Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
ffff9293121fe2e35cb0c951c8209152_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffff9293121fe2e35cb0c951c8209152_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ffff9293121fe2e35cb0c951c8209152_JaffaCakes118.html
-
Size
67KB
-
MD5
ffff9293121fe2e35cb0c951c8209152
-
SHA1
321aadeecd9b90cd7cfdecbfac4fdff4e4df12bc
-
SHA256
34722675546df17bf6e59b28adeefc3fb488a1c17e2ef85a76f2a1014f09d3e8
-
SHA512
7dbceb8b4e8027a59ff0cf062ca2f1f63e4d58271c0b0a5024550ee6aabcce421391482b5599f33ebbc8da8902de707c53231918d2d479ecee7aa139b6c84c67
-
SSDEEP
768:JiigcMsSZ8tN99OIsJbsG/ND0uoTyfQCZkoTnMdtbBnfBgN8/oygcR/QFVG8c//L:J2WyxefTePec0tbrga6cuNnzIjv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000047d94430d87fbb67dcf0eef03aa01cc5234e2c3bf95b7db3be3bf990fa848d01000000000e80000000020000200000007603fb31e78f498fd232570b9b6bc68a8354029b54fdd2e1d98c07748ccd496d200000005d659ce94fbc2eb7d0890278d9facb65f0eb2484f0ec277484dbcbbbe0b4a56a400000006afa8780c6a2f9f53ff4bba1e2041baaabb3ecfdac6b1a382644ac2aa3ad5f6311cc03fb9c154570a1e007cb6487743e6de8641f1e52a8bb626481264d335b0a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 106e59eff312db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1ABECDC1-7EE7-11EF-B895-D686196AC2C0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433833519" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1676 2052 iexplore.exe 28 PID 2052 wrote to memory of 1676 2052 iexplore.exe 28 PID 2052 wrote to memory of 1676 2052 iexplore.exe 28 PID 2052 wrote to memory of 1676 2052 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ffff9293121fe2e35cb0c951c8209152_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5788882b7410302da3b882604bc757ff6
SHA1d7493ca1ab00616c42f8ba8d967e2d4a4782f91b
SHA256730cb7505f3622776db19595341d80aaa2564c9a3ce756f46c7b83b2ff6e1de1
SHA512adb7e0c9b133d76cfed09d7ea546b937cb98d87922fdc517ddeb17690f9d9426443530eb8e722b0f09cd8cb1c00c1215e4073eccc1601e5de2a9a31f404cac3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dad3dc3287b7acc426ffecdfc218e6f
SHA111873f137379edf9fac2f67c712f3c5ad8bb9936
SHA256a9bc9370fb81a935fe1348fbbefd3f642886193e97f6dafee5d142e949dc49ed
SHA512c5e050fb6f3d630e0550fa7ec9aec442f17ccf9282d555f7dc1b823a0f3d6c48b3b13193e119e7da71e155cfe117aabcc263dab2aa5dc90cfccb0ffac6f7b450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce03e19f54637080c6d016bd61b44fbc
SHA1411fdddc96e5b38a9c8b4e767d14e9d126300d93
SHA25649f2fe86c21810a1006fc32bbf85bf84e54d832fd85be89b495460fc302eb896
SHA512a91a9e5867faf31c20e4702a82f9df4e586b4cb2cfaf0bd87bc0edeca5185bf21aef30a0d53dbf059753fa01ed03bf05b8215f4d3256cd5d10b1967b71974306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5349deb65c4da5fa3e409c936351b0a3e
SHA129fb591486af88eb7b674a7bb6dbd91763c17e8c
SHA256e97ded31bcbee01bd195bd4ad176618ee0b231f9bac15f4a47675b615ff5112c
SHA512d21c25d645700d60241a0358bc63a8651e5618751f85dc55ca9359f0514795c5893df527e2dd93042d779a5b4188407667ccec646d71a0ad22f20f1053db8491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f82b3f3bfdda7b42987d18afacdd061f
SHA1231f9b59303395d8c28a8f7632946679739df511
SHA2562696835a0400a96547b45c334e6e4e9da3718e55ddd848766df008ffb62e2456
SHA5128024ef94ff210606715975bac6bb7a519492ac94e3ff54aaf3efec7fc0f061f5ba948d5a0594fcda969deab04db8c8710488a91a9215133a6cd07da729cd748f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f4e933f3dcdb81de691d7766c430433
SHA1b09cf0b4b91665d86106d3514fc60d49d2a688be
SHA256d93ec3c4b50d7cedae77226f8b13c2cd89d81b381f108ad8e802d04b29fecb1e
SHA512902a57b4958eb1636bd4465e5d56f1c0c4f3fbed288c7268ae32eaabfcc1e00213d142a2dbe28ae34a19b9cc54d02eaeb648416f50684ace3b68ea635c876b10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572310dcf1f3e1adf155b4b052b85bcf4
SHA17d8038409b813a6d5983f982c63d534fe49af80f
SHA256487b67174942ceb553a847bf3b3820dba570d7b83f61263b1d8db0f49dd17a67
SHA512cb441ff5e3c14ffd3fede87e7f2a5250146d1eb6cc15d29db3aa4dabb480e539bdf0c0e28baf0f9c769fff9a64421bd977c1b25eec65775e397a8d7024d1969f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3219a8ed425f6bce2c8a64fe9351d4c
SHA1a07c3622d754234c391eeab18d147beae2423134
SHA25651dee768974813364f223f9640db37724bdfa029a48ef9c8e167970ef87c115c
SHA5127efb00d91a1fb3b1b50fdf08cb5dd97ec36c2573c7b18632fff1f2598f1e126b0f584464e1113b366e34bc785fc4d389dd163b71f90f74f13c888b40fd2756e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572dea8178d110fe42a65cf7ed19bb879
SHA1d7f1aab75e2d7d6b4a72d199ab06215cd3f42497
SHA25696b7ace37dcfc8b942f157f1b5b75cf0f1d8f5210083409a6e9bbd264fd74dd9
SHA512e763186c8d6c5a4603dffa08f2583246aa4571bf281d6da06d588dbe24df5ab69e1f4604f27fe513843316934b7cfa14237dd031abac4635069e4653d1eb26d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5809ed3730e3b7acd48c1a998dc9f90c4
SHA1cdf9cb7179545a012eed078364decb0cfad1fc90
SHA256a4fa74b5f3b3596c92a89a66a1663da764d0f70f9a819e4d7cf3be9f0683500d
SHA512c1948b06d79419b5fac56605ca415972d2944c5e4e295bd1a1bf69906ef2bd4ebe39022ea0ace9718c52a9eea59cedf1e88fcc9cdc0a03bc3d02ef8e99b46ae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aa30ce64ee93f065b3787bf013305b3
SHA182816a4516fe41d0b7438051306184a664f31970
SHA256801eb8702550e82dd9f663c51a94126e1b9f273f3512cbb5071a0e096363eff2
SHA51269dc5ba83a060e4e0f711633ff9016fc316bfb8e8800ade1fc3d4f194745f4bc933a56edab3faf68efb3d6f747be035f3c59997ffc514cf2b703afc82cbde061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d20e2f93926cd558c2db0932ca8cbacc
SHA1670b9a6e0c4f010f0ff57d3bbccdb15ab7cea017
SHA2564e48827798b6ea53658dea9e548d37347d6c9c7d76452693941cde06cf136811
SHA51280984db564a0e2fed48c397e854967b56a5461a78071cbfa1252d014dc3b9547a5d152709144d263b0617ebded145b49356e1feeabb9f6621cc255d7babf5cfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd02c8d952a766c2f00a74012cc01490
SHA1198d88cf141d79378a25c9ef7e98248e4141f570
SHA2569dc4df91469b049f58dc5ca86db07153a927de910944cf447b697bdfbb954ae4
SHA5127d6394e6416c7ac933a6f5b5e1172f105b11e39a8eddd118807629c3f76ce535ad007a3e0e43efadbe6ec71b4a6b6216125d8e4c7df000cf50ac6813d3c44fdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c3e3447956a830cc0a9082353790a42
SHA127b906654c9fcd97edb42b574b667715f822afa6
SHA25695fb114fdfafca7a526b370beebeec0ce7fc85ca002970b3bdda20ba207fa45b
SHA51288c5389910496ab55282862115366d46226cf01b96864d414c3b1d649a34648baf1004de0e346f4326ba9539785785046faf97a36eb12f338f9bc08e46a25d6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6bcba678f1d0835a4e714d718cee323
SHA1587b7dcce79073674074709b3b509ded987f8ea7
SHA256e5fc461eec00943e2dd7555d4820d248c28fc2af36147c0958c42d56367e8e89
SHA51298aaa5b35744822905ba30a11f0f25bb11325dad936f2781fc1e822d5cf87abb570d134aef4a23b0964cabdf9db538913e68d2e9c5d6b4ab5f5c5ec4a0cae274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50818b911a96fb9c41c409d9034c68ee4
SHA150a53b11d992f3e5edb18179d377fb96436efd7c
SHA25603cb42c9c2b5cb79e4aa779282b9d685454c9b76d75cd487e4c56ff1b4c3306c
SHA5126a7f6e6b22aebd7a3e8588e87f653002d69aed19bf83d0c26d7a870ddddaa73e5ee9ec6c5fb313aa37f8b7ffb9b1101bba1584bcfed9830a6b8871769eac2012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5131168cdd930f0043572c1b388f86dd7
SHA1362d73510a528264f48c28af51a2728b01962ca3
SHA256b6502130ab0483d1c51bdace10aa431b7b8ce870e8d443da2b5b36428e30a402
SHA5126f084ffbef1a6d978fc10dddfaeff9cf2eb5ca58a79278acd4c86f215d4689d477abfa56e9dafe6b79e09ec4d6d942f1f80ac357480d61bb519791354fe01c95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a27c77bda884e94688bd2a0cdb10f4f8
SHA15c0fac62bd4d011650de8970fe5309a1f0ce7493
SHA256b32574943cd8e270dd5f4c5a393525c8024db2230d5b467c4dcfb02998adb932
SHA512a3e6b272a238db7310ee1ecbe6c2a5def97aa54da87fafbedcfe4f37adaab49bf19f3dd1f952204df16bf3e136332e4e4ff2a14e38420a5ebc600ab4d1de6cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fa2622f90814e7f578999ccc13c0208
SHA19ea5af1b5a9e3bb3269e31a422074f9b06329020
SHA25644cc6cce33160c96210cca61b02e4df194301c2016280c8bf32a4c49891bc35b
SHA512fbe78a19fd674258d7b984e82980ca6eae782fd8b80dad1dc005f82f75441926b94448dafb4937ad48963949bc8968f2642d6a8ba277d6ac1678da45cef54e47
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b