Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 12:49
Static task
static1
Behavioral task
behavioral1
Sample
f60d73d0528a92102a5ebd6d5ea275f4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f60d73d0528a92102a5ebd6d5ea275f4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f60d73d0528a92102a5ebd6d5ea275f4_JaffaCakes118.html
-
Size
68KB
-
MD5
f60d73d0528a92102a5ebd6d5ea275f4
-
SHA1
2604520592a238e66dd18b4bdcf7897acea8fcb1
-
SHA256
a4da40a8396562a52bbd0f68837d0be363be31ff150ecd1837f38a41cbb0b729
-
SHA512
165d8d88839982e8a5cd7ca2789dbf77efaaa7f454e6838ae338b2eac298d7f93eef6c6f05df6e52872fe3004c1b011e99f92ef6885fb439f24add033e7f544c
-
SSDEEP
768:JisgcMiR3sI2PDDnX0g6bx/kJvN3oTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:Jy6MJvN4TcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ABD82491-7B3C-11EF-B30A-EAF82BEC9AF0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433430466" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000a3961380243ca9fc16d515ead4eacaecaef441dec4336c0be5c182664f442394000000000e80000000020000200000003ed215f015c0086b3390bd4c20b179e3c5299ca9d178d6dbe1b697fe2487d8f520000000a0da19e35eed446fbc653d88c6df304642cbbe292b25dd0fc77f33c93549315f400000000ab2f10718d22f4f5f93726c97a43a02b246f58da49adf270d7d4532657d8712f342ab3df3496dce22dfa4eea09752f9aa67555473f092e4ae73dcdc241d7ac6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30a06f80490fdb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2920 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2920 iexplore.exe 2920 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2748 2920 iexplore.exe 28 PID 2920 wrote to memory of 2748 2920 iexplore.exe 28 PID 2920 wrote to memory of 2748 2920 iexplore.exe 28 PID 2920 wrote to memory of 2748 2920 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f60d73d0528a92102a5ebd6d5ea275f4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2920 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5123403c9cb03e62227029d6082462a83
SHA18363cc6acdf21d0d9a171898803f5e804e6e8e41
SHA256630596defe164b4058106a2aa008679640aa0585fecdf3e820489015488a59d2
SHA512ea995d3fdeb64914b4b4d5608b05f3a43e9350e3fc07d91bec7ce6b65b786766d1ee8ba6b24c914af54d134f8d02b12d795b513119b4b421d9a09779e25079e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51986bcd3b5db21531689b81b06cc0a2a
SHA1e438dee3dc6023b5937c25dbc79a5dc3a37ccd79
SHA2561b6b7ab9f77fbedf93bb3d7545c0c877f1cededf8a99b5c6c00423afc7054278
SHA51253e6874087e45debd51c836eeb2a61b36ae5987c2ea227b7b8ea8c683d2708ac0f084db8f3b78d6474dc95cf2144db2f4ee8bb6906e67ae061f8d5dbbbbcb356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf60ab81c398fd4114975142b19bde91
SHA13315a69b6159b5465bc4d4a566a377d660d4ef7a
SHA256c3da1c0ddee20adde7d5f83e58450517650c5c9a711fa1871d7e90f0b2c06e4e
SHA512897d3138b619cafc2843d246d7b6c0e997f203a2bfd8dd04d155df990903337d5d420b621e6fab2975f746df7a594309d8aeef928c7f52d44223f3a3c980fff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f17a4f5bb044d2ac123f616f9cc8644
SHA16f56bda04b0c61beac889be296761fb0c3efc02e
SHA25623b6249f0cd45fe7e2967716134ac090e96b2ec68319b12139f43d8a9cf9f4ec
SHA51239ed13e0ccacc64ee7ea85d9e0a766e4ec9da55f5f446fd1a9ed69e1535f94fc5f8e30c016042cce98e4ba36f43ba58a0eb1b0ae34972b815b103363d15d46aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba066b509e1ac9517321bba920699827
SHA17b5ab6fe1c710dd8900d5999c31c04a1d86d8132
SHA25674795168b82b702d569642f9e9e800dc2860ac01bec65ab67327a5a81a66255e
SHA512ba75b2d808db7421d04ca5bcf48e3aa1a6448a655abe92111b76ceaaa33ad03996de04adfb9e15a53675c40848931f15de9d988e66cb148eef84889ad52e10d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54793061caa4dfa72cb3888329dba9da6
SHA1f8bb466d19f423ff9754f3f5c66ae617d77c6c11
SHA256ee399d60db9361b022798134220f33ac2212d00da55ae25124bd97e24fffcfda
SHA512ed9f2d3a74aa59e650b9a7645a230cbe3868660e53112a5c550cef43a00e5a079bb0c71ee4becbbd01889d4f27750281e70a67735a67b7d8808bb82f863ab32d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b74d32bb39afce191b0a8350c946a6d4
SHA173453131776b6e3498f29e257f96a28c29cc4bdc
SHA25663b935df4df423f177bb81ca65251ade580d72999ddd54f2486b46ddaf14f5f2
SHA512f14f98d31f3395f87f5044a782b5df66db0ae9d3d80188818463c590b5aad73b0afca1702e9845a079976d8647ea469d6c6372c93fdc7459b22b04ffe303ba98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0e2de4487f0635581486d59ac8a633f
SHA14341e1f8ae44f23101b2475f5d79790436ada1f6
SHA256f20c6ea46198db511febbd5c7a2322482e5bc1157cde48623cfb895df5fa8bb0
SHA512739d72471de2bce1553c5c4d1cbbab5a85eadf97ac0ec90f7dc01e7becbed860139b07e292f89e33b3e3f7add5704fc54125d58da2b16aa96025d83d6b7bef1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac3b72d074c7433e23da9cd043edfcd5
SHA1ba9270f23104501c3ef7d09675825a2cf6a35fa4
SHA256cb2f000b2007222c50a56bdb6365d66b661a7b267627bd371553b0fded606e48
SHA5128580d3c5220cbf8d7740d76858821052777c0cd97f00fd9813a0aa1e0dd29b2c6eb18542e560c219551665b6b569b63ea24de3f3619a0699ff99400a58849208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3d3c50dcce33cd0881f887f0bd560f1
SHA14be8bcedd12ae13e27d7eb9318bfaad2a005f825
SHA2562fc1d3fb0c4b7a68a50a2edaa699d1a17a9a8fe66360c2d64e55d7bc23c114a4
SHA512e36fb71ba68b0d32315027af504cf92dbc3105731b407cf8d3828a6661a15950e506a5f09255b329ca1528ad788450e7f4c32b672ea34e4ef06a27abcfad90aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554b8d13f9d861fa3d7bb82fe9e931d86
SHA1dfd4886b2f76fe209fd4a1880464378f2f45481f
SHA2566d970a829a9728b9b7697f738e72d9e2d5b3763ea2dfaec3084399def14f584d
SHA51255cd21d5fa3fe3d07ac1c76ef0003274501786f31d5de9dd9c550917534d29756d92f42b36ad4c8ccef8902bc574fb900b6df46d746dbc76e90f347ba04371d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f18572b2898e4bfd4ef57f17f93a1baa
SHA179f574b7258befa15d49b779fb1263576362596a
SHA256c31e2e4558e8ab3f4df957a5aa225f674bc522bad96ae1928e4993633fe0bf5f
SHA51255ef08c84e89aa5669425fbeb56a0311a115f4e7726cf645049ae2d6ae38aebfe80ddf49818f3dd0e9b4d8a25de4a0fcc99e090efc0d4b604b44ba67add508ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568d91c292260171756410d20c8151f58
SHA1d7160a2e0258fe8bb0562c8bbf28f4b38fa86887
SHA25601131ec173f90b881fbb4fbcc802cc39decfb49d72c2af4b1fa15b6794026108
SHA512b23cb1eb6ea0a572ceedf9cc56c7cf55b3fd6ee725d7fb987a534e7857f033e198209ae2d40ad65c73f989ecd011253f93f7c17c97dcfe1f1aacc785e26ec8db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a7c523898a4b41bcc35da0443ce2820
SHA174f4d2307ec724a8ef4aebf9e86a3587dd2a7d8c
SHA2566f3df6e82205d8ea0c12b01a8cd8bd8183b8fb77513c3662548622c646e0555f
SHA5120cbc130ae96c6d1686aa7e762beab60fe87e4f341b3c610b20e19a524e089e4a39ca1b102b5bb2a4d2b1d2ea528751b2d416ec9ee272d8ecad421c6f1bf7f7df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5154bf8f9b4ee12ed9f1cca9b00f93763
SHA17797dd81d48addc5e1c1938d5c945943b64b70ee
SHA25679e1e828d07653c1e28ea23f86b32de9c7b38f07ae6156d8a6cbab6090859431
SHA5122b97c98ccc0aa84871f0d8d6b009767182d049e2cd1e7738bf76bca22d696904986c792499a2e31b0d1babcf4f5d820f0ef20279df3789bf74ab92dc817abd03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d52927449510399e6e4ef227472a04e1
SHA1bb018a0bfc3204059dd46e1b97c59677cb59fcfe
SHA2565d59eff1340341586b84da5e6cacc9084081007c23417a9b01b6832370f0a3fa
SHA5122b23f28e20d8f2d0cec2cef527cb71e61018a2ab58998f64f07ff3d868b5903780fe3202b8defb44b72b67766563162eab5ad8e2d52c2157907eb75bc8c311f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5163b8a432686f97d4a91e981a601e651
SHA1c482a14c302d9c0a654f18864f3ef506937ed90c
SHA256cc316d09319c723b607255dd1614cbf8ec9bf0c4b0dfd7118d7617e544a8392b
SHA512750c2e04d83e3e8b7620094d93691b501ffb18f036c18cda8a2b6e7df5c644fc5620ff06ec7f5892d6c3ab527a52457535947699b97986a9238c690321cdaddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6906326b084f4d60b8afd8dabd0ea34
SHA15cc99dfa2297c260868f50fc487cd806dcca5e53
SHA2561369170a8be93bcc790e62f9e8e3aa927c4ea4817b7b44ca53dba90aa667dda4
SHA5124fd63e6f3d8ef36f6680d0fcc9911c13ebbd2215e6ebe851d16898b4c5835d3648257adf3505b346e3f9882fee977c466e6766e4743b1fe39640e71ee05a253c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599344ebf565d528a23fdd87e011e35f1
SHA11c2e5e271de75563092ce401efe0dd56b3824822
SHA25610503a29195a4831f312f08c79872f750e6b2075ed7e32fb6e5de4a935da9592
SHA5120316bc67dd2a0d079bb26ee86ebd30f257652b3c7e64f862ceab7a187269e1be9847cf7223aa047395c279dfdfc4b21ec2a320b11508fc2831c97a8db125b2c3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b