Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 04:18
Static task
static1
Behavioral task
behavioral1
Sample
fff30218620c4c8303a86a113fef73b3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fff30218620c4c8303a86a113fef73b3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fff30218620c4c8303a86a113fef73b3_JaffaCakes118.html
-
Size
460KB
-
MD5
fff30218620c4c8303a86a113fef73b3
-
SHA1
dc6625feab8aa272fcb0c71182dab32da599d172
-
SHA256
29c5fbb001139b9dd89b3250a03f44b36549be36d334cf3eab8cf2e1eabb2c13
-
SHA512
74a28c15e7fd43af34f78da2dddbd8900c0ed66a5245802aa5502c6475c46e22afb66cf620d01e19a35b6d95477fe2c2e940d91046cd526a9b1ba8d8dd97df6c
-
SSDEEP
6144:S0sMYod+X3oI+YNsMYod+X3oI+Y2sMYod+X3oI+YLsMYod+X3oI+YQ:z5d+X3/5d+X3G5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000a61f1425a8536be2f0aa0556f1aa62a14e87300e82a31288c0c90708a3ea5698000000000e80000000020000200000004428c3eff0589ca15ad3c92ba53e414dee516cf7db9b7f5250f758fd5f75590e20000000acc9b6d239e34bd553131aa13b998fadd064a5a9155cd3f8da84ed7be848f26940000000766280e4f9adc5b6491bb9eb9a40d1d60d68108676ba624f581b3834e316eba429368a705ebd1f4d0a2dc28b91832d2689667c395b6c9fc7f719d15772c1ebbe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433831761" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d03066dcef12db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{025101D1-7EE3-11EF-8AE4-465533733A50} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2696 1732 iexplore.exe 30 PID 1732 wrote to memory of 2696 1732 iexplore.exe 30 PID 1732 wrote to memory of 2696 1732 iexplore.exe 30 PID 1732 wrote to memory of 2696 1732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fff30218620c4c8303a86a113fef73b3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faa2c8e4817d6de27242e0641095b554
SHA1b8d725c45baecceb8a077f20e38c66313433a694
SHA2569e8a69c2f6e40a6fb015fb3efec2fb71c46e6d9040014436847cd60cf01f382c
SHA51226b6541d661a989a5d05e6449f69656cba3071a20e323a7e113fdd484ab8c7a2d7105ca74a84908ef3cd814bf4f97b23baef814f70f4542019e71b8a30936b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fad936e5e3f3df09a08263b8e3e7568c
SHA1c75aa92b90fd11f2efb2751e39c35d6e3d8b2cda
SHA2560e3eed5d1909d7c304039ee68132eb674cb67bddc045421ccb24f2742b9462be
SHA51234ecb7db2839dbfcbfc1a1125733f43bf3922614ccb99383f65373ff0d3386a81788ec38d702a922dfd20436ad46511c4c54bfe441b2450f929f9a05b23b2d02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552288e617e6550986084037dd38c3c0c
SHA1b9983487a7a8f59859191ffc402185ea4b4e46e2
SHA25687fc9cb286ec384d4717b3dbe4c9d7296e5870d73dcb66d2d497025109d1ae92
SHA5128af79fe6df2309e33da91fc5cb36f81d5e588ca78be716b8a2267ca5eaa6bb3ddd51c2a19ee36176394939904667eab4e0dbeea803f2b19ecce2568ed596c60a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528ea7fab04355ee8580eb0d89e81f419
SHA1036e6e3439f2f9714275c88f21831a9898368204
SHA256bd4a44226f512f07aba70d1130dc1a9e10f97f0e81fa24aaac7566c91f31fa67
SHA5124d7ec2d5edf5571dae6b9bb292d4faaa4cb2f5873bf5229b057c94b7bfe9be826ebb3b4798f4ae8d943f1a2b68e5fd3c1618ca7c03f59306a336db11cc26f4e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b7f7e79096bf5df03d661941ce9c137
SHA1648219f56dc96b1f79808eb450b8e65230867465
SHA256195773258c23dc3051d6bcc742b30e99950eb1e77244928aa5be42310cc772c1
SHA5121b86150abf9d7c7be1578136b38893b156242cd1fe04c457c289120a58b580ac9687943a97f7fed0ea303b2e05ed611bf73b4502f7965c944b64cf60eabd6f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7988eb41896a9166196151ef7a728a6
SHA15dc94160a252a6e3be2e7e8344d83ec46cc4a661
SHA256422fff483e309468041c658210a3e923aae1b2b4b3b2227e0581c0a9d54a7cb7
SHA512b367fd8313d299ba8a246e16fc7ef2877b08d896265a50262134ac3ee5eb22d69f3e4359a4442c0861f260c1f15a3332382e3c2e03a227ec72b9e652e7038e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e001ec3a49e70bb5999b96cdab532de9
SHA17d384b634563e708350764bacc09f66695c69236
SHA25607ad0de3602ef2a4e97cb36d87a01c5de67580a425231120cd049934bf929e43
SHA512ce674f468a1c3cc092cb4ab546af112983006305701dd89b4158f4be28a80e9533545cd0cb0d4dd25d96ca06cff349f2c5ae76e6837ad0c011d979c3c44e7084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5480c65513165fbd19607b258958947ab
SHA1f76b729ab08763d6a116687d21ac82a7e93244e6
SHA2560153492140459093bfb6461dc58a3f9051898908c0f50b4b948bec7c0d1c00a9
SHA512b835d0fb10e59d607161c0b41d3eb47df70a94617385f9f57cc55212b36a59378dc0b476a88cdd0bef3e0443089e98894027324d35b617164dfe52a904d42caa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef40c36f0b7bde9cb27f650653ae000e
SHA1d4ab83ba13574b6e6d10deca1806befcadad5b60
SHA256eee75ce551038eb2496e5bb1387f92ba2f50f48ffbd1424349239f8d15cdc194
SHA512ad81455d184d8e8ae4ff5acd42525bee28ab930848294f8cb48da6f800e395e211ea3964a5650bed1afa0417da58156a4873ca8d82ad5ae65c17fb9453ca2bce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f00ecfa775c615ae90826fdc222288e
SHA1df61c5f4981d566abd10aa44169dabee740cd574
SHA256b17f40c6edd7f0157cbe0c5a49ed27ca9ed786eb54c25e0392ca634cc0196f69
SHA5121aae192ad0d1a2b517592ba82b757fbd4a8093802bfbd315860ea33badc2de75f0c1f15d26ba6868ab505b2cc27132aacfae8349dbe320cb69716792d3bd6303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5711f4c88b4dbad9ce2d18a6905e56320
SHA15eeefb48936f43f03d1d3f75b894cd32a5f872fd
SHA25613bd78819a8e49098f27dde64bdf1b9ca977358daa7cc796d0877b5c735c2707
SHA512a1c07982e4f631641cca66caf08ab2e86451a582b71dc93c03f00e099688f5cdbbb213c5a11e637a612c3c00c9e088e04348ea542f34e16fceb05344981335b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd4025a494c3e75f376fd05e5e9bb909
SHA17f4587b4d511f385754b6ca4619c0df44399282e
SHA2569cbbb584d6fcadaa4d0f077f79d3970f2aa838ddde80086a0134243b4f88ac32
SHA5120af8104cdaa481d5e385649405e5e56874100af0d175b798693d39cac6bb438c5918e44f17981b0a29060520e6f04eeec2c35ad8f142aed99f32daa51c362455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc8b8fe76150b1b0a791d213d07ac365
SHA1cef474dabad16eea8eb7172e528a1a5d433a086d
SHA256895bec3f556af9d61d6635b0a2d07a38b296d7de2bcbf9fa1095d24d38c4fc2b
SHA5124f5ae7bb4035b2aef6456234e1bc64973c78613468198f4df4bb1aec76cbfc6fed086ef8f3d97666c9324108a07423f2734d7300852545acad0f46849d0f7720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5839385d324e148e874d0d6851d57460f
SHA13d18c21cfcd855416476e39f7ee72bec2711f15a
SHA2569900848400d4a9cc7d8c10638152ad7c914376d167b6a8114b5d53e379b1f672
SHA512f6c3a163e112e5e3224885e21928be39b613587f11cb06679db68a586e74fc49a5143547c899059069faf96423076a3fa755571d6e089c1f9397bde893c2fe9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519ae0632bec33b0ee9a538f094f4da1e
SHA1ab01bfd7ddccde23aea3962188263940b26a0699
SHA256fee1a404e60d067c6ba448ff9c593f3e03a8cccfab745bad5baf2caccfbd69f3
SHA51237648ec99196697cd34032bb11b86656d9246ca3116d4ca5dfef20b11a95021c07b34c85beaa7dcdd59d5c373870dfbc92419476b5044ebf56c7dd2d47ecc2b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56beb6c2e5452850a325740ac6e161801
SHA1a2689218ebf9d7a24cded3dcc3830df909520656
SHA2562e7c94f3f462a711f61c7deb6894682af24dd8a2c77b27c794281d6f2765913c
SHA512d87d35eccf01448484b99e0f93bbf755185c43b53b8e34b26b11334eb1e5ae0ce7db3b8b76ba4201b0780b7e49d5b4a7f690a6e03f2a6921b593386d41bc2b7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503f3080642a503249c908a4dbcc1d2a0
SHA1f96f6cdf53f6aa534c15a84fb5583afcb915145a
SHA256134a80491b675f9e3ce931d4ed60aafc897af8c1e45ebe75fe94cc5e3c4e0c0b
SHA512174d5d72c3708a86277ce56f855037ceee4e117cd9540f438cb2c000dcddfc70118df184e7716798547e1d78d380986d623496d4e3f20b5c0bfe26e1f4cf6b29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c9af3f9e4fcab2707071c5273ae1257
SHA1eb1bce5611d2c3c9ed22dbed6778de5694376a70
SHA25692f8a2bb0b5b6f6a5624fa53e4d8547c14db473a87964cdbf4be7474d020404c
SHA512c8a65560482c7641d7827ba16f2d18ca908fbbf2305f554749235d4875db760cc233cadea0b182ecffb98b252cdffdb7965410928d117f65c8eff527aa547806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533f560e7ffc932261cc6db0345ee4d67
SHA16646a4428986efe917c64436c6d7f279a39b3b85
SHA2565498f1d92ffb08e7eb84ab561983d60c492b17fa31c13a2ed924c65fa583adf0
SHA51294061384d009900ec47dfade57080a1d05ec6c283d2388f7194542dbadcf1082d9e00bd7ee1015207b26d23304907f3f40e321aa25207bed21f48160f85cf085
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b