Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 21:34
Static task
static1
Behavioral task
behavioral1
Sample
3c22d8d6ea2bed274033b62271a12c53_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3c22d8d6ea2bed274033b62271a12c53_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3c22d8d6ea2bed274033b62271a12c53_JaffaCakes118.html
-
Size
1KB
-
MD5
3c22d8d6ea2bed274033b62271a12c53
-
SHA1
f46314413d3b645d6f486320b329a9cf9c3e21c7
-
SHA256
00e48611b3364936546fa5945f765a6d405ea3ea79bb2b858c52fc905fd59817
-
SHA512
b9786f2f22a1ad23d67f6e87b85591a6014e279fb3847a0fb97a468a92490167a69c3c0310cf1c026419b496a6ac9875abfdf61b4a68f375e3f7b9a67d165964
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B393B661-88E1-11EF-8659-F6D98E36DBEF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000c59ef0edd1b42e3bdb8454afa56e6d6f71018a1873275477ab52d763b2afb897000000000e80000000020000200000004579e18930859ec20cdc178c138fdf019341f44d16d30d07fc613ee193985f9c20000000e6b6d46aa1cde3b7660c00015d2f9afa9ee2c9f2141931af53775ad85348bfad4000000072e63e6b0f84bd947b31e07fa0de814ad6855d7acaa75e1d39a50c6906a80c8d3034989a3340b8e4f8df3f2890b5c86b4cd217ccfe6d2deda44fd1f85beee5ef iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b09d2b8aee1cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434930711" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2428 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2428 iexplore.exe 2428 iexplore.exe 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2428 wrote to memory of 1028 2428 iexplore.exe 31 PID 2428 wrote to memory of 1028 2428 iexplore.exe 31 PID 2428 wrote to memory of 1028 2428 iexplore.exe 31 PID 2428 wrote to memory of 1028 2428 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3c22d8d6ea2bed274033b62271a12c53_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eff54f4727e266b7c2a6567ca4f47d9
SHA13e15f104785b912b6fb038c98858e4cbb74932dc
SHA2563ca07edf2cc0efd0460b179b7865ff562c823e28587390af3cb8e0c846e5c708
SHA512dad8b0f8d1e69f03672e9d823630e63370714eb65c0f452e4f1e82692653ee746aa16034d4e923fcb868f8bdeca38533c907eaf7c0ce542d82d0dcd731ba35b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5664b97d066ab9a93212a54f4b97aef20
SHA1534395e2ccdd32be7b6e04e97c16eb40f03d4f40
SHA256c2d0623a61bf4089c2237f0d33a9d4951b4f3a1534025196ced641fd16897fc3
SHA512b4bb117e1efa73cc37e0afe4ec33b2279c8782a955eee67c0043c2a0e80c7ba166b8eedb45de0441e70a76f06d0f326ebe99ede24d8098e8f8e5d05b56eb8cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5112f76500b0f21cc213c6feb1b060eda
SHA114bdfdc16b84e442c645e5a89546becd8908eb13
SHA256c3b6aa9b868861ece05ac4714feec497a91d7d8dd3f1417808e1903f12f5be9a
SHA51277817574f05f3f9df4afdc7146d5732e9299e7460725b4ac45903ac287b73da467005134c7fbed1318550115464c5ff7453aaba3b598fb5bd9802b2445c9a96a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a01e42b72dc2d60e88e8ead06f1de05
SHA1797ec1aa5d078b55346554ea430d667766a3edb8
SHA25621ea45afeae093b85b1a1bb56af42017e3862528fe22d9dec1df0687b267d7e9
SHA5123835e36d4b7c0ddb37858ab804a463d5e9f7150315e57a95302a0f9e52a5a361112b862ac9c67219c372eae127f9bc3783366790ec6535db17e263490668c6e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56360e52a322beed8ee7efac918b633cd
SHA185c69a826ec45398a38bf645cc8a5c8c26b8070b
SHA2563d7fff2a6887fcc2a5848c20626aa1b2304691678410656c991711f1fa793b0d
SHA5128ce6758315f2331c5d613c1032c9eeac114eac83c441198a142c4d05fc4369478c6fafbb664b4b755af5d87cf01da7ef1f0b2ea967680d4d97b80981e9f8d4c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c4acd8a445fc858ed49f424186d7853
SHA16682f9e3dbd35a7d4b3ffdf62d2c7e9e9d7bee8d
SHA25630ba3ad2dd031bdaed91697761fe4b0d57a622317db2f69146140d705e65871a
SHA51277b2a59af1b1130aa3e86af2635153561da46496a5e4026334fa76b99eb38c800ba8f57c2314cefbf3ade3470b5017f654dc186dd15bb5d8ef4a4d4ecbb9d425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5417c71bd10c83b38ca7672ef35d3287e
SHA17dff815a04e9f190cebd484b0b470bf103496c0b
SHA256da7c44f8ce61b21a0154f9fb46275bc7f2e52246660be9847239f166e5ce811b
SHA512dc35b262f0ce783ee7f188d5612bca3d2fdcec254f16c5c3439a8702f4ab7edda2eeca7b07804db7bfca0d77d183ed0f530b03bf6dd3a01985f91a055fad766b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dca9f2625284a4633c799d175c3274e
SHA1afee4494dcca3d85994e88bef648d82fb671f7c7
SHA25613fbbe62e786caf9ae906783b62d730791bd8f111ba090667150c3d3ef1d0d24
SHA512a42879dac02a3fede0d741b09d0a28bd925427c8116ebbf1a3878d76f72aa17f448bbca1248083191cb4c48e5ac075bc667064f09d89316017f7e5a18741a212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521628b75f97173aab46c4dedf5bc488f
SHA135b26f33516021cb07b54d295c027311524f4909
SHA256963514f3c505955a26ae9428110f4faf335b30b73e1673f47496d409ebe0dc3a
SHA51266beda2f9a9870783d1392759232f0507b28ccc58498a5cfb42b2eef633465a2fbdc85bd6a3c24e7d6aa5e690053e63266e36081d1b2daf088b453f33401b15f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fc41363ae456de03af9eb604148d2c0
SHA1d89ba8ea7481fe652a7c40498d0cf334f535606f
SHA25634c51a6d2c3b672f7a22cd502121f54df7780917b139092c829ba0e6c070bbea
SHA512f03276867edec01ae85a6f401dda1f670b163c4ba6a5d8a0f81f3fc348cddee58f8d0efb2560faffe385340fe3ccd1f1f5556fe699ef40417c9d495489524176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d014b5b91b129e9e5f717c85a84bc6d
SHA105e64b054a9a42c691b8f30869d6db7bec4d13c8
SHA25651cc32663cf226b75ad5c4db3bf7e21179c05d1dcf8f992e6936dece91f26f28
SHA512415af474751bc64118742f09cfc29f0fcf9ca89fb4cf5007f7b334eee8dde7d27ff96b1aaea23f567d2979682b3d4a8b77690eeef01aa5a1b96f8964d4cd8dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b37c803a837cb06deab77c11ff4ec196
SHA16b641478a44d241ebf301b91f5c9d8473bb8221c
SHA2569ceb6c6888ab78bc7dd77d79d9db461a2e8634d9eec3ecd38e28dccb196075a5
SHA5127598746b479fbcd7280c058527b8cc050b208d1a989538b76b177a1451ccc622ab9292b275955cd642c8a0ed174b91707144b266b4460e22d0d0cd70f2c989a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3d48b866a1761be08eef2994cb2ffc3
SHA1335ab0b44ef26a6217600f0cedf659a8abbe7792
SHA2568a94a0327571c49e7d4fcc4c5cedb1f48f4b00af03f24c2d2a5c4549336cbb24
SHA51200da356b0d11e6a41be9376226bedf887b27ad5616e506ef2b59e2ae248d2521cae6f534d90bd0d9bd86184b5ba68ec7aef6ce335c7169506cf40f64c2db6a51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e1aa54ec28b48dda28c26fc4419a860
SHA19b29e9304ef0ead5e09f43192523fcd76baf9871
SHA256d70cd6833ebb92ffd9845d9e456843d926f364ad15e947836b37d553f22e2c1b
SHA512883f49d740eb80e0ce515275759cc1b4e976408bd3f568a7c90b42e5f7b2494bbbb78fd8c39c9a85b56c7fc4795f0d8c7aeb973bc6e32e2d12b4213b9f979fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5532cde1124bd0af080c7bf2024ba488b
SHA12588d8cae30ff03d298da528d766dd22c8eb06b6
SHA25682be68b419beaa3459e8b61249bcb87cf6974bf0ca36e7e6b330bcc43b537b90
SHA5123a4f8b1973657547ecefbd35b8067f2dd26fbfc48ab87b965ec4ac8763962cbbdabb9d6616e2d63cf873e5810b028ef433a75c67f5adb7319a4de23bcf3e0cfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a10af184eacd9a52dbf51dd327fae060
SHA1fa54bf09dce8f8d30d3ec8ec88e3c147990453e6
SHA25619dea6c4f8a6359abe1693a0ab0d48b3ec3ad60c2719486d0c55e486374036a5
SHA5124a75ab90ced4669f3a6bc49eaa41ad1bcd1e2afb70a4f816f188ed5858e177b2d6aa246e86a2f3414f7f41ed3564817873d272b5bb61597012fd329373a1a3df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a89fca02ac161e09e9619009a416a7f3
SHA1ed410d32140ff61fa76dd3d21d3ca920f7157ea7
SHA2569bece6394b36a11f1134f3586a755841a98a69849c429cb18394732ec9aae1c6
SHA512d04d036b03bf78ebf75e91c61dc1a5f03a8acca7813efcca0e28938e4b81299b67f24ecf5c333c90cc802a15fab831636a4fe9bc43202b6afc530164ad3129fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552df9666290d080955f3f92edc9ad515
SHA164a5259836ba567100ff8159357793e1583ea1f6
SHA25676e63447eeb5c6e6d7508141bf5d45faafdc23d14a55508ba5a2eedb292e4101
SHA51225b214a0d5a7580113a731c1bbd60e5f50b3d5bb7b99bfc997f6b46d358b12cf318cef85510ae1e42b6aca28f3d76f62b1ad7f369efb01da945d016a038b72fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5114fa5d1569a384101f08b08616e4bfd
SHA106306c2d8f6cacc3aae7d8e32c0ded473d89bc71
SHA256ab9b8fb5fbe19cae2c30bba98c5d17e0b8fc22a4be6915b16dc33481a9fe8528
SHA5129b28c6f919260d3de24df22a615a47199ae8bbae206649a0a40cf6231f9546f278ea7cfeaaa2304f06eed827859c90d8adddbb00f47f2c5379d9739fe370c6b8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b