Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 08:18
Static task
static1
Behavioral task
behavioral1
Sample
f595170eac7de718a8a3bd935f884645_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f595170eac7de718a8a3bd935f884645_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f595170eac7de718a8a3bd935f884645_JaffaCakes118.html
-
Size
31KB
-
MD5
f595170eac7de718a8a3bd935f884645
-
SHA1
d3dfe2022028187bf50578bd6493bf9cd6010fb5
-
SHA256
41d44b6e32827f1d0c4a0dac4415f9b4b5a26d33064d60aa1ff356f168a2fa2a
-
SHA512
3a5a6f99beda8b7ee7c002527c6d08a427600a319678334a2d16d6d770bee8c034b55e4801222432eeb3f3f293dd2cb3d45e1908a6588236855810f7ebe3b4d8
-
SSDEEP
768:Zcd9QZBC7mOdM0XpC5I9nC41z81w3wkwmT8EPd:gQZBCCOd70IxCezMw3wkwA8EPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10aa1ca6230fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CEEB9FA1-7B16-11EF-A364-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000fa45c2ad113e32801514c6e858a4d433d589f13e1a691b5e11ecb1f66b9d7938000000000e80000000020000200000007b16f7603be29bf3d1d8f2197995b1cbae5ee266b69012088c6162d2e279127420000000ef945b13e91edf379cfa17a110ae9201f6553530d8f1a81941e097dce5b6d6d7400000009f6f59d91e892b11f9daed808c71e0147b5a820237ccee052be62799e3d046d3ab80a7ae6647f86c56681a75bb1bee01011a80d388fe0f9a00710a352a9beb59 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433414204" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1292 iexplore.exe 1292 iexplore.exe 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1292 wrote to memory of 1808 1292 iexplore.exe 30 PID 1292 wrote to memory of 1808 1292 iexplore.exe 30 PID 1292 wrote to memory of 1808 1292 iexplore.exe 30 PID 1292 wrote to memory of 1808 1292 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f595170eac7de718a8a3bd935f884645_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1292 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f17f0005bb5735d2166e448e9ed0f60
SHA1c34a48f6acd017cbef79a92e2ab77f9ed16c626b
SHA256ac05484995c42c094e353809e2b08aaac5b4e15415af6ddaa0770700fec32329
SHA5122fd37ff38329fb40458e3ee34cdcc58aa0180ade015ce6bdb60cd3eafec06c5d9fdd6c75afb081dc6e7abe89718d83a208b4cb22a526104e859c51eefdf4ac24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51430e2bea04e236a738c8775430ade57
SHA1e6530401d1034438e7737b57987b0d03c9dfcd8d
SHA256cd85c1c515d9bc6d8302d3fd826928a4ca28e266cefccff1aa4d3db88ee596b8
SHA512918135eef9ddbf3b092f948f11a391cd9b834520e627f12cfacb49f333a0e11780f7bf184a5f3d7549ad7fd8b574c80cc6e5d98bda1c88a543e1ca0629094def
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c75e66728c4a25c607940d3af8bb432
SHA1e4649e9f50bff779fc4f662d85de3e0ff519e6db
SHA256e12d03f3693320b6af403c33d3e3bcca392b04bb81122e6fb102c52240e9be8a
SHA512c3cad37a894016f0ce5e75df03b906e2d91ce5226061c41ad683ccac40b34efb9ce9f5cf3262d145bffc8af2ed81086c5ca265ba230ecede6f20d1e8fbb65d2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5348b36e5ca19e2215326b71150e0d03f
SHA1eb51f8ea78977df5b83e8f479c83db559eaa6536
SHA256d3a0a20bf1f0f114d1e98f18c5e2f0b6b9c7e3cfaf991cc6aee99feb819a7d00
SHA512053cebebbb3d659b81c53a3f68aa461c0c890fc62e82dc0f567d0dccfa628c36d0dff633c8b34cab15676a266dca13e74f7e366e254cb1c5bc692053c27dcfdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fe8ea000fdc77c255f68b2292b64e9c
SHA1fad03fa26d473bca6e557f4c9307f605d7f519cc
SHA2566c9ea4c3aa7579a11d97fd651b2b72ff263a79df1f1ac80a69f8893bf0cb2e52
SHA512425c3f8ab9436f3c1e0fafa82c99cf143b7f10d317458bde10d516eb7e689587491250d667c67571fc4df0d48f843559c8e121bcd769b2c1d1bb4e59be4d2584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0f4a2a36e829c31ee768c1e8dc13753
SHA1f39fea78ce53b64fa1c2034eeee8fca4829b9f97
SHA2569075ed86068905addcc905a9d8ddf45e83348465f378ff1395a53d3e978b989b
SHA512edbcfe35112d761831d0298d0ed90ec6ca45624c248a2d6486751e9be5e2ef70760d0f9d3c15137fd8c4c8919e84edafb58e435b1d322b7813a4e48fa0aeca1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a856bca29fd7e5ba94bc47e61ef72ce
SHA1660fd700716cb3164490741226a7b7c9ca99e151
SHA256f61fbcc4352775726783a09b9e5226a48b46d12a738143665038b6b9adc931d3
SHA512cd8f0533bce1862b95faa498e9e96445b67b81aeb38a3ec32a7703188eb3b71a1dfb02825a9fae14e2b8777de7ca94163819c4c41d53186252a1078f8e11593b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2484b7e20f80ba9cf8275282d54e38a
SHA10a7a91bd2fdd6c56b38a3ecce5ceca2dbfa2591a
SHA256c659a4af067286905f71e49f27b7f9f721753247988b481731e91ad0e70cdb38
SHA512bd0ae3dbdd2671f44974d73a10afc4eb20623760ba14ed1c8493b5c2ac2ee565cdd87305a8a59f9cb08b59f66623fbbbc6384b6a8a26b197f5715b05aabc7e21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5917c651293af42883df8e4d1ab31c553
SHA1dafda64e84a62f92c0f13723b56be52db9e8b3e0
SHA256c5f1411ccf7255a1fa0e801147ad04f71aba04890b6e246f1c33518467067c41
SHA512fd841b03c176d0bf10cfb261e2164bab3811cf83f7d759da240d384d34a2f0632f911b7241c712566f1b52656392272b8f4d17d911d2955fa3e3bd5aaacbd5a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580b3e8067a501264354d649ad270abc6
SHA1097bd451811aeb22220ace127698b698b436dc44
SHA25669c8173c3cb77aedf5317ee3877af5ebf5a744fcf349eef35a893a974f2da731
SHA5124c8ad884696efb20dfabf59cb78f540b6b6f95838139d0c4bb5a906a89e52d3b0e65e4878d7a0be324991f9e08fd65e9d8af2be88e4656d53ebf74cc7c3ea627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8628913f7f4a109244df48da5a555dd
SHA1e85ebaee2573535f3c2ba26075fa8b768bd88d10
SHA25699609bfc2629b0ab4e8f1e5256d30bb419df2353d9a490956b4952b39f6c5206
SHA5120f7eb714c7d440857f3a3585a5b8acdeb795f857afbe93ab9d301ab16b0f9b8e004b20e1013c696eee9bfe20bdaa8b1b1f4ac09d7b9cccc5216d4a58755440fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5136f73db4d908adc3f8579ab77968beb
SHA108eaae97006c11828c1b70fa0cd87e8b40ef5c9d
SHA2566c0ff190ab1574d551581da4dc6b365eb7d23cbcfa25473f381298b76204424a
SHA5124e540d18b640f585782c09f109c04ce5345e2d174ae512effdcadb7db91fdd98f8f885eba8e5c76501a64a91ef39b760c57b99e2b7007de692d916639827ecc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5a208d393f8e36a81a5fda1de1b14a6
SHA1f6ca9299755f0dd4362d79265a7ca761ef3b34a4
SHA25603b1bfc514d3341bcca87ff49d8f82c52e80c473751c2bdf1b4d3d4f3245e711
SHA512254d759ac2a2ba5578b39afbabea271e031f012a6675ecab8c5fd0ceda5466c3b594dcac66f4096c95287a2d90704a99b1a7a7fea3a402a4cfcd67b7e6b145a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a7432bf129a67e5bd0a1043b0a07350
SHA1868b8ef1378bc32c164f2f134cb7434878b44351
SHA256a7152aaad81c50cebaecf0864e6e4277fb498ad13455eda8112879438cbacd4e
SHA512af861eb4ce4c72293a269419eab35e89deac0896e366c0a1f1cd01629f1249ddfd65cf3f18adaa8735ec497def13ef779253fbf124104077fabfe97440a4486c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d62b9ddc8190266ae1fc21db63d3c5cb
SHA1d686fdf0c1f218186e79d04d6e3e57db76ec333f
SHA25667d2de4ef53df8ecd85db0fa5f15532b1dc62155c4eb7f4e8de7b0204a32e81c
SHA51277adc5ca70dbd8ee3e1efc1509b316f09bd866ccb9b40d92edf44236c1f3baa305dc1c584e7f784b20aa2914d7b5167329b622b255b0e269630516f561d3804f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab2563ee4348d19ef51dc1c3b171f95b
SHA1dc1a156ef30d62887ce7a45675fc38e4ece993ed
SHA256d5b759a63846a864ae26152ba52c463e80ca2e574320c8670738f8ee6071e1a5
SHA5127a530bd0d35798ff5d63d8e0d1106616218c7dc2f8197e4947a942488b25564bcf3f67e25b1fbec7befe861eb877bc802af125582a47efe85cefbea5172a86fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5177789dde5c19b1a4ad9ff165aaf9e1c
SHA10efe5ce629a204560d3eb3848534ddc8dea55b61
SHA25668e3f28ac20bb071adb83e40b330353859c4b80266bba4ef59dc86c8a6e20c42
SHA51275a3fbdecdfa50c673c01b99cedcd9c3870571cdc0bfdeaa89463267ffc1076f91f58d24a15db898acd216532a5ee218b530e662dd045e1b4887c6c076593179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a591ff1e6602698b44f7d442aac7827
SHA18763535c63d47ba842b759b1f3e82068c6305a2b
SHA2564506b9d743fdb8ba75cc350b0d7fd99ee32ecc035447b8938b2298c5f87c3e0f
SHA512e5c4fb686ec1b0dbb98818683befb6710122ef0f01b5241702c551c0fd0876f65601e6e9d72b65c0c558684555f185fa2a583195bca1ec8f8423122d6d0591cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dd17adb495879ff3c721ca69425661e
SHA1f1006b9fe3c4069cbac72aac1c91ff68880d9497
SHA2566cc41b27686ab866259a9f7da21530a3f3ef6603c4a56a21d6793f3a3a716fc9
SHA5127f8ceda09a6aae0f9f16c34f30499399bf46186d504ad81e75e4e3ad9226e7c62dde9d008e20516bd5514e7b20661b029809b57a56ee1718fb7889ca0d2a2123
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b