Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 15:12
Static task
static1
Behavioral task
behavioral1
Sample
40907fec2186ac78f057802abd99019b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
40907fec2186ac78f057802abd99019b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
40907fec2186ac78f057802abd99019b_JaffaCakes118.html
-
Size
28KB
-
MD5
40907fec2186ac78f057802abd99019b
-
SHA1
24e7fb9c975bc93b16766c5abcabfb01e00bb789
-
SHA256
0ccb43f2f2e45310579d5f37c774c8a827fa0e6f25da464b35242c899e041e79
-
SHA512
185bd3f9badcbc1ef33e4cd0fcfa83348e887affa437dd2cb7593a04ac00a7953d47970f6ac7542d3334f5ae45602e3b83da7f99c0013e6c75c2482a7ffa4f74
-
SSDEEP
384:pZ+SQ1d/PkqoWvXPYg1KZ+1OBMC2jSI00ZiM7bgvXsZEgggb:H/Q1d/PFfvPfQWCAt76Mzggb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000d9723ae560c514bab11aa0a814648a9d462e08840de7a0e5537899e855a22ed4000000000e800000000200002000000084028f444d6c14bf9c940c9b25046df153fd34ca20951d7d2078870e029b9041200000002384d3a20ceb6ea9d93e6088e193ce2a6f5a139f5b79aff1af1135dfa8e8ed9d400000006d32b133cb11672e5c3ad56edd15eaa1aac0473894cb8e4d72576d13fbc9c475d559109d1176243a322bf5b60fe35b70b9552cc2c95ee36b79aec675e027c840 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434994216" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8F78BC01-8975-11EF-9D9F-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00278a68821ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2316 2524 iexplore.exe 30 PID 2524 wrote to memory of 2316 2524 iexplore.exe 30 PID 2524 wrote to memory of 2316 2524 iexplore.exe 30 PID 2524 wrote to memory of 2316 2524 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40907fec2186ac78f057802abd99019b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5055a95b6d91240a30e89300529b1242e
SHA106a82f0ee823d0b515c99b96d42288d2e356bb82
SHA256d8c0c0478f7b13f2bea2b3e1e31ea0dcae8150dc76867197bc09913a07c78352
SHA5128515eead207d57225533d74f7b1159dfdfbb44ce3ebd275398f57f879b6d81513162412421a64867af5a52d2deaa6b3216c6378b5c17020d4ee7df882206ebcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575d48c5afc92f6a9d84c8d184b8b4851
SHA18a3e4c2be9ab20d04a48375feac78d814e3edecc
SHA2564d947095dfee396a49e4da6779d082122f4359856b92c5f1fecc175cb084f696
SHA512ba7026c6d6291398acdbd1c98ffdcff04abc89a6ab959dc2dde304059c613c4a6acb2e3885e411b9d2bb3bfb6bad99a305f82500192484ce31c9cad1ce023911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586a8f82cb6facc6027f0c886a18207bb
SHA18f48762dd2de5f99b6004bb5b153291500a85580
SHA256032da5dc0ff996c9312b3ffe3b6b49e2a64c1e83017fe55c069520eb48adace0
SHA51204002f42e13d663a7f5734fb16a9795a71b98c42521cfc087ec47b414cd8101d11714ccd15bd6668f70f7369cea4110f82b11f3fdd324363283c9a9304b8051c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533f172138238c280da150f606560dbe7
SHA1e247e49709a6269835992bde1d8d947bb56089b8
SHA256edf125b923e04be6caa1d05df0e22f0f5d0fb748d9203e0b6058faca049a0533
SHA5129c73970e64e2634e56dd7196627c45f7fad92e3b19ab0617b19aff77dcd08d3613bf607b6f699a728ec81a62e4c9c98f06036782ff9bb5fca18aec8b5ea3d3d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0846fc3efb1c47b541975fe3a07e042
SHA1fe665a12d8a1a2e502029657d4c01bc518c12126
SHA256289016eac271de318b8c72e43a65223d4b468cc4242557720c5583a5b430afb3
SHA512dfad6fa3011b8496cdf32db71f9ac3cde8210496cf45b8625e0ed1a62cef7d9c7e7032987e66a62a057b4d0e945907be37c17c930275c4cdd48b63073ee47006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b82420c870aeb1f62ecadeee02b774c
SHA1caa14dc067276e31035fd1910d0b1ed1f87b3230
SHA25628e4d82a6cd563ef8d3c4d39a5caaaecf241a77e51e026525257bc5dc0162d50
SHA512510d7b674067d9dc23cf0e9af9359d5f3e410e0c78154e9c46f4217e03ab345010ddedef430d1510a74b1d0845d6371f08adab0ff740f0b83a0df001b9afa17f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5709ffbc7a950edc8c7bc87be25147406
SHA1d51995b0ae31b4f5fa10e1141a07afa4f869d622
SHA256b72ff729c85c81a31020eb9220d7150b5f84157d3282b3027b0b1b81d7d325f9
SHA5122db3b9dc87040dfba838abd0c33f68585527a8d9b87096a5d35515976af02fbde9c91266449058099db02a03633af70ca831db8eca20b1ac52791061b823c391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587173539565536e8c73f8404a4b5045a
SHA1c96d867db845270210d4ff237801d61e0be77090
SHA256ad65a716ef3b726cb6b5e99ccf91c07c841f08e011d5458839b9372d27178864
SHA51289442d03b6df4a6b16fd720ec7b88d23f973a2c72e2067c7b365d289d6cb156a73fddc41a6a94945e62ed42e9efc9a253ad908034a95874726cb89f15af30a3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b20780b874f2ea60ad80e5bc9abad7ed
SHA12d5380b570bda21a276a6b3926bb1075b5995991
SHA25666e55c52f2bfe44798bc0340f7a7def20764e4dcf9eb77f0127e474ba99aabb2
SHA512b2f9bcc9cb2c2d225e06461cb7035d5d14124afb7cf0a776f636f22897eb4ec7360f8573a39b90fb42eaa896bedce09dbf89ec491873547dc68be9b9c0f7c1fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54546f903e06b2ddae1b820869961eabb
SHA176c96fc772dafccafe7d8884ca55a2b537b3448f
SHA256609e7b84a98e91eafffb34c8aa9f00a42f47cda0a6324a761e3513df16367d85
SHA5128a257e6dc9cfc007e50b577f2d5cc6bb128a757b06f7eca92e8b7c0513b54bf43a3315030e278b3aa455e0c25fb0cd202d26f309889b9b01d2d15f2023cad1b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591d5b2132178c6310473640602d98728
SHA19ebce1d264b52622162a8b5bc59e0f7a71831cb5
SHA256ba196a825e445b8e29b40070fc3a2a8b83049bd04091f856944b4a7d8f6eca74
SHA512b62dfa1919c36ff89b8511898346e08db842da70da64436471eb42777d4567e6e5816fd0919dafe19026c16300dc51a81fe19f8b2a450b38cd65ecd46687094d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fab75fd81dac22cf50dbe959ce74cf5e
SHA115bc11e88eef528a8000e840a736aa2e32844d9c
SHA2569c259016389b1a1266e92dc2a1586026afdf8e876f29ae1c0f0a07171a2b1db6
SHA512ee52d0b86bbb1aae53abe133904bac3f18265c7fb562ec292b5ee455fac26d6bd1a4d08649c6b6000af2500a867886746905cce0cfaacb1c76670e90d42d26c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5593257d8336fac58d5f7241507c878c5
SHA14fc9b405d2e9cb8196cd83a989e25e42046a12f1
SHA256f053a6b223fb86ca636c855233fb098c768d83020cd80f210d1731c46eba9d0f
SHA5122b9e118f5c7b670f4b698066c4867e79c2623afef9201182762b38d6bd28e89dca5b8e2dc8f15ddb9170a61610d032d645f60aad60df2b6c455209d42b78cc9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d99d4badf467ef5e5c7eb9e6b1657e3
SHA19bbd4081ecf93c1d593458ac7de5fe6aa972638c
SHA256ec4f52d2cc14822c525f8cd1a842c1fe9b2d80dd5d88844d1104e00bc35ff1df
SHA51297583b683c47e865b82239588de82add412e1721e44dc34c4063c7bbd34e99ad7463a657b1c7e005c76d9afc37b84fcc5ead6bf250fa1310da72767f7b886b73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD52a555ff7faeb20e6a48b6c92eff6b7b4
SHA1b43675d90262be2b09a104f5b502203fcbc4d416
SHA256332d208498851992e4d393051500680001c845c55fc6a92b61c392a7102e59ee
SHA5124411dce7bd0f36194106397590bba3e812462de9b6fc809106e413c7c5695712ecbdfd7fbf5e8e5c806e501a1a232115fb40e649f582db9aed186ed4b6dd4cf4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BQQODH7V\style[1].htm
Filesize166B
MD53ea1c8d079b38532a6e01a96216ba5e2
SHA1598d3ff91d3e252f1e13df8cf0348b270ff2da3f
SHA25687a9323ac85ce28867d5d7ce590c8f29b8d1a999961fca71bb33adef48683691
SHA512cb4f800a735d5ec435844ac114a81ee6c4a429138119b97f2266edb87cf729f1a64662190d04917ce955b0bd3681610d49be42cd6782989ecd4b0d87ddf8a03a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b