Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
ffd4228923cabc3357768981b3505322_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffd4228923cabc3357768981b3505322_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ffd4228923cabc3357768981b3505322_JaffaCakes118.html
-
Size
461KB
-
MD5
ffd4228923cabc3357768981b3505322
-
SHA1
dded3754824dedbfd76b45e4a9ba334f54ae26d7
-
SHA256
d46f78dd8053587256516b61181458f78c7b0becad5f05f39fbb60d26b490de0
-
SHA512
5e4b7a6297a2460770b53b81282496077ec945731b1ac92b8b9a772c90a0d5469805d4db2668d1bbf8f52b7afe6dd8e0a8b2343c70225175bf8fa4785404e636
-
SSDEEP
6144:SxsMYod+X3oI+YDQAsMYod+X3oI+YSsMYod+X3oI+YLsMYod+X3oI+YQ:I5d+X3J5d+X3q5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CD39DDA1-7ED8-11EF-B0B3-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a3c4a5e512db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433827376" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000f2d47cb75ec05aa35659ec212a71c6f209560037e3d9bb2ad6e0a229e9baed88000000000e800000000200002000000039d82b6218d8f86a3c95e714627cc7b4ae516caffd2c8e996d26d6127c75023c2000000028419798809129c53365fc96f088d572d2fb7e130e162a56852dfab71bfce531400000008214cfed28dd03183f8291ece65f039afa4e67e56f71649d2accc113da12118a29fe484abdbfeb17cb6b959835bed3ef74483ad70499e84ad770477104f62cb3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1560 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1560 iexplore.exe 1560 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1560 wrote to memory of 2684 1560 iexplore.exe 31 PID 1560 wrote to memory of 2684 1560 iexplore.exe 31 PID 1560 wrote to memory of 2684 1560 iexplore.exe 31 PID 1560 wrote to memory of 2684 1560 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ffd4228923cabc3357768981b3505322_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5348e0e0c757e0b6f72934c03790dd465
SHA14c83a330199c7f89b96d438e30e234181240b0be
SHA256c6acc7f3a0236bd2fd7199cc992c172307ea5877669bf732f1c9726706596dd5
SHA5129b3daace4dfdc1044e9010ed24436b51a578186a069cd8ca157bcd32c50a2361b22841c0a64d51fedb0bf5f7a8a0a49cd9f9a9c178bad0188322ce6c11caa225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5658d35bf4670a841ef5014a78e9993e8
SHA1429a1ebb517420abdbcabb785c416b5dfb541fdf
SHA256c9dfda10ab9703284bcf62bb2f6e5b6ccef38f6f9be44e38222d7147d85309ef
SHA5125e5098b185fd1b9316ab16e15e982ce8340bdc208591b0083ebfc4ca15a1a1791575b45016b0cdb69681bdfd69938e49131930be4b376479c312bd662f612131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d16cebfa344a7085ff855b6565e6b51c
SHA1821597c391e4d7789b4d71afd6c2900474915622
SHA256e8949773f54b4d7d73bc2b82fb872c26055a4d5feca1b92f578ee2abe98a1d5f
SHA5122048e5a59a70cf021c1cf41098e5834ffcf67c287439a29dd62f759fe2490f205129cebd0ec905b08b03245abad1439d56a6c380152a667ed3261129d6280151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e505c157a7eece4725e3af4e913d43ba
SHA16c6f7f197e766e14c922233ce3831ab7af6fac29
SHA25630cc02b6a675853ab5eb527ee2e3ac0669bf52d80820faf24a4bc207edee9bbe
SHA512fd3ad70e6d49114f0d553888d41c5974203a4f8bdcd8de8be79da8657b1dadc6b536f31959b9c4d0635ba3441b1a9a9e97426b56c4c59b99d50c68df7f9b44b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5286536361a6fd081a525e907e2f84b04
SHA1f1e9dc6a6ba1842bd4c0ef88cec55ee3807b6aac
SHA256198007de0614500bc087ef20d722255ba056b8fb122eee3edc6046a2b43bc060
SHA5121a90b648e72605483aeb09dae96db668cd6a13487db7213813c6f3b683b75586bd943fefc8fffdc624bc1f1f2344d9a2b3080dff6caab813dd53d7c0ab390514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52628fed92aa7cb7675e949dd3835b9bd
SHA16a8cb59921f326701e7306fadca3cf8c5318ff87
SHA25659cc6a4eb9fc865c2ab73672b67458f7f9b281c63e0db60385bda095b1b0a799
SHA512103c85bc15dcc552aa24287c1bb89c6f8ac77cc2e19f8e0e81f2570c6289808cd086f6ccc34fe2e60a5120447e8d8118ca37cb2d3d30e4027e1d3cf0d997ae01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4a302c39b0bd6ccd86e851dbeba5137
SHA1ee6ffc9edf9c7ad3afe6c0cf012c3c1934455a59
SHA256044719ac1ed9ba0da3a7770941d8b6083fe2061fb791986e90ea59367834ea95
SHA5126a95adfa0a5a8815203730de098365fd0a463fddf26b06fc80aff7df8f920e10121a7a7fec833c5c030263dcebe1e02b5d4070160244a311859d471168606dd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c1e5c0b9181fda00c3a6de2951110d5
SHA1d6b3cb7a347810a9e07fae817fbe28fbd7f3ed26
SHA256e748aa4793281c9009e8320f62419d2d8a0ec55b3f6df6a7bba6f05dc3308a00
SHA51204dbb219bcbb84a6a60dde4b7d53334e6a9fadcd9ea53993bb1e855e284cedf5a74ec50ed76a749a728571c1259e5eae951d2f00583e09850378135f49fd4949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5053cd94844fc2d55ee9481d7885c8b35
SHA1ddba1734c1b387cf8b456430610c58866fb247bd
SHA25679231aecdc63168ce8ac8dbb70657acb7cc121db85ab3064ac3c23b40b391091
SHA5126b83543010962ac7111bb8dccd8bda539d9301a45eb681a01cce6d11f64ea5167b53dd72b4c1ab6a325276f7cc54f9ff6cb3fc28d8e23cdedf3fcaa1bfdb84d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52edc5eb1fc1fe51c43f411b7ca394a99
SHA139bb1576a361583248076ff53af94b9fc0bd65f9
SHA25602a19b68d3325c17a8348a66fa88c026f9014e09d1f4d877a91d2f1279ea7ad1
SHA5120802ed62b129c7c5e229f7eef60b23e7f8a038536bc13514b94a3d530bfe9c8b899e8fe8acfdb372897dce37413a4670c65d703352c1b47e493e79dde62925b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e200a256edf53a2ea1a549a01d95037
SHA138fdaf963fa5fa2097692ee46bd44fad6150933c
SHA256c9146d4ebc3d4468e1aa6f8e7e5562a5ab215c7250576f92d0193692cd141768
SHA5126d5a5845c212825ea6a05abb90d6e17455051873ebe8f0d3ddcec181d54e76b3f2a93d834f6c461f4ef1515b0e21199390105fc22f245cb74961815d3536e91d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccf2dd063dca2344f8b0b37e0bcb9f54
SHA1cfa6b2f50e0508ba9255321402815094f12ec3ee
SHA2564383abe13f6ac3b62e2b885a7972fac812534cbea20d602fddea975ad448e5c0
SHA512ff411c6b6d2a4f99d3d5e3b7937b0e59932c817291ca11a2f556875b7e3966a4a0cf6b94623de3b556a2edf9a43b4ad9b1a1790bfe6f091054c4905d8295cc42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d08279ae990720e8c85e8d5ec74fe173
SHA16c59a39482c2eb16eb067e6cb1fbc26f6520b747
SHA256096fe5f2d0eea886745891432e6ec66f1e186cc406eaaf42e01f34d17f2c011e
SHA5125b0cef79c15e1af2f59c4739c6e02f93365866191cced7f62989dde8288796ac2afc972f7ac1a84896d4c2cd5080457ef2d43bc06d07fbbbb0129d93ced0053b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b4a67dc350d3cefc6af3ffa49b203ea
SHA127c7128a49736ee462cd39f511dc3931a51b82a6
SHA25695a24bfb6710f24ca1381c237c0c7540b4a482e8dea0730936a11f0189587ad1
SHA512e345b4114c0e8b170f2948add55eceaa753e238e15c1c07f4392c40cce6f04853a0311114256c3f3287cc9726e91c27b492d7465615bd9f46c7f561e9fb62623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b6daf7db80d90ae074c7fdf7c2ba2d0
SHA1331affa1550f78dea3316056bd00f541355be1cd
SHA25634c15d6d5a63f9db63b1552038f93d1c2a563f9a41ddaa143b097ef45931d12c
SHA512e211ab874b4e0feffd923c17841856173976774d8c3d77cdff3130c3239bdb2a69a09eb3fdae80339865a3e5c4b1af22891ce644565fa1547cec797ab49445f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2a2a74bf62e4b7ce92d78c59f1594f1
SHA1d3a55318e5495eadaf6724e1ef4c8c452ec444fa
SHA25639bab6b85ca853bea728b762e4b29d0462598cfc0ecf52ea84799669c297f492
SHA51294e1a0a69e49fba021845b1f666fdce65d08aae383f53488ae832b4ce74265b4aaa2800d4035fd656c6789fba84b3d8f215faf18661f1a8b95831966b73251e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d6de2d35fdb69f827e25de9dce9d1ac
SHA1e4d21db66c82e8ff1623c80d5bb942e4543eb1b9
SHA2563daa013a2e99ac97f674474089514497c8968cb32322c247310c334e4a8adeab
SHA5122b337c6e9ee4a7bdd9fec9c427299306bd15393a5b912fbd76ddb6ea383f4636ec398fd3324095b33622628c40c279d3a4cb2fba24d27b866b593403ed51a5c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572852491ff7a3a22ef4a8ca1a460d586
SHA19418a65c5b6b02f52fdfc7c71b6e5342c4e2f73a
SHA2562e37d3fc0fd6aad8344f9150cb4627213c815c0e1bb446d7f37b3c3146f92e13
SHA51230cdae981316984be3570471be8bd0bd022c7f0bb2bce8376628f98bd0c8c4cc1b16d7ff95caca7e07f6c4f879789692780e869f43bc036c2571d676559f71ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b632ac3aed8bd9132dce815faf4e7f27
SHA1a032732b75b9173ae865fe5554fb6b9c1e5a7a89
SHA256cbbb08debc9862e7ae6d04f78aeb565b019d11db997f3ac54c601945f6761029
SHA512006253f666aa7264dbef11070ec4bbf6d4b0b89b5853af54bee85c9a94c3f3753b4535b31f3a00042c3e6a32d220a1a5c8ae96bdb03e840651919b367dbda39e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b