Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 20:19
Static task
static1
Behavioral task
behavioral1
Sample
24e7fac00d47618cc36d543b0570f784_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
24e7fac00d47618cc36d543b0570f784_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
24e7fac00d47618cc36d543b0570f784_JaffaCakes118.html
-
Size
16KB
-
MD5
24e7fac00d47618cc36d543b0570f784
-
SHA1
ea695f9bc5afd59e60f94e782f70227547c64a29
-
SHA256
09e31224bfa03f64a956fb03821d208c9943d9447cc52b41fc67647950736ee9
-
SHA512
8ea82ba5eefbc87827d640152b253cb69b09e8931d8ca28682be17a0fc9f944e3d0c2f5f8d18a17356a79ef76e7c08f411b722ac78f053e9793d3f407e5b0417
-
SSDEEP
192:P2vEjsPh1NIWuHYjljzzxL1rtiaOifGlo56mOifGx5Jktc:P2vE+QON5L1rt6Lktc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434599870" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000e7921fb7687e552031272da410253b41ebd545d03dd14ac42ca154a76efde364000000000e8000000002000020000000babe001a5c61a08a51d45b7801443ff4ca05be554b255737e235f4fb6841b42020000000f1a9f15aef3fb49cdb14d8efd74b954b30a503e17e46bd86b27ca2965888865140000000eb412f3b68283c2e72916244ba4d4dd2840b2dcee5b9c846b089f23781d9ca2263b27a8cb872d1edc656abc9b6e70040e23bf527370ec2d824e617b5f13a8cc7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{66F01CE1-85DF-11EF-9CB9-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50545e3dec19db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000006ced17bdb0b286c4a986a0338f99f7e287f2f4b006c4faf4b6fab0e77781d474000000000e800000000200002000000082f372aaf44b4a4b069e042042e64d9b8ec19d42af8ec526a6d9ab5e1bac0f36900000006559779e16cc71e4815e9912a456ca89f446db705b27c51ba3184cdcf9801a20db4ac40746faa1aefe9d3d93abb5efd9cf5b28f9f215ec6a0af4e3504b1d11ce3a9effdb86a7c5cffcb0ab204cb741d70fbe5c427c60e051d9c0f132b0d0bd8b48135ccf3b6aa706e46f929f6d59bca855d1c2d083f8fa7941a50cbcf347d08eb0c9ebb195caff0c44a2f662ce07f962400000004a2d4a34127d91e19ccf653602227862ac13ee867e8d9e668e0b3147908d15c537e5177f0c8b622280964d140f10a24e700488416810693cff8533a05b7b775f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 1548 IEXPLORE.EXE 1548 IEXPLORE.EXE 1548 IEXPLORE.EXE 1548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1548 2336 iexplore.exe 30 PID 2336 wrote to memory of 1548 2336 iexplore.exe 30 PID 2336 wrote to memory of 1548 2336 iexplore.exe 30 PID 2336 wrote to memory of 1548 2336 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\24e7fac00d47618cc36d543b0570f784_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5272ecf0b36d861ac93d278c550c92993
SHA10dc4c25a407219daec82621dcf3130ddfc65fd6c
SHA2569cd7dc7f860ed635cebb5162e6c4c096081d8da7bbb7bd3ea453a0c8ce699ef4
SHA512824a6e424d5a307390bb7a36c479f0e20859bba8831fdba4c1136fdfb7ee52a6a45f2fe1b4e74c6985b8910f0b498413a0c4b5ff645d588abc4e834ae525f63c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1c9575d2c2b820f08acaa959f9dfbad
SHA164d1db91a28758e8361834e3e7848bc404be0ecf
SHA256ef6d063329a18864f69431eb3e2edba6574247bcb4f88646a2754e848800bbbe
SHA512557f9fe1a69a32354528521b7d9beb9b36c10fb6ff6f7beeaba6480641d51ff2c86b4a55d5db9888e64b08d1163c343c082ea554092c15d3a803a1a058839bb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa4c3d6572745f2484de2496649f0509
SHA1665aca534b6ca55b91beb4149de23551d20fa721
SHA2568184c2f4bf643a65565fad0d3238e8482807ee895cd902e5a95165faecfd9027
SHA51201e595f69cabc772360578b33b5ecde3a496e313cb6d4334ab7f481f19e84125547ff8c61483479733184bed534b27f062853b648800f2cb4ff172a899bf3949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510f90b01b8be4b9c5c143f1e5c1a532f
SHA13f0b2154313ab4616e79d30e7b0e8d279d4c8efb
SHA256e20612084dfb49f2efcb53d8bf66985f312071d1f9a5eff3b0486a0295b5c663
SHA512bb2fc8a7927f3ec3a31be743f682f3900f2fde3a85008c48276ae78c44c6f258c07c689d75135826c4bd628979f16b831f2c78b6f3c6624e7b63b42c1dd85c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574dd143151c5a020d51bc59c7f301fa7
SHA1488bef69287a7c498f64964c94c44f22efd817dc
SHA256e51f9c03dc0d697b904be22bf66b5763b918a840ce9166031625b585232a7713
SHA512914e47aba01bf525e73acd0a434a75e337d16517050e2001d093f69560d188d7586a8daa9277d85704b6c5702e33bf5ac2632daa60f8073cd9cc6062d69f155d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be94148902a297a8019eae2634c6c22a
SHA1bb51bcb2badbebbebe9db7c17d38a5b7c46ab994
SHA256a61c7fcab04fdc3f9a40cbe1ad940196ef95898fd7f908cc28322a2d89ae5bbf
SHA512ff79888083464ff9c4d3f63a6dc42d37172b929c9e76c84e942fa1d04ebb149fa2c43bdaf528cde0adf4c11aeefaf2aaa1e0b5dee8599d93994e6063e5512979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc0583a2bd44d2e2b245ba09220a7309
SHA1d01005d8b3a4ef040c3d2f483f8c0fa89a0e14d7
SHA2564f9a7108c4c4ba05567f69ce0d0ffd6e2d170d0b1a52a9e5f8f968d2f90558f9
SHA512158804629b7c651fe24e4c7f54d8d748e024927f92aef9ed6988e86e3acdf53719e8435d5a93224247e9675475e54cf7bc9b3110cd95ec7ff35e4b12e8aabf70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55abf858ffb434dca369f96c6cb611b3b
SHA1451dff871c5552adf1cdfcff92b517937d8cd552
SHA256153535130cddc861767332901a27e63b6cf119abe6a5166cbb02b1e636c2e911
SHA51252765c9ce282e02977817e05ab6f91f80ae81f98bfe06442adf6cbfa7695c2151f8bc53b9349c39c6ff25a6bf46f01a91eecd25bccc5bdb3392a9ddf0be12bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb82f2d0b5289123754b3c7eed49eb4e
SHA122783d9ed66789f094abac8146b56a9497ba0e8d
SHA25677914ee5ec514c68005b687d487450743ac56b14173d21f415ca76a29087bbd4
SHA512801bb3b441169e8252e6e957428cf88f70266d0d0138abaee6f84bcca38a88ffdde71db0e06e7f79f918c3a1cf6dc5d58d3fee5e852a3e6a8e278628c2cc6cc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ffd2172de011cd537f9da79fd64d4ac
SHA13273d712200076cf6b42ca5ba0cc29e523010d1e
SHA256cb8a1fa899b12881e3c98ffb025ae7e897e75f0e37cfd6980b9d2185f8239fa5
SHA5125b895c2a4cda25485a0c4fa815acba0bd0a2281f7a0c83b11fdcf0c8956ef92cb7e256e9c9cf27543c4852b465ad4453134fe3b10a92522b6db0347e94f45da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549b510e1ddbd2de178f5a40993109de8
SHA1a22705d8a566dc5154a54dba21e4e0682c19880d
SHA25659421189feb7f88fd94082329a6f655618e16a12e0e9cf6e525c8a49cb5b508f
SHA5122ff0e99e5db99cadba6bfe73cba321714d556ce54ff6ed1760ec9b5a7a08f2d2b1f13aefabb91b75a616cae5c3a622212785584997418ba19144d54673846a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b03c3f4bcf1a141e048482b53fc0ee0
SHA129cb286e64d99ea84d62e3e77e62a94df442f059
SHA256f509fed0b1afc76dadceedfd7106c43d7aa1fe2dec205307f0d1128ce95b4ab8
SHA512bc5a461814a3f17040aca47356740658df02db897a68c8c4788d80d0f52768018144881d8575894c7e023503b6b059a2743fcf563eb575b17c4a5a50f17f0272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550bd352709151672985e4458677e9ea7
SHA1d38128d867331ffb8ed7f7c9cf4353de822c0895
SHA25686ed36f71e6d16e0afd1e01700788f775bd7a7e938188dc37580d093a2382586
SHA51281b144d7b67ffca1cf94090d91d5d7b9811372a41dc9400f52c0cf487ca213dfceea178bd95bb11979d4e44e3e70655e9cf15c177875069926b55593018adc17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57870d08aa9df88c9c3d0c898cc5c08e1
SHA118b9645e655e29e937b5f90c1537f967217c3990
SHA2569d507e41a704712174fdf62f5ec8a94703e0203eb0348bc95446deded26c490d
SHA512d7af0a6449416d669d269560757fb9239ff39e02c14ccb1c54e31106048335d43a10b9ad5454dbc52dea266506bdab432fcddde79106b40bc99f0127b631d3e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9f5cf4ca0d2ef47c798e7e9bb6340ce
SHA12ac3013b051e0bca581ba2121bfddb472e0fdac7
SHA256482e2b07e577714c77fdb73229c9346813b9c1fdf5b4678f63ddc737d3b23499
SHA51262b8b3d4740fa65c8dfaad3a7bfe0833e4eb4d634dc60ef0344c1c3e202240c74af3db272f4bc69737ee1a53db98ea8bb1f3a4d5bab3d1b6b5646de04868759e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5560756ef7facc8de2ebdd308a966e4af
SHA1c02246e1f4a8b5d14143e6ac6af99922ed1203b1
SHA256a9652a6d326a9089db3c198fb7cf010963c47a53bcac37f90173764a81c99486
SHA512678b325eec44f85e11e777fab8445a1b8a88c0a7a48ea0ee9ce59868ff5ff2053216d4b09554e6b86ef8c5b5f6dbdfb276a8ac8a501099bcae1ca3d9e167b2f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5369670dc6299e4692c0ff7f532e96a6e
SHA139548f311e321da92bde4677d6c3872b11248451
SHA256b3e028aaa6fe40fad23a2176e99b2849968803ca7472087f6360cec9ce0e6e36
SHA512ccc74ef39d1f434f88ca3020e6b01ecd6197047b3815e051138a362651f60ad04ddcb8240c187151ad764601a1ee005cb247d75624f8f7b7e41ff33cd598bd9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad3c6498cb4a908d46a5a36636fcfebc
SHA1b9c2c19cbd55856eff51f80f17ea832ee8f17326
SHA25644ac5e48a63eea33ae235bfb7c9488afb475d0612996aebd3d3b8712cc49d930
SHA512ba3e44757414b041153815cd1d58ec3a5799344c965c7c7e9863545d92f2bf8ad7a218d8e91f169a009199f2b7bb11dfad997336ea7ef1457a7a02bf85efb30c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b