Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 23:00
Static task
static1
Behavioral task
behavioral1
Sample
038e31b32db036c83796de9198b3a961_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
038e31b32db036c83796de9198b3a961_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
038e31b32db036c83796de9198b3a961_JaffaCakes118.html
-
Size
37KB
-
MD5
038e31b32db036c83796de9198b3a961
-
SHA1
89ba43edf570c56383d484d27bbe4e258ce999f0
-
SHA256
ed9b6ba52bdfdac204b6a6aabc4beb1eef411c6611b03724030e32c8ae9f7eca
-
SHA512
db0177987684c5831181d892df7fd6f74e408906371258699b1676c69d49abb8d0453020c6d4232bd108598238d0f942a9d028ea85dccc18f55cd237986ec77b
-
SSDEEP
768:D/bVFRFQW81D4RA+vEOjz6rdG2Gil54RZfPGnf3Gu34azi6781DdRA4vEOjq6h8q:zRFQW81D4RA+vEOjz6raA7IaGC81DdRv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0d0beab8c13db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433899111" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D2A17EE1-7F7F-11EF-B57C-E61828AB23DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000fbd21505eeeda5801955b718497e6fff29f784f72b54968f6ed15fe41c6d8845000000000e80000000020000200000000391ebc693e9f2715f2878d8e64383cc6c2c468bccd5f9c590a2140a986dee7e20000000c8bc9811978f59f45a3c3a509dd9a4c54ffdedf9477dbc9db6fddc06d2cf12754000000036bcfcd44bad68eda248cc083f938f3aa26c5595a2ecf35baa347af42bd578c037d57deb2b7cb7133f2d87404597393d83dda8447c4e3f65aa661dcc22d3d846 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2328 2380 iexplore.exe 30 PID 2380 wrote to memory of 2328 2380 iexplore.exe 30 PID 2380 wrote to memory of 2328 2380 iexplore.exe 30 PID 2380 wrote to memory of 2328 2380 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\038e31b32db036c83796de9198b3a961_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554b31ebb1ec98eaab635a2c33e437235
SHA1bb85853a8d7599906142a8eda1d074c9d4822080
SHA2565f1caf8891b5d423f009a17666bb9f3cf2e9a974714e4aa6d959f5bf8411b7b1
SHA512eab7fe72a622341e6c53bc08189c5254405140aaecf98ce246ae453952c6bab4f8910c2e349da07c768d4623911de28b234581944a008db769371e22f00920ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595402db2c1061fb46f1d451eecfb863b
SHA126f7165020d09fbeccc8b09576d3a5553723ab23
SHA25603580849c7b8fb14c8775682e4a080002d1998e1c44c1fb5bb1a6fa37dfd3ba3
SHA512f5243c35ed5417ef8e36691b0dd2263ba0b4f1590217993911e4107a4e40980738e33d1a85c2b3e0ed94e059179caabb7399e43df17ea732b55b10cde8f07e28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f3579e9793c616a50e3a31cf5b226a9
SHA115679ecc70bc0689c820964386628eab5e47acab
SHA2569bcbbf415db4f2e0c44b56b6f1b53236c221fccd8b2749599203a732f862129f
SHA51262b51451f72b93af042599502de9497f4f0465a9ab318753b5e200d393198094c8f88d76d759ff0c884c832884828eb4a5f923e9ca4a69c5e8a7d040eb1c547e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b42d974b47c7511b0665a07119dc9a0
SHA1b02bdc4b5e0b7b8429eb9886f17e678f07339e72
SHA256f11770b3a03dd8cb0b03d726fa582152e4d5904c40baf9986a64963ea65b39f1
SHA5123838b1abc30dee3e03069756faf12c5e951a43ccdf81f16a2780ecf953ee639bc83932f452f3466fbd9cc520ba57ce603674ffe382aaadc285f15279bb675421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd31a915a8fdb58362dfd1397285c4b1
SHA14e2418e3e5c41259aff711c397ff6313c9bdd722
SHA25630c39b467161e3df380d926f557f1a67f77215a7f2d7a9b6e6b82d9d3ea0eca7
SHA5124c1303329c366bb0bac881eb87b35f98f2eea750f27eb843a5b61bacfb3e22c5cefd16b5ed81eb8d73c634936b6ae4ae4a6877a0f71cdc378b25325ae4e63c39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53db53c212550a03c09c3e7721954f83d
SHA11c42ddb46f9de725311885fc0c71dbd03de46616
SHA256c36e683bd0eb5175ab5c01e3f78e695875a0b345f6e50b1b8c507de59b5fa71d
SHA512271bcde532d4a58fd928be0e0d004d5c482e7bfc770bba478178af5a8faf8c8716eebe9331ee0a5686b6e342cf771a5411bcae552fb3f65c2099c4c46e4ad171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551a8fe05c906b9855c0ee21f49b22a52
SHA1b55cee551417be92c13a8426293657c946266d45
SHA2560272905147cded7816f7928b2b290afe67fe6d23d7a97713ee4b569d663848e8
SHA51256384b999660d2b190f706727023f76aaee09396589dcff01a42a37566206004b753f8a0070730d91d1e264106bfb226734b523a2f67ac083048082852f1a5ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bbc047f7b2fce163303c049a0ca0587
SHA187d5c229bd0e47d43f629496c75b2c6ff12a24a5
SHA256872458d43fd49eb08dad3de2a0ff0457a4ff23c87c6e0b41b2a34135331c1c24
SHA512be9c29aca7fbf7acc6e5282f1b9ef565b48fee923c530a80372821890070dfcc49019226d846b2580d3e0bd47add5586bd2b08a8949e3309830f03ea048f4b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6a702ecaaae406402be03495d9fcc3a
SHA13abaabf353e3001deadb72a59a01962b3b662d4a
SHA2565924381072d63add8d70b630be9b2b139bfd628fe58a709a48ba946af8c7cbe3
SHA51203b7d717b7b049d04f6838e27e3ce9228bd476d02f46f7ebc07a61de33acdf936b8448862ca45b347cbab4de78a5825e315cc747a7666015402f2155394b6dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5042889941d2215062a1181c796562f4c
SHA16386e4e25544d1c4858b936890b8d9bb97678cbd
SHA256c91c1becf80ce0a04ee9141a4371b8c560d499cdf31e734a91be35d3d4174635
SHA512416e8507ebb3d792fab69e6bae2f1b15e7a93b54462ae4011666e107b5a7e1b8cfd02820b68c59f539d6842661d793d63b2cbdc3de9a9b21a4f1aad3490698c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dff0d8fc7705a2a2f4310ef6ffd55520
SHA191da7fee16e970a07557ef2a7e246527e287fcbb
SHA2569eefd10f1ddd8e71e534c60e3aaed7520bd356c759e26fdbe6de23370c997ac3
SHA5121a945f6420773b793ec7b528cbc9f4c3e0a013cde0c7443f7437aeaf3c449514ab1010329dd1b97a7a5ed15bdf138989765ac34c19928042aa8578002a6d2869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522979b90928c10bff7c8e7b99b16d1bd
SHA1e4472ce8ff420cef4564a0754c0e7f2e88334034
SHA256edef3b4491dfa170a0f3955fdbf06e461a6de9288fd4d4f5711a09e4565dcb9b
SHA512120df24b090b2a19bf3b30171c04a52d2cf14ef8330f251a700a63f0c26cc2765249c0d82965118271b364e94a7070e25e93b14e0bd8def0a997785d7a5d0743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d019108d3e5bce7f04098f5403bd273
SHA1c86513622072af4b74c64804c6e2be7109f61d9a
SHA25641bb9948bbb9b8c38b714b76008d94d757545a24479385544f951448879c9522
SHA512c43e0bece38c7d3e1dd23c0bd1a768a518bdac6e9d7d91b7efb5634b98d4210f80ebf2a4aea545de65e06e26d3de2d3dc41da9bc0daf67067271acb2993fc553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df8b10c282532227d9c8ff658cf1e81d
SHA1637d6895658081a8916a8bef641f543ff804c1e6
SHA256074539220843964d1a2f36992297425e2e63731d19a2dff153437264fefe2445
SHA512d969e7362815a6b73b0d824787fe9dea232e82cc0f890c21d06d99f0a2e6257475179248f41fc4d8ef0209d9c3e869a201c1d093a77b668d9f3943fa15ab11ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54457b9172ca27006eb7f354e74d4364b
SHA11a5bfe922cb73c7128c35131f80b791ddde2bee6
SHA256fe65fec4164a82facec7228d7d0883cec009612b4555a7220d940096e3da29b3
SHA512b8f823042a220fc2f3b01bbb0202d1aab0a6972802d4f720e89d3339444ebe9bd64aae25aa48ac382891ff1a00b25f6578b74fca810ffeafbcef1e9f8591cde5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7cb4311ead507fdd8513ad538604bc1
SHA14f3d4af9ff6389860e6ad80e1c884c5f8fa5ca00
SHA256ad31f0f3a43a0710ea1f74136b544aaa542aa584793b9f866960793cfbb865ab
SHA5128c951066739c7d67ada7cfd8140b7c73bbcb703ce1472404e817b686be9e9033c1421401efd813a7aa3f5381f2ae3fdb3410694e69441dd145452de104f8f3a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59831500053bc53d49d9855cc162843be
SHA171268198c48f0830492f68476b61250e9088b038
SHA256b95acb14705954fdf956e857ede42d18a389559b145a8969509a87b7b5e3bf8b
SHA512279a0fd8e5132b04ff3b9414eb897390eba39e064fc7d309ef3502506b90736d146bbe774c7f5c4fcb97c85377f9b30bf4ec8b98ac121e39feb40d8935d3747e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5197dea39724e74586898eec6b5c88d5a
SHA1e31407de13713e5123c55cf39b3c93f0ad1771ac
SHA25654d69aa6ada3be5c2eb41525bd9166e71b86f2c3da71cae65ed1a1c98a31bc6a
SHA5120618c2e00412aa394cdf74f1fbe42e6a1411e6fb758894614d40666fdb67783743f18eeba53e7fd0d40c7d2e90edc854003ba1aacc7affd9475ae40f84453688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c168ba11e74dee68b744fd99cd0b1556
SHA16945622dc621e2c42282cc3c27d12049114e42f6
SHA256f4a43019c83a060ac2e8ba736202642d6ae6507c1c6f1cd3d117164559fbedd5
SHA512fd3f32c0440f83bc339ada68b6f2341fdc441133facc04afcd0675fdce4d91ec7335ab40d56c06287b47a3c9737e5c43b8931d7959d3821f3f8cb1d676b4b4ed
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b