Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 03:29
Static task
static1
Behavioral task
behavioral1
Sample
f51326906c530aa761dce88e0bf664ae_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f51326906c530aa761dce88e0bf664ae_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f51326906c530aa761dce88e0bf664ae_JaffaCakes118.html
-
Size
140KB
-
MD5
f51326906c530aa761dce88e0bf664ae
-
SHA1
c34d2be483819444bf5b13747516cafd3ac1b709
-
SHA256
e7655e0990afdcd721e1e6368eee6fea31504e3d6e0ceafcf4cd9344d1dbc005
-
SHA512
972f7dc0c4d725378895d48aeba8becdcedf914795a9e2fbf81d3433bfbf0287ae28668514bcb5d9c71321c4f07f1e8f33a0b6519149c9aa3618562398aaad3d
-
SSDEEP
1536:zxZydlEbbA99YZHqRHHEExx66++IIddtt77bbSSSSccllbbFFDD998811qquuHHa:zudlEbbA99YvV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50675449fb0edb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433396865" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F40B721-7AEE-11EF-AA6F-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000004a272f1cce4d5c2c031972be894b327113c575c250d20d29d72d4b5d956148bd000000000e8000000002000020000000f6f513db300769a484dc7db7d8f02ada4d624fe789c1fcd486320466c9ee6480200000005333e973c9f902b3fa9f81ac3976fd4efb80b4c6179c4f476967b6b9f36946ce40000000739b7b4ce24f6bd2327a23bf9444ab2c45ea4469bf90bef54b74bc25d4f3859fbd616991a5182669b4c70628ff6ccf3e2f7f7dc2713c7231f54244cdfc7d57ec iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1980 iexplore.exe 1980 iexplore.exe 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1980 wrote to memory of 2856 1980 iexplore.exe 31 PID 1980 wrote to memory of 2856 1980 iexplore.exe 31 PID 1980 wrote to memory of 2856 1980 iexplore.exe 31 PID 1980 wrote to memory of 2856 1980 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f51326906c530aa761dce88e0bf664ae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586de84b5bb856450103c2e86c11c45bf
SHA1923337bfe0a9cac8f375510473dd77f23aa13e03
SHA2566bc340ce321cf692cc20d674364243e22122bd1a9746ae763b9d23a898ec0bb3
SHA51280c161b08492cda25496c314ce1520820c6a6b748b3e398a227741779e4be923c972d1ddfa772da5e51e5533eacbbcc731e377c1f14419d05a7828d949970e23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cadc49f483109b2e15655c8538ca7259
SHA125e487e772aa9169b1ffefd857923cb9a61939bc
SHA256ccd5d3813a89f8ce2a4dadfaa37b374695b5ec6358db38bfbee05d678e011b05
SHA5127674bf994fb1ade54d1ad997cfb4dd4360ffe03e19ddfe6e77d42ea0d921ff50c68c1b4e150c889ca962302c4ffd6e7d4a4c8bc259cb5cb65a08e764c12f35f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578076d0c05245070b1b9332bd410bd40
SHA1b81200a2e3e6d942142c1d22ed7fffef99dbecc3
SHA256f24ec051a249691b5b2e383cdc4cbc2ae11d7888fe266751456ddd1e5d98b75e
SHA51229daa2f759861cbea1ec58d6b1377d1c6f9593b97ad57421898d5071cbbb683185bf23323c2fd9964264973e14ef436fc42ee646ed41cea094df0af564cbaa28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bd61cfd036ce1d6451f00aff2089016
SHA1840b42cbebeb5dbdbcc70bd661dfcf970d9beca9
SHA256f1e665988d845b82489960033a9a4dcd612fc2d74d9dd594b29551aae29df76e
SHA5127c30bca2faf91b29cd24c35c03ae04cfe135d128b97d8662b7b938c59538d2198c7c99a2a7631168232c7963abf225bab34cac527d3c28a58a979f25d7c270f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd8070023c34dbb3b9c7e012410b71d7
SHA19a1892c7ac664b539c3011d5700377c6faa51fdb
SHA256903b4c50481426efa77214e0887bc1c74549d39ee2b620ad3250e60c4863f8b5
SHA512c65308a614774d106ca425ffd7619af2a6e8c8d4043d1cba4a336be9e08663122609682be64af9fdb97017e956f9e81c2ca1b31c61b36c738eec5b367fb24c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4db28c4fe3c70042cec5848b0f4bee8
SHA155cd7b224dbcabeaac9c07568373f4ad2d640acd
SHA256f27992ca3d4eaec79aca8a1d4abaa23c28177a0a70bdd01a5c4c569917ea05ea
SHA5128ab2c4bf57f95540142528a6e3260805635a37414ee1bdd18ba6ae7a7c861165966e9fe9cd1e36813f282ca7878633b553fb72d4810d987a29a9079e89248032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc4fff987f6b606e33468de1ba7b6bab
SHA140fa1fde35325742dc2f6f76497986135752bca2
SHA256c45dcd7d95391efc508d04cf18aaf8949b68d114699d3a09b2fc702868603ccb
SHA512ea766f01af66db9172d01b56135041d241fc83da8217593b2892dc4399ded923a8af5ad79037a17c886c6ea67f73ff7e44783de36a0342faa064ded5296dbc27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5945844cfb750a191fd3f80d8d0579548
SHA13237477f24a9883649dc4a14614e33b0b020ff3e
SHA25622771bf8eba443b4a4cf8f9f99cb2070eb11c6bd15510042dde3c26573129b0e
SHA5127933fe9204b3e593bb39fdf49d4b503185f17d13ca9b7df1695f66b9490ae462aa4e96c70ef0d7defe7b1af43e89a0efa9c4bb4b968dff1a1b8b2b9fb0dae174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5617ff2b45eb9ed5cfd4b0dccadf64e75
SHA1b9163863e52047c8fb907259a2438f25eb17fd23
SHA256dbd7dd675594a94e38bc31798eb87170c4d7dde6e59f199fc744be8f069bdba3
SHA512231fd067289134bb65d2ba4be04c2095929f8b82f68425c97226da8394139d3299c8820c249d6afba32ca2b33d8ccf3545c59b4b8479d6cdd74b5d551f55d732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510335a69d938741b903a302aaf84bd2f
SHA19f8ca4db5d72f1eb5aa969dccd062b1082d7b0c4
SHA256374d40af5900358f24b212e942467ef35cb208acf10e2bf79b6b248b5a1482df
SHA51235faf4924989f5682ea66eaebca87a57169370a2b5359640ac95bcb83c2e08c54991b7151d17d35695b225ce6fd555fe4709f89d2d3724c8abffdf731f22af8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505bd0b41ef35f5eafbfc2dcbd207852c
SHA182e952376982f1f574cecb81ef15a10ed58d6a5c
SHA2569ffdc0d0e3b25663cd1856d269812295237e082ef1b8e9f7cfc58e38a19e4216
SHA512306edf3f6ee4995ab7a696fb781887632cde2714cc5196edb14e96b9c68f97c40058c1e07ef02a2caf1c4c6810bc5c0885684837a9d6a0b7f57c959f4d4899d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5f55f845afac369b9ad141730bd4f01
SHA15596a057941386f9f244317f9e98fee8cf6ea675
SHA2569199f18bc2b04539024eb60f7dbb48beb7400ec72f0548ce873b3775d1cfc057
SHA512f4b212709ca67e5d4a6ab70e9582ed5273dd9b414a6765a2c97a03cec5d492d4583e62f35dcf0e0f3893c5430466553dc28bf7c8f18ecbde0446060ae4ae8657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6951a87014f05d9ec6a364606c57b27
SHA16086faa45189e271f2e8df1b2832984477b22ce3
SHA2569e258e6ab9e899b818e9ff4b9bf9b002909939fafaec1f51a71b50a8c0a26564
SHA512835b25e2154496335ed02e3115a1e64fb62bf4749ff62a073f3fc3a00c1751a673b8a70d9dc17a6b27ab956b4676245a8da193949327af790d8ab378c1e7f0f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa0b4a08d9550d30e43867fb24bb41d4
SHA10deb016696bf18cd22983dd108f9324dc6e0797a
SHA256720d2911127a1378238a63abd6826498707481df2a27f67a22b0af411bf7fb1e
SHA5120f438352d8c67e4d1245d327585c2391b309857eb7637d8667834c82a52d1d39893269476901970b17392e19167816ed26ebf521b8bf7a534f14e2f319c599c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ca2ebec94bbf8ee0050b4676a79e058
SHA1547f54fafa1b6ddbc048c2c80c7c6742579ab747
SHA256d3b28bc5dd04e613f41428b783919c9893650a91369c1fd8a1b663f887cb8381
SHA512fb62e3961d3e15854bf2f247bc1cba4ea79b5cf2badc00042e7d8ed0231a642f134ee56caae5bc9dbfce55593e4177bc5264813281df8fa989e8c4bd0103b11b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553e6fc2d6bfabd5764e16b420f45d5d0
SHA11ec8e5e4233043d797c0b72c1d7bc69758b2be9e
SHA25658c007c84499c23cb1ed735d8bd70130af844c9195349aef8a805ee3c68d842e
SHA512977a4f8cdda3ad523430a53d3beeb6c6ddf187d59f4b51442ac4cb91a45169c5f23f6b64d9e5261d934893b387a9c0f18ffad53d5187e55ee46f663fa260fcaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e481a2cd9b6b81902ad34ceaa74f2b2
SHA165bcc66841b56e130857e97f5f08c7a2ca0a472f
SHA256089ed71097f90079a223c4a30b45456beef8ae36fce0f080e4928dc3f77a8234
SHA5127c0b53f0070cc45946985b4bafd8fa778e6dcde6057d82b93cf9c36a5ec6288f0f20afb9ae2151cbbcb3bd12c1209aea7a13b618334ec056d3415a7d3ceae512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e97c2a0c00073386dbfaf1bd7fea2d7
SHA1a45eeddec2f03bf1a22bce5a7cb34571fa1158e1
SHA256208a9ce99958ec686593a9630af6c0fc76d56d6354b2bffd5ccd395922a57e45
SHA5126c62406aba32289e041d88d8a6c1c05f27d8f4b1eca130e647564df0af2054fcc921f6f9bf497fa14e7ce5d6c9b3595afee475cb78787417d57cbe3fe512879f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e0b84afbea1efceb36f7b45473ce6e2
SHA1bb4422544375dd6f05f79c891707562c62623306
SHA256a5a6f74964db37a08252e59c251ba4ce5980f675488e4cfcafed53fad35b4fde
SHA512f28706cba3f31da052670afae71a25916e125f29526f7add00a5e4444ce6cb8c61222123fc9986c352289172fb6e7bfd0d7b258e2c5fc10b3dfc14ba294c2b81
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b