Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
01a925184dd414ed80bb955cb0921c72_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
01a925184dd414ed80bb955cb0921c72_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
01a925184dd414ed80bb955cb0921c72_JaffaCakes118.html
-
Size
94KB
-
MD5
01a925184dd414ed80bb955cb0921c72
-
SHA1
e45b6fe2fca9029e55352bfa6d6077ccaa9bfb1a
-
SHA256
b07c2850d7a5625d7a21a85696cb68f79e5a709b6d374d292896d7b4486f1448
-
SHA512
7529f23829cc01df532b07754806ab594ce95a2dac524d87d9c43f18adb24bdae71c45987f79e8518b0ce1053960671a5c53212c6c15b6165f712bf93fd479aa
-
SSDEEP
1536:5zSpeI6aBFxbxkx4xurT2T8xWx/TxAOl38Cm/FN5a5C2mlVLN+QxL3ggHSIeye8P:5zSpeIRaFN5cmlVLNiUg+RhJm+xOI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0e6b5c23f13db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E53A3C11-7F32-11EF-A641-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000466c287d21a52534a1b40eb8553bc536cd57c290939f5d2f805ba0cdd80322e0000000000e800000000200002000000097911ab34b2637f18564702cef43742492cff09ed726def52276f46270f0b1c2200000007ed656d8a3caad05e94f633610d854193bcf3b6838db02eac3bdb4a47c37607340000000cf4c2c6849e076d450ffeb391c824c876407d5590e03b90a9caca3f92ab2154c337eee424b3964c690bd8ab3b011100bd897db06076a935f6b8c2169814266f9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433866072" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2308 iexplore.exe 2308 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2524 2308 iexplore.exe 30 PID 2308 wrote to memory of 2524 2308 iexplore.exe 30 PID 2308 wrote to memory of 2524 2308 iexplore.exe 30 PID 2308 wrote to memory of 2524 2308 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\01a925184dd414ed80bb955cb0921c72_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53150c19ae16e91a917851822eff1a369
SHA18bf8203f26ec743da28e76755f45ae15b375654c
SHA2563a4d1f11e2fec5f09f5280dc352bb318f1b9abd5a5d599cd98d45a45f540a9de
SHA512033f21bcdd1f3138f0f0cb76241233c3d45abf1b4a2042b545a238adb9f4c2dde61544ca4c9cf213389ea9dbe7199a9167bf0dc7e79917cd963355396c32d5c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a30d314215a5dc6b4d43f20f2d3d7683
SHA116475fb82265620508209547c2eecf4de3e0f868
SHA256dff266324e2386c2d590ec7005abf505c35f5c0294f458fa416b023350c4d451
SHA51210e0121e76d49f0b5f418ad865f1cd02085620cb210e718d5625e5758ba341227c1bc499a31f641953eca1a1894ba8e9a4190592c1724b17bc513049c727dcf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55af39f2177946001d800977701aecf5a
SHA1bf0b6a3671241ba235f25cc9bd78c993dbad9e12
SHA256f6ae0ba3298281b0d145f6cebd95139054eb052dc0bacf4461233cb5beaf615d
SHA5122b56e226c61777d6961160b6fd92a634ceb8081aa2b63cdea1d183dbe6e036b40a723ece282e8e2e00539595eb930f9db3721fd134d3bf1ab76886dc4f38e2ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df633de35a1b5bb920ed2e420b2b42f9
SHA1f5114c3a4d9b1e9c0399dd09a2ddac5cc05dcc06
SHA256dad38285d7fb8b0ea458b5623c7f4a4b8c8b28b470fb5464e99fd987033ea002
SHA5127a6f64613776c162f2ce8b89027659512572432effa3180a1323f6a6fea5dda27ad7cda4571cfc950cd854fbde7d59b147bc43298a8ad2cce17fa7c5b4a05aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561b599d1576b1af3b12a30faf2693a15
SHA1e9877109c658fdcff2d4f9ccd1c100085da2c028
SHA256d5f24e9a809a8707387bf71399b4d1e76be24e3a91b3b76878f1276fd6684a50
SHA512f9d45a9b5901854ade6a9941b1bb65b277658cd86c1f00289c5c529f68f3c84f66d9d3ea2a7279e1d5d83bb24ef6f6a910b777efef494e588cdc5c520ebca77c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c177c8015941fdc0802e243dc07762ab
SHA126a621145954943b508cc149137af1fa3281e1e7
SHA256f116a99b773eb6ee7c2146934468fa2ad9f4dfdc7818444b181a8c7b56c3eb4a
SHA512e6c30a0ebd69818e61fa51c4245527e7ae2ec04422975d7ac6df4e38e4e9eb49e685c22408587e1b125bfcd66fd6f96a26977958ff40147fb94d5c49fbf96616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab6a9cec9c4c77cb690e2af0adb39bb6
SHA1894422123aed7172d0f3de424d2672d7a012914d
SHA256a33c33c76c8fcce48293df2d3c5bd330e2f525e08395c3e5fffc8a87b5083fde
SHA51243ee16ae1f3454ebdca33ee9d6296eea0c7968d7fa499ad14c8253ab953d14a709daa86b968022e0f1e5464f14ea016d17394c7dd896aead74f6438e37cde942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f7d0e8a1789b3c8a2570033aa851b5b
SHA15899335d91d7d0604c582c69c805783a0766f02f
SHA2564b52fdb8f104fb780d03e77301c21947d0ecad3f3b1640e206e10aeb2f62ebc3
SHA5127bd98203e435a82d716cc9d8c0995a750fd1610f390eb85a86bf52f145ccc8a112ec5245a2610eb8222fc47d1537626474d2d1c27b9255694d4e39994b539a44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6f737030e5d10235dfe9bb03e0e234d
SHA167507ba0eae40339193c36db3ee87d36e7a50748
SHA25642c2f809c7985afe8f9134fa066107d8ab03d5fcc2b358300127239ef7ce9ec4
SHA512521d66d6765c5b0f6202d748bce545d93bef58884a4f44e6fac74f77fb3f8d96bab0cc756e5c15a79d8784f6a85e49cf0fd96adf3d9b4a87e535de547f31988e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c393b07b207c17fb76c890c2c55ef40c
SHA16b3a195b3c61f0849517801413de0af62f63b1da
SHA256f3ef4abfb08517e9c5c679e9199a00436ca949b50f2abf3c0fc83e6d6d907291
SHA5121cc6c51845fe0777e7676fcc5f284eefd65b122008b0ad30a4aea552b45eaa03b004549a1bd3100cb9519aa67b1e05d9a7b9eaf2811dcbb98fd76855506b8256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb1a6123fd18149f8c47acaf04d6fcfa
SHA18a51ef3c7cd989e3dbdafdc728712f5cec340794
SHA256776317e08d30f7f4d92087e23955e12d143f4f4632cf5051c9c88d58e273abab
SHA51244a498835df86b1a5ab0ba2771f35ab0a191078d37cb83c4c78569c2038af6555a2f6680fe507c65595448633f18979498767e284c1957053f3b5acb06e789b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c097aef9c2c7b4740514c4c84ee099c
SHA1017b6c6c18cafad89331dccd79e8220cfb86e4fc
SHA25687bb7eb38049e8659009c6c2ee0e38a89a55d9ffe3f9cd118d214e499c1c1bf4
SHA51215794c579e2f87d064af40ff1a537fcf2678eaea6cb3e3d82f23f78e1bde5b9764abc068d470972a6986835e48366c0dac3ff9093fd0e52c03c4ac95fc8e4c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8337e2294129a48261f162eb85ba9b8
SHA11e7f366147d0578b12376044f9090ae15b65a946
SHA2560d213489b1acf750bae4427a12bea75a25fbcf94aea478ead08f851f1cf78c4d
SHA512eddac9945b8cb4b199f667b4bea2fc7086853169c1029e87395c5a643383d5b11b7b40e4cae263756c93faad618109b909b43e150d0f0f2515e20d937e0b1ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a95c58cfc4b95e8959afbb27078e480
SHA14e5654c8f0625850dae0b7179f071b33a517860d
SHA256ff197f3f14822108bd136f489a6af1d1571fbaeb7c9ffaf85f4420a666d9ed43
SHA512aa8eadfd7332632c2ccef2a0e2c0912c5a40c0b3d984678a23fadc199263ecc6b227950dd425f6c315572fa114631d5ddb3cd8b8e765d515cf7899248b57c926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac97d1ccf469e2bf97459310732b5a7f
SHA11c5b1be945b3707d3084ae3e76b4c42f04854edf
SHA256524237b00cfdd2a5f2a48d3ab91af07faa9a74c570cea0357e4b9de9d15e8dce
SHA5128a53f2d2d486ce5ac6179eb53159642e973c4716b2203a620062fa28afb7149af456fbd0d32a30340e0a216ed8d4d9e360613b6d38b366569d24f22e3f01321e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5597a63910238e8e51e63d6420c2efb8e
SHA19c6b0838be3de6d89f8f2b73094af17c78f7533d
SHA2566a574589fe98cb3ae66d2faaba208938d991d7ae5b2c6ac41fa1dbc7df43f0e8
SHA512499d70054902725545b18eaacd69cc9318014177dbd46259e9a49a990c7a5725b300b0b506c2f5fce8c4ae2bfe2a01f73eeccb88a0f034ed187b4dca11a7429d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54adc222a390d10dbf5782cf329295ebf
SHA1eea1628de4c70c63652cff9d7f7c6f4a5aa46353
SHA25683f29d238773a8f235b3265031decabc602cf626117b68ef8ece399a3ac4fd20
SHA512d96a982edb7c09ac72482878f468281c942381ba16adcb4ee7c20cdb24d4ebeeb07d6c9b2ef76d9a54b6b091facc6896aeb207d93d6936a73fc3891a02597669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5395497c837c654db4829c5891cf21382
SHA1025d076765f24be92a797eb2b8fc9353f5595580
SHA25687eaf2aa8075b7765870bbd9076f8438b58d2a5311b021ac45d6b63276fa88bb
SHA5127881f2e0d75c91c0a4d4d499b2a5cad979f4a68c0bc88643eccacd28182f7ac4dde311ecb24dd34ba4c6a2e2165cffe2aef6b473aa8dee2d42af5c1d23ce9d1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5423c04ed950921afc6545c2a87745710
SHA1b788b7aa2766117de607418714344e091ebe06d6
SHA2569bfec033ba158173d1a340765a86b3e047c7b58840e6e06f8a9a98cff2db1acf
SHA5127966bc4c7a8b9a6adc645774eeb0d7358a5b92bda952e2340aebd9362af159db8f642c3c6c2f3a89bcb2b205bcfdc6891ca723d5883d891c2da59d3e6ac62abc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b