Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 04:13
Static task
static1
Behavioral task
behavioral1
Sample
3861708639ab188f7dc1c4e97083b9ea_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3861708639ab188f7dc1c4e97083b9ea_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3861708639ab188f7dc1c4e97083b9ea_JaffaCakes118.html
-
Size
47KB
-
MD5
3861708639ab188f7dc1c4e97083b9ea
-
SHA1
87d07d14010845d80e34f86307d021d0e2db9e18
-
SHA256
8220d396536614845782a84d6ec1112052ac10d86d03394193a69f897a7f737f
-
SHA512
2c5252a6397e7fd5ffd9401c74960a4b78e2dbb171be3680d668ef3f110ccbc04ac54d2988799009091433fc6448ccd91bcb99b39477bb1ab383b1f0c62b3c1f
-
SSDEEP
768:Sv8yiftpimEp/amyxc+lMQWJNHbAbvbEFB6uhPPp/oSVOID5jCYZ2Z1Ykk2WLbyV:wxQWJhRPPp/oSVKYZoWLU7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000695e6ad307ccd6b49bf7ef8b5c84ac6bf43321ee52ead80deec2686a1dd301cc000000000e80000000020000200000007acd69376ed45d776e9aa62baf70d58113adecca88130212bb62eefe74ff34b89000000023b16b8536d6abdbc6d794f44ad7a70cd298545c52d4bdb4bfe2f84522e33a956c07197c86d78b423fbd2d27ce08422554b2ea75815124f915da33f44f0cbd224040abe19fbc01a008284266f347b9991a5d79f9fe05b610e3d9f9c0b958546d86429fe3ea3048b22df38950385fd764908825b61a7cb4c466c546d372acae21691ef4601bf051327abbe5d90a4a5247400000007090f77af2a9c731987f5ff5f9c72a216ca3e200e76f052cb155e2a2d18737b4fbcdd99bdeec94efdd968898ba43c6e6af7f9a3176e0b0e9b3d5940dfb703782 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000003e70b3e2172c40c87fc7be5728aa88e212a70f69d1fb4cea232e26c74057fb59000000000e8000000002000020000000cc62ace00ed5b73cf80c327ec0966d7cb7423bbdcb7dd5cba34258ec2e4f1d3920000000c4b99379c1f24196c3e4ca74b715f356d79be74884f9eb7ab67902db7c2b9e124000000095fd8f144e1de8d36445d6992ba5c9e3c94e4bb8e3ebb519961f6c09ec90d3398cbe3c6b237fcaba447dba3286f06392eeaafb9c68f15864268a458ae55c650c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e07c5a2e5d1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434868284" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{591563F1-8850-11EF-B4EC-5E7C7FDA70D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2852 2872 iexplore.exe 30 PID 2872 wrote to memory of 2852 2872 iexplore.exe 30 PID 2872 wrote to memory of 2852 2872 iexplore.exe 30 PID 2872 wrote to memory of 2852 2872 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3861708639ab188f7dc1c4e97083b9ea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db7c1ffd8d7c77bb3f716bb95feda82b
SHA12587bd58e273855c2ee08aaf076fe4f02432846d
SHA256a97b7d495cc0c07bab19d5d4ff7f819da5606c2ed079850375b2cf118d76eff7
SHA5129e4af71a700fe336ff13fe8941b0b175c4f1b9c9c06f42473a22cdd9969d469d25a52105942dda8a0ead44e0093dd7cf4431609f05b63e349fee8321b9d9333d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520861c1f2d30e57cadc8671e78396a79
SHA177cabb64c63edd639d21fde7a52d3195c36540d1
SHA256cadf54ba1b51c11c47ee719245c6db95530a86c2ddeb67a2595c55e18cea3d3d
SHA51235d939189a7faadd40713cb338ae0b2198fdadf677837d5b59b63d3ea72d47b98efb2ec64936607b0e87f0c4bc3e276e1810e4cf26c3b90da439a095e9991fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512bbd41e939292174b9e661fdb58b1b6
SHA1396ad5cf3056da9b4d5f66366d50abd13e1ed015
SHA2569401bab12b3bbda6ec3ccee7a44ac3492a788a3f8f093b3cb12df217f4578207
SHA512c51fed2a8601a4e27eaa1564fbaa68999835b8342d8f8f3ba8014aaa53eda00897e5c68855ea5798514c0d5694432006341c79c81278936271d93d3a47ca4d83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583addce1dfd79aefc5c61208168f23b9
SHA1146182f8ebbd8f1a7e868664b275343686be2a5d
SHA256aea4cb8e15246257c4b64b546408c0ffb5977ecbd711c377d0327860b4ee87ee
SHA51257d584395283280c9debbda713236d32c6b166cc082ce55012809acc2f1c481d58bfb42f5b53f32e75dda8aaf6ae3429467f36d18cbd9bb550b743c1f3f4932c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e3af6f6a2c0dc0c454979be4a291fc1
SHA118dd3099aaffe9de07c5b0aded8639c13c7688c6
SHA256abb2618f8caf32e0cb9b1b947c2e51885284e21849c75df376a26ef16df3f082
SHA5121ffe3288b10f2eb83e17e001cdfe77478dd66d4d86174d781189e10deb87a0c6e73d1f36cc0114f58a5b87d1b8494110c715c704ecc251e327dfff43db7dcfb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57544c99eea4736a20d5c322f51599e9b
SHA1febd405e83f210e17ca5fac51bb6f16670499831
SHA256f209367fa8f5a3adc505b03b54f860fa7457d9adb9515e13801cddf72d6f8a90
SHA51279db4ea4fe35f3a22af43eba0fe599c2d1d2f5e05d5f03ffcc3877376d2c0528758acafa1ae89a6c6d3db75b5ba537cab5e14345fa5f256e696308365efe5625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50785825d6c0900285e741d3da0761c6d
SHA12f8b4693c052322ac86784b89e1e866c0ca8cbc2
SHA2560dee27e7fa50ea092746bd9816defeafc1745e5526185d293be3f9de35e37582
SHA51237178ba5b6d84ded98ed127a3a16f119518eb8813ac483e23a4056002f82bb58fc991e9571b253f60b1cae9c281adb08241c53f7d78c97f113c2f429a64d11cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfbd9b2876f121dcfcbac0456c028445
SHA10aeeb6e8531953de9a6cf7ae4c004abf01bfc40c
SHA2563d83f2c764a12de3698f951de2cc7970279d4a7a2c50395b9729e7c7dbbd2d81
SHA51286d27c906580ccc2b0504c5acf461808deed5f988002a5e512587f9e1c274f92cddfd1f52f618f16646e6810ba75c27f4b622b8c7ca9846b77de375c2b1582fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dd09b221cf61cf0b84e955ea740449c
SHA13ec33c295ba0021699bff105f0813325548d57cc
SHA256f07f8c9901e17bcd7392c74bdc2f6db51561781cbb39cde11b425dd51db07c0a
SHA512a75f82ccc89a90469faf3bc0c4d6aa47f43933e4a79cf7d29e2d2dc00e4fc13123e07bb8122b94d35940770bde1528291895b57b1b4d29fc33cfd8a4fc9c98dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59803045bb559631aaca450a1ca701618
SHA19c0acf07fb01cb4dedd8539df114f48f807b5d24
SHA256279f74f22537a6b6d89797d695f63acbe7fd2ed09272f7fe1fdeb727b5a8a1ce
SHA5123e4c5da05f484daf5cee10635d87575cf8a3eef6aa0f9cdefcae6c819a86a6d0f5dbae1389c41367a5d23f8b6dcbdb24e2c94d5033e2a39396cbbb306b5fb816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff67c1ee657c500e51f535b1f7004eda
SHA1dda6f6124836f14cd170fc2738ef8a6c3b6732dc
SHA2563b4a541d89fbe1535344a0c7d5bb2b583e3d325afdaa4c2cd3c5c26627347433
SHA5127d03821bd3c4c9950689ab32e458e20bdfce7237d9b68720bc3d5b27da0df29ea3782dcdf307d99d1fe2d3ce71c8be4561e41d41839d5f6a3ca0b7282fca33f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a54dbb069cd00421fce82c8ad7158d7e
SHA18f15240098def84743822978e5f9809d54b4be54
SHA256f05ec7846b1b85ef3a72e0e1e4178147f2a71bebb85e83c85f69f346b6cd2140
SHA512c40922862b051e916d62e477ac54cc334b624f8b597b0664ca2c1ee6b1771ee364a1bfad3eacae8ccfe59b6b3d5b51fe6720e4f10ba224742d12b403b3be31ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534742ae9052f0132cb2273bf09ef5fd2
SHA16e9f863ca30332f6aa75ac4855e75a6cd5dd37e0
SHA2566a290142ec791f255f07a3e0606b2ad0ce65d9d209c322afb60d3d78badc323f
SHA512d27febe28970d403845bc6a57df7963efc452447167a439bf0fb88882b15c64c17519d326efdcf2ec13ba29a2e7d4a21924b75f074399ac50c93e03eeaad3302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1eef091685ce9578430aff55d5f6d45
SHA167cab4d7c54cd1443caf1365efdb6f4439ddf157
SHA25652a13f64e4192b6aa7a61cf45ada774449ad413f5a4752a6d2f6b5a91f3422e2
SHA512146b3838d579f189355cfb5d93e33cf5a3d25ad2a93180cda123b0c90c8a21bf098f9026d7885ef14f9b38f5b22f80355e4afed047bb7ff3d568ae27b1ab483c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5643d432785dd5ca7343ecfebdfa3ba41
SHA16fa42c4cc3313f4ec59604eb466b781861ac25f7
SHA2565669e272a53b2c4c66c15d2a5b106c1ce8dfd04be955c08213ef51076e23bfd3
SHA51223771e0419c5c2addfdd0812a47aced1c7647c9b8130e7a8bbbc751965d10d56c481e0fff4f4cad214da873e0b70e8784342c0a51162f786159ce596a5a92b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510b70151204dfffd55caec0a5c50dfce
SHA1b0b7de18a28aa03c4ac1dda84f750092fd509ef5
SHA25622b08aada3f6462b72c138fede44e3fea6a5d132b4cfd8743b4a67af25a88cb8
SHA512f2a7d87df0407c482ba18188a950bd4f6935194ac119955f661736463da49bf6ab6f5f1064b4c8ab38414647cf5d9bd489db9336ec6d2a921a04b5065f3ab003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58940be4f162db03f412d3afaff65617a
SHA155a49b0269bf48971626f558626016a92c826f53
SHA256110ea9ab81548004af7004c3f9ee8ffaced6aff7cc8e85c51dab4b16c68b2ed8
SHA5128fc576ce5fb2df36dc46b5907bcd4185c42cf1d918c7212bb6ec9b5f93841cfafd212095954a72dfa172dd5327762bd99527403b2af1806f91e87a264b297f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542235cb305250c165399a06e00c19e97
SHA12040c8eff7aee9f61a88ac7d6bb03dedb20c1356
SHA256604d64c1fca857b00c20c8a6cb4664be0235160f5f1c239fa514e4a787014316
SHA512e13cbc406202696db8fceeff9aa69e3e7b39265b99a96b83e9f042c8055f8b300a938f6e6712eebd00151979bf71d7d5f6b2d96e125e60e5a26539b46263042a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b