Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 21:11
Static task
static1
Behavioral task
behavioral1
Sample
f09f501a49a563efa4b038efd99b6d96_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f09f501a49a563efa4b038efd99b6d96_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f09f501a49a563efa4b038efd99b6d96_JaffaCakes118.html
-
Size
17KB
-
MD5
f09f501a49a563efa4b038efd99b6d96
-
SHA1
b6ef4f970a0adce9496707c86cd1df2f0bf1e2af
-
SHA256
6d22248b23cca19c41cfb6f8a7ca11be0e5cbd42aaf2bebc3f54efe5bd24156c
-
SHA512
9275cd79727f13d6bc27550f24657a50452d06e804113d98cf013fc529362a3f5a6d1029f71aee62f5bae1eafd5ef042472d39f24bee3c8fe3687968652059e3
-
SSDEEP
384:r3ueAClRgWOBpbXx3tK71CNSDzUqMIs4Uf9eHzEg+:DGgRXOBpbXx3tKR+SPUqdUfAHzEg+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{21E6DE61-785E-11EF-8632-EAF933E40231} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000002c94a7c0b9a9e3ab5f741f50247ffea1e9bab495443c4e8c5e0f091e3bf427a8000000000e8000000002000020000000667d9be8cdbc28db66061f4e8849ea3b5fe51af85047887048be1a825e978b0620000000e7fa8351e5892ec780866964e1694cd138b4dc38102f7ba105e9412d29dc3a944000000007a175b093ea8a8a54cc3ca757bb8b95868a44cc05c903748cf554713871c64e48d35fdf5a94799b51d9b1624b6e94b1fa5738ee95df8b17e33ff0d0b3d540a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ca2ff86a0cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433114984" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2728 iexplore.exe 2728 iexplore.exe 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2792 2728 iexplore.exe 30 PID 2728 wrote to memory of 2792 2728 iexplore.exe 30 PID 2728 wrote to memory of 2792 2728 iexplore.exe 30 PID 2728 wrote to memory of 2792 2728 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f09f501a49a563efa4b038efd99b6d96_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6a99c403ecc95e7fa78c15c80abd7d0
SHA15d000ca48db6725c1550824dc1e21eb9ec2a2883
SHA256e8be0e4ab29f6c1882b0f5ad1a393ca5dcf7eb14f8df1ee9e57bcda03314fef3
SHA5128bc7fe5940c22bc93d7b3e3cd3a17cfa961ec51abfbfccf5c1e9df27a38b0d563d80cbb0ff613908ace45abdee8460367978cac800e4e30faa363bb378e602f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551f1dd75448ee5d8ab19150e30ecb638
SHA1e093f7b38f47d4ed9c2c9a894a32e350602192b6
SHA256467e3d044f2dff3b49810ccec52b560d58485414fe4e40fa2d5a4c53596aee33
SHA51217ec86d50459295861049ae8138914d7529b514699d32a767e42a5c86c6ec6c97a854320c3f367828957888af5255a432b94c716ad58c1861501f0a07365a77e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51815cd4dc2460c03253ee1ba26215b57
SHA1c922e17aa1ac34c625b93451b528255914834367
SHA256ca7980520632078d37644a45283b8343fc0ca3b1490e39d4934d219754461ed5
SHA5121c1a9882718085e2bd6473df8e6949e19512cb665bf67c1f3b972dd05ad2ba2ee712bc3d7b9aa08dda8800d58558dc314469ad06fe1c9df3ad43a0aee95696c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f830641601863a94351a0c1fdbfba87c
SHA1a75cdb10848e2166a6cacc14bf610db09fd90dd3
SHA256b51d9926b897c7829452ac598382ff0b4ef82112c17060e36b7fa0a8499e4d5a
SHA512495a4313607e3bbb43468dcc355557820c5ab0f88e9f66205f0a8ddb57de86d5d1d61da43a6a2e5b7d16a147c981ff85c27bc9b99987490b52d758968bc5daab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f8e4d266780a81c218ee658ab3f27eb
SHA12c21c4cb946cb04b27e3f7b6d739c37dad26639f
SHA25689741945016f5cb6483f9b786c6db6288feb98b7081d1268f80103d3b63395e1
SHA5121ecaae510eb6456fd386327e0f2f3f6d26621fda3820a79decda5e824d03d18fa28d41ea95360d2a28e55e50a7424f8bd0f49e2691fb798d4f8637c7d4145c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e28b734d1e94d33a86197cc2d4fab93
SHA1491ecbe74c8f26e0818fd97b65c8bbe30d13f179
SHA2562fe35a62b4916a9553fed527f1578c4450ae3e54fdaae9b06988cb6cb3e7d63f
SHA512f1c392af64f942902caf112a83f59472d2983b6d91bd8db41594e9e6735f9fc098901fc2d06afb341a859c61e4a65e162b812eb24a97cc8490687e50da06bc04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a01f033fcc485bdea834f7bf6f4ca6d
SHA1571af9faba2276370b378407eb5fb464933ba3f8
SHA256567ec8adf381844946c701c4aa8d5c24d20b20320cb4dac3568dc87fcba2646d
SHA512dd2fb46f6b176219f6fc4624605844e63fd41a4976dccda1622bfbd38bc39a6e5a08f262ea43c2f58fbcd192fe061bf522e7a72009e41a2a42e2a80a1e7bb357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57222285e15920975e238d37952936ee5
SHA19211ac800aa36cafd187aecdae137136e4862781
SHA2568eeaeea6303de9fafdf81ff0f502babdd2f0cc977e96e8551c20e2200d051c88
SHA5120f6d04d92df96598ae0877b7f7850593be15e489b081ef33d4d6399469303570344de9910bc80bc0302b4bba46cef7e245c673b6cc6b1f96a3ec0bd9a4c79f42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e20bdc5872f7bd3c1b6c1b5740ee6e4
SHA1722571506c4fe27f09f5af3073cbe715f1833abc
SHA2569f43ef392046b10d471eb7aa84bd9e2732663287d4d0661a278b49e1ece3f7e0
SHA5126927d3401b37090825dd73ac5be908ca90e689186a351a1ddaf647626276bdc60f2b9a59ff222df0c21c777ac87c283dfdaa96d56748403219d55ae2e3e1652f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5208168f5faee7d4cf8615fd86cdb00df
SHA1ec5576ab2698f2fed8420f728c869f3f8857b6e5
SHA2561f4431473de1e733f493aec30665b9a89fa0333dd1998dd772c295d3740eaeb2
SHA51258e6c8eb30d4e965b8ca939aea2697ce50e53f92f5d281d9033b0156613421bcdc9c77c879147a61d6d0bfe30cb7d87688d82b98ff47939dc6088315e6343e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553f26d6e71156c9a4def06175f5c6c34
SHA18d1507268c404be470094b3b04f1ee1463a9d748
SHA256406366465cc2f83d85d976ddffe948091935138b7bdee7b5a56ffa2a1a089f4d
SHA512077acb0a73ef08d46078339cae979112a6b3ddf793416399acb3945ebcdebe117cd416ad65d3545a304c5c2959aa2fda2d9f00f69ed3dbfab37178a977027b3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51373477d749b18851da6220d309730eb
SHA1147665a08f688fc4a51c0c1341a6170d70e39410
SHA256f8088bfa9e6d9409ba4aafdfa494797f91cec0eda9505a0c50ab138843fbabe7
SHA512a6f23a45b1ed0ba9b9581ea6aa8af5a5162d40551ab011f0962ec0db1625c5a5d00d79b73de94cccd48f70586659af78010d1e2dab85c7e52fd5fcfc424661ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f54a1e3f479dcd607dc69a80ac1f1c1
SHA10fe7d45f936d321e26c1fd9dc2e5c0d0449cda66
SHA256c5509b8576742373cc35fcf46ae89e057b8bd6baa46e663baca8e27f7ffd30a8
SHA512089585b6dfd2dbdb1f1da54056a2c43296d47eb0fa0792770e34843a33fac56e92c7f2e8985e82838fee27805750137b5b4a2b2bab2b4527668fc4c546c0f4ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b9d35d9b39c9628e8107fa5ad26c6a3
SHA19f6485ff8ed4e0abd7a9c356a950c2edf1436268
SHA256ca90633e57db05e8835b822fd18c5c59499db631d317611340b8bf7aea0f5f9f
SHA51264cee9afa4b0c90e3a7f6a6e7a9ac552cb22cdfd046ddad125db79e6ecee3908698b0aed3a6c8bb9aff7f0b40b0707296352c2f01bd0bbc821da5489a201c9c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9624a5a7c54f7421d77514ae8330f91
SHA1a3cc5018ddb8d0f84165e55eaf8215d67a7eafd4
SHA25643ac3e6c8275e0335c4d75d5d5e150b0c651900a0d9101e4d4537a52fb055638
SHA512f48f41d15c7627226060a3273701d91b14da0cfd922548016418fb67db9c4754187e0206e440255600ad1dad41176449b2574d213917cc70d0fa945131f35296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55482aadbda3bc5f97889be57edf11cb0
SHA1f30059cba0d06483a55138ca19ce8f548a6966cc
SHA256a03c48838144da77f343b3b6e604f1470c2bbf48f9614cfa1d7a9b0d517c086c
SHA512266cd747693db1276b1a3ecbbea8406c176cc28049b491e26de19535c43954b02eaf3d3d3af6461a8546ad95f4123443405175c8bdea49c3bdd9865479385d25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff312ba0031fd9257dfa97a22a89d4a4
SHA19c2ed37884e8750c728a882a309fbe1983a5df6e
SHA25664bf0222a7bd814adf97ac45d5bc8686ba2a61e2fe455c72125ec978b3de774b
SHA51216cab177fbc8b221f7c08630236901731c3d7c2668a0c4a1677b1fa214ffb662f052e465de7a749649aad9cfffa00cfda3140672c317d395605adfaa56c9089a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b4d895906c2ee97a0e18fb156746a0d
SHA1199748fc6c6828e9e302ad4b96f4e8a1de1df196
SHA25667339566b87f3488e053f7b6e63101b1a8143cb9f88f4db1a1046756d9bf5ee6
SHA512e4484b687706eb156d4ad11b442c20404e7a050fbde04cd31454955be4617bc2209fc9ec0dc58f6e41456079953fe22a69cacef50388e33b0b9535ab0502779b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5291831481537bb8f35e3091024e33fad
SHA18add8039952482a06c3e9c03e05e714ca51d8507
SHA256c3992e46a6f1e4f1e610b06882c4bae3eca4210b4d06a215843cef52b0d0b2d7
SHA5123b441270a534063d2c85d26da2ac3c7bbc8112a038e72c28320e15fe2c3ab285aadcae5fda8f5913a31d6a8ce424b870a4bb9711c8470db29d639ae485ee1b16
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b