Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
3843c156bc528a9ce098cfa140e2f841_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3843c156bc528a9ce098cfa140e2f841_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3843c156bc528a9ce098cfa140e2f841_JaffaCakes118.html
-
Size
40KB
-
MD5
3843c156bc528a9ce098cfa140e2f841
-
SHA1
51c06d105a8261acc2cb4d47845f5aa932089ea6
-
SHA256
b661d6a3f0f7d5a114539d1ef5c7fe20a5dd9646dd7be54a115e5a055a831568
-
SHA512
f1e79373b277c7e6e517c73ad0f4c4a71e795931f9af97185c746afede28db9c40744ca692271b5c939ad89347ca2c848172496970e665fa15630b27e39cc0bf
-
SSDEEP
768:wITdJpeYC2KJeNIR59dO1gnKpxAdnAHTeezDfV:ddJYP2XiR59dOF7rHiezDV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434866129" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54B76AB1-884B-11EF-A276-7E6174361434} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b13190000000002000000000010660000000100002000000020f3ced39c819d4b6d8ba3469c8c493227fae4f0156ce0d57ed5bacc47452156000000000e80000000020000200000001a4adbfc5973c5a46f528cce48594c8dfb3991c7d9bbc6067ebe0709199b4987200000006c9311951f863230232bbf37279685a40563c71e4f7dbd6d2de3dcaf628e56b84000000000024d1eb2d498af61906d710f8ff4cc7dd9083363120d34d14c2687d8d7a451aa31e50978f833e6bd29f61f164ddaea02767e20b2e4a02d5f2f9f6f2a3fd417 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10b1cd4c581cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1232 iexplore.exe 1232 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1232 wrote to memory of 2892 1232 iexplore.exe 30 PID 1232 wrote to memory of 2892 1232 iexplore.exe 30 PID 1232 wrote to memory of 2892 1232 iexplore.exe 30 PID 1232 wrote to memory of 2892 1232 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3843c156bc528a9ce098cfa140e2f841_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1232 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cd3b350b83debecba9a59e02bb5ac0b
SHA1470b2461ff266c46514ec6115eb4a3e17d30460b
SHA2561002ba168df62dad43b389dc0d37cbaf1c797b5c8b52b55f02e53e40b17dc7ca
SHA51206117d06ef6e8aea46a1cee6d204e93e9745d874950f2f5327294511df19bd9e93aa37fd55a06b898b5e2d5f589b268b4c5d4d4c04001e19ab95b3299b1bcc52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cafa9ac13c4c1bf3b0355168dd7a447a
SHA1d7ee59d75b253a418bfe1c4efce5e7956ccd4587
SHA256263b954c59fb76417c0553c0957679cbabce8976023d11f147dc965d866b0e84
SHA51270343a71205d7722907977549b756ad307adc349d59275636cda187bbacfebf315f3bd99cd3b60bc6c9e3593e6f63677398ec7135f2b25ea0d6c86a8105db55a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d59b27e8dde3722de781d0ef02d1e6c2
SHA11abf3e5c4b652811c7509523ba98da2cbb4f1440
SHA256023768e0cffdb61e3cf6206895cdfa781db7926e7641ac58f52096d777134659
SHA51274f871745398c60bf969adc1d065af9e02c77ae63894923e80f3c2fbb25648a823525c03841112caa66cf4a47d9fea3e13d466be875ade12a29f9c531527108f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5983380f37fc8d1a9e617c62333c2a13e
SHA138ae2a18cd9ee21be0fff47124944808afb25068
SHA2568adcd7a5146557d2b6e45c2a3c1f778b8e3ad188dce5c620fe639e84f2ad80ef
SHA512f95c211f2f167384cf4d9b3d62bb3619ac15fe792c492ede3b676dcd45a0c1d8297f8493b536f224741a4691ec6daea2c599cc7f2745e505cb4bc07c98f855e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2c990e10835d1f8b7b6a4c5646466e7
SHA136ecef02f4493f8898af9537328822ac5add0d5d
SHA256ea3a688304b7c9b61077f7090cee68815085dd59a9ccf66c55d1f5e6ca45e994
SHA512cd887fba2dc97fe0e1e0f745ece2e41d307525ab34993ccfa3b4c3e85d5d07ee1642107a9b1ec2aebb9d1fe9793460b477c144c143dcf240bec42dfbb670e818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575d7cb826ad840127095561f07885431
SHA17445ae240edac38fc321e04ad6eefd3113eb3ffe
SHA256b6f16c6c49b85ac181d12c589a27b902dc0a5536418e366f76525e7ca73f859c
SHA512140ba25a567daacbf1b741012f07664a5daa572de05c88cd4fc143fa346ed0c8e74eec11ce9144f4d0be199ef02a74a9a9350b93a70c312c2221295f8ff04bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f0dd3c3b0f6b2e3f7558a337362ea46
SHA1d1753b40c2599fbdd68362a10f83b56fdf20b8d5
SHA2569c9acccfae70837d05e684a94edc89b63e7305594fac48d5e4ab21b614bbd633
SHA512854d9d566fdf1430452373583db7407124f67d3ca697e707755a89405f03c569d60efb27c63465404f359deb31ceadefbd4140fc81e9b8d7f73bcd3f032a05fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5577c8e328b8e9d8a40be92e4b8e8c9ce
SHA15c7e2061923aaa7a6468c64cf9123cff4a5e6854
SHA2563e8fa19af23dfbd6fcb851e52a6ab918be5c9968cdba3bf96b99fc4054dd2db0
SHA5125b3e9d5b2778689268db9b96341673e75826fd1a79bda98063f3e0274641440cb5d88e51ae15757cf9ae0539ca91e938b9c843ba182e2b7ea66a3bde14d92dfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569010b864d94dea39a52b6caf4426e0b
SHA18f1c51307c1860dac4e00a25691a36b56fc2af01
SHA256e6a8f1740b00f66ca679cbb006b4e7a2b436498e5dfbf9b35de077661ee34a8d
SHA512484b18607976864b25a4138d63735b4cc4d407450df08aed14b55ed223496f69aac693cfe2c99210351ccd3020a59c1564a15647507c1ae0a00f213ab24bf44a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dbaa2df3e33177eb822d4513a2280c9
SHA14185544012f0692c2cf185fe66c661d6e22523d3
SHA2567b66dca6c6acab972eae29ca4ded377f6dc813bed726fdb996a6a758af76e84f
SHA512f81ab1e5ba09e7d13b0d66e9eecc949ec638cd681890fda4665b3f909c2e60fcc87d4024457f18a9a77fe52c526a4f59f20f114e29b5c85784fe70a8ec3d981a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bd45f8a53e94c78dc38b0f239e9feaf
SHA17e74dccf1eb5bcc110fa3d577b7fbac4c79a5e2b
SHA25686af76d5934e80de417123a86f36f8bfbc9fd74d2d7414befaff2fbf4acf1f94
SHA512648fc3c1619cf03189beec313492f07b8c73e9f04efc68502046ba095e41110bc0a4a8b3971f87685e20f8c8cd5efb49247618325e1f5535739812e0ab32008a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb241ca2c29e776444105c511cb9ab1d
SHA1bf0d5888418f4c64b81e9258cbfd76df4d8b008a
SHA256fe25b6d800fce6ccc3046b4794b975ea769980fc3467a753c4d5aa0c56defc9c
SHA512dc43f1ab3eadf8906de048a405a80fbdce4740090718034b1a59d2807cb957590204a05b37b4f331ac5cf89ca3832de5af7a700c13513873d4a2c96c3d164891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b624cf683c6acde6c34a59032556438
SHA198b9cf606a53ba987da720c10911d80d37053097
SHA256fc51004efd7b534fbd271ad24c556b5a96df0178bf4c6e055d08772371bc91ab
SHA512ef277c5b2d3821eff10d88a87e24697bec7483eb103312e53930486008e10934856f0603c8562f381cee8b02d3a00e512b59ec176abc8bfbb9c16f93481c7bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1f43dc2c8caf065bbe9021abc3e5234
SHA1b16b60eb6c2fa791a0a63f0f12b8ea753eb28b48
SHA2564de580aa2cc130e0925844c27c7d075baa583ed1a854febd21ce14651982c71b
SHA512b851ef698eebb790ccbfc9f7f1247368659738dc578a0ddf49fdf29f8976cf5fc638987e248889ce900b6a898076a6dd7814a6643ebe0c27d79f99f8906b1cfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51abb5222a6b5a8acf536077a811b6eb5
SHA189385f1f4575e83de1d821c872c3363bb3ffd279
SHA2568a33f0b68e7b385f06056755f497611d762cfc6e974c8f3fd85006589a981073
SHA512297f801630cca01592b54820037954f82775b66728f4a2a1884d04086e1380b645fe9113bd7a464cd90873f2c7a53c0aa84af82d11c7a203a4f0cf676fe6a72a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57583a6b847ef6f01df0799bef854f875
SHA1400485c8756a7f08ccc3df333cb180281f2ab4c1
SHA2565b1627b69069fddd0fd80e20247a638015afac369e9fa09a906d63839081b11a
SHA5123988b4ff9ca76c49a339d03ca3e115cac853802ccee2d08bb8983a9693c6c0c244d766123dc6514950536dbbfc04290182c082c0b952c436e256e09849d3d665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513f986d7181eea5c544dd51de7b92280
SHA1b720e952faab712f4708eafd6fa7498fff83a667
SHA2567a5db69e5a572fbfbc7f1dab7a3580adf39cc1c7f054ddd07951f669e55bc501
SHA512f2f6231f4866fdf5389432015cf6515bb51b357966b218009d1ce9bb4b9b28eab2f65e9753e6a7087a3625c373ab160fd53681be4fcb86a407be41ff7448047b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523e0b3d30b1ae2d2a8ea93d54b8a6d12
SHA1f94b85ec4cd6bc47d2d8954ae1ec30f32aad1fb1
SHA2561475dd6fe77a4b21ca3ee1698c87d8051e03b66a3fe3afc6f0c081b90ca1640b
SHA5120260c6f50744c64eff77e74f62332eff61ecb0a6dd3a79de121a176f9e57797ba06e8ab46f2b0e177b95f81dd34d2c77d3ec4eeec97be0bde3e954c103e18401
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b