Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 15:14
Static task
static1
Behavioral task
behavioral1
Sample
fc92374874e986d8169ebf6f28dd84da_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc92374874e986d8169ebf6f28dd84da_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc92374874e986d8169ebf6f28dd84da_JaffaCakes118.html
-
Size
1.0MB
-
MD5
fc92374874e986d8169ebf6f28dd84da
-
SHA1
0a5eff885925aeb2184bdf2d3d60a39cf97e202e
-
SHA256
07a0d2bcedf207f2ef2d2336c84b236dae643e1040a322ee1733cfd01c4a0b61
-
SHA512
f1cb3d1cfc64a7fa3f356e45611a3eaeddfc2f17b256c6d9fe4ab7c8fc5f5dc8baf2ccdeb4acf3759c379e949edc1fa523a49370a951a518db8b97e40f4418fb
-
SSDEEP
6144:jkcla4UQ6Y/JBDRl3LHhFKB/SKbO6/lsE2HG1qxt+GPaqFZV+rW1bWb:jkclJB66BDRl3LqBZ7xq/1+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0e63d36b911db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{514814A1-7DAC-11EF-8587-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433698319" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000c6f08463c092186d219c10ef6f9fca2cfeb19abcf1f2b00f87ede491df0ef552000000000e80000000020000200000001f687161486c6f4ea7a701b38bf9f39f915da76601dcca0d077c4898b8d8cb3d20000000165e97e81589ccdb8c3e2f2e794fd8b50a48c99ef90eaa1410787ed1b4613bfa40000000ba42e66b8f0f48a69e2a624fbf6dd37a0932b1c71857e128ea5ea0ef8bb4ff1b17ba7e6963aa31cd95196579731f2260bf85032b3c3066b036673281a4543102 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2024 iexplore.exe 2024 iexplore.exe 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1740 2024 iexplore.exe 31 PID 2024 wrote to memory of 1740 2024 iexplore.exe 31 PID 2024 wrote to memory of 1740 2024 iexplore.exe 31 PID 2024 wrote to memory of 1740 2024 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc92374874e986d8169ebf6f28dd84da_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD56539774674fa699ce38ff0c45e040447
SHA18c732bbf576b90c8bb7316b5963f78f61757f994
SHA256c3c1b2cc71e3b2c045335e2e187dff001e352f2098ecde9782fd29ead61955ff
SHA512a4da8a8b29df3028dc8331a1ca2e2244ba9e0c4b69b42b2348541b769031d742bbe7b64e7333a631532bba193a77e56cf99f994940c7392352d6edf5d73f0f2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5027c10fd9b1ef05911c7aa4f154c94ed
SHA156699969cc61c0f409131795e878257eee65a4bd
SHA256aa3804d43a0123bb299e1292f53f4f9a2fd0c1360cdd6d5deae8c036c7f2fa6a
SHA512086036731cb9f9d44c60ac141bf4ac0cb0465ae82ccb7393193e87852f88652e68562e1ec55df071dccf4c92a173b00792b1fd234abb959445609858c3b016d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54af0ab4eba559c711baf233b3367784c
SHA1f17f08b060e945a95f4cc4fab19e2ea073935a4d
SHA2566453455880fdca062ae2a17a5d54e3cf79f606ff2d272b2f65b93b408533a942
SHA512a06428eaf3393f67527427af1bbe86d3ebf8385b4371eb02ddc232fbc82090789037859285dda81eba8065073ead524fcfae1e0883079977010ebeafc8adae8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eba6b0afe6f6395d4bb34033c074ddf
SHA1a019bb0260140009a6e032a6b2f8e67129cea9ff
SHA256113ad4bb5addb4338600d9573105ce13098f9ae009875c75871297d71183f565
SHA5127c9d8ee075aa56a471f25a6b7bf01a0db5b8e989eff3d4fa8f3fe92da5ca0fd72b3a5fad6445939c5677791833ff50426b0a9e13dafc796f567f26966a34cb7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cfedbae52b881b04ad88b37c5d1f406
SHA1e82b7723409581a645922f459962889b3a2052ec
SHA256c8edc008c60ab290e56f8c2a7484b41a58327b7948e01c6bbfdc8d3e3cca3c72
SHA512c6d0397c5ed697c23567b94e4e926b86c96b71152f232c3d3afe861d76bcf3c70986e659f69c7f01a884fbaa5e6ff655747fd43b1ea936271afe9d309bb8d99d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb8c219b17f578bad01a8bfdc24ba439
SHA1e3e12ea822a7b6d1b25547a73c8f2a2ee3136a27
SHA256640bfe01e53ee3f8f462c23fa60b01510c66ff124639006e57ba3e7f74920da3
SHA512c99816458c1237938d64506b460937a9a63ecd87c61a383ffd342fa28a90b518d2737b961de82d5c058c8eb2723021d3a7b627a64396d43dd9cde392e43b7c3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d52c3859bf41f7cd3408ecb98c6592a
SHA13a4174d21a32248d333fe447adafd6699ece0ea6
SHA256e6e7f3597fdd760f8b36795aecddf98fc5e0db4bffebfc50397e5015ccf11f35
SHA5124419dda43aad5dbf101b210ea8dd0830424ddedffd5d68227e6f536ea415741f263ee7c99eecce8765d2466d4408ba78316322f676fc3ccce2ec039f69604727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dc4e9fe7703621c89b3a219787d3757
SHA1af394ba321e47188725fa540b56655eafe1dec4a
SHA256873f98128b82d44c9953df7862debdc50dce98e20c913926b982cf3782a91a5b
SHA512b4bdb09940459889b9fb2af1fcef83d31c323c04434d1e3842636308c7460101271e821558027a48e034e6019d246fcf2feb1812bea424d83e42e5532efa19e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a57e4144c6308b6d335ba954d270ea4d
SHA1bfbc97ce558c37657da3af1ce31b2c0f2db34cc1
SHA25680228699bc49ae9f42b8daa3a9f21c8a7a04537e415a3d3fc3ce13d65da32496
SHA51214611a0ee771f8bfbc8e3c06e89847c459f4a20de4b5f363ccace5f349cf75eaa0a79885ed89d0e5b4a392e057b9b08e8132126eef5b63b1c345bdd923ec11e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adfdee7805e26d58fa323afc7fdb8150
SHA145f5e96c6e9eb18afae0ba16e1670976584ec76e
SHA2561a9879c7f324cabbfce2c249414b0cf6719a8811ced42b8d9b388d236e2de271
SHA51212aec628fef4a55a2b6dfa80188f8f8f0501b3822245c60f7bed1b9796fe323b66298fcdb329f2a0bea3286642b5ec4addf8727107f82c04ecf310e733d0339b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d65b8ae11dec677b32ecd9e998c4cfc5
SHA15ff4e93ffaf327efda91209bd5bde880e695866e
SHA2562a908a3b203037313ce52aa9fd12513e3fb1274abb084014cf856a4c1d1a84b5
SHA51229b3a4bc11fdf34d47b73cc738f61f176ae8d30c45a700cdf08b6ad78fd0b5df033ab082378518297dfc21c62a2bdaa4c257bb28cd722b38979b14b51f5ffd25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54491aa7ba1ca19f086944b4d47611572
SHA1b2fcaf20afe9c246b10551c61ed68a3ee7e819b7
SHA2561a9f59a0d6c39b3aaf5362469d300b68409057cf3aa2776b6f337519285f8c1e
SHA51294472b6d07754a5d39397e375c0deb92ba66e7cacd0a757ef550ba67dc4f9140232aaa2d9a4a0fe0124f33977878deb471ba18f54913ea60bb148d27009fe848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c992fbec0e1e0947ccfa3e579c6c88f
SHA1fb6b62fcae2f3a61c998b80c0c9768100b4d7a3f
SHA256e1e1510ffe5f8cf1d70845863d2b357046930edabee304145ed90b5d232ba329
SHA512586e772add15977a9e7878a33cddd14dea3958244b21a93ac757d6621fe76650e5d2e0fa33d7fd85afb404f8b217033b9ace83845593ce90287cef3680e187b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ad40d50895a62cffeb045397df8d5cb
SHA1429c60fd107129747f6f6c0af8f1229e5b7a0d95
SHA256e0966056a13a70ae7aec2c43d6e588a961a11857dd01e1172a95a7e57d73abd5
SHA5124f311ec56768e943238dd9d35c75e80e678cee8cf58e03b6e836f260d1ce46708596b66199ea00723ce262a2b5273232a8365313d10ae231ebc763828dbe7fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50713565c8348fcabea42ad62ec134cbe
SHA1ecea54723318f1cfa6e0f51e77f0e43d4f712328
SHA2561fc08b64ccc67003d40497fc63cfa89cb3079cf357ac553a8c3fc76d6d63e452
SHA5121993d4232c1ae42bb1ac64b86b7eb2ee0c33566f1f758f7517808cc9d12b7e4b9853030ee3b1832160b687f8b776e5dede05ddb23de388b37a34feefa083645f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b08fb92ad91112f7698f7fb9876cd2d
SHA15b6938e50709eba45fa1f80c1413b99e013f0f2a
SHA2561ee7c1d309c14f13b378199960dfb256220a991bb19086a89f85799607861170
SHA5129e8b6d41a5d6c5f58a6462dbd7eac51a46c5abef3013ed080dc55e049f31c68bc3163e7215310864bf42bfc5be22eaba9f8393f0e0a78c2f9c974e6f70ecedb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56833a06bd38811dbf5ed55c05eedaea6
SHA17660517c8857b90303685792ba7ff9814ac8eeb3
SHA256dacca675d2a91cc55d03b7c9687e8884cdbf7724c183b23cef2ed92da22beea9
SHA5121da052d7f51f4e1e2d99eed22d49e79daad018be717fc6233f954e185ec520592c911608b09a8034dc7923f98b92880f72e2eb7eb493fd457b0799f4d13fa9d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5633eb18d122dbc4dca3153c7ece1501b
SHA1a4d43f6ab59703edca422416ca106cb078d5b3bc
SHA25626998e3647f3b7bcb2958fca613db82b0a85b686683d4039b0ac2e335f13db02
SHA5122693b2d9141fb2a602f6ae2de468a6f2aa2511ae34d4d5aec34e1fb2a890441e66643289312c0836808e83e305f47c3f3e4112af6d20cdb44befa97c4beb5fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577184e61a273db43383ea6ff572f6b1c
SHA16c3d89769d3fcaa994e7b8ffcb33e66de6e0b376
SHA2569523e7186b9c5d416b5559afc18030ec7066f620e952b76a5b7d89554d351382
SHA512c594856990df0763d402b7437e2185ddf91c7dd95557bb27ba9e63326ddd429975db9b557124e3b1c2eefbbe999cc669daee315c48af7a0b4b295c0fd8d57fd2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b