Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 02:05
Static task
static1
Behavioral task
behavioral1
Sample
37edeecc251313b426780d0d208dc23c_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
37edeecc251313b426780d0d208dc23c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
37edeecc251313b426780d0d208dc23c_JaffaCakes118.html
-
Size
18KB
-
MD5
37edeecc251313b426780d0d208dc23c
-
SHA1
c91dbdef6bdd24e74f32f8a4ba6c77e4ad64085c
-
SHA256
5c61c46913484001f80e088e1be7a94c1164b21e1de4cee6e9fa1f8a32b99ab4
-
SHA512
643ec82465d74d5e4d1e9a3a75451f33d8f8b46563abfb67bf0eb8bd838733ed58db9f0bbeff4e621a30a3c679721b179b144017aa3aae2affc14ec038697ae8
-
SSDEEP
384:FR8MlXqIJ4t3zKx0IUuFaJye5IviZJqQFji9YwYYYWq/iEuqx88:F1XXUrJhiva0q/iEuqx88
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{68E0FD61-883E-11EF-AF7A-C23FE47451C3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000161617bf64e2786a3566264dfa9ce286f1c771aeec80d6e256774756ab6862aa000000000e800000000200002000000065d79b03839d8970fced232ebf36a6f7a8830024355f01b19f94de409a52b0bb20000000adbaccfb371208f3c3331e8eeb87489de3f77217633ed02e0517cc909984a801400000003abbdde859c4c702e1c8423a36ac2effd091fa84f548c141501543204e6ca5b22cb68483afce274c0659a7addac108711d2f0fb6237ba7e60dcdabaceb0d21d8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434860579" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1088f93d4b1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2976 2280 iexplore.exe 29 PID 2280 wrote to memory of 2976 2280 iexplore.exe 29 PID 2280 wrote to memory of 2976 2280 iexplore.exe 29 PID 2280 wrote to memory of 2976 2280 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37edeecc251313b426780d0d208dc23c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f17375b9eae1ecaa4f1f29e132149c88
SHA1a5e9b1a854fa33439859daffebc48396e91d783a
SHA25648a3453c6bc5225addd87caf69f449428a9f67a278af89c7ab3d6c2ef44aea90
SHA512af321ebe3ac67bc88a3adbfa6a5fee5b677cf3ce84fc0c5c5c1f69e1e165457f6440d7fdbeccd44bee5e7f33fbdb2f9be2207d5f74f67dbf2ef4081f87206054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efc7d6b7ec158f106c2ee47db94ad839
SHA187899dc35b9be28731012a3e053d320f635ffc34
SHA2568bd18d0fceade3a41b17c7fdd4a8cd2f616836eef5ff8eb6fbf7eca6cae4398c
SHA5125b61459287a0b3adce410271d9411fc1ffde468598d171e9694ea868036d1701b5c17cd353f7c2189e28881ea371e0e39198d4340db94ab9acd92d3095eac002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b667ece37e0aa8fb0564d91b0240ddb
SHA18ebee83dc07681e3e9573b806dc32eae09e9768a
SHA256e42756be525a464799b7d077d4d8ab81c723294898a68c1869514a9b269dfa7b
SHA5123915ab8261b9df4af9a5f2512fec93165d2d3c6bbbe571e101f60c19a06387bde8a0d7cecc04840d10eb833f30ceb183c26507550f38b0fc4cf270a690dd1713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb5e937d2fe38b7da25b4fcb266af970
SHA19d99c87039abd80ae89307235adcef012b8a4f62
SHA2560d405b4a25774b3a0d03b0aa084beb27e3681cef2f75d079c954aa27380cdac3
SHA51225d252bc790210880ca53307658a1efb69eb06fdb090937122ecf3a82457df2e8966869393893ec31dd185dc1bfbbed47cd4099f67e3edd756261df0f548d45c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa9d1fe881012b7d9dc0eae9bda14c75
SHA139d3c1c5b93419ea637eff8037fe79a8080fbdc8
SHA256548ce455cc83854af14c2d25ecf00f184232556ba5ae9e3fc2e77300c5aa90a7
SHA512a3aff8372d12aaea97d0cdca966b87d50f2de9338e89ef658f3867cca9da7e675c52b3a9663ff2bf047e417eaaa1ebbd12ed33165a8e36035a4a5076799a7eef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514fcc7608a2d4f786449199e163fb3cf
SHA15c546f62706dafde0839bd390800f04fe40cc6a5
SHA256e7459ba3f79516e06b86789c2f5cae4cb061c11bbfb426f941893d7078eef079
SHA512c7f8e812fc79bbf6367c8151d2701be02ec636999251ff9a9b27a30806c8f1eb205d2d40afb47747db1ab96c81cf6821117736cce4b5e25b905da271a11c5d1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf905873bb8ff9d86971220eb9d1cc08
SHA1aa375743a1b88ff39c90e5703d858b4da1b218db
SHA256685864f52bf5499f78c3c0e2a4ed6291a6d4b86f84a5871b7fdf56dc5a8dc16a
SHA5128a6b2cf7f3c238a1762131c790d66ad2f8d15d7632c9da3e1ee266283873cca3fd59493d71b0d06ae47702c272fa2969d96df3d32777e995bc1ca49b1acc9ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5592c3da4e90ba3224b2958b1a461d8a8
SHA13de0859dc246d80e79bdaec491189341239e8109
SHA256a046579ec61038c1d7d3fa93c43eb43b353c200c3fc1ec22193fb3a5d29969db
SHA5123a44a3d65f977e3beacd933202da176c0017daf49501dcfedb130a13a987a13ca6c3def051c2c4e3f8418d937f976805f68a3c5608ddd1f5554a2e099a239e1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faabb9a1bd6a2d73b8b8e907134f7451
SHA1f1e55788a281593f23ccda7528bb13408faca75e
SHA2568904dd05fbea160397b8dc686dc0436664c6f6ece045ec0b0517d345b20bc0ad
SHA5120865ef10df13ba5a404f51c94c03f3c7da10e75521406fd2749a08d713801b4c19b22bba7fb9ec81a4b31511ab8e67437332f1586b36598f098b355bc32c5d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bdb5c849e42b09fc97982b8d062bbd5
SHA108e73b24ee50af9fa8bfdcc42ecd8c0d48a85b43
SHA256a76e6ff1c0b7282c0d4997688e8b163f4082d7510400a0adbf592b84ec97a180
SHA512e274e0be959190fd3219c899694384237f1a7920077cecba5273fe7e942fc31a9ebbe5d37eb89b616f23c37159618e2dc488654fabe0ee863f114c02534646ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba5aea9a66ccd6a9f6553fe99dc9428c
SHA17f6e5ad0cbf2cf2bea79e0e30ea594bcda38f9bc
SHA25656168662ab6361849df7fc98a0e35ee8a5a16268a9113741defe43edf4356a6c
SHA512c991589ddb19bff08c5e61ec5ec719b0ffcafe00028952b34df351c518d5febe620f19a489a33ea814bb01162235b26f7efa430ef15b30fa68ab7bc5092acde2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510138eb3a0501346cb0cc11bb6f136d9
SHA11684a26718dbe2edfc8f7661536cf9f9108feb92
SHA2569a19360359965055fad8b832c639e18f80e605042368872ec3c92982334807d5
SHA5123520fd979d8938795e8fede68ccd1d04da48525d6bdc750559d3c912e9388daff0a62cd0a3111540e3d233f084f1e7ac8d41c9e45c1020896fecb7409128c835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544185be135bbc408196f414499205c9f
SHA1ae3ce8d8544378d702b374f6dd78224cff5fc1ec
SHA25604eb96836d9bf59581cb70d7cc811edcfc3d55ad5ebede1d78cd4a9c4f928912
SHA51209512a20fef7957d03b330d82f2e7ee5bb5820b0e1f60d9b91bb58eb14bc63dec63b0e3325e594f07e102dbb7f17dc7e003a044602c0add28b350875c64251e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572c3bef1a149a0470b7dafb87cd4e98f
SHA1a02f5b9c5c1011ed2b3a7f5ce4da02844d62cc86
SHA2564a5f3a091485f7dd53bdb93da13adc2f5133a85af7088441e7cd1656f11b6dc8
SHA512b0ab8707db5728eadafc823719d19a5a6156f75cab5cb6a88d2457a27247e6d95a6d023f6b8f163a95892fd6d2a4d34128decab7d9207af9aa585d24d6b0d217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54783ac0bb847ec911bc863ae70777d81
SHA12d54894f72985e12cc22695dc1fb23bba8d47372
SHA2560754c035538c5f268c072667f8fecc7c8d1a01bc8d49f49c0953186c8bd6168d
SHA512a7b1f0f96ee4bce9efa282491c437e233935bff91e5e69570440ca0d24009940c342b662bf8e229b084a9d9116e4f9c237a8be78252ea20f2486c5a328b5e583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530f80b9837ab81a42a2a2fca3dfaae37
SHA19c2a79723c18ce7986f598882e780080674b24d8
SHA256caad0140efa18fd52df835bb0bc7b6f402003b821c0da9478188709570e4703d
SHA51292079b8bdfc5725aaf63446a8dece30af84081b71442e71ad518598a00b9b77ffb8cb9d460ec986f50415309c08afcf85a2c3282d812a09fd021b4bea1b38cbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b45a7d7d84a3c4f0c0298a3276a68a04
SHA17e066685a2f87005a4b6f387206f45dd6826ffdd
SHA25684ae4ddcb0ae47738ca700b4738ae55c3dafd9ddea58aebc8568a8493f8432c5
SHA5121ffe7a83306ab339a31f8e4ef75ae700fd5f013da44ee6e418c7283c1b285d8a63f80c26e84c42f6efa656f38c79547491f00de9d1fa541baa755079d9a582b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53000e24981a90ca1579e43ada6d937dd
SHA171632d24bd8e21b7400bc412d4f1cba313fd2044
SHA25685f5c3d7190289123d20e16f7f661dde2db6b3702bfd1a116281a24dc9d78574
SHA512fdcc31ba2df9e5e96739096deb349381882089a744cff60fa5d7fdb6e025a2a8b3d529ecbe192a2e0a6a55204222686d1d56693f7f81a9ed03aa1e6ad5f901e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa646da40875549d121ffa7f07f8fde9
SHA109182272aaf529df485d544bdab677f8e87a0e3e
SHA2568024d51448fbb45c24e1db4b2a40203c16241125c635a15f13a5e5a61c958966
SHA5129459d684072486eb86db3569def6a69647fd2ba254bc2626560d30ac49e5488b728fc9459e47129fd56541895bf525474a101ff9d199c5587c752bc799576273
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b