Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/10/2024, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
36e49e91ad55ab1af6d4a8d6437786c3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36e49e91ad55ab1af6d4a8d6437786c3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
36e49e91ad55ab1af6d4a8d6437786c3_JaffaCakes118.html
-
Size
19KB
-
MD5
36e49e91ad55ab1af6d4a8d6437786c3
-
SHA1
71b6a42b35482201d64a2ecf92320ba9e37e3c3e
-
SHA256
9c30b8f8ceaaf446ac6a44090ae95014f61f66ef870265d167c4083af47462eb
-
SHA512
8a7ccab3fd18e1125627f4b8b48345da50444cd6ac28e27022f3f6ce4a800813362041a273f93917785dab4318f6547e4c886322c01cdb992716a9ea5fd525ef
-
SSDEEP
384:4+QfPFd9QZBC7mOdMA6tKfpC5IgSnbmFe7Acez6FeLAPd:Zcd9QZBC7mOdMAvpC5I9nC4dPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10dd275f241cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8839DEB1-8817-11EF-8320-E61828AB23DD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000096e6de5a18919d44cecf21753dae6997a4441e57e98e65d41439a2fb353a9890000000000e800000000200002000000091a8f54d8f04b930f42564362d66210b80c0f77792da347e457a2312980ec68220000000f3fdcd911ace95c72bc6e122e82c6015c08dce23146d36cb9d11004244c1472040000000e8d8ac9718f46384ffbc6042399eb974c976633f63be2c59d364fd267ea9b42d81aa6c3d6442be9049d8b77bba18d326ebdd2de6b4a8585cf10a277bf75b803d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434843879" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1832 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1832 iexplore.exe 1832 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2560 1832 iexplore.exe 30 PID 1832 wrote to memory of 2560 1832 iexplore.exe 30 PID 1832 wrote to memory of 2560 1832 iexplore.exe 30 PID 1832 wrote to memory of 2560 1832 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36e49e91ad55ab1af6d4a8d6437786c3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1832 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51141e3fb51648124a38e1b594d9c6fb3
SHA195d3dabc63a8bb65abe790636f361d412250b914
SHA2566f0847d1796aa190ef24fcc050333611e5dd964e3faaf857b2e37e94c8be2aaf
SHA512c1b0105d77b834105989d732daa66caef21a37f15bb10e3147592fe82b3a2d26bc35edd2f897131d20a4a992516063891d95bbbaa9b1bafbbff1b6ff25f09c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5026252905620cd5d3998797d310ad239
SHA1fa4c618de90991aff86acc388d5de1431cbb9a5e
SHA256d41e9b695f1b2e085c127865f0b01632a05787f6858c148329fa792f58e33eed
SHA5123f2eb8b06967c34e7d945ec2f6c47bc868ed8f3dca182f6046def21864b5c49478e5b1b7cff9353d5a4b419d9ede03424556f71ce7175d1e2cdd76b2f52560f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e545df7d642d8a6bdae5676e31e6c866
SHA10b680d17dde04d2133e36c912157fc2f89e43aed
SHA2563ca365764d0f152e3ed953a92dc2cf8009e0ec6296819350f39b1036ed3a1eab
SHA512615ff2f0626a0196972c507fc77de349d319862f797b716fd6547de02f1825f3b3130db42f1a5fcad5f4de79ac0ccf18fb8bbd412266a9a24bf81d7188e8633d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e75de13d134a0a0bbf50fe9515fd03af
SHA192a57b2e805470ea798f9c53aea154a6ebd87ceb
SHA2565806c9c6f8c0104595f5f901417249251e90c9421f8c1c28944f1e7f0165a9ba
SHA512f3f256a61cc3bc7803724ef86553b1c7bad0590355b303f76925542bfc102cf457b4e6dbf93916d085241546893902557b287021aaa37913b6fcfb0ac016da90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa4f079332390405ebdebcd93f0a6978
SHA1183f4118265e8d1df75d585762047a80c5b983f6
SHA2568884fcaec07b3c3ce00ea576e3540e8cbe0fdca4b1f38617851e69370b93b158
SHA512d3d8e5b9dd6a75c3041ee831790e35c858c5059b7bb91f8cb3399be75860e7cf2c6ccd3b65d062294de0d1828eb7198fa3f27648b831b8084b6a5f7d1c3c3cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8b97459ca20e71e8a99a21a71688808
SHA18db62538d71318ac91901a1aae6faeaae2a5973e
SHA2563aef01ec38ace8679a6b7f2d5ee02b342c34c745eed9a3af9f93ba7b075ccfb8
SHA512f6d3d8c496989a0dd3298d56348c036fee34ba61d59a41982b5020af4b1baeb1c15b587bc4b4195ab29bdaa60d913f9e02c3805509a9e40e600e00baba37aead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceb05339b4e0e05592a651f8fb9af063
SHA199238468a866131621db2b9ebb18deff6a5bd995
SHA256875d35b2ae6528ce97edf752b8dac27dc4c103a816056dce9d72f18c7d32f213
SHA51235a0ecf69ec9abefe168a2e1d85caf1a40731405382f887d95ca83fc57ae04e5c3bce41974c42efc565c9d50bd190d03b73eb22be8242c26428867198e46b782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4952a4f74a3bde74596ac6a762e1994
SHA11bc26184a6de675e79c1cbafb1edb57136dd2d3e
SHA256f27c958a1663bf948c033aaa2afc1d2b4d76c5c49b9f73c5b77b53c694594cc1
SHA512853055615623cebf96b451143b63447bf20b8e486be03612c2aaead079a4bf093108f8c17b1126c941d49058751165328289e6d8a777d4d08296b27b6be322f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a496304414afb72e3348cb6c5fc987d
SHA17938508785d2b4a3a2b015fc00d5962aab38efeb
SHA2563bdd77c94da623450eee42cd190119ff4408199bdcf7b9dfb2bf403fe7f565b0
SHA512d6af42cb5e52cc84bd68db7b38e7907956a332548cf7d0c34b5b7bf10059ffa45a8a783fbea901780433f50afe6e2f14ae14583e4bcb1f8752ac7d3e3f5d62de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5590574905d8f65eaac6a6dd9dac4e4b8
SHA1c04a019170ff104f285a1e3907ac95f5ce119f1f
SHA25638cc9ac6f00eff043e3d37ad2805368ad1f28b8350169fef2a5096ae0b52e991
SHA51262a1e9fe489e68c87352b1b8d6cead5a87801f67c4cb691eb49f03013691bf19e2b995005fdb2c91448508e325cae514d1742f347a74ed1094d222ae343c6885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e587f19b51d2a844d3136332711af4c
SHA1fbd97a31237a69d019bcfa40df8e9314b3b241b6
SHA2563e5b58969b32267845391866ebacf5d26fb0b6c5b588e47cd82fad9cb6e94b38
SHA512b03557ffb9f35a24f7911e834889bc647325e1cd43a96d653aae4f0c3e1e378390657125ec4815567b587a77e36b949cb583db76fcaabbba5f80e0d8633d7d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aa18bbc2d4869e54d57eb21e054839f
SHA11c51e01d0ba46da71f7944cb1d4539d8183d7592
SHA2567416b01c3935e0ad95984166e80c9a1d77ddb7e0576b0abbf2508c5749c4b4ba
SHA512e25f4f312e503d7ed18f82d24495384923a1c4dcdd89bed996e34ee7de5d927fbb7bb41347c3d7376ee7d87d984a2c5bb2510230aef7ca3da092910cd6c550e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5927b77c356e9edacdb2d8a88d68e8eb8
SHA13e46cc9abb336036b87f76a737f47ac18ce1bb1d
SHA256471bed60f5aff5984dd5c42ea9483cb8547d7c4feff0f50dc7bc3b4dc95716b7
SHA5122dbd3f256be8f90ed2ddc40960487c7b24d6eba0d4dc51aa76ed9376e2916e4dfe61a2a0859a3dab2829454772310c29e3fdbaf91c4a2c9b48a78b252f6bad23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5561a920d8f3947248f8a21e1dcefea62
SHA129bd4e420cc832531542ca2c16f2914ec546af5a
SHA256e7e07f8bf9f89198bf36264ceedb693bac97d4de113c98eb6edbb1efa853cfe0
SHA51208a4a1184592ac91c0d9dd4cd04fdbe8da9cee86e24fbc781ab421318f82d801cc1f3d21e00afbe91001a8b17ba44b7d945e495ea9c999db746f484208970402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3345ee3c001dfc38627154c05a6b9c5
SHA1ef3ba732374da3a934e977745e2a8866d0c7add8
SHA2560aee82a0bd48fe1478d401ff8af81e940616dddbdc98e80d80128cb317ffe586
SHA512a273ca03bc2c7db9b9b60ed2a1fd8f57ecb3ecc9dd72d719d4596561effda1d5e730f65508533d07d733d11f46682bf32e3cf4f8b6347cf24b6c2e1512269884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5566d6d6e1df1dd91e7aaf7ba9c2e66d0
SHA13115860d58425f26daefc672d3340500e1d880b6
SHA256d678966b324f4a187bbb90f4880136388db617a1abf6492f1c5f8894b295d379
SHA51207b6cba8eda73c6bc688ed13bb003bde01e04278a6a174e11b67546a7f8c705ce35a5bedd4d0a46873447f92b2a16217ced32ab48e46480edc523eb1b1f6637d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df3caee48cb8ff9085451d7b60d41db5
SHA11b32393d492f4989afbd9ce93573aa2924b0dccf
SHA256407c6d17b28869faf5e9045dd92ab735d8ded6768bd97dbe73c8ebd77784c4a1
SHA51246317e16b08a0417dfbb69b5f4e7d115bb4019bcec124061495046932abbf87bb4e122243d0967b54feb7ca9f66e1ebe675d2d7e971cc94ef56a12e3c41659b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a296c82c16644c51688553b6a372e461
SHA198d900583b6946f10ccd2cb9e964602ae21145c3
SHA256814c0cb960604d380b6fae1005e5e38a6e7c8d7404ae1c3b30b10f1d25b7f185
SHA5126ea6aa2967812a7e232760e6b2219be44efcbb1fd1070f23eee69eed42d78a9f19419e2c85fb2b94353be2d4eaade45a1ea460692ba691d556be98de191e1bf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efe08a8e726a4fafe77ff2781bd319ed
SHA19025818293c1614ae99b3754386d9aa1f0e33168
SHA256e49da79c6188ff1931ba5781856e88f75933dc4d5d60c04cb698d02219a3bb1f
SHA5128c47f6cd880467affae20ef9f81a6cbe91c71bb9c4a62584d2433440eda071bb976956be34b6cadad46e4cdceda697ba74a6867c712b7095219e6d9089e08b96
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b