Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 09:50
Static task
static1
Behavioral task
behavioral1
Sample
3965276ef3f677ce69aab434ea0fb511_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3965276ef3f677ce69aab434ea0fb511_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3965276ef3f677ce69aab434ea0fb511_JaffaCakes118.html
-
Size
14KB
-
MD5
3965276ef3f677ce69aab434ea0fb511
-
SHA1
d4a73708f25761d1371d972ccaab4cf0d0c336ca
-
SHA256
4317fc3db465131d3189f1f778bc9f35c86b4a951b981d3a75fc2672d1001391
-
SHA512
237639bc9d5649b2e2143c94189d2cace5c4a8838f85702ab1c9da9626a557ab355065b454ed1ba7c1ed19f71b0f86ce7207353a0cba0ca0039036be6508a1e4
-
SSDEEP
192:H052Nu8CxFo9hTzX/PNODOvubzAD0mzgTBgTDWgTugTHgTNxJ2FyUFG92WKr9wIX:HNNL39hTzX/lODOvubzAIGQjxSAm9XX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000c68be44dde44707e1a58645a915d69a2dfa009afe62b888c4ec37d9c9dea2046000000000e8000000002000020000000696180bc7038c6170ada542cb7eed8e70a7b38257d92139fef66359500dc922c200000008c1fd25200c7e2799de65968073c91602df9a18daec480c4468cce656f18c51a40000000afa991eee2b3fd43e9ca586ef2cf6dcf580e374d4518296910123497eae4ff33a7139aea5f68e0fa8b3c7ab65d727d3fbb5054014c140735906a2263aac55ab4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50fa34508c1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434888523" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7A2238F1-887F-11EF-AAF2-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000a0a660a788853dbf634d8d8af5688a5a32fb20a9cd9d0e3ffe4c5a790a510daa000000000e8000000002000020000000dfba3b3548bd2d44f5097ab9f2f271f064ea2d4f724a36f36b0db59f6df46b4890000000d55a8f44425b2061724783c4e77834d170c81087d2c1b29482e0d967e648ec98be9033734d35de10cba2a5ce03696592932e29cc8b24def5ebe5705b9c673c6f6220f2e6f9457b65a775c4b60bb74ce13115445900a9d80268677aa6cdb274e4ab5b8f4eac48e737cae8b508cce724f9d8d5f0a707e230a4089f245129786983c5006ff67286a35445cb31050c7e0f994000000055e6d821966b1f071e50ef9f53507e05cb4f2797699203df3a232932f55bdfefd14ebeee426006c0fac71284a358c6b5f1b6b0a74de7f4fb812e291ffa5d3e58 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1352 iexplore.exe 1352 iexplore.exe 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1352 wrote to memory of 1976 1352 iexplore.exe 30 PID 1352 wrote to memory of 1976 1352 iexplore.exe 30 PID 1352 wrote to memory of 1976 1352 iexplore.exe 30 PID 1352 wrote to memory of 1976 1352 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3965276ef3f677ce69aab434ea0fb511_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1352 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5681f908c5a0bce80c557cc5a053f77a0
SHA1cb993ebe4bfbf204c21bfa7e98b84b0a4f24cc30
SHA25661c231f32634fd9a99a13ac77919fba6ff0757907a0bd2f4ed23fe8ec3764e8b
SHA512cce7540a1dac877dccb71466f975cfcc248cd039dab135107bf59863b123c8ffc605adf50eaf36ba32b314b4adf5025643a4d85b35bb4ed4604704181d0c54a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec86731d1a86279227f3614d68d1d229
SHA1526d59a7129ef24adbd8e7e753dddbc3a7e6e92b
SHA256e8337a570c93a08345cfb97a1f3336de56c7fb82ce27afbbdd737f3bbe628018
SHA5120986040d485edbe4d1fc499f90717dc0464bb048a8dc8a14ed638ca677eb4926827502c7eb8aac3b68cf6fc692e4ae2330b517fc9fe8f28587eed40f3c0372d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5692256683b3f62c68bd7b5c39b9f66ac
SHA1f8ab085cd6ff7f0b5b1bbe26486053621064c772
SHA256d10e468e96a2ff54a35e05a3de92ab453ddaf3c4e2a6a7a1fa3c3da644b81ddc
SHA512f43ad2727935b79aa87c1bf42f3fd1da67ea304877d600aebef4ded196e798d24efcc50ee759d66ddbba13c8f7415f2916fb6cc888dae76a92bf8c30d85f6167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50441068a8cc81cfc5831c18cd8879e44
SHA1585aa7b82e5c66f614c09b171cf35112541b815d
SHA2563d54e123095ac31f2bebbce28ae4a8dfe167c938d5f05a2e58298f349b57885d
SHA512e83cc918e40105454f3ad0d50c3b1bf4cc25ef1a0b19c69dd8b8ddd648ed7012abc1dce871dd8756c737f48f3ddcac7f3dbe781fd77b37bbc3f18513b582165b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3ece4a399527bc826fd4592ab1b5df4
SHA1e2133091ca84ab279b87663ffe9e1beecda0b3ef
SHA2565f1b762a91fef7ed1c9430ed1331864f5062ed367e5d86393d4ed87440815119
SHA5124697201cc0297113e4c1d95b25c83fe8377e946f6d8610a62d52bf4cb7f1b1a7f8404fccb751e82a271d64a6ef281d20e03c71c74c39091c42188a8c18595031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c728dfcf83d4beae6568fdaa6a5d6f7
SHA182d19f9e644faf87264c97d781ac835ec51a82da
SHA2562216b7763639ed647f05d4cd97e9da390dd9094c1ba70b8f8622035316c53836
SHA5124770271413bdb5043ad7afb37f5a81d1b8c93b31fe4367f1b9314231ffb5ef578d7e225cb22b59ded44b0a5565ba3f8dfee211a716c43deaa42b08ec675c22e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b4074f53a53d3ecf82f0e6aa1c98fab
SHA1011051bd1fb8cf84962c63640e66eb2f1868e6cd
SHA256d876dbbc821e067ac265af394e822a3d19164bc8ad269ca4009f5d5bedc98360
SHA5123c4710288762658ab1516ba677fa81e94a616e5363e0662ccee6266c1c7aef604ab62d8ed06229f89ffa76f85b2bcc9d5b01c9630da9a2b9388c052c6805679b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540a0d6ee89eea491d8a5eee486440edc
SHA1d818910e00d37b889a9baab69b9f6ff59724f1a9
SHA25601ed781d3aaf71b454a757cf447ec2acca60e2eb0688eb7fd7079b52cb051a16
SHA51253e797860f695ae93e803ef8ec70ceda606426ca7ef985c8d62d5eb0da890b1ec29e05208ff3edb7550c0dfaf0a9d00b6269daccf124468f82df59186ff49820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5325b07b6f9706b51586327ebef7cefbe
SHA113002821ec484ab4d9e6d554d0e477b70a4f5bcf
SHA256f65d6ca7157e3a9b6c1f69ae3c02ab4e791156cb63a5e1ec3714e4bc4d98f955
SHA512bbcd8a9aa9abb098129c80b1a5afa78a8cdc964e37d1316930ab9cdd17021dea827c35e3e658fe0653e4786bde2b8edfa868b24c172c891114012945e694f43b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e3563b0e4a274309c10572e18385892
SHA178b906addfd28a0a6a90180f692190e26f937f78
SHA256b0a064de3e300d8b2211fc289b6e2b120fece66509fb068627031b8887031089
SHA512f8f8ad47a0c25e6f12e26a2172f0fd5c1786c5824bfbc860abd1bf2134d312cedba5402c77d06357f6008dc660940fdff76d1f06366b05e7c0ca25506a9433ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5300373acfd87df0f0692fdf5b9976cd5
SHA1b0e982239c7efd44247cadf487735ae505901c63
SHA2561434c9adb45c52f59d7ae26fbf91b92d020f3ca75bc816ac5f7147ff026ce257
SHA512eaae688b1299867d72180e28154ab658495a6487c721b13ef81207b71b9f708148babc5c6d8e6c6965fb36c96438a7dcc2438ec6797e64f9c8dc3b3f039eb3cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58730a68d2f571cf96b35b056659be0eb
SHA16cc168134f3354e0d426dc389825a415584e3d9b
SHA256db7cce050c73f3edfc63246206bf148eae9ca03a30c7be3ca67bd81e24f495c1
SHA5125758103e79d335dc5f86740f1b2f392d5a30b50c46ac831dfc648e5bfb2284dccd52595cdf56edca44078da5acb8b101c09134b7ce50525045879a1ef3ed68f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e82f13d7d1862b08e8799de10c98dbdf
SHA15d985221c9366f152e721430080fd25523c43887
SHA2564926ded8046e14463c992f25b534a38a2020279bb0d34d2545d30c3c698d863a
SHA512511f7b149bcda7c87dd29495fffa3b2010851de0d65d96fe882b266a48ef2a79ccd9a0cedb3ef55d28d9099d0ecb06c6de6e7d8b1fe9a47137b497f112e02a32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9ce2b6c5df049ccafbde5d42eff4ff2
SHA10b33aa1816a0ae1acf3051c51df54c83c8732e65
SHA256f58f6ea500b6a78ffb1edbd8a6464ea6959aaff8ee068582e1e1ce4b4319d3c3
SHA51229213047fb2d763f2aaaa8e8c30f2157aca7d5ad5e6cd1ac5c5292745c389adcd8d42265d2ba488dd670d7972021dc77a02402f9359104c9d63f6dcef868f9d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597a0fcd52ae3b07390eb023f8304f30b
SHA11efb9fdc192338d791be37aeaa5371a789c9bf9e
SHA256c9511cc381af99ffac28a103c4edc6e899cc2e8ee3ae58f47ce7be19a1b32ea6
SHA512c62810f6c8498a4d3d74647637e98f03c10aae3ae0c378db8e4de7e344dc6167921b032ef6eb59f1ba7d829a48acbe9737c9c942b16cf32a1ea28ff443a3d0b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56419af49e98fc937a3343773cebd1e77
SHA19c9881b86f3d2d9f252de397f8d245d5e14ad0d3
SHA256ac50301a54de99f204422cfd3cf273e5c9fb6625c3705b3cf44f9aa1d59fa368
SHA5125667518d63290161a21d3dbca679deaa9335f49ce71bc5f1d6a7e86c24f9fbfb4b0e287e923754356ba71fe54ee3594e99363890a3fd27799753e32e4fec255d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535c6b4873ddb3a89ba6bbcfba50b9454
SHA1ca67b1fe0898363d005ba703724d0e405732c8a6
SHA2567a362bab74c9fad3af679224f1de81f769b61e8ce8f5e10cb1e7d6e2802af717
SHA512e99a4db6189acde009ea432db936810dc6be8ecae2d6a1cebaca54e14028b1b8c5817b170b31dbcc629baedb2d35a50c8de5b7b3abb51541860752836c93582a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5136115a1e3daddac753289f66da98723
SHA1348de1e0160b54b7a54165f468cf5f9b1b422014
SHA256f9d13ef065ecd8c3e7d459ea728b357fe5c24125d346a4b0075a7d74fe724745
SHA51270c75f00790ab7dbfe6644fee34a6a4b35cfefd2f4d5bf27ca06857fefdfa8b2c7c677a7c64698f9c9d186da0ac3757f8fd0691b377ef09a6d83f37fda478846
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b