Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
f61727fcda390288549094f9256b583e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f61727fcda390288549094f9256b583e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f61727fcda390288549094f9256b583e_JaffaCakes118.html
-
Size
68KB
-
MD5
f61727fcda390288549094f9256b583e
-
SHA1
47234a6af94f75d01132d05380717fb59ee3fd4e
-
SHA256
535c492a55e80499ba4e355e0b1725a346a0c9368c8fffb9dc719d518e5e6992
-
SHA512
5bb30d6c4be2ea0e2f6fabdf9910b288e8d03576b99157df0dc42ec039d0ca6b337c7862b18e179576511a2661380fbf8e31a81662675563e0164a6dbe4dcc16
-
SSDEEP
768:JixgcMiR3sI2PDDnX0g6FK++g4hy0oTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:J9j+p4hyJTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433431883" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000003834fb3313d991e3795d0ef5b827f5da63d0637b17749f770455e19bc9ee33f6000000000e8000000002000020000000413c71080b22b71712c2da125fcf1d990dce56537823a2a9253692f226a0795c2000000067a333fd11aa105a80dad77ed69e12c323624975fe37758ca14b934542951f3040000000704adc68aba93b5073852d7b8394932ce20bef8420ea5b27953df3c3f48d442aafb6a2db5e59b87533df8c3d197e0ca75eeb95eb2db20e2f06c8fd17d203cfce iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8077f7cd4c0fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000007c47d2c54c153ec3babb49d96a28310ef6ebeacc75002b725470df51596e0c2c000000000e80000000020000200000004d43f04e5b6f8626a196288f810b0e1effc52272d5d56333f58102c7f7e03da4900000001938ce59ad4a6bc0231cb8aeafea54aa57489c38ddad0ae993fe7bb58a26d0d2040b6ac2084a716b8551a85929c725becb446ca32ff3b8164b2925dc9d53ebcaf11e9105448ebdd0c05e57b6cb5219d35c5cbf566e6445f43bf55ae48df5d68952ae310ce72d786e845e07fe9c4df2cf77c289ba59d18537896fb10ae597748aae4c1a38c2c07e4070c69db17c9839d0400000001dd09839abb192eb648f810e0fb202c1c375e05491f53408d0ea42a2ee11f07dbfca63c846a5ce6abf28de3414ce3046ebe2dd1ba1067af97778a54f8d4d1ec1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7D934D1-7B3F-11EF-A7C1-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2540 2520 iexplore.exe 30 PID 2520 wrote to memory of 2540 2520 iexplore.exe 30 PID 2520 wrote to memory of 2540 2520 iexplore.exe 30 PID 2520 wrote to memory of 2540 2520 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f61727fcda390288549094f9256b583e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8ef185092e158e3fffffcbd4abdc4ee
SHA167c94e765913917d404f94cca98617c72af9e712
SHA256c30c1047e9202409779db0279328d5768b293317e9dc358a06cf03407dcfb7dd
SHA512ca1d36ab51f35e82641ee5774f4ece1e6d4bfad55337d2e9d0c8ef4d538ed757121c0c78646f66bcd1a7eefde7f51769c10f9e827e23e4f0c3472129675d759d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540eca38fa352526aed1beac831b2b2c0
SHA19eca25578a5870d3db54c826e063c3fb89b87674
SHA256a679631e68423098a0f10eedf9f8449a765b2873fe627bf12753f973bca7bc43
SHA51220c43630ec233fcf3241eb08b81b4a04ae8e64aa39a1a3f0d2abbceaa13e7f90529c7aca983db6c477acf204faaedb5a299c7ae44f491da0dbf9f35bee7ffc11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d74de7371ad0b6ad20f3aa260c9fe6a5
SHA1536a9a8c73b7a5421503a02453ed39449f45b4a2
SHA256a398d58dcea247246f5221db0aa3f045cc165d4fdbd7c6100adfe170f6c120dc
SHA512bc1d335b0831922fad7612462bf9ea77cfb376792e990a606c4f480ab618a4c2c1ced6d9043d764174a30a8444b567107903dcf2d4a587181e3c7f0e132c83bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c27bfebc5715c287da1ae99c661fb06f
SHA1aac4b6c3b748f4b6a3d0ec095f68efbc06facdb3
SHA25649fa630091500635ffafc7ca13e6e997821b7fe6b980513cc472abfd841d3b06
SHA512988e55feaa69593ecaeb149cc1766fb0a3221de12d71155ee225ed23a2e73e05d54af861e316ada5419b7da2a4665366c41a6799ea29ef5f7bc43d82bfe86eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52633e13ff83ec8db1b736ff4d52c3edd
SHA101a7ed0d56ef4231ee2efab62878b8d579c3e178
SHA256be3837259c31611a1a9522599ddbbf3ce9539804f82cc0e160839bccf6574914
SHA5126812d9662cd69a81b4cc95d71d137c8697c8ed736e336d906a0c743d46cdc9ad8b07b2f8bec2775f00e548207aced0ddf2a3841617429087e696bb401c35b320
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1e657b0b76ee64781ea8dd1bf9b1cbb
SHA15d54200f2e30530eab0379e9bbd9127219c91b1d
SHA25614d1564e6ce366c23b7d425cc1155d40fa0af949fc1764aeb1221c2a172d6e90
SHA51285145810a9520e5b07a3637dd5d97b7308bd6c6ecac03e31d349ff36098ca8b17c9f8c374a0f4cd06e7bed90c864c4433ae090d87e50e68171bbd401be737cb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59684ec11da84b9f6367df452649bdd75
SHA1af6eedc0ed9fc7df12e48219c99a04de3651b0a5
SHA256dc929be28c5ec4c073806849a85735674396a2810dd27f30bc4932b2a35d868c
SHA512175db13118506bc4d59b13123bde73839d5917eded1fc753be8c7a5511cfb922688c31b7b1d1f3638f27f7fca010fc12afb9750cb0cfe95815a18b781cbbf573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545f2d79ee5928240c49425b9446df748
SHA1e6683a10870c55b57f412836460fa3cc078eeb1a
SHA2561183c19920f9090578d8a4a42490d0e16eb2844c8b87ec5749572764e46f960a
SHA51258f6fe44af867551367fc7348fe77229e1ca83ec8bdd35c7fe0fdef7bb2ba8e3d67f911d3e4a9f7e4b4101e91e715ce9758203ae8a255cc8a76ad976f37ca370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb3942a46fb29a3e6a9d89a7e0f92e48
SHA14973f61a7cc6d4fa9290d2a15a5b2e7bd5377af3
SHA2567b57a395ebb8b3a3cd47acc28ab5e060d91d9c5af291d978b076afc467665975
SHA51278aa0f2cae8c8c53efe08e0df81c26ce3794b0cf0be0f548e11515b7e2d275d4dbace5c2080ab9159bf0d08dbf86802b23e79610a596b5c9a2a1f0bb690681e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ef1641a7f532f510cdee2e275820b15
SHA1d1df66372dbb0d66523cdfee86384f98db641f38
SHA2562ab015a9f5a12c320c784b0588e8607ad97afb2a1ba9485b59f6acede3ceda8d
SHA51232a4dbcd5e56e5cf06777d1d90b0cc5e3779dd16e728ac016fff47c79ae8a34c2b4cfdf222a790d35cd786c29f52b978995d30b3e374a3731633dedb45c69403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548cbee517da25af0b34d7145b7568077
SHA1840436cea5d7a7afca53c4fb939dc17efd09fdeb
SHA256428e0088afd123c2b3d66f8e0cb23cb1500131fb4c0d56aa0d77c34254098cf7
SHA5123393c3ff026b645ce58e5c74d86a1eca10258ca45ef1592609e46aa092cd10c72eddafa1a97db144c92f82425dea168daa60b6aa35f9f20a5fd1fe70e7fd2a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f520a084bbd2e67cedc5c5a33fdfa6cb
SHA1496fa387d5960cf69254580445af9970f7c8eeb0
SHA2565ccb7a70317866f2055e54de7fae302837745e3b7b73dbab80f13338b0137d3b
SHA51294248ec5b7d347c0af23003fde7fb066737cb78a1682dae55b0571ab0bb4c1707cc331ba6d7039fa6f059e519125358a77de33fbda30b647aa7b1dcc4bd64cf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecd1f40cc0b5b71828e205b2a7be0a9d
SHA1fb5cbabaa46b5e836095779c1f4059e4c8a925ac
SHA256e5d0bef9f847c6c54813fea71430f34428e8435cec726760b25305bb5d687a2e
SHA512a52cd9b5499c5a82444307a1ac455415871b7ad68d09917af0131b5bcf52a7ec9604a905d7feb87703afb265e6744731dc55cca016640eda5a26cc92cb8745b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b1080264eff2fcb3acc3cddf8ce18fc
SHA11e829f0fe36be365b65b21e427ee1af2cfbd7412
SHA25657f02cc6de269138cea42e8177473b5642b0137eaa01af294309aa1498c4663c
SHA512b571ef6c3f2c34d3f713e155feda273db5d0d10fbfaf3747fa010d644bb5f4a0226b1fa9a959f8c94633c934cf2a62a7c69958b1cd649f6a2c76b05a78005921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588284aadd8c9cf6fbb737be740005498
SHA15c03e07316874e55d6506150e9f2aa5272b9e564
SHA256bbd8ba04e3b546b98ba951bbd653a1dc0ce566766290ceddab558553aaf80807
SHA512c12914ca739791639b7bb1b0a7ace989a222992ab5cbd81c36bf08f9c10ed99621f83ccfed54f9c12068da469457c9d7cd8bb2f7dcabd819aae20227b419fbd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a718195f312a5460820f0d4c89c38314
SHA14b2893d088f1dc0364c817320822e9d144b4aec6
SHA256c66103ba52b4785b304a31939c189ed016b4920d3fb1e25107774116ca502a44
SHA512330f7d18f9f0b0471a24844177a2f75b427c257616497635a2d570ca6f99e4e629b79f5558ffe670f3643f9c89dd32c26fcf39f943c7702cc7beab79d203b2d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4f79de7c1631e9de5dd84b13daf85c3
SHA10efef1613c47766343625fdc844b7c62d0489c6a
SHA25608c0cdff297d05a59210f82fb6cf04c4b54e5eb091de46379ab58262d96e2b1e
SHA5123a4519fe7bd379ba7fbf134741732b416489b17c704b7bd516fba4ac8e4e2c309850c120a11868a246cddda55998e44661e235d924083af1309541c1c67cff36
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b