Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 09:56
Static task
static1
Behavioral task
behavioral1
Sample
39697c20826cd3cdf58750718cf38224_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
39697c20826cd3cdf58750718cf38224_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
39697c20826cd3cdf58750718cf38224_JaffaCakes118.html
-
Size
70KB
-
MD5
39697c20826cd3cdf58750718cf38224
-
SHA1
7d2c1e410c0116648b4b17a9484d1f053ff41107
-
SHA256
6f0cb8dbcbd9505b390c9a275c1a748dab258217f68f1de2b97eb4877ffdce07
-
SHA512
60ad5313815723de84b499957471b7b77da248aed20c3232ffd3f0c3e762efc8a4a5cb3a60604ef44ba5149581a0fc390f1379b2ef46366e5600514305c0081c
-
SSDEEP
1536:BUyDKXsR3FodPzW/2LbZrUWAzLHAAPUzJJqAwkAmGOzyTO9ANZzX1hg50Qqa:zGXsRSdPzW/2LbZwWAG7wkAmGOOTO9Ak
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 508c730b8d1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434888836" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{336894D1-8880-11EF-87C7-F2088C279AF6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000005cd8fb792a6330856ca3f44840433e58f94861be5aa9b5161bfb01952c7f3203000000000e8000000002000020000000a4591b684ab01023e2227480777e50cf05f6b8f4c447682a318cda0df0ef254620000000d0813df28e03ae57301e9683d1b043e3bcd1bc635be701a36cf541533e78346d4000000063293574616cc3cb6952b785df2d3e9047392ca5a26837fde4eadac18ce3935609be75142e44ed4fdc58f1ae5f88ee94a58bc6f151ed7d67bbe35eef5f29e25c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2808 iexplore.exe 2808 iexplore.exe 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2980 2808 iexplore.exe 29 PID 2808 wrote to memory of 2980 2808 iexplore.exe 29 PID 2808 wrote to memory of 2980 2808 iexplore.exe 29 PID 2808 wrote to memory of 2980 2808 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39697c20826cd3cdf58750718cf38224_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2808 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD56c4001248a034efdb34af6a90e037347
SHA1d6d4086acdd7ec6a80064a6357f5c24534c1fa44
SHA256296c5c8c0d137e92d58e7032303c73257b944adeda6bcbb30fda134c9b595d26
SHA5125471d3bc7a15153cd29df41b5c9c6b73472b5d137b56f2a430a5ae49c5793f7b110a4d6f03a5e3fe2d733967661364a6d8113ed57472230eda966687292a7eae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c02e3238c0bc7db943c02b30f165a710
SHA14ac3143336d028f3a8d111b7a5b313ac96dfb80b
SHA25609c808d614e1a1f64990c63e37e58f5eadfe7b5a2b9942ce7f9dd31077873046
SHA512ef62fe9cb9f425f655590108edebcdfefb56d9b64e74a7f307a7f9ec5eb517f5235ac14e8e5e72be7e1349b1ac0d917f1caf522796ed5ce8dac7aed7b358d01b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5813d1b784a2152a355bbd2486e4f4101
SHA1023f97785c32827c7803d496dc79509c66de5b00
SHA2561248f4dba7fec1078cd68c4e32fa9cf58cbc80edf1c008c80fccee27b738909f
SHA512f5603b07be19681b940e3819a65d51d939f041e079d1ed93b19e21822b5e1f48023162a4f7756bbe4ff5572996224d639b32d95f3690be52fd2c70ccb03e39dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5fc3e39992683ec4423b2c7d3acfd7e
SHA126263996e89307b5c4f398527d88efc6fa3cb3f5
SHA2566e0357d0f310fc841d98d0225cd53fb9772d1bd697705c09286fac970a08e3ca
SHA512a23848d8cca8d77c0be77f88fe551fa8c7298cd4d0a197574d9f4651db33c8ce4b408112181f957835442b52fa8de0d8f8d2c13bbd72bd6c429316515052468f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4a069902607cafb3bc4defcbf15a160
SHA171c383593d5cb2af7b35f96bea6aee5804095bca
SHA256c54a4667a22c56c35374e1f914a91777d44bbc9f40b53d55cc98ecfef864b5ac
SHA512b55a78bdd7a3debe0a7324231b08d496071b9ccac37b1c9aa61bb9d2356742b9c8e68209aa4f726df346932f24621ff15678c1545396809d1c747aca570b85e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e14ab38560d4bcc65cf986a9a31e1e9
SHA15ebc6bd79458f66c263b4f8bd528451db560a246
SHA2569854cffa34347c27793f75b31307c10aec5c6aefffa6a1a0161982d494d17a93
SHA5123e57140d76c8981bc9f0a3f6cf9466a91940aa02ded4c5664ee0f050aae9175f031d18a345e02b456592cb0ff11f479754eb8d3998f40eefd1c823f23913418d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5490783ec606c6b88138542128808a7c2
SHA16acc2d6d2dec2f6e4507f6e627d8926c32a096e9
SHA256c06584dfa4a05b291cd041d88f7f758b7150edef128c919ecd4e18fc00e50159
SHA5123a107d8fe93dae260211d1a6a13ba22ff67590fbee3f4ce6ec2a10c74673d7e20f94e37477fd1f68883404157734caecb5ba8cbba867e541223a44aeaa10f488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d88bd7a5d06d1e16d7cbc00a777147bd
SHA1d451c222e47b5a49cef303edee15a4b282b49e5f
SHA256cf4b51659d61f600382743d0a72ca8ee99dd2a7ebda5f4d1556caed3dc52015f
SHA5120bb940d135af3c4387c678ab0e5651af61fbb5410e20fe444256be593027bea9cf109f509ddd41dad41c255551b17b91bfed5336a3a5d0e100454cc401b91539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530141edc426bdef82ce5324f52312df2
SHA14f5718138736e3cb84739a2c1587387c3b13f9b1
SHA256f8afe6eb380ee7136bcc6803a9e79ebf5294e9da807365b6c1131c6234f4b553
SHA51224f095a159f21abf40e6fe649d77be1f54e352bce3a72a11a9bcceb25a632b649bf7ee7d108df45e5f2443055c2577fbf53dd6be6c10ed1d37f2ff5ac15114a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d40c8e5121767e6a57672b15b2dd105
SHA15525e150b82b7260701f6ae5bd284bebf3d9f411
SHA25655581c71deaabbe3612bced7bd31a59584800e261ff02318a60b006556183604
SHA512406f1d603c3bb0dd01ffcbc264a7a09909a2b54a1216f64b9614e9f28c5ff4cd996faf7bd2259fc5f11acdb6a05cde50225f57850cd1e2f601aee2676fb8e976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff15029811205aefe7efc580a81b5f3c
SHA106074d450df2e28d6a39dab82ad06af58df86726
SHA2565b19dbf0e7983e5c88439fc4a898d97339365829aa90f03094992a84c87f1ab6
SHA5121950d029f8f57a5cd9b97ceb9285965756a472953fa2f09e0b6b1f3511eaef863c34571f0e10eef4e042c3a065385890c07d24d222d7f91814f6734f56d761d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581e6eee8aff59b143a3271e112198e6f
SHA16668839a5439fd1de3ce6a9a38fefa6c9615ff27
SHA2568392ab02053bcefb193ed2d26c4645535e5663e093117127f61d7d898b1c936b
SHA5121f3759ed6da0831aeb48dff21690d2761f26ad5c1a6515222afd2b1f2f725530b467f8f6e2dbc35b2adf840f07a9ee630f3d7a455dcacffd6ba893e28cdb63bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fd8f9ba1a39eb94cd187a97d37e8b1b
SHA16e168bb9e2174354ead8442d7ff9eb674c9ddb0e
SHA256f9cfb4244a197e5f02736ca6fe912ee194198252ba9c418b8d3153d7c2f09fdd
SHA512ea625073ec1145caf0ba095dac42d73cc7114e44db1ce854061395256ea40ec3e7759a88a123c8616be97345bcf657ad6e22e2ebcd1157147b2bf08c014e64a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5731b33ac21ce490b7ddb8c2377e3b724
SHA1b98e051c997fbfeb8dacde87adeddce9ea3aa5be
SHA256336370f332a57ed7a936b69c8e8a8867c00e09a08994692be7379933608f4842
SHA512269d03f9fcb8066c2919f8e5453d685ecb38c26a5927f7d34eea4ca47df048bcf095975df8059d1549ac70ef08859302493399ec069215aeecd920ab07841f10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a769c15897802c00ff05504d6d8b18b
SHA104f397378070a2cdb1d2560cb1df3387c3ad8b43
SHA256874baae6a135fcca0a5dfee81f5f0afbc60067e602b5a7af85ec363e61591873
SHA512a4ccc8b1764e54cb1220617dfcd1ffcdfbdf6d20d92f2d5ae3bf05d2da2b2eff3ee508c4453c1e7ec2e35b4831e4eace9a9cc366763a80dac81c80c35c16a6a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddb8a47bdccfc797ffbcd92c6f9d071a
SHA166ef6aae1373f0f8380abdff293799b331746141
SHA2566d48646f8ca3a40ea2dd34fe0c114e31de9253b434b212eafc39430a4e496f85
SHA5128196e45b6816fb4d35354e6c3376418cd6064eda2a37605eedf2274b32367afd79a34b3567e34fa98bbd8c56700a83dbe01c723640c28a3d142e6c0b1f145f49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b393d05aa27f24b0515e794938fa8adc
SHA1512714f3d3677c963bd8c850317a804f5a40bd43
SHA2561a523263501e570907af6de42a76e8c2862f828113ddbdc067adf8d059301575
SHA512e42670d3261ad12fe62871440b1f3cc22d31e409418aac65f6121d534791e51f42074b76176e4789a2fd11605e48a8356582a60ca94bdd9b588fc8d453653a12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb762e4aad48f32a258e3450bb7207a6
SHA1fa8121cab007d22a86a675e4f203c8ca963d3d8d
SHA2566672469e12912ad85c98cec15d6d08de60375e580d62df49a80f152659e31794
SHA5125021733c159998bed78b8fb4e3a63992bbfca0c0946a287d96bcef6a7f91308576dc7073017fd2bdd4b6cfc46d35708d5e3f43915ddda9c09d1c2012b18f52a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e8cc37713c941bd783a9dd52d187276
SHA13972f9e2862ae4d8264df06e0d7d0695b763fc4c
SHA25681d78deb924f7f1298baa5de62a148dabd05b43e35bd8ab723e1d3a6e281312a
SHA5124140b673b9750008ff8287f52a86a86dfb5ea557c4d5b609fcb83aa9149e1981a17db3b19ecb862d1505671c8b408cac7d5119d77f34a61e34e431e52646b535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595372d2d7d9dd121dd4b8d12d9e45fa1
SHA16bc4c42063edda25644713f23b747a09f804e334
SHA25685c158593f633910f5f8713120acea93a351227becd3da7293fd61c3fab63838
SHA5128522a885c22e00bd7f63bbab55152651a1f60754a8b41b33e64e83a4cecec597d2bd232c2910352a180efb261917ea20284fe2db9a028fd2d950d41578f2a1a1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b