Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 12:06
Static task
static1
Behavioral task
behavioral1
Sample
f5f9ef5c2bbc70573c9b019057d004b9_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f5f9ef5c2bbc70573c9b019057d004b9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5f9ef5c2bbc70573c9b019057d004b9_JaffaCakes118.html
-
Size
57KB
-
MD5
f5f9ef5c2bbc70573c9b019057d004b9
-
SHA1
0c356bd86209d7f16a09bd70ee65d218b7db8750
-
SHA256
587fd3fd40a11e424fb45eaaa677864aeb6a86c4c90042ecd78dd3f3c1e2b76c
-
SHA512
3b7fb41b51237553b2004133288004cf1d970109d21ffc075d185825a81b996527021469d9757d637c3a735e18abda4fe3a2f73b9701aebb4cc6b692f46905e6
-
SSDEEP
1536:ijEQvK8OPHdVABo2vgyHJv0owbd6zKD6CDK2RVroVtwpDK2RVy:ijnOPHdVF2vgyHJutDK2RVroVtwpDK2m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0f14986430fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB35F811-7B36-11EF-959A-C67E5DF5E49D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000008aeb426304be72229bea903b70156f0f84304f15d59ecf7bcbc749ecc29a289f000000000e800000000200002000000039b5ce0374cc691e125d320e765fa89b847d895cab1e7d3f2401d687c0bc542d9000000012f0841e2267ee8902f05188a3fc543672e4069509d5c72128e1f835ee4d5a58b35fbb02225a89ad31672d65a44510aa9aa2712b608d9734b9875d810d5d2934fa54731fb285967611b003b07f6c222aeeaf79619053d73572c0ab30554b451df67b6019449cfa273d06f78dfdd46b0f8e35f3e3e369adc8510a98d20c9f9c78a2c47cc1959d21d0286ff678a25b03a84000000063a7c9a1dc5939904149d02905434cfc2dd8984de49f708b7e3716ae434abf85a751ae895a834066a2b38eddb34e3ac122d1429b305bdf1748927be26833dbad iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000000901e2c6cc2af10b00931dbbea5a6fb1c08fa4bdda89bef5cd0b35eb6c0abfa2000000000e80000000020000200000000fc55f20afa4e249bfa337de43e179af4da4dab5814a237e07869ed73e67d5c42000000086f5b962f659e29b0550a78c95eae5505ceeccb6efe84124ed267ce059e3f139400000008c6379f39f42aaeaf1339ad73e83b4fb5f4d7e2b527a1de936e626aa5689b091b01f322018cd348184b738001b97ca3c5025f720063981e134dddb3f221fedcb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433427887" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1148 iexplore.exe 1148 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1148 wrote to memory of 2924 1148 iexplore.exe 28 PID 1148 wrote to memory of 2924 1148 iexplore.exe 28 PID 1148 wrote to memory of 2924 1148 iexplore.exe 28 PID 1148 wrote to memory of 2924 1148 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5f9ef5c2bbc70573c9b019057d004b9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1148 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c2d0cd8110152685025164f640cb3890
SHA10450c2e0529c88ffa0c09aa0e7acb2768cad4f56
SHA2560b0665c51611b8002415cd8dea8f27f65d6cab92ec5d968535c22ffc34644c5a
SHA512fafc3ed6802195a3cede1d61c49ff222b0da6d86ed960e8d14e617a901bdf84ee9c47c9994a7185b2e68f55f35a44f8ae08260ae62a0dfabd1fb5fb0bc90c625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b06287346113ceba30efe0e50669570f
SHA132eec9bd5e798e6900109779488eb5303462fe90
SHA2561bda5fce30e298f17e923155c49c366586b4b30f0df4a9555ca873f422ea7061
SHA512c7d54fedb19eadb19d8c7334ba29594faa69fa6ce3091b0edbc81eb3e6fece907ab0eac46c155b018276ab89db594da1018e62232e2d175e1bde9ec7fe4c34d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d4af75f23c02af4865de403ccb05186
SHA15553cf35daa21bf50c1cb18dd2e1fd45f1d219cc
SHA256180205622035861df32a1c7b73e4c67d9e331fc6476819c97f8d703eb39d9b55
SHA51205dae82ef665857c463b824751fcd29d8b536717d9073a58262e13cdf6d77e17211aa8dd219ff2ffc5c3d64a970bf28a48340ebc78900c1f85de49fb2a3b69e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f7ee19a8f8abb87dee6ab775597a6c6
SHA1b051031b118cfc9b66635d058cf592df94d36a34
SHA256377ba50271940c9b3191dddbd944d3f0e5446eabe152fb3c9dcf9105ce3a159e
SHA5120f475d99164f4931560802c1e141ee7f2cbdbcf621ef4c11d330ac60ea60fd5f195b3f00909b882f11a931486cff76ad21a883d3201ad18a4e45b0e9ab4c711e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eada6409de4032ae0e1fd5852570601
SHA19be09fc98da3b3b68a1cb8127d015fc141e9f3b4
SHA256f8202a79c1220cd0ff66ad25907b4c97c3365b0e16a4faa0638fa825e44474a3
SHA51253f5a166bb3b5ec2f97f6d8d4271522464f1b30c99ee513dc37eabd9b1311f1ae0e972c7660fff4438654d1ac22b1ca1a218d69e839bc0cd9d409f9e6e16303b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587f317ed7085e6fcba0e98a68b0e4191
SHA1b856d4262573f901361129dc5a5dd5b6e42cf8e0
SHA256870ea43fb78b02cc78890f7c390615c5f1f7b8afc7bd60b8e024006ae80ca66a
SHA512482b6048d2f8cdd685a4913a2e6b464c2f7bdf4505689e648a24563f17b51277a212d05a5950593865e449b88606ad8e56782498d548f936200c06a68cb0f5bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d790eba938f883c78e3907e5ceb861f
SHA18ce17facd9b6ed4a95e8d47e968fb0e7adc649c1
SHA25613785d16f3212d73fa4960f64e4963341e774a29b05483cea0a1761d83b8905d
SHA51228a0133784896888d1cbd146c3d285ee6f2576dd9da3ef3678f5a9190b17f6008f375bf4a37f483536ba8019339b469ff3b52fab4fa8792d6c910f45a7db4d48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc9c52b8dc0dc9307c9a7a239a9732dc
SHA1b9ad87f3d4da9456334e71c22ecff113b7b9c5a6
SHA2569f84d47dc51e5d4903158d08b00910b3563a0b609169de3e1871e5a9d8d979be
SHA5120a2cc066f3d3594db31ff69b22fc80e7a423e127d4d53844d9ff17729f578e1f8ca8d25b3ab56dfe99a26c14b50b6714eab0c7150427fd5a85bfb0ee14046f5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508a25b197993fdfae096bc2043c30056
SHA11d3b215afde4317401ec3d4874c200485466676a
SHA256fa29164b9704013f63f0fc115f401d4ec90d6e7f3d9dda8914cb917b5ff81f00
SHA512f783d9cf0ac468ee1bc9ee70ac33faf503f9371d697c7ecfa1042fd000746d8a58cc61db97890b4818ce64d8fbf5acbdf419109152a5e7cba8b775602bb3359e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536ea8c83b60975a5385937216bc7f5e3
SHA1879f22d42d4ee771867b5302e9d2b68108085cd5
SHA2566ce36efa200f7049ea9c831282dda5e499a9686b7cf8faae9da0f7947f8a8d9a
SHA5125a2199e740f4811ab9dd0386667b9442b1b9a45b9cdb62cccf615fad6f55524261a498b3279d36eeb0f8111b4eb2e23b21b3e90e75f6aabe16d66f0e9f21bfd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aa26ac4c4a75c3be044dd350b9d8033
SHA10b30297ba865cbec2e4df7f0c19b4dd68cd25a14
SHA2562aadf523cead173e4149a2c5ae073c1c79c73687424258f88a4cab56060b6dc9
SHA512e55ce39ce5ffe47f1abd1a12018afbc9518ed26d96a1e8ce5d4898132e502e80820fe4fdaaaf31b552988ff75aef4e52ee80fe1fbcad8a9daa38d6ce97df6878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51377c2cd2c51c27926de9c98141204e4
SHA17500a798d8902e840d21b788f377e647e7030926
SHA25652c785cf80df05e05a627e7cb1c892c4a906015c211c276aa07558493ec75468
SHA512e224d462c5d92218484186320e9ceec667c1139cf241a1e93d4735796f2124287d93c13a5ad745f125ee95532c2e4292f90d6cb827b55f42fd953c30f052f664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503416000d274e487602926190cee2b26
SHA12d212e31a75766dbab9f6308d6dbf18297cee964
SHA256ebd4d87a5a1273e4b4c0da7dd2a4b0fa08bbee96a89b5f1f113d67d0a4a7b77f
SHA512852b04a227543309b93466fc83919961a010141a63e7e25f3d8b1c55596bc3b236c8ada0340903ff73ebc72006e8ce3758dcd0d70fbbbacad1736b7256afa1a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58daa5991163ea86fe05d245eb1bf4456
SHA1d0d5e440617c5a66f3d3f35ea61f18d86930723b
SHA256d7a9c58e511873c5527b00539692dfe4d7fcfe7c89b80afd5abeffc9656fb0ff
SHA5124d6e26cc18b9b47a4ecff83c970ffb6b8bd69d9eb2419a220badbc756b8ca0c53713879b40be7b0621235e42a41fe8d96f38915711d712d95fcc2ec356390cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD57f3a46e3656e3abff3e170ad4ba637cb
SHA13edee0c002bc9ccbdeaa3284a649a6c015287161
SHA25644965e2ea42818605eff1449f0ce5faf907c39376557c3f450079197d9416012
SHA512dd5eaf65ef6425f120aeda3e463bbd86ee2afa70bd9928f6d90a544d5ba40bf566bd98dbe1f8a248a0723769a09777b414bfc0c14bb8396fcbe513d43dcd9f0e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\f[1].txt
Filesize41KB
MD551a73b2a343ef602090eecd2e1438afe
SHA1e392ef0eab4c0dd4aa1d7dc5553b07f6cb9df86e
SHA2569c972a72b28c94f534755ded003417ea8781551fd9ee69f6aa0b227353f8277c
SHA5122db62a616aee982e3c1d5e7976d0930ec3a0caff252057d7a94db98da761d7629d733d44fb2cb28141fbc39222c1085ce067180afb183fba70a4016b668677c5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b