Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 21:05
Static task
static1
Behavioral task
behavioral1
Sample
dee6cd142907945574f66c170e8e372f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dee6cd142907945574f66c170e8e372f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dee6cd142907945574f66c170e8e372f_JaffaCakes118.html
-
Size
6KB
-
MD5
dee6cd142907945574f66c170e8e372f
-
SHA1
ed2778ba088a8d554ba9e7b655f4c0c65561b3b2
-
SHA256
a62bf854ae898e5c62cfbbdbb8d3038b1b3e70fcf2fd14e3a3ef2cefa978e613
-
SHA512
f12f3904e7688fd707db7c5104e6542ff040f937564dbae30a5339184a97ae4aef8e649713f011d60f87bbfd77ee1577f83d1a36b55aebc81d20f09a3f5fbf2c
-
SSDEEP
96:7GoKxnz6BHk/4JZPEAz9zBem5PFOgkHbxk4o4oHrO5LniplbucBxPs7L9JVTBOet:7BK0xQ8wNLnVniklBh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432423422" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F76C1741-7213-11EF-A6F8-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6019d4d12006db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000babf8b96fb3a8bd61002f859f9e7fbeb777bf74da3a159a30a729ed153009391000000000e8000000002000020000000b94289ca001f6cabaf95d8b787fcdce70f0b6e4c862ddaeb3fc6e6624caeabf62000000099eed8fe65cff43311e907194b9fdc17c8d7d9730a827e932feebe5b6c787f5c40000000eaed4bb3c209f422603e26ce91b2823968a0e92b7b2465e059b78c73d8cc74f399f18594c7e7f5a369aa5b4f22067b1ea0434849ead8b601a714464fad257f53 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1544 1728 iexplore.exe 32 PID 1728 wrote to memory of 1544 1728 iexplore.exe 32 PID 1728 wrote to memory of 1544 1728 iexplore.exe 32 PID 1728 wrote to memory of 1544 1728 iexplore.exe 32
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dee6cd142907945574f66c170e8e372f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c60172756cfe1617c4d64743ecd79950
SHA1d72d28d549f495b5d3f7be02206bf58dadfbf908
SHA256cb2a2f9c919ddbc4f13b21aa0cedaafdab849ef9629a48eb84b5c5849f01772f
SHA512bf2eec70e9457b570f0e3c20543c984ae5ae709807dd0cbea3b7bd0b4266e9d5b288631567cac633f097338352bdde352686aec23c79da53a57041bbf5c4b605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50492f1eac1a5fdd0af47dded4c80b69f
SHA16a1468855a8d86580279b8671ac53682b7105c3f
SHA256885b55887cbf67736fa4435801135a132e2d3a1a8d86a301a4cf739d896ffbea
SHA5127d89fdc59eef495826100ce28520fe08ce18d21c72077995a9bbd6b7ef01e811c683a25b5ce4d87de12b47d44d4465e938f831816f582f3904dbb1545636857c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfb5dc807e391cca4f823f01da6833d6
SHA107260a74feba955e995011e5e2865b136a5e25d2
SHA256a005412cbdcd935efb6ffd140a427e63d2b824bb8b3a0d688dfebdb62e3b90ec
SHA5123df50568511ade73062d3d2862940e9978b7cbb81443bd9b7d29a75633cc9d728f8d60d10e1b0b27ee94e8c73c10afc52dd01e63742a4c8f5c2779c5bb4abe34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e268ad1b4d6024322716443591a096b2
SHA1ae67d89babe233845608fb4347494cd3f33547c7
SHA25692656fda2a1b385054da9ed07c399588676adc093b52a189c5453a912641d828
SHA512d8b47aa3edd251e2ca865d1131eacbd06cf89c287dd531d171918e3ce6405c54b1f34d0290b30c2598092a7af07e1bc7c5dd67f70125030f103da5c9c33877aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5338976114a60f346e63b2bab4c287aff
SHA1a359bc6a4038c5f250a8e3c037231f8a1e31c8dd
SHA256c65051afb2bbbcada616901b3a59c4002616cd9003db2cefbc93d08f39ae7aba
SHA51267c6a85b35c4f85cd3db426a6fccafb3f38d6367254b905dc58ef5cc5dafda64600ddad1ab3d02475fa01b2c323cee3750849e99941105551d77049eae1ab558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a568bdcfc805dac9759a46a255e68a01
SHA1c948eb28f28bf843b1ef5e352dbb2f6b7ada2289
SHA2567c922098c6e80ceafb3020c6b793712784039a8155343b6e0c71ad1ade18f3cb
SHA5123ce9e93b1908a5f68e8e9861df312698338dd382094033b70bdee1298a5c349834883a04f9861f3730e665a8db70164bfd7777624610d1590cf944d9d512812f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596c24a773b5a835963b12ccfbc90bd76
SHA14f05ba6a8bae1d32ffab4faf555acb38141af497
SHA256a5595b456ddbece47200cb9b8f637532b6e4fc2da5d1f758df69ec764428ca69
SHA51239640eae506d2065c827669e817978d820697cb0d4f5eafceb1409c840d5d933f68b600c12ce99b224685d44455f96a12100f4f1fe5c4b872b769e8ca69bc4b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e58e6e69858adb77e91116231c100b8
SHA15191ea8d1a528ed462dc3b563043306bc5afe141
SHA2561b493072fea8283cfc89c2a12002291625d875d89a3b21033fcda8282413bf0f
SHA512e00d1de24d278e1d59b0e3857d3f2d373fef2e71156a1708620c4f5e990c431fbf18830f20f566eebb989912e850addc46bb69b4505276ef30d122c1d5f7d9f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5879f86cd6699c986970d20ffd372381c
SHA1288b8c562907b7f1254e10442a8f4b361dc3c075
SHA256cbaafa4ec381cbc8cc1a98084e588aad9b59f578bb4632981aa6f858df15d499
SHA512028361fdd7ffefe1eb30d02fbd5f32fc817a5a16883186c956ad956f6ef701bd92b9cf8a77ad658c6b0cb827f53a9830a89d9f0d58749fff1dfc839ee5960c24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5171bcb8b468a60ef29a3a79fcb35416a
SHA10e88bedf63b3e6a00cd52c50bbedf7e90d7b0bae
SHA25666070259faeb45c8675454d1420127ecd4863a9ab041b5a12d15a1fc7c894204
SHA51226ad22499460e1956a933c327195d13b1118b1a0645def0f5fe992e19c30e856990a87c8bc737b313c207b2743e24cd62ff80575d733c638d8c40dadca9940cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54898afae6aed8bc2bb1245d15bd1d79d
SHA17ff7d0793e830fe97edca250fcf192469d1cef4b
SHA25648b3a6f68cbb880d721fe6f6d51e181da264d6e4bf083683ab119336f5ccc309
SHA512e8a40db4d99aad6042617d77993fe750380e8e5f8b4c89a766df7b07b6e60b179a80e4b677116ecc938e007beb44a38c4935fac6a4bf1ae0af174594cbc606ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582e6d14cca3e613a85e842cd44df8075
SHA10e161505b6f08dc9c9f0fe5992ccfceb574913a8
SHA2560d294c7f36d4aa1edbf9a226d8fe06daaef2e49c8f251bb6054b2a638956a27c
SHA512c2c601a04a2618aa3feb774101e75c150f4bc811e63249e53d1a895e1399f7696fb247450bcc7be6660f0ae1ff8a9e745a6ca6cfb552b862dc10e0682da7c583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d98e782aba0f85cb6b9f61ae9c231e2
SHA147b15107771aee1b5ed8a895c816d0d7faca322c
SHA2568edc91b1b69f1b8ea5a2d6854321371d3f5abe3476f1ac24861ee173942741b0
SHA51235c65f15afe86ce2ae44ec857bcea93ba0217d92dc4a0a14b766a30c8e997640d68376bbba6ea08865952aec0796972d96ae8628f286434419c47e95b6c0ef5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f86b26a73ce89621c8e38764c2cb241
SHA18c11bc8ca468f54332f58d5e70db85c95ad55ac4
SHA2568545b081399df4f872d2f404a73794c68cb73a811e3ddd6150fc4291aa10d6d8
SHA512fa6f45875e4ba5a64b14231d471737336cbaea3d2d33df4325b930c5bfcd4c917d5f15828f3e3a331b7b32436282b9d8b07d9c1d9d7a9614af52078915a3f664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532c96b611ff7e15005a0e02d835d3728
SHA1da7bd2aa20e8da9b6e1a29814b3725fd55e094a5
SHA256b19b0312812ceedc41032a9586b7165d5f88b1799b246f5cf1c3ffccb0616afa
SHA5122902ec880d94afaccb971913cc0a08853db4697afd4b8a0d854ecab978005c8770b5fd22192f1def425010a1947e03651e316e0c3fef89f1eb45b230ca797039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521d2093b924d3981ef7b26220e4f55bf
SHA180ed8757cd0f4eb10aa64a3fd142b5913c0afccc
SHA256615bc068473df4477a9ef84ac96e80061740aac982d419080c85ecf0d5a12eca
SHA512dba22a96dc6528aab1c4fa10eebf17af3ad7a4d59ba6c0f241feea2fb6e4a7661bf09372a7c1252f6f564e18dd58edd43029939eedef54fcc9241bb142c5eeaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa357729646eea1ccb67dbd679804dae
SHA1bed33c2359a7f14dae8e687d16e6f4b9a4727169
SHA25652e1d52c700b84967a7b657504394dc2e0c38731c0b6e48e3a25cf42f9f7f59a
SHA512992f9c51dba84f5d81855791505f85692b971ec15e4946c3a30aa681d3616a267d2f00256b3abed37c91946ee5e032e0fcf3bd065993ac220293217fd7654ac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5830ab34b10c89edcc06947c919ce8722
SHA185d45e990bbbd075838ee076eb8d3d7e7f02f6fc
SHA2564edefd629db5c66dbb1df22510cc916b6f2cf7d1c327ce22cec7ef857ae28584
SHA51266d514be852e14bc75da74203e6a968d4a5f4bb94b3987d9b596097c839aab93ff773872cfa48b9f6f73815d38b7e6563afb5779d01c51e8e799f33b71989bae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528daa3bd00565359af7d899d2ce61c06
SHA14ee20828fb234ce7a1c36f58b113d9385b5c79bf
SHA2568250ac7351d3a4bb215dd2cf7fc5b691d12f89725699781b1f99ef265c745836
SHA51280094e23b4ed8bcce5c999329a4ce0b2bc04a4390be644e303ac783fadd98051c39e36672c627e817879c340951eb107003c149cca13e89e68ff7772994fa077
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b