Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 21:52
Static task
static1
Behavioral task
behavioral1
Sample
0363c5327aa5a7dcba098c4588fe7cf1_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0363c5327aa5a7dcba098c4588fe7cf1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0363c5327aa5a7dcba098c4588fe7cf1_JaffaCakes118.html
-
Size
5KB
-
MD5
0363c5327aa5a7dcba098c4588fe7cf1
-
SHA1
71b3280f6049437b06804543cfcea4528cf9cf88
-
SHA256
ca1ad194c55431ee394a492b10d5375519a3e6d593cc8dd6c4090930720dec25
-
SHA512
73b8c67e3d6b1c40bc0dc9e141af5547261138b31afc6233efa6c6a8fe4d1c8706ace671bd3a5e04a17025a0ecda8d5ae182a368354e1e690824720919acb72e
-
SSDEEP
96:hCDvONk7jk03IRsfj4A036MLifn603py8pRLNY9OdtvXBRVfIzsJ1:EvOykaKAay6apHNeU9xMzsJ1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{582486C1-7F76-11EF-AD51-4E66A3E0FBF8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0adc02c8313db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433895041" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000090703c1e372002f3ccc16baacfcaddf0a251b6ad33efa09e34e7addc149a758000000000e800000000200002000000001cac1d5e3ca2cc2fce793bae148e59a2587f90c81f56dba157c41754d82197720000000f9b546a3b021a73f353c14d3636c1f4ad77734f26ee64a4e39aa7b2d444a189b40000000c1a855231eb762cc59df18537d56c8d90feb7cdf2251670a990680301f3f3dedf5d7451c1cdb4341d9312881516b7316b4b58c0263fad921e84742f78652da1b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2064 2368 iexplore.exe 29 PID 2368 wrote to memory of 2064 2368 iexplore.exe 29 PID 2368 wrote to memory of 2064 2368 iexplore.exe 29 PID 2368 wrote to memory of 2064 2368 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0363c5327aa5a7dcba098c4588fe7cf1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567045da8f788ff386f7d6ec2df2d87b5
SHA174c2ba1d3205d2549b6e43a8e24e2b6cf085df78
SHA2565d628c1cafbe3aa33445417e2e6683dfe2093d429da308574bf4bedd9cb5a715
SHA5123fa579127865f7221ff2cde9c22061ebbf2d82460c33e83cfab6d16f83316ff91bb0903f6eb302f837397e60338a1d49fd97591310c1d7fc83da8aa4e67c1f78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f88aa6efaff66c007041f538f4d8570e
SHA168d30c7a84168c5b564fddfb64f2da2067beec61
SHA256814683e3b0d9210d5621d2f04f6190bd3ab6fc91c0fa634433216a47848f3127
SHA5127e78c0fae55b154687409147dd8a5c0a3b5dfa22ff99521f0a60513a86b15b2893e4eb70ddfc207a8a94d8f0c590eefd3453367b4fd3b3b072f11b4ae48abb86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e916469ab137edc77bc1961b2ac917c2
SHA124a4a075684dd669696a32606cc789d99b7727a2
SHA256bd564827cdfec0d10c8d939b4b0e1462acbeb432f2d4ea38946e50e992a97fdf
SHA5128dbe14008690b32ee89b6915e27d8ed2f2500e2fd93d8d61636cb90cb2cff390382852f9a77550ed2da8de5c5f1fa1a0749af41f57dc689417c942e459599904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c656e16231b05be5fb7fbcc56db73f9
SHA15a3e2c5135603104fe5d29161891753c4904e16d
SHA25602e3dfb91326b9615096d3279882128423e0d47aa448bddb522c3bd2fe2a45d0
SHA5120d33c1672ba5eb253fa49b023a60873eb33861b8657a8cd52efde79e5ed7d54674075e44fe95b6f225d2bf9ed5a069a358f617b03eabd95cfee4e49edf67ec20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54210ed1cac621b02736a3a0dba264f87
SHA1f921c4052ed63de4c137f391b8103728c2e4cd1c
SHA256177fdfbb3ade168dbf0532583651e05e704f21bf47ffa3b0536b68eada689a0a
SHA512970061e60632c563a8789bfafb4ba1e8a7ee667f06ab688aa22a162f6ed0e385cd01f3d2cb8f4a8e354dee6cd533167ffe6a3ffebcd97c36df49f94930e66cb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542a0ce2e90e01755c976249effc782d9
SHA17440b6ad1376f5578dfb8679f682e5f0c9a6a961
SHA256715065fad5ae39e31d536efcc8ad1dd01e58e6d379890984e8305a15113c3e4e
SHA5126bb40f063260dd1f3ec706c1638e2ad43823a94a841748a6a56193d921346ef653a35bb16c022eb31f6d9971c10dc3970110cec37857fb69faf0dc581230c71b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9f98467a0b2c79521ba4143375d1fc9
SHA1010a2264e1233d862b8ce2c2b80cc9ea14ccf48f
SHA256bd63da6dfe81b7c04974591f9188c564dfeb04e704ea9005d6c2fae5af4a8963
SHA51236eb564bbba551ab8af74eea92f53eb3628958b8281f316a6e1958c064d45fdb4f5500786e03a22cfcc6d93488afcb7f7e3c819ff083b17ef78012f9238b1711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559023d1d030935368f9340f9b7969688
SHA133ff7bc22bce0c8dbafff35034d26032807e3b9d
SHA2562d44b32ca9e67a415b6fe6032568fcb7e16d8e92a273572bf58645544073b50b
SHA512fd9333dae00a737b9ba123fa03251ca2e1db3b371019477393bc7e874d465b4bdd6ce65f5b4c648fcce865b56be3e8e22bccbb503b924742f09a323f746a2b7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8abbb95774e49bb76ffccdfa023af3f
SHA1da0314c145e69ff1ec3ec18facac892848e47715
SHA25605fdaf11d390f44c403b766dae18cb982640ab04d5e74cc83a69dd7949c5e6e2
SHA5128fed4a6fe97832b3921303fff34aa2daa20f67b76eb44a3c1baa6f7e2000c29e52391debd37d9ce1e4730a929045eaa529181d9f50dd378f3003ed6d20103aeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce2f9e5b93806e6dab0cc329f354cab1
SHA124e844f2de8de99cb5fa067d59bb474cc0fabcff
SHA25607ee19403eb79eef85e3e833c2c750206d65442ac1978792049e24839114318b
SHA51276be14f92a99df776c0b9681026df05a24f3f125bb941635f980caa6b01b3e0b5709b42623188da4ef4a22225e75945a4bb4e353f0340a11be67c19283c715b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc3eb378029f93c6490a872d47fbc537
SHA19b71bed6f6df214cf0dc00ad2517949d8a73bc15
SHA2567ba349518ccc0df1b8b2ff622ecf4f7a11646e67334ab10e0fa4b790ed3a7fd7
SHA512a59cb1d8cf3f1cb860ae931f88ee5bea03f2aa3833f70ffc467395d201e9c9f735e902f8fb6ba0271fd1213e9c6829a6faef64f1bf5a07754a96299650f10941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cc642b121592eaca5af3e3f86e3f005
SHA167aa0fbc453506591ee84a89a62e3f32af0e2a5f
SHA256579acfc048d5e9f6501fac2facc7e9bdd2db10ed28ea76e9f6c0c64c01aa5e8c
SHA512332602a142aa865f9ed4d0b83a084059a75a76858a1fe1d186c75a88a249568045484e40459f6e6ef5090ae49715c65ac8c1da4cfe3a2530d13e5674715b1fe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d6c9037fc1316a413ad2ecc1392c763
SHA133d0c7348dbf8ce77a1ab850b761f3f3ec8dc644
SHA25674b0d2a562d49b10c057c7967b9fd212fad82d5be6cd40fe6b2d6cb58018556b
SHA512a89ebfa7db47ce9f0cb296a5b2047211667d45587249004c992360636297a67f78edd2c5f415112f0dbb57759097737476df87360fd32a9a6b16de8a0a1fd0b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57500751a2eeba82c0d0351e894c37f05
SHA18392c565a9bc9a59d8c5af5a2aeb2027f055c552
SHA256853c7cc1d3aab2de3d99380161708c89bff394a79d3e9baa10e8b03f89840a42
SHA5125cc9c7f855f3dfab75267075a40fd722711b2aaeb94dc7917b1ff3202fbc8ce81e4463f82be612c0066c299afd2032295acfa26afbe8c28e0e77d5ce5cb8d77b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a778e74b36ff96d8a3f0c678e7767c6a
SHA1c35b763de1dfd5174145f4f745040c092af3465c
SHA2565b4311c013cd24ab684450cb844267f8ffe43df4b604e5617813c1b994c13811
SHA5128dffbd3815c73a6f7ccfdbbcfe2a7e5354d4ea4cf621c109966681d1c18a9a650b2e12bd91c04ead672a84f4a8fa82520d9c2d8481d540931c807c18b8400f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5f9024e70201cb094f29b666e7ab76a
SHA188c0cd55b940b742b2ea51c703f516e6c931fe1a
SHA25685e1b48e6944289fdcc8d8ede9679a61c826939eed304ede3719fad3abddc3f3
SHA51203e303eeff3b2d8e5619093dfff1664593b29457d0cd9d08d7c461222de5a667e356c0a57ebcab337a1c76850784316c11e34d48a15db6c07d633d2b1eebdb6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f16237c6c0b04c9b830a84fd77070768
SHA1a5382cf59b94592155474cd73785d184100816d0
SHA2569115a293ca067512ddccc1ab85ca673ae5ee5d8fb3e56e1d80d27f1fe63aa7c1
SHA512cc5477438a2d3a565a411027397ccbdd01a3e26ad50163191f0e09ccbc1f50a06711e504f032bfe0509fbd41ef19a30a826791a8143c60deff67d5096fa605fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52085a79a0605c4dcaa088449c3f80919
SHA1caa7708f956ebe281f25f0ab42a7b9551fa2c980
SHA25669cf73de3023f720d704de4f71d71284ff386c1cdbe18402c347c1737bd1a166
SHA5120c3468412d474d63138f8ef0679ea26836d4b37e08077a4d5b69ef8e88b734a76981385143f425d098129b51438cf1ad7ad038117c6fc2d728a68d98fe3760ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555c823fdae53c8ec7e46fca87af096fd
SHA1f0407f7f3fa956dd51519ec7893a937028b19268
SHA256d24ae85afedb87513b72d2b1fd40d956770d3b788fb5ba173b96dfa7e90f3685
SHA5120eaa6ab6cd4c60775b123f4282bc7d4e9acdaf9b429bad308881df5106447daba1c3ce887787092936180f8f940b1e5ce33f0b7cc976f1367fdfa06032407126
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b