566674d0c4a7733c44f2fee07b9c043ffa3e17c66e634ccd2942b9de03bd2b9cbe6e3b9f79f920bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c976f1d2ac2fb5907f85d1897efe734
SHA1a0dbe63494e6b95681e6c6d0194fa690835480c9
SHA256816d6a9fc2863f6f2451d925e13df61f3a6eca02ae44c5512c241f70f465e150
SHA51218eb45a1a0b22eccce68231a415dc98f8c9eb746a6b531ea703e1546d6a3907d5997ca76ef1e78bb63158ed3bad20bb1fe8d28fd17596a2c4dfe5b96316bfa78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543d06e314f8ae7ea5fc27eb68e6897fd
SHA1a9f48fc8fbc908e25992aad833afdfa5c202007b
SHA2561a8941ff52a6554471f2f05d25a664e8c66fa4b3730b5dbea11b9ac8233f9223
SHA512317b98edf2a947bed5522beff0727d64ee4bf1950d744c009915e6577f25860c5bd0201f8e40008f2c38b906f8ecbf6081beeb0ceb5fb6598b9f347723a64034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af2c4561680588e2c32d96e59eceff5a
SHA13c6439947508d01f1c4882e75ba8d95ea2d40c94
SHA25689d2a2939d21cac2d2da31ae2cc0cd485c19c1aef06b25f191e3277e6833d1b6
SHA5129264d59fc4c088f201ef9d71703d50a21bc827d6f2db79da4d35dc9968dfc22166327a38ca3dc03488810909e1b18d499b2d40014fc1023d387dd5b90e85fb7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c22f28e1ee8476b9532e8f7e7878953
SHA1947b03906aa4085ce6113c6d4ddb36f85b30b2a9
SHA25639efa3f92d22b3cab9c9dbc35f87405fd67640983715e67b936e050efeadfce9
SHA5123801dcaaf3f50437aafb22d0756905cbb2e8b12e1739418b74b077df940982c7fc5dd712c76ba69f1701b640904052506d3ffe624cfdb74e1048d39b43fd600e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504232347867bfefc144dc09c28dca88c
SHA11935b551f43ea088d5ac0947bb1b6f334729aab1
SHA256fb13576c3aa8d02b39b5f5ef629638242ab0c745b5230d57d5a7944e6ef06e9e
SHA512e1b73730fa374c6eebdafc677abd5337274261f1d9d4d66a478dbe2e072f41cdde3ee74f52151e24c6ae8da32974647cb45c2f64d8c8c2cdeb6a3bc15bf9bd0d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b