Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 20:19
Static task
static1
Behavioral task
behavioral1
Sample
ded5974da2e55550019c2e60578c2f08_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ded5974da2e55550019c2e60578c2f08_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ded5974da2e55550019c2e60578c2f08_JaffaCakes118.html
-
Size
4KB
-
MD5
ded5974da2e55550019c2e60578c2f08
-
SHA1
6c7087520348cd2c3dc7076e3a2b1ea6e02188e9
-
SHA256
b829162b76cb04dce2c862c7151db4d0d71e2495a17172ec66035cce7b30502f
-
SHA512
e7ade1617aba491044c9bc048172a8774300c7e864f902ad5c812af66301786968085b0b6a0d93d6a65c8a4270916ee3c6936a740a503ba68e24c166fd13d3ea
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oo6Pd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60aede4c1a06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7874BB01-720D-11EF-9917-D686196AC2C0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000000c5fbcdeeefa6848af2ff03ebd2d96cbd6b5a7aa682720fc9550db81d2932e3e000000000e80000000020000200000004299fffc664f04caf1b62f0a944ccb4058e7590b2c49c5557381dd588bf4fe6520000000c3ee444b2876c96cff0b2114d74c24cdf2a2d1e4d38d4f5f3013f00e4ed4d898400000000a5c8d0eb653941e17449ff9d64f4119818fde97aad0c3c8df7f70ad3a108853e58aabd2bf22079ddc64d8288d1c9c3e4c7653a838b12c202164d136d8d3e7bb iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432420632" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2732 2400 iexplore.exe 30 PID 2400 wrote to memory of 2732 2400 iexplore.exe 30 PID 2400 wrote to memory of 2732 2400 iexplore.exe 30 PID 2400 wrote to memory of 2732 2400 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ded5974da2e55550019c2e60578c2f08_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df61d64612924aa31dfda36dc0c82ec5
SHA145df149f6b5326d44516a379d9b5cfdddae33cad
SHA25624617906c8a2b6cd7eccb679b00bbc475b373ed27def963c922703295fb57985
SHA512af01fd00f45a92483b8a441af1ae01f40a06c4bf4bc7dcdf057b03261d6063022c251858351dd8c44ba2f985472f30ff4a7db1800f440ca761f4292b47436cbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6952b2b8909b2ee785c3f2045b4ae37
SHA118a83c954bb5e8c1b461253c0993a7a1bb0b2a84
SHA2561228532d8ce39a9b204eb4b08920025996ef7803f2eadb8e6837660d63df12b5
SHA5125df21fe67383914808db7bbb3288aaed7b468a535be026b8f244b103c4e780399b54e6ae7c8bcf075a3d29976d819ea9778e0f54e675abcd109737310aa5231e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e2a597ff800f63bf00c5fe23ac0f91d
SHA1a3b5bcf9f906a784847ee73f60c4f304e0c361ce
SHA2563a71bd99856c075e8b5856b1cf035c5f0f7a9a13bb0fd578d4c5709f92a01021
SHA5125b19fff92cabbf13177ea0b21565461641f7cc034b6dc09a787f8aae0a1b67c30e9cebb37d9e716c5cd54c4ef4fe9a84c637f4f0ea71b3adddb592864f32839b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a058e30df2cefbd217a222c17545756a
SHA1a3a46a0675db84030e7ce65b61c3b401cfa87cc8
SHA256d450f18f6737701b697db060a2a4916de73cc080ebbf26da76dc9e671bd79e51
SHA512dcde797cfc9f153bb421c570439ca59ce0b32dc816ffc50ae5a13c88d13ae03dd807fbcd278fa4b0eaebef487a8c274c8f70f409fef9790c8c3e242f6edb1d96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fe88e9f526c2c9e1111b80e5efde676
SHA110cbf7ca9f5bd0ec8c7d0675d5876cca240f18ca
SHA2561687e1d6640fda04b4186f6d905c7afeca375dc666912a080934eb7a0300d99a
SHA512b49347d0b658bea2124db4abbecc3bce09a434458c82215c01accd02919dbdc600ba8c637ac918f7e469e88d330d353a8989191d865a94084e27107b6729b083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561482a86c79810fca4736239a98d9129
SHA14525aa36f220a800160c8446da53baf5861e31e2
SHA2562efc491378e323311e343418272270bb7dc1b34e546e524657a7fa42fbcc5141
SHA512f1cbf57410113bdbdca1374b10aad04455cf9f958244150cfeebb83b5e6e215265d6baf3fa9493c9fcbb2465a557cfc09bd975b53aa90b897f2fdb8ece19c5fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f57ba032a8802dbd2dd7eabb6452e81b
SHA10bb9042f260ddf0c5637456f6ee3a95046d69e16
SHA2566fa27bca3496cf6a921c6681e78e908fd4ed32601f32dcd08bc47e184cd63d3b
SHA5129de8494d44b5851666967754a538c8f2673d2dea082276dd5e012b988758b523169caed03534bc243ff58542e08c700d8725b53b2153979ecb6a7df9bfad849c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f81b8b5824a3e1d83d31f665040587e
SHA19b806ff65b1119937ff75a588a6b0ed01b9323c6
SHA25606eac5f30f203f6f020fe5b83b9076bcdddf88f7109c4346e66143ce1ed36e2e
SHA512b4d5798597a836963f83548ecf3d7aba93a5a0cd53df83c6b8ea224a36d13ae263d25c0b2368a60534abb87ef4d8edad05f32dbe8ce0874ea6c45137755ec252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a4c72b5af6673fff5c69c8208d23d8c
SHA133f33524cdb0630e6032712feb5655a60c4ea709
SHA256951cb70eec4cf0957d4844db1904ab87060095530e5c2353402eb330d59a6589
SHA512d8445b762ce5f2fd6cc9afd6e54d0bcd2bdd1e85a8722c6abf121ceba0f546740584fbbe8ffa1e979613e85c1dcaf18cb2129badc85d955eeddc8b2e63c66b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b4fe3b66a65a292b7fd7bc18aa8b21d
SHA1e6949108049fccba0e7d61b821963c9d6f309593
SHA25632b35a8bfa9828f27108c392a08463638698364ffaa788c0407cf9e98e20f4ae
SHA51236a4411a3a8b0d2a63c9e56daa623751932fe0ad005a10111e3dfacd4ac05847d0e85bf508754fda80ebdc0faa63b6229e2f3beddbe39b491af5f2063a2b0b48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a074c0c91d9de8c9b00a9cedc5caecb
SHA1ab7b48a1ab79a81f16e6e88255ee1ee0ba58a3bf
SHA256ebc98840bf8242feb684c1e4a4a2735c6bc86b11d2be0c30273c9844a0e56c10
SHA51250e985cc22cb3eb058aeaa3621e8a66abb603225306ab1b8417276c160dc2d31b7b6b4fd221bdf26a97b58599cdf9a1dcbf5fd573b2901255e32fc0af5142a06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573c66b09dce899cb9f7ea49e29d2fc51
SHA16162f6d5e5a2ce10eaa05bc5841db70d8e7c69b3
SHA256c1f0941b451b3431bb978c644e73c75ab7339518f1df0e6c1ce6ae5cb1e01c04
SHA51203943d4aca7aacb1a471402882cb8f61b0f38e17735d07c0ea62f98dbedc008aea52f10b07e5251d23805f5d387e489e3c3f881deffbc6032cd0bf7de26e9c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5716b71556048f6ad1d352e31fe1c711b
SHA1927fbe0f233158446eb78856425fdc6d5a36b605
SHA2561ef9a61f1e1e61cb7b23d2f89104c93bbcfab9e576e829eec2daf5299181cddd
SHA5124f8afe23ab96646dfdec04a1b797da1958d37977a52ca3c88ff5795e2077e397ddc9c2658ecdbd7d81c0395cb53fa4454efd191d5788465b9d622141682a4db9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555576cc808217b571ed52b16ca583e1f
SHA1b6408d6077b8da70ce76e2f8c2a79e52e0353ff1
SHA2569ab4422bb680ae0145dbc37d44affa9a95fbea2248eaabd9bd4959ec5722872a
SHA5122d1af12868695e09d9044c741473fec1b1eebe77cb16d3e9c223d625f1e146b2255165d6a4e76563fa2805d95d943320b94cfd36d94f863f7f8e7638846215d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f742257ac3bbb137ed2b4a136619ecca
SHA1db262f90187ca3bbca8254cfd2ec95b57b5894b1
SHA25628fd4bdc614cade7ce56bbad7b177a5ad7ee6c3f53b2e76cfa2ebad8f1ac54b8
SHA51219c6a61cf0611ade6fd5cc630d001aae2173b79e07672b3c6338fe5f56cdbcb428e22f7b2d0e4283efde3892993836a84be8d6b2e7e01155185122bd77910739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5350cc04757ff87ee8498558e74556d4b
SHA1e2af19298adeb296b77eadb8409d717e1e5249fe
SHA256b4957512722fd2613e38a2a8d2620a99cbfdf10554b891cc37d07c5512eee2c9
SHA5124d0686abbb916f5bd7cb46f3dcff3e360f950e3e9fb7ad52ec0483cf9c405601019915e9ba162c9b44f15c2b6d56d83c4a3f5602dc5e16a82ba9700c1c049e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546f0ea53e22bf409f642e5cc9a898dc8
SHA1a58281535151f1a4155a72b4600fba6e785f7d63
SHA2561d684eba356bec69b9d332d53872fc69a2e1d3d2e1796bc3e20d565fa2ce71f7
SHA51237b764751e85ffc827fb217b10d556bda1250ffb4ebd4fd35edc05f45041a27b12b25220c8f8912d5352e282aa8556401fbe8a9f50cd0264ec65fb75baf52903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf7f28ec2c6eea34600e97bcc31111e3
SHA15a99e44a66ffbcb2cb62b036449df89b456ad01d
SHA2561a791a1daf13296c5e125e63d69643afa3ef81915a3cf19cce2e850f997c2143
SHA512956fe74863338ddabd2c59f495d7f45ed46123a0abad347482d0c4e2a3d3e11e55ca61866d277e8e09fef46c651902d2ac3f8abf1e19138f66ddfafe2b9723e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5415d080ce0604a4309384f8be94d327b
SHA1415489c1b694c9bc91792a5f638aa53df796afdc
SHA256ca0da91ed128a946da9d9a99336523d6cb05195f07d8c2ec146b598ee92c246c
SHA51232bc6e533d310d564b9ccd1adc1376670af76f464a89d7a5a86a892b2609fba5f66191cc72c38763bcaf52b49cf8d2915a9f81d60dbbf0e3042202fd09f7d0d9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b