Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
68s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 16:28
Static task
static1
Behavioral task
behavioral1
Sample
30d721f4e6190d14da7ddd739d9c3bb1_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
30d721f4e6190d14da7ddd739d9c3bb1_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
30d721f4e6190d14da7ddd739d9c3bb1_JaffaCakes118.html
-
Size
9KB
-
MD5
30d721f4e6190d14da7ddd739d9c3bb1
-
SHA1
0645df3ea94b0b763ac96333f34d8ede473da8cf
-
SHA256
fdbddd511b05e6c7fb92261672263d1d90939998be019edb720f4034e773b936
-
SHA512
ce4887b4559cea139fa42ec6c89d55e96719f70e89fffa16c141af31186ec85f247d8b65e97feda71f01fb61c004da7eda1e693991eed5d01fccc25e81941854
-
SSDEEP
96:mbGFmiBYJsMSU0MQPwQCQGQhhZAO22GDAq9jex7SnylnnZlC6T1/MUZdAxJHggfd:QQdpjR22hq9jQ7SSnDC6TOuMmM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000befc76f271d1db9ff7dc738b7b8fe8ee33a969e0b2c55b1777df8dd8366aea00000000000e8000000002000020000000eb85afd311e8509895461c42604b02d7de9abb136b1fb81bd424a2ad74b4290b200000006c58691e61aaaf1569545d7c342a0d4888273000ac346f834046ec40318a18bf40000000162efd644b506ab63235607e55f9d35be06a1b5b3aa15c69e1153421a23bce0ee9ca8b63eaca790e69b3f616fd381dbe8ef9785e120c3a262fa56232bbbe5f44 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000f7b64c0383f9e99a8eaa943727a2600497e81b27a73631d49a556ca9175ffec3000000000e8000000002000020000000d0d82eb7d5847e13c4d37b3903de70deb1db42091df8efa80692c2ccf89802f6900000001b4d1894b964ec7071a3131a3025f836211b8307f6dd33042b90a34a7079792817afd8290d8973a487b934615e1c79968cdc2c0c688708c4426db114be81c6215678294657f448e27415928b324621288ba74c5ac303ed25e418518898913f1ec106b28ded9ab2b79e25dfd3878961b56871552f39b1c228b4254cbc6d0e98be03dc07541c12b21eb3474bea42cc3e4d40000000dfe484a0aed1029dc26427f3707691ca8ff939e4092eaa711641ab862906822a34b4d074a9aa444e485b103bfb534180e755cf60b8e168ce4a316f9f40bc8e2b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B05A7F61-8724-11EF-93C8-7227CCB080AF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0bc6988311bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434739581" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2892 1680 iexplore.exe 30 PID 1680 wrote to memory of 2892 1680 iexplore.exe 30 PID 1680 wrote to memory of 2892 1680 iexplore.exe 30 PID 1680 wrote to memory of 2892 1680 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\30d721f4e6190d14da7ddd739d9c3bb1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f07d6315c8687065a691c106a4fb97d
SHA1b727280563ba5693caac121117c5d6fb12db6b95
SHA2561cb50163c8e23321675bb81855a2c0ab110befc308873fb51e1da50b9f89dce6
SHA512bc0c38bb792b8855d9ea86c95118f8c0402216ab853c663bbda6e149e7ba99194046be090b8687b578751c14427cf8a7759600a3214734532d69b8d2384d6e72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cef3b741e3416cb0fcff9d0ce18be6a0
SHA13a7f688e64236e180cc2638a8064e2ae4b9360a6
SHA256ed659b6b972bc554d93ea5c588f34f5e242a3820cb1eea0be583ece292be2b5c
SHA51248b59d6a64d9da275a04df0d0849120fc88fd80a65fe820837ddc46eba143e7dc42872485e57b62eb27d6d8c2fcdba12571ee40b9c9e79ef9ddea646e73cae9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519b24b0b6a5b616b068dc5329fa00f43
SHA1936170bf990c6620b92a22143ab64029367f1078
SHA256684b037f4235af49963fcd745ceb8db1a90f91e1d52d7c70619a2743b17536c3
SHA512f7277591f8d3f44337b5d81259c68d796c178ca4159704c11a1f33d21a5977cf25e2c26d3c12ff9d84fcd2cbb113341f1f2402f160c2e83e8d4473927cd7776f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b51eaf9db9237abd14721b91f521611f
SHA1bf029e0521c11c75347ef0c8da593d6a5be9daa2
SHA25693a6b3765b0fdb9b29e80957161c1f8fca13dcd74b1982a635918f02040399bf
SHA5120584c6fb42508e609d2d77d6ca5aac8b59842d6dd17bc943a9237661a78496c0134ed8ebe5654848b1c58527c36d1ef96f7b67a046c622e753cb25a2d36882cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e6962341016406583ac51ddf558b92e
SHA122174ab9fb28e0e24612ec9311e34f35c23d6ea9
SHA2568904e3e29db5df70b241a0973086161c4e227a250d9cd481a0a1eebe95aebeaf
SHA512295394723b771dc3bdcad42c7c25aaa0adf530f61579d9ac1e436c94337d2b5528404ce9d1d70552a54386afe49d42b4323fe614b9174639241e7d0a44b9a9c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5421710e5b56ac2a7be4062f7fbcca0c3
SHA155f0063a03d3148a348423876516b4e895512d49
SHA25626fba265e0cb5393581a50ccba4c6a03af843c2ab3c43a4bf90223c8ea2802c7
SHA51291617c76e9716a512978a0dde7bd34095c3c917b013179b88cf971c7becb7195e394a68f9a86a1d7342180b5aca4046c0361e3a0529cf9c177eed8300945945c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524786c0c298ac8b74b93c3c90eb96133
SHA1af97a4a83982852e0d72fc462c25cc2266f8cca1
SHA256cb80206226b559cc28bd49f07815fc6d0f7edc82333c64e3ed7a081806e39820
SHA512c82ce89fd9d4f8bd077366233f0d95040876e093ecdeed0c4874becf8d278214e26d4e6e90d074f9b1e0fa769fb068f1ae70657f9da68c233ab9b94e8662bafb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9c54e60d3fda3813e237e4c72509e6e
SHA1b05295e10ee4f572344c2441a4cd74dbac47e84f
SHA256b687f7a47b7b632d117322bb844275e3c3849782d58891ffe0d96fde0b7bdc24
SHA512ab939c553d79801b45bf40c264b799b4af1ce2f842dc139323b71f769fe565596c5e0f011915626bfdd059d0862cf8019d41fd40126e04cdf4c8d09ec8d5dae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59276cd08eed10669d99feec382a0a519
SHA1e950acd3d17599a51eff2e60e1490add325b2e5f
SHA256af591dfed8996d35402564c2bc45ffb275813dbc8470172b5a95c9730587496f
SHA51230dbe4f46cf86f4987379a7a9501c8b89abba40d8f149423c781808cf1b174c0feafd644857f634f8113c2f91f79001d9967312bb62bc2b67b188f81cc05a368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58344d613c86cbfb825c37e96aa13b541
SHA1cfc381c1a5a0c99265ca8b2419e38a26951bbd28
SHA2561dbee95869da79acf1cd79cf9eac5f9f65701742ae14aad8d4e8315c35486a67
SHA512a9abf3e917138d3adb495f5303c82bbc6819c47fd649a2469950d90a05bfd1abc1471696d4a7cd8fcd6038619cf6430f696f36672646a9762b951e3e0724c9e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559f706fe21030ca14d0a7b2aef02b328
SHA1db1026be1f71123b1b0af161840eaea348a6c1d3
SHA25651f40ccaccc22f803a971fbb8d86e9446f8b4d2145e388383a122f6305c93e5d
SHA512639404c884eb094a5a5c10b1a1a04a21925ea1836bbbd59bd1f1ae22d5a3014fbbdfb6645ada7c764153a130e90bac7748632d13b99319e4c373bb909ef9cb17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f8c729bbaf26132ff834ce88759dfb2
SHA1b5a175f6b94ef3de53ec84abb3ea0d8ca4694b7f
SHA2566d3e6012c976aadc58d942722fe6428329c116e2b0d48b879070d8ed9472f577
SHA512257db07cd94f312da4886427b1b916908d0ad73d0c189050863340f8b197cc26f3f7bd79113deaa9371506d95752d138b1f7e27ed87d469be2fdd15df513825f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562da37e03b5a5c00399b612c38b0892b
SHA1070a7049a60d886adf1a246c6b868851420981d0
SHA2560d7e39ba64489a9bc2732bbae46dd6f65e4136384701d483dafc161cc56f9266
SHA512f6718c307945ab6b4017fafabf8d699a702d50f7eba19954f57661a82a11db0b862cb2d8e092c44285fa4a04884fe3b6a1cbf188cbfbd8524b7485322aa98870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adae3064714bc0cb27b0d321b3eb2ecb
SHA16df0237b5042821871e2d6c6956a3537c9c539e0
SHA256db23cfe62e8057213a93ebca57ce24dc2b30150cdb8a6469ce30fdbc6da36e75
SHA5123850b50d0298aca4086f0e96cdd8ac633841ab4150b6d6df5f82800fab2a4be1848d203bc36f400e4e7df2c366d3d4b3a8f87b3cd916eae5780de60407f284d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57518e3208eead6131e2b18a508117ebd
SHA1ce8b93957539ca899bd0831c16e6ec5d332eaa71
SHA25632d08db931c46e7d2fb33c28b929a96d71575d595babad903d806a2417ef3d0b
SHA512b94087c00f6e44fa486643de97a48cda2ac044cc9e6c129f610678bf7aa66d73685a08251024afd5dbaf49455f95d0825c94cb1ac5f46c6261a64df2f577e8ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ac666e09f5f643c5bcfe55f01bdf51e
SHA1438d3f0e0167b751666936a2871ee3ea2dd16fbf
SHA2567ffed3fa036f11881050ce9339097925670334387b3e629ab274f4b99a68c5cb
SHA512c3698df2c5ea62c150e5d51675cf37faffa15e66e87be6f01721d349acd52f4072205c5f934e3ff6b0ad04e486df47c1d469cfced7495e67616c1e26fb786036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c842422f5342811a79da6afd3b986ba2
SHA1089472fe10ee3982d37fa83e8ba4665ce1c0ebf1
SHA256c2f589b1958a31d32f00730d03fa79f2cd9fb2bfd39a942c5c99b7b369ab3fb5
SHA51217b46ef79baa75243b17d0be970739ff4a4411de961bd3d7e2068de123008b7f3c71b7ed34d5262a36acb9a9e5ef11ab123bab97ead92eb6111b356669a46cc8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b