Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 05:19
Static task
static1
Behavioral task
behavioral1
Sample
f9c998a7d1fa9f2dfec5fd5b4a4c1603_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9c998a7d1fa9f2dfec5fd5b4a4c1603_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f9c998a7d1fa9f2dfec5fd5b4a4c1603_JaffaCakes118.html
-
Size
105B
-
MD5
f9c998a7d1fa9f2dfec5fd5b4a4c1603
-
SHA1
ad473a733d8c0813d4bd7cfaf4c15b9185de5a2c
-
SHA256
f01f5f542ee702af0d9d0d6cf787c8f62460d7068a078baeab11ef000c6447c4
-
SHA512
c9010146bac7ccf5ce1596102d46045dac8de50ea1eac5f9b633c6bb52d33ec0d41b42c24496c44fe9ce26b27d70801ca9f945720b86bdf4ac21272acd06bc0a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000d035cfeab2861ceae3b3cd16f97c728153c491ec8c7dbecabaed87ce9bb32a87000000000e80000000020000200000001756e0d8de6f65d3938b2ca4a18ec586a61bf1547b3f1782bd80e9e5fb8c3cd9200000008a74024ade349d0240239cffbc05bb9e49490b55b7bd395420f8edf76931b79e40000000ce3c0a801d4824ae5fe65d8c61e870324dcae7e34a9a1f2cb8ea0729052496c54cf8233afd4889e86bdf6ba4c9c1f98395ec38e01d444c3f74a994639140ab5c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 203e2ee49c10db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433576232" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0FC135B1-7C90-11EF-AE85-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2888 iexplore.exe 2888 iexplore.exe 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2996 2888 iexplore.exe 30 PID 2888 wrote to memory of 2996 2888 iexplore.exe 30 PID 2888 wrote to memory of 2996 2888 iexplore.exe 30 PID 2888 wrote to memory of 2996 2888 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f9c998a7d1fa9f2dfec5fd5b4a4c1603_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ebb6f7ec9ea451e0d0c0b34c9412c21
SHA1f98507e15bafbfdf0baa1bde498df2cb2259293a
SHA256646ef58b70c4ca2b834d01f92de702cf42d08fed086be54fabe6fc352634b36a
SHA512be0f795a3a4e61dec4595574b01436fdb8165c7e7387804ac38a0e15a4ed72fafd50b9c3c6519623f8835df107aeea438c41365f6da0aa5f40607a047d8ed0fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f3ea32d397e6b94cfe05c1ca490d4a1
SHA133daa1c452552bdc601796faca7b6997d5de7962
SHA256e86d6dfc0992ce48bc0a13845bd8534f2a18153c52b4b5ff94a1b0f7ded543ec
SHA5125aa55cb8369fbe84071a5e064cef790ecc1f0762563237819ba647592f242c795a1014a27edfb9ce6475fcfe06e904952ad98dd842fef0d8f8521e8b0bd46767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5854876db2a23e0ba5893e8f5b995e2
SHA13cdcb53ec98db6b737f45529a57e3caaa9da657a
SHA256339aa21e3905bf935dd294f4e458a560fd6580d49c1abfb31b6f8a01d365e341
SHA512b1406cb47863f6d56546a91b63c5da36a97950f9553b3b2bc0fdccbb90c2ec6727e3990737356c9cd31b5d2c527e9fa28b4c540ffa5635d29456c7ac0f2a6f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f12e17bef749a250fd705fcf54f20644
SHA10e9d1d8b432e9dd0281f9f39b6473e9dcc10d619
SHA256f75b7849b8cfc333c691eef93961c8c120b8fdacb24c1fa9c35867bc45937eb1
SHA512ba31a41dea6b6a5a6d8833b1231f0bd6b2f2f335f5c079e65714df190ddd0ace63156e98c112c359ec9fc6c45c3129e275ec312503aaa7f489a19a18984f7f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2adeef8ec439eb26496c71551d51dd2
SHA1b1c107331bae7211f3ed2a4cab7ca597c99c6257
SHA256202cddb910833617ee9a3f9d14277e8ca63aac4260415ad926f302112807d3f9
SHA512ef310522a0a1e042a793fb03e798fdbfda28ab3fcf916f9b6cb174d82ded370baa5f2179cba3184cdfacf4a452def3285256f37ef78b1bac907e91b7932c2cce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508cd701464f32109b09dca77841b2514
SHA103fd9bfceec2e56458a43a20c567f23726065e5c
SHA256c0e3f0731869e68bac8f6c479c91d377219b6c1dc4181d77906b0b44252ab444
SHA512c8ffd26fa7b8268570ce542df859f61bac2aeb96c6e184645d4de84c91db91a1bc6ee96ce4496020124d24d382fce54ea25d56c7a56eb5294790e6a0f31b4746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f180364343d68409d675f7e149d5afe6
SHA10d07257a52814942fa6df2c56b40f15e597272fd
SHA256943ccdc4570a3dd786fcfb5f250855959c873163534a16557a1e46e3a1c29363
SHA51275ce650294dbd452178e42346bc9fc1b17c91e789b3a6e16e1eaeb5294526dfe838aad92d9744a4821e913aa2ff3d2fb2118766efad1c40ce99ad9f0ca665d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5970189a44e790ca85af4b79256c59e60
SHA10352270af72479a6a5793cc376a12681970c83de
SHA2564da439bbd4797ffbe40682dc452d324f9dc48eb1851e68eb9263f3b926c2e1c5
SHA5122f2ba6ba98350bbb24f740e6c8f77ca06388f1487790fdc151531cd52bd6364437bbd37204bed158c21f00112e802c95ca13f9a4fb2188810645bee9bf22acb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4b7bd15bd522db00f316e0adadad52b
SHA12e62fce54450440bab0aa0aeb2387298e5245bb0
SHA256f8d500f1c0e4a8e32f70b3351a971e09939c97820a046cf1bbaa9fa20b481da0
SHA5123706a14148830ee71e1375ac414f572e3e6439c289209262d29d43f88da0a70b1fab86d07a030514c1f5feaeac4fc22fa73141aa46f04cc81972ef972f02ee5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e69f479b51cf61037960cbd92f4de041
SHA177e205d2ef5f902188fc8b79838b7b50355958aa
SHA256c687ffb8bce5d22984110302a307d23bafc8194d1b5bd3823117d182676535dd
SHA512c81215876f37991fd8e8afe95856a5990259bd59af401e1b647084be44190a94e02810ed90e92f31df4b7e308405d844295aed0e8e96b9d072c5379371195d7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e18a7caae520973eb85aa9923a90f0b
SHA113126f52266732ac3ab9ddea2a0de75f01f70d34
SHA256962aadf94c2b598b702bdf132dd2fe7f8c14839e01d193e391b1ae4ecde88f29
SHA512b1d3dc458f7a61a62e7953814df25065b4ed69fb4ae5a992e3da447eb07fe8267b3861e7edae6841fe9c6e43ffed6179b9dc9a671e99d8ec0ce1f989689105d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4d1786241c0042e281354ef7dc1b602
SHA1542dd771c09bde08bb12b0a617571891b8f72e0c
SHA256bbd8b7c32fdac9188c61c877db5c42899dcaf5f984eee15690291698f614050c
SHA512aeb81260401647854f580ea38d9c08c1f5c10e4740e0f0f901a4a548c4b3e675f114a9c300deaeb44834a05e717514ed764e7be9666c45112c718aa8accb19b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edeb98bbaa5c6c239143474fd742637d
SHA179a06c76b06973bb322eb1bdf3565d22e06dfb20
SHA2567bd97ebfb40d893c7d31e0a82f221873006c8d06cd3747a55a3a1c0f503667a2
SHA51229ce2efa81b8fb69d8dd59038e163fa2871e7face2b584077fe930e6dd95cb4a375813fa56ab47ae09687b19a682518b1c9254dd3f2b8fd54025467a32d78f26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f5578c2124aa4ec1ca54a01bc5b0d41
SHA173f4a477d35a9bb1bdfdfc34b69f8ed7bd07f203
SHA256510456ec281ac27bb306c04ce2772fa6b0e3a0268b89b22717f3117774360631
SHA5126a3da09fa708671cddee33d2d83ddcb9d983402a773d355d6f9fb85aff69f819c9661033bed6890cc9914625cf806d8b54dfed24e2a12bd7c76a44b5823f61a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e320fe791d7cafece1254d34a2c30bf8
SHA1f355640b66d473a0e1a4403d289628c2e7884894
SHA256b46cf209ef007030d1e41636a4fafc6607fbde55e7a6c729a3ed6a1746b8bacf
SHA512336cf00e4e282c0a9d616693baaba2dec60eda411ffb6654fd2ff39839d4ae437e1ed7ef708f1c00f49e9636ea1b5507eb757811c07ece9a98b1d4ce9feeec1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ad0a3909c28cccf42f0375b4b3e9e97
SHA117f4ce0345e1d02299e2b7602b6fa083f41fe63d
SHA2561b119f0654c4c4ed2ddf798a4edde1322f635f374448ef413862323bc00ee9d6
SHA512b6af0c2356cf8336dd112a4db448af081affa2327ffd82699045b3511ac3acf84dcbbfbfbc08ff72e6b18505e82add2852ef5ca8b119a41a4f268b4a6f58728d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a8dd6f1822c684ecfbfb0eb61ced351
SHA11019d0f4deb81d34e6246aba28f006d5c8eaadae
SHA25657f920e4afbc0957fa20822b6aa8f34916baab53a5d82baca40410a9bcae2549
SHA512d5cc927ed19602f8ba1817fb5de84b86b4391faadacd4975cb24596827c44048e8a4f6702d4c387d2fb150eb47dd6bf8c69d5a7b81e188641be3f116cb31d8a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a88871b1338f86e089e8f9357d151d79
SHA10e9ec31b1941b2b3b41477005ffd616125d73474
SHA25662db617625a2c771934b3f223e315e7d14c515eba28fd8df35983289f9495288
SHA51213e3b157bbeb1898b54f590a8e6ed2e655cc2ddef161f031365c7593d30161c15c78a49f0e00cdd4c03fe0822038684de1d8082c734c7487dfe7494442e56267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bbfa2de14a9431b0c12deea65b1a893
SHA1728076cd602d315717e3807434b99872fb2bbfb9
SHA256cf8fb2e776b9129527869a39f780a244b0cc0d940848a1a6a01ae3dbe2688913
SHA512b79fcc06acf07d0d174f74f5d48a83d5a8a2eb8a10150824573397030e488e4372e487cf44935e455562df11b52910475007c8ebffed29d35e75efb06e86ffbb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b