Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 09:59
Static task
static1
Behavioral task
behavioral1
Sample
f5c132ff6b7ff37604827c5f30d23984_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5c132ff6b7ff37604827c5f30d23984_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5c132ff6b7ff37604827c5f30d23984_JaffaCakes118.html
-
Size
222KB
-
MD5
f5c132ff6b7ff37604827c5f30d23984
-
SHA1
96ffb9a05c76283d1f2ac503c5fb324b778206ad
-
SHA256
6f583ba60721e1f6b9a3344c3413afb7910245186c0da425e5fbfed1cace78cd
-
SHA512
6991c4ecb9eca57c6bb3e68fce36a861e3a2ac6790bb60518f6ae24f50a7e0a99910a74534bbea9e9c05b5114d6d3b07546633fd9e79c8d8f01b4fd78cbfa610
-
SSDEEP
6144:fqvUekZdwe1aAvkqDX3oyq5BrieD0OT6S286Vl1Eb:fqEZdwe1aAvkqDX3oyq5BrieD0OT6S2y
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c011d1c1310fdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433420255" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000001d8d791322be8c1ca146864cb790c4c2db323f7b38ba90d341b4a84fa8a3fcde000000000e800000000200002000000001c8cd8917677ffcaf487d6cde6f160acfaa5677a01d59f725ae91a43713c2c220000000ab23d69e2a9ec826f8904ac7b352d9bb750c5e629e01d9de1b7351accacdc10c40000000bed4d4f4ad3f2e490503c2b4db35b4b855c0cb3f1f9ab20113bbbb4190e9b7522ab666c65fd5ac98343b84a86773281e989611b94f6900f1f21eb643a949c4da iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E632C221-7B24-11EF-9C13-E699F793024F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1848 iexplore.exe 1848 iexplore.exe 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1616 1848 iexplore.exe 30 PID 1848 wrote to memory of 1616 1848 iexplore.exe 30 PID 1848 wrote to memory of 1616 1848 iexplore.exe 30 PID 1848 wrote to memory of 1616 1848 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5c132ff6b7ff37604827c5f30d23984_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1848 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5921fb4d7e630fc8992a6c32eb32615ee
SHA1ca19468fbc6dd1cbef53e86945ecea5fd1c8bee9
SHA256f3dbe0a26438015305da47ae9956e015b44a1eb38f9ca89f264212ce47dc9056
SHA51248d16d633ad360592e912050bc6e667f57bc2b71aaeba027b268dfe3454d99fe882cd216896289dbe5989a2ec2d5253e959ac9d18615d2d2e4a34e64a7dac705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aece5dacce16fda49ef3f59f26fbfe9
SHA1d8de394d56fedd13df1fdc5a2407f57150deff2d
SHA256fcefe5dae16260788b009daafc4d2a3f121d98fdc815ffcca61d7c42bdaadcff
SHA5122b2ba634242be66e1e3bac704fbcac908ea3080bd2019be7cc8720efe16cd5da2ce8637865ac8c7df523e938b9f24d5e215b82b0e88e79a785d2dd2b2b8723b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52559439a083ed0dd8ec71eeea72d592a
SHA1a7ff9ea6a19dae9635bcf549093165ada3f97a3e
SHA25650e3d508e05fb50318427116e4402e67448a5077c064fa5b1a4561e372ae1710
SHA51282c5222c9ff3158e883806df2b7a88b92f97c7a721531549a36469c0730778680df3d079dad2fd9339edc4418d31ef00957c50ab9b85e03cc1d44d728d13166c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584b06f690fc076e98cd339f84f008e16
SHA1ec62f679833b56929806c17348bb04577d6257b4
SHA256a86667ad20b1986cc72249388d81f1bcab1f57c2588d43a552ae0430063aa831
SHA5121df0e959dbbe7833065205bd50d4f305f4e2052fe80fe0207678fe3131a42cd3673ca645349faa1e55b67bce675eb98190f48163d9b6f9c2072b81e200a09e3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f025aa94837507e1760b3deda4c1cba
SHA18fabfbaa4ef7cfd77c7c56bd9f9710d46dd45584
SHA2565a887e8541bbe80cd51d313dd9cff99de1450e8db32ae682b8d227da4a5d8e0f
SHA51295fb97c152fc1a1c9872932ba4b9a008d16d3cb96a3905b69926d36eb3b780a87ef3a0b9cba1097e2b98faa8893d305b2f95dde81a4d436da73b5b63e7eb65a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542a164bb9d6a4f3a6d2de0fdabf27c87
SHA1d6142196fcd614e4d653cec1dd4f14cfea2dd66b
SHA2567f4daa77f3499345534300df0eb13dae6aad72eb15a7efe8dc5ff7df79487f7f
SHA51228ef2fb50f5c2764ab558a9a6b01df00e7ae33c20db95a4822564aaa266693aeff462c965451eb9c069475a92b7becddbbd48a57a40f23740663d7ed529d4f7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d050f00572bd61d12f891b23b18cd736
SHA1012c158fc91028ef4fd82f5a4a6bb3fdf6c3dc07
SHA256a47241040b0cc958036412e25025bab27fa6a24259678b94b1db0cd79db49461
SHA512daa71fbf91923e5f7b36695017e5ae8f02798b971aa003e52de0c0ef3eea6e021f37e008c00d56dfac4f13c7fbf0547b0135044de2ad03960b0b40590e648fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adb3d10a5f85347afaa84bd50dfd3941
SHA1c0626c684b43451dbc1e41b494699780bd45e2f8
SHA256da5e080b42ddf5c877477c947dd4ddcd36a53af0cbd230342dcad259ea070522
SHA512bb3b59a95977be5b2488c9b9022a614c35f5c17e80b698b628cfb0c425e8d15daad2c86f775c7e6ea99f1dd0e2aa5c58a38b96c1cf508f95126e8b8c6a63f548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8f68166f4c77ed6d68092f1188759c6
SHA13b27bbb9bcb73698e8460951cbf9fac31b34937f
SHA2568c6c4e5a3123979d404cc733f0f59038ce0304517ec3f07df096721db1dd6f5b
SHA512e458ff847d1e2d97c6c26684e6bff24360036724520832b3fff7fdca25e738325ec28fe8877ae2ff8059453e3f3ab1e29d0ed7e640ce75c5f02191b06fb13015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbab0e6974e8411b1dd82e5658b40264
SHA13805ae38d597c6588a7c7a7f5b710436f6afacdd
SHA2562b87ac0fb45e533622e1fc413be7e1e7b0bb265382fe62ad1d33b9325aa125cd
SHA51226220014bd92e665df9f0bed7c858c9dee265eef49066db55ac4323e93d8fdff33c3ed8e08801ce1a892a8c98173adf85cae924d0bd1fa28d24aaa094581b771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d01f9295f3df7c33139a03f5dfc978fe
SHA1e6dff782061b3ba8fe8ee42781423543ce2e0426
SHA256d98bfbf738a0dd023822dc0b2f6b1750040d1f1488ce6e8139c8f4f090ae9c31
SHA51294b6818b9f6e2821267d1fa1fda0d32802f1ae6fef643b1d1c3f0ab45467644f88794452c26a10992dd5e34030f9577fb37b5e53bafc494a879e8cac7f9b8c8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8dbc205caada2ffdf6fc99427e02a47
SHA111c4aa6b35a67909ffda76ae44063b35ba9dcaa9
SHA25632dcc6714bf38f0ab050982af7459d161c2d160d5e82a356cfbff61a3e364fa0
SHA51239c0704a0d768a69d0d4699bb3f2cbf5d33b36f0fc5297e2ef19c4ae97df82c10771b24c6f69a4f47bb7c6503a4705878355250a84c13e7d096b5c814fbf7dc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501de3aa755886013a9f054c1b39c2e11
SHA1edc4838a0bf3a2a0f823ce7fb6ee6d6e48d82585
SHA256a9ef2afc467d3ccb57466cf92bc57478eb528857af2b6b21bb165bdbda522afe
SHA5123d305a8bec7bfc4a1b613dab8b3e454ee87b5cd0b963bae8ed4108cdbc7677ab775abc1dc9ec711647d9e6bdb7128dc42588aa2b79405848eea57d364cfc4985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55945c5df155088b4d01a3143c729bba9
SHA17041a0219039a6fcb13aab3d08c73d877d543565
SHA25619438e10717993ba7e9c2cd2ce5275ded9e0a2ff371594f0fc67c51a3e33def8
SHA512a1ef65c09a4ca30c50540205ca3044f9b84dc0e385717bcb8818472f91e53c743cebbbc8e9b48d386506795feef8976692c7ee1882fe4d2e3141a31f4c240990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5bdd0b3861018a72d0ad6907328a61d
SHA1a39ab2f366eb21ce457c55ceabed2a72f13e6970
SHA2568da11e02c642b4ab940b43818137c558b566684277296000270bbf850872128f
SHA5129c3246134b8caf4c07a9bc0dad5f30a2f25824878b8f1ec3948bcc048233ed501f8c11db9139fbcf538304b8652ab3aae2bcf45755272dbe3bbca3c924bd780a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ec64965926109fc7a74224e4b5d8983
SHA17b05a36f8d100849ca65404f2db180ec2288979d
SHA256898962394e37ee6b07ebf9611c1387e82bd7df71879895de6682b6c0f62eabc8
SHA51293003888abd1aad4e43dc70b6499646a008d0552f8981e8354e9e7008d9c63e5cdce406139c625d1464d73473e6cd113433a19546f8c80eceb9380a3195211ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7bec851d373dc2e94be4973d984de7a
SHA17f9945ad705d85f2a7032d730d821744a998a7b2
SHA256e7d2434d339005164cac282dbbab7a52b1c893f4ab87dd0c344cc95e9dbd7901
SHA51224e482bfdfc1baf63e53e625c89495a6a52a6d55fb3c070e778b653eb9022de58fcf587b95e78900b149d42d3f2fa3fa48dc5c5f278c25e663857db531720eeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f98585ec19304964f9ccf6d7e1331f5
SHA11dbf072fcd9ec0235811296652d6e8edb60e6a48
SHA2565ea37edac02ac8925c8de60bb06174eb9e8980da6944faf434dd28b4bd4f57b0
SHA512a781711f1e836a6fb0097a708d520a4adfade0682943b23f0455be6c96fb32195b8f840b1a06cc10f567887b210129ef4a0e0d857e26a1a38fab5f04c01d509c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dd9f4409ae17337029a10426bc9fdba
SHA1bf5844e888ae294a5e9437b019d8dd11de7c932e
SHA256f0691632262d55c8006547d74dbd0e4291cdb56f0dab4468ea57e4d8fd65e919
SHA5122bde0284b405fba54dbee937f92dbeb8e8d063d78c6e783b9a10920c2bb07303f5721974ae30c139351d708d5b38e65c7e6471c0d699372a1608921240e52b35
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b