Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 02:40
Static task
static1
Behavioral task
behavioral1
Sample
f98ea4a9545ad8ce9187979ec182ee2e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f98ea4a9545ad8ce9187979ec182ee2e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f98ea4a9545ad8ce9187979ec182ee2e_JaffaCakes118.html
-
Size
25KB
-
MD5
f98ea4a9545ad8ce9187979ec182ee2e
-
SHA1
3a3f615f49f2a8ae3fda97d9a90f183ca111315e
-
SHA256
39a88a4d57e39fb9e450330b440510468bc0b13009ca9b5e79874e738265827c
-
SHA512
684a4025091c1e2a90c7b5e754682d3766cebf6665356b806c2cd355ff638d8fbc7e09ed764ff2ab2e49c72087dce76b9ad3239bd5d096177fa7b110dcee7e58
-
SSDEEP
192:N/98i5od64hb5npnQjLntQ/hnQieXJntKnQOkrntLAnQTbn2nQ8MCJA1pdEsawuZ:8oohKQ/EWLCk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0745fb78610db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433566705" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000005874334c3b21282616d701be2b3a822e8decc75239a29c2de89edfa912c1d85c000000000e8000000002000020000000aa34bcdff3d3dc6fe969f9933afd0378781703dfb4e6eec3ab83e6ffcf36f64b20000000551669ca6b7cccf1763d496b9905f5929d466d476d2544ba9fd5c9e5aa0b86b340000000fbae0fba4c8245fd5bed908549b8730748130cb378cb52ab6a06a7779d334d1ef910bfb6fef0828e8191a641c0635f3ac482cf4f9226a48e546198baa67b3706 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E138D561-7C79-11EF-9F10-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1032 iexplore.exe 1032 iexplore.exe 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1708 1032 iexplore.exe 28 PID 1032 wrote to memory of 1708 1032 iexplore.exe 28 PID 1032 wrote to memory of 1708 1032 iexplore.exe 28 PID 1032 wrote to memory of 1708 1032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f98ea4a9545ad8ce9187979ec182ee2e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f29cf66ca38c87f216a3e1f64d7f723c
SHA12742ce25692b21d1ec8f7d5fd23321255dd5e0c9
SHA256ae13bc7a62751c082797e48206cf5d929f237da435028a7e7e81a53b580534c6
SHA51254081580a3b981e62bb01dc8ff0e99506524842652d0d53c2e3e29ba08d3d206dde586260de8f1d2c1356c8b046d2e090234aeca3863ac0f08e27675ea8ecef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56327af4a15f68b6ee4d1b0b8a904dba6
SHA177c0bbb78fb8be98df8e8ac83c463cdc1e463d7d
SHA256a81d3bc27c6b6c6d3c891bc772ac936dd80d53084da7bb92f779b08dc0c18a96
SHA512c30fc35655c13c2a772c3ee82ad806930e9b776744ce4893824a00bdfc12ecc3b44229466b4ab7a1eb00716f2d2ce3f35688663f2619ce4bb073f8636b28d00a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f07315a24984def7591b479dac8686c7
SHA137f875f4bd96fd3ae4ae77de5cb23871052db2ae
SHA25618cb9ff3d49ab56094ec0c2193ea9e374617c128dddf5764431228c0924f3827
SHA512b0fddbac3493db21ecf1396fa1a82e46d45d106a14bf618d313081057705ce914753783002fd04f60677001c755729664391f037bf434070b114d37313e8c06d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5a184cd13d96e102291fc59718ef626
SHA1448e777615282978586d83b688570472364d6442
SHA25624c3f3f35ca88e02b18e2ba7585a442e0eabd600adcc71458869f8f9facf75a4
SHA512548b6b27eea54438d35d9e8ff7b04d09e91c750e9ebbf0f6fb2a1e9ba29c961ebb02b2665e45675ff1ee33c837c75d915b52b54c8a9231ebb98d1d65b7f6a7c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3d213b9dd891d22ad56e8104ea6447b
SHA11f96e880dc2f7000fd69d396a19ae708d08ff07a
SHA256caf54b06c5cadc4bdcef071587855bf7b833bf780205997fc0af258ab7348e34
SHA5128b454e22a09312078d2c2235ca17edd5db67dd65dd343cb21368697e86dd27ed6cb0fd1107e355c6d2f99c04ccdbdef74d31292f44f898b044557c04035c914a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bee2bc45f95d88c05d69bacd63ea98e6
SHA18169f8599fd778d03f2cb6e44d11d8a97c1fb000
SHA256a67cae146535c2865f08c75a4430d78582ee7f9d5c95924aec4dd0d6c6ab4f70
SHA51241251859eb15043944dad36e20b9447d309c567a0c92613fc719250be2a07209b3ed91809ff0d173026ec38a15d1d1810dacc543d36f2f1cb25ae48d8631e479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579e042ecbeb38a9b7dd039690b7c31ca
SHA125a2a74121e5d7ddf2486491ab2d5578498ead18
SHA2563c8cc26595f44935dff7e5bf3425b2229b57c0b7e268c248a7d37ad980001205
SHA5120d860648196b6c84b8e94beea8fcc3bcd8848c86e318a03beb96394b8cb977a89ad7d0903a7712871f896fc58a067c1e66934571f357eb8f75e2886f0b38465b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7d0c67630d6d4ba7f96d36a447525ab
SHA16d5653d532211ab294477bdadde73df6f248c011
SHA256adced8be9f329f05bd7e2979980a76215882020aa1e78237d8b74c712987e98b
SHA5129b8b297187042584223a875069d0b804ba818e73d74bfa9698c3ac99054d46f6579a121908c5f68a4bf174ae6ae2cc0229dd040d34a7e88ff424658893a9d6ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59514e44e8895730bb94ac4ec386c40bc
SHA1787ac5f4ee4b7e180376011ef16847ba0db137ec
SHA25659c16982a368461744cdfe76c8b6f68357420037b2063dffc8b332606d60580f
SHA512aa23577992f8928f7f8676abc6980b88a46a027b3b25210656903e3d1de90e5155e5cc0efb4edb0e64730dc0f9db5ff0d6bc72ad7d11dc1171d93b592e274210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5243e2c97f88d14d8f875e689c7b313ba
SHA150dd3c6d16013415234c0567a42332d91649dade
SHA256ba3db0757949dc4a62ff33db3118ea48bf0c685839cf6c3662db80872a21df8c
SHA51206a1300c1f53bf7564fae2bb9f6a9cfb04324fc3d95d8fcbe1126cb67a99329223776ba90b7566cbbc5865bcbea443d0449bff0f90d40b3e7cf8c60c9d946c68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f9a8e67eca767611fe6bab81682f001
SHA18a1632c9545f759b7a60d827e0803e8e1ae32926
SHA256c11c03f62196e5c4eaf24bd9d93065fe059d6bf8fa59a28978d03fccf8657855
SHA512d3f774548d7ca9debef309b2e1906c5cfd8efccd6b7421c2444ae2d502f2878afc8aac39521865082d5de69c40d4a93a0489cdb5ce7c4d9281e7d70a58ebf857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a024841120a8b0b17ec72bed00f92c09
SHA192c2172eca4f5d3c783802c7f27fec5f38f99c93
SHA25658b3b134c4774d8c81b610963e9a0688d48b3994fdeae00dc7d856d0060f520f
SHA512582b976dfcf0275702ce86f88bd4749700f6678b9c29886bd6bd83bf6df9ec46d90a433ab3972877547bdb3a48150d76ae0131d30123dbf5a1e20601dc3418e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c89715072a40b07c34c9b95eefc45bf
SHA18ef4ad9bcd36d281b793119fa1c09944188c7e66
SHA256f275e28618b996a0db0de5487371f5dfe1947fb52ef6a181519d607d455fb978
SHA512de3bd38c105a41ff3074726deb2cfb54e5fa065190f5cd87a85116b1e8e5fbb0e0591605a729b809a601412de497f7112da6afbd998560f33dbd3b66f3ad7963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58246821807181ecc7814cbbe9ef2a868
SHA19c8c44da2d6c960d3ac232a4b57a091232a617a7
SHA256fd4f6c4e46dffdab3912255dd03a726dea7aae5fd1bac1b98063de69d2d16a89
SHA5125b39d216abf24e1db703d10cf6095bd1a59e301fa3e15fda0562c5b9848fa2a3f5a921396b37c25f750c7d7f7256db9f380472743bdabb9818ca0fdc83bc398e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9cd968412412b200fba027896767186
SHA1d63771a609cc6ca58c967958d9d24822b3318413
SHA256beffdcf6ed9ad1ab1ac1d0d20b04972c08cc8846025a247db73a883f4a7a7a37
SHA51220d2bc6bacc60fa6a4d0df8c84255935ee38c3b1d177d5a6a77eff44b3d208bea9975e89738e74b83272a8d5887fb16bebf9fab3e7b4d6f81e4ecdd3f8d99729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca1252e7e9058b6fd722a0e37507e5eb
SHA19968f216eae6e2a225f42ed7136b9488e9ae9961
SHA256f19cab16f0cc80ba0c2a658c539a5f2aca3f040f1bf9f0adad534589577be1eb
SHA5127c39b2d395380dfa152f2fa1ef7c267f0fa74484edd77dc75bdd7770ac6acb7b53e6827451ce751718e312b4667e2e95b364c9d2ed5599b919ffe69d03f44aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52799cb1515295a613c402e535b645299
SHA1d607e6bd04c25d942c5148b2a3fbd73e2384f480
SHA25692d85b2db46f77dd761eb50d2a8bc9d3b34d1e1af7f01277dc1de9f227dc5de2
SHA512af1a998d087cf2d2d9ff01df2c755e63c0347791f17e58e9fa34abda16eacb435476e2f1f1aa42817da512d7b50ef462552b7fd25593019bacfb51151d8a88d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0c3becd28abd509286ddf5c0b0b5aae
SHA12b3fb4280245d17b81e9285ab82d4fcaef2faef6
SHA256d67c00699fa0e452626f1b77c818e22aea4b08ec7718c22685aafb6889a5365b
SHA5128604b8b49fc5a636ce5dbd2c297c4ba08dc9f27c2a8b678506bb38f72600a03315bda3779085262e3583702bc861e4117955330d292df2ce710960cd518562e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54488eef0270d6297b50613e9c0b372fe
SHA170f78425c04de05884eb8416a769512f93d968ea
SHA25690279302d078d919b17676f601365d4eaacd583202da708ace44e1e403f2ca68
SHA5129e7dcb7d461304eae0220abf8b62ed3d772c257398807e87f2c29e86e3dd0c400eff35c660cb35ebc5d3e5213ce5e2a9470c60fb12618443e0b8a51384afc6dc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b