Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 09:45
Static task
static1
Behavioral task
behavioral1
Sample
f5bb8c29ea3ffaaf5965535a8d38b2c2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5bb8c29ea3ffaaf5965535a8d38b2c2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5bb8c29ea3ffaaf5965535a8d38b2c2_JaffaCakes118.html
-
Size
6KB
-
MD5
f5bb8c29ea3ffaaf5965535a8d38b2c2
-
SHA1
c083c95d6c1d2ac00e1466d3155a952ccace949d
-
SHA256
c81caa9883745bbf401920649c3ae1e8b8bcfe30737ee5e85fce5ec4868af638
-
SHA512
9105057393e9c50d62895b498c6cc18c4e589b0b09d47bffdd83ff73822c37abeffb19af2fefe490cd24a804fa9c0f5fc61a698fa5548104c71c37e6fbd9b097
-
SSDEEP
96:uzVs+ux7GjLLY1k9o84d12ef7CSTU/Tca1sLircYR18N2cEZ7ru7f:csz7GjAYS/CxR7b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c043d0b02f0fdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DA480441-7B22-11EF-B439-523A95B0E536} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000059353fa4b9e27b56b72c6a2e8d9d2dc41706804077dae01d2c1a947c4b495470000000000e8000000002000020000000bb23a373a81bd2b6013b4b5e81bf20489e7684cb2081d13ca400d274fb2fba2e20000000fe8edd2ecf10f27c88863abb529fe49540e2ba846df8d269ac68b5e83cb3293840000000a7395be184ea37da08082b19c99b43e6813dbafbc50591829f09eb32cf715bfeb3c2f6162a2a725b62ae760550a853f1cab56d3fbe53325fd5abdd230cf0bc80 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433419378" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 828 IEXPLORE.EXE 828 IEXPLORE.EXE 828 IEXPLORE.EXE 828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 828 2156 iexplore.exe 30 PID 2156 wrote to memory of 828 2156 iexplore.exe 30 PID 2156 wrote to memory of 828 2156 iexplore.exe 30 PID 2156 wrote to memory of 828 2156 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5bb8c29ea3ffaaf5965535a8d38b2c2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e865af03c441c08b81c8ef87b65ab512
SHA18d8f7fc1758e17b17ac7eeb6dfbbcefc6a2393c5
SHA2567cbf9c9a009b045d1d548781e8773d52c5682c97c9f2fef290fc94961cbfb430
SHA51232d1056213984b67ef7366079ea6af81ac730ce37abfe7a8dd77963aba18828bce0989173d33aa4a4755d00f6f44312eda2fcd8493dc72ee90eb602ce8f8854c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b48716efe1018a0e96ddc1138ec35c58
SHA1930197f170fbc875facbdf8584971b752ba575b8
SHA256041a32a7d04df98500b376bd9b867ef8585202fddd5e6be6f19369f5bd166c32
SHA512e0fe8f0c780e887aea41d2a24cb76f75026821f0830894e416f03e7bdaf4fd57ef4df8ae8d50b4faa9410f34951422f5e2de4647ab9e35f128179d058eca81ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562ebc239487a58e806a918223db9504b
SHA15e9a50157a083f56e89ea116792d3eff6c3c3d7b
SHA256d4f4f5d6e37c707528db2da9c08f1b69c9fec1edd537ab6716adae70f30bb8c2
SHA512540f1db27263cac5c2974f5bdfc452f0f15db20e9d77386727bd6317a2d8089942dff506486186067e9256a985236db1fd99e1375e9a551656f9dfe7e83338a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f2845fbba2e97cc310c8d90646e0628
SHA139b58a80ec7fe1b4812b85a43843dbb27c50a1c9
SHA2562b353899dbdce1be8d6386b8502835b0070d2e8ed836c5379663723960acbffe
SHA51252ba4c596b82fb6d5a46102494a8f28176d6ddb5895dcfc9ac90f0d64407bffe0b38d842179ad61028593ac3502b3268f2b02003d0d80e5a414a09c5748f6430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd6d6b902bf133b29ffa114a231e12a0
SHA1f5e70766ea15c7edb511cbc6b6deeb7226ec2e56
SHA256757fccb544b6f241528c80bc8adfa5b934c49fad40410126edcf931805381cfc
SHA5127197550d7765149c59cc9234d6400eb5133be35e38bcd438561c05326ba482431e594f2bfd7a12a1ba57ac4cfa844af8e9350c2c0b367c6eaf1874198775c4dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beb3ac7ea8788ea805c380024e873c07
SHA10546d74dfe181c9ddfe2e236e4378da1acbe9c81
SHA2565b3f7c192006523d3f429a4acedafe2377ca8fbcd08489fcfed45c1f2a611f2f
SHA512b5e110488a52cfb928065e7e6efa2bd23f7223b3dcb2f12233d82e0f0266d42f9e227367b2be9ac4f3d05d59549c8582a636826127c56e2932338aaef8c1b9d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591182927d949e7579b70884a0b2c7104
SHA1429f71ff2e8b0e3b87d6b4ca7129fcb8502c6c3b
SHA2569bb5da4fe2180a1fa055679b916bb10f1791c0169ea262752a2304c022ee6ac8
SHA512b1c0aec530f916600c62da47bc919463a2ea6daa373895f45875c4cf7ecf1d60dfdccb9389ff034fbedf8a8268c1c1de32589366fa8592793a110dea482abcc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577e17d07a941c976315ff8a6081bedbd
SHA1bbca47cb8bb85fecabbe18938c94b7b657eb17d0
SHA256219801e994b412b21cc3c964d96826bdfb916f7ff123d570db29d58bd01131a2
SHA512321aba2dc7da2fd555eb6486916ed967b6baa1905aa081f0e4fc1dfa4f2e56ca542886142297ca0791bfe5016277e33e80f64664b62b2bd75ec05f74c4b12fb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0fc885d45166bd3c5f7a2984d6b3a9a
SHA19fd5d9b8e21bb01c14744f4cf3d357aa06b39ba7
SHA256cbdf38b60e1ff4012c1de96255a71f415856068d8652bb67d6cba4881d24ca01
SHA512806bcb7cf1f7c98d32019c520d7fa539f5ec55bfd6957a6df57a3d95bab2ab1ee6835890c06cc3c9fe5571e571199f1e6f20a91dca7c3ad28ee4bc810a4a2da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e02aadd265a9289a8cc5f987edab8d32
SHA16b42c1ea73e4cdfaeeacf358fecc7e5da93c1604
SHA256511e4472faaa3067297d1455b1686390b3609ad29c0dc1f9741474c6dbed5457
SHA512ccab5799f7cc8637a64b75a24974c6292d2d9700fe14627526a8a6eaefb581f299b142126678544208b7feeabc6048e92188d9df6729058b219e4a677d5101a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5225570e7cb54ec0cf50a35744ac77ae5
SHA1d6ab93abca8b880dc267f804d3aeae66f18e95c3
SHA256cb32d5a6957288ba82a79a1c0ad92b739a10f803f0c7f28e99dbd72624263104
SHA51238224f232be3218d3b82f613254fc5b5cbf9b54db711c9821fe621ea774ffd92e8301f790db05ae90981eb01b7df0e67ef2acb2c87feaa2c7ba51ea0c9e28b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae4e045495d8e2eb642db8079dd963cb
SHA1aa474a48d6ed6f2c0254b0596b95afb7b1e451b8
SHA25607614aa9e4f6421d9f2bb9390f6eec7872ba67e31e414aea1d66771b3a6bd3ab
SHA512d8a97c613f3d10fb9502f4d2fd2ffd63d978e0d3e82f57bcce5c71e03e62f7b12c0a5f2750ea07bccc741c967d2cc4081c1224527e153d85db5975691b6a425e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56023edafb9c97643b2b857d5e029fd6e
SHA1ba10905ae670c0ece5b76739a14416fdf6c3254e
SHA2564a31ce16ecbeb96e350ddead2596744045a66f4a051993c2695e16c31b105458
SHA512ce499bc1416ef219832ecae0fcbc70f846c6cc13daa74200a66bc062ab004ef0d15737dcb028eceda07140dddd6c032cbb28bf1e0ee3c547b37d348016324ee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f6033b89f9ffc30810e621bf33f00bc
SHA13712309f839ff25a1a9f2724cf5694f3675138b8
SHA2563897eac50fef0e9e1d3cb1eae15d7631ec634c115e49d5af81df1af4a483f098
SHA512c972dae5c8c68fe41ab2547dcea0eab27800178af2af21789cd95aee959673f3055b31d5bde5ea54a3ffcbe3cbb5151eda3c8450151f92a52f5db7a32d85f388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568fa2788cb96d968df91bb47aba46946
SHA1208d716a43ad4bf94fb796675102b6622a18fd0f
SHA25619d3016c2bc47bad5a3df21168d1e08f46b3c78b9b869c453d1cb6c991773620
SHA5124b03e9a5807fe89b2ad8df3c6b384145358f4984e10100242a43add4e391a08f6721a2f38cd259cb7e8e115464a392af4b980bd0366034127e89fcd6280d926e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c61f85fac31aec023cd06e90fb108476
SHA14348f36beb0ae9e23911bd9434b037f417ed9dd0
SHA2560a1da141e29a17b61d0f73a05f1966007cb173839493d3b008333b7dd1c7c967
SHA512c387517b1a9766feb80b7e3bce598cfbcb9895a8098f29b28202afec280381e4c6e9804ea9b15a8e0d0992da716ea293ded33e4c6e24b3367140a54c6415b44b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5070d35cce5cff028f5c67deeeb8f393a
SHA1be7dbcb89a6eafd0481e7a124fd182db2d704ac0
SHA256b045d39462633d6877a9be3ab8b37d75f230addc69146519e33595801221ba3e
SHA512d6eebd94e4ad098bbd97e86caa457a3f6e6c06343803a64939d9530480c8eb8ca34598a3e21a30288c2d00e3480feba36199fb42ea4d30b0a29ed167ebaf22b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6b96cdaecaea184171de96b5b0d5670
SHA15b71c6d2dddf0795c55803a16388e5c30c215cbc
SHA256298b2b9d55ee0cf0efa82bcc35f665b189c86d0689c3d79df49191177a07bb2d
SHA512bc07284998229a04729d3dc9bdbc5810ef62015ec4a7e82c1b84d36a8b29c0d5b60a7c2ee7a133daab14f2e3334a17d6e06ad9dce94965af3b58b5f43bd1912f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dee812f8f370ca84f54220937b09d095
SHA1c617d39716b48e720e4514b064defd2afd4a5a82
SHA256c2bb32df5e10e8f006ddfc456a5769695c87fc610ae3c6331e90347c62d9b990
SHA5124546cefdf1b0dad8d043028dfa7051046bdc5a6c86c94eb9285309b025eb9558d45d3736fdfc7e05d267947d930bdb369ac4452d1806532d755e3257169951b9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b