Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 17:38
Static task
static1
Behavioral task
behavioral1
Sample
41316e9d9411ca24e36ea423d67f712b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
41316e9d9411ca24e36ea423d67f712b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
41316e9d9411ca24e36ea423d67f712b_JaffaCakes118.html
-
Size
7KB
-
MD5
41316e9d9411ca24e36ea423d67f712b
-
SHA1
9647ae424166acb6da426bd0734667c9d927d324
-
SHA256
bd540f35bc4c695aca4a1f8795fe758ea126d80251bf0038545d593ac96e792b
-
SHA512
de3e014c42b4969b6c3624a1f84e3f7ea5b9a0bf6633f76a162c19ae47e37618518def3951c60a3f36286e534dc9166af93810967783ab1c6dbf6a41a09fef8a
-
SSDEEP
96:uzVs+ux7zpLLY1k9o84d12ef7CSTUex/6/uQvVHcEZ7ru7f:csz7zpAYS/h4uQvVHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000000fcb965a66a867de100179f2447bcba0af820190223408893884b5188fc231c3000000000e800000000200002000000045d35f171430064dc851868f55aab5f4a5cf1f07a01f3ed1ea991dd6b5a88af12000000030f25da8e37795601be89ba9e088d387ccfa37409ef1f30d08d2bcadc6929410400000001d2bc53d03cf2c32fac3a1510f7a1d0d4040066f196e157c7f8992fe221cf661b1064690fcbcb3bdb4dc4a5e305f238025a52bc5b8c6b0165e4d1bad4cddccfb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435002975" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F441BB01-8989-11EF-B267-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108fcae1961ddb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1892 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1892 iexplore.exe 1892 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1892 wrote to memory of 2332 1892 iexplore.exe 28 PID 1892 wrote to memory of 2332 1892 iexplore.exe 28 PID 1892 wrote to memory of 2332 1892 iexplore.exe 28 PID 1892 wrote to memory of 2332 1892 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\41316e9d9411ca24e36ea423d67f712b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1892 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521be07b7b749c080503b5be7027dc1ab
SHA1c7371f79e5671c7fe278352ea61febad80bc72dc
SHA2564a6bec6f75306da81b6a9e8aa840762a5545bc56b25aa3acbe3aa326fa45fc33
SHA512c30e08b275feae46e6b86de1a61383fb63e81b970c9081d92f4db6b922fb93546b82cebea9023f540b21da9162a1717b8ac410e7a9b7290d7565cf56ff59c738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a8a4127f7046afd85a64efa443c9a6
SHA1bfdd183a9325c54280fe5bc844926afb29fb4ff6
SHA25637d0ea5b45a4e38424ef9ed88198bdb0eb8eba4c7f2c9af875dbdc166d9b21b6
SHA512530d8db8b5a2c3a82b88a8d11f59298433f8e89b630713b5fa80088213f3e8c92050bb7c3b482ad7d1855768f7af91a29ce0cb753b6d38adb0aef0928cfe461b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50423be90a883dbfc1f9c3a0620a2ca55
SHA1f54f68cc222588db393c4ad4a043019bf7bc0f44
SHA256b6500fc04b7dd306414e7eeffe16178b6b2c367526efa3feea3598a7dd105c6b
SHA5122e9322d838e2c75bccb2ba99ba9de07d64ce1fe79e764d91d97391e6239e9e08cef9f24505df746936159ff1d2319c1d7742f00b496ed162b662bb552fe4939f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e3b20da7fbd16ace30cf392fc5778e9
SHA167685dd569f1ea713006c2e30109e83f272dfaf2
SHA256125624294ec8c34fcb4b8bce7c146203b7b6e769b4c94238ea51eec6476d7f20
SHA5128b172c95f0e1cc6abc5b44bc532f763882dbce330c1ec489cca4b402f62645a537cd3fa7fddf8925900bf8dd29ef27ed30653f5e484daeaa6843d32eead38ab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aba1278ddc1892788391534ea990d3d7
SHA1d200d084b02475557a51ed6186da20a0e7e806c1
SHA256d5bf7101c8226771838036339a92d7254b96a4f9114b4943bc81585f00473575
SHA512dee765c8e35c72bb7044fd02ef03473d5ce921acd845b92a11e684cb5bb196647a623b80d235c1f7f1dab9ad857c32a2cecb2ff3193b3cfca42a2456621b327b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c2b09a44a8255c6d66a5c8ec8954f9f
SHA1dade6272107a316a87c683f9b061e8e496f5e7a6
SHA2566a6a9fc56ac4b89b2e31169720a53e21d4ef76dca4d740f4ffdb098987ba2275
SHA512c7ccdcb0cd27eea61cb5036ef2b2d9a44e49a88359e2ea9c8ef11badb0bde61eeb697e99e345d29de29126ec3a85880e2f1e352a4d4794bfaafe6c680d804174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558990ebe500874c361e0679981c085f6
SHA1045b0e7e08343c1ef0646a076612c2209370fec4
SHA256294491a85f32e3b268b9bbf46409bf6f04814312820455894273b6e2708c7659
SHA5120a15b8f2e66e50dd1732a939a95d82e5d968cb6118de8307bacaf7e268313a6c65b0cf5a6e5742ac546daed904267df7cfab5162b2a45571c9ffecb99bcf2f9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6c5ff6a249d98a1a2aedca197a842d6
SHA1a798e011305db8b8de3a50e1adf35b1d1e5beda0
SHA256ed3426c61b8bda8a2fedaff25b26cafc0173755b1912881c2382a29af587e1c4
SHA5121852c11adf0b577711cc87b7cb8aec1d1b43683a7c344533f64a658f1bf646193cc0e49a5971ef46588d4153d060ef3c5388380e3b329c1b6d866fb5453ac2da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f5f88af83f6bd3036dad9e67948ab8c
SHA109189637f0de52609555a39dee6cbd190bb8452f
SHA25660c291cd42393525529ebed30bafa8168b5e5f3aee643ddcfbfb262117cd793b
SHA512da4ab0ec584080041fa6c0cab5dd5ef55767d1b483dc578497d32730acdbe6a0ca82cb434952e76766a6893987aec056cf1f0ab8cd33503cdb716c517384abbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc0d8c977ef31188927b9f4789a88d66
SHA18c493a0db8d8b778a459e1646447c268fa850bba
SHA256dd1f9ecf9a687260c2aeb6fbbab2ee2539b976431c8b007751d66e4fa496cf5f
SHA512e414e680fd2cb2bbb16536ccc21d9fba3e0ee9d98973f7232c301cdc87684e3b1ee4504bce4cc21a179570052d1e1b5103e53285323aebac3c89e9f94aa3620b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ecadc08f5fe11372a78854f251fe2b4
SHA1f4a0c2e6e0475f622f5cdf57d7be4f4b3e6a3b5d
SHA2563e6e02bd00938b0465b1653d0e33253d6a329d557f9975e2157c6935ae9e2a89
SHA51296980545f5d7ca308b70d8b409a2e40b23e88fd39c2674d95a0f2ceca22443daad1723327a0bf85745f36a3dd9da3e478806a6fae003cbeb230d1e0797e027c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50767fa04dded5f6d1b476df8bda77b2e
SHA128bf07c62d4000378560e05c1aefe84f4546aa4e
SHA2569f69e2113ac18b2b5b90e9a80482077005448268919420ae800c0567062c6aa8
SHA51259f2cf14c810a684c231cbd1ef68c57a7794ed53c06cb922f0fd1c271f94cd2a39d209526bf300a60be44202637f871d369ff3e2c69edc2e3c166ae311a3048d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb9bc175d5a9a0907336823fc7f605db
SHA17c048f7ee6aabc8081de27a607fa2205b00573ab
SHA256c9529ea1011cb798cb786c3f742fb6645d0fd7e81b8fc129d7ad3422e56be5f9
SHA51238f20235d4b60824117b4e4028b3ce2e8c60fb15522480759bc6b666e8ba3c0774d1f86a0acd9159cb05ec40ce0b0f8c8ee2e0eedff77e961337173657b3dce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8815b0319a05ac1f04c0fb34ff27889
SHA180ef161b8c19293fdfa7c8f406dab2c4f4042b87
SHA256c3056c5d3215a9829d03a3ba74d0d8ce35c1a1f8100c4437bc3e1511bbb3a3fd
SHA5122e860e430f2a7b0e004d81a28aa8c912f6c82bb9a5f3f8dd70dc63a895b6a145b4bcda99d343b4bbcff567240b0dde86c3dd4f708c1e6cde8eff83aae7e580f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529b027bec3692aeab11e10c3241aca61
SHA13a9700e85c4cb8d77e819a6805635f6989a77380
SHA256a8bf5eeab541e700d4e85770cd23d8f7884b2bb899c2a9e1c917c399d593207d
SHA5124ddbb76ca113f7db4d5426e4193e6b9d092a210c92718dd7644111786d3f62bf10818a41865a9891ed95dbaceeaa4f7a4070b7503a79d6053e7774d74b08acbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca18630893961387f82e2fda09df5d3b
SHA16c734da23a50fbd7288a61577e14a823a27399b1
SHA256384bf3abc6784deb86872e955dcafc8b95b97f60e766daf7abce1d7ace77bd34
SHA512a7616dc6bbf9e30318fea8e8999f997d1ab396066505a45b792f58f7392d6bb47ca8730b0a04e58b59c551f5428340e4e413b2e7986d502cac753936827a4629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520742d69200d342b2118553cbb2a35b7
SHA12a0d65810e4a8f8d0ab8c37c8fe3035e168dc802
SHA2566374e451d39a283622d0cca97fc23869673425c74f8c820bc9d84339e40428fa
SHA51224e28e403c7e5f1fbc427f14a53d7fade61b46d3d3d45d3cd151f88625e69a6beeeedcc16b4603504dc4e0339346ee0333c7f7eb2830fddf56fff64c00fcb0a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f614d3b502618ebd1d4dccaf3b83334
SHA17ba48358cf4d55aa5627b42689035081422308f3
SHA256bb430d7ce9e27ab2facaa9d159d8d9f2d0dd9da2a83e926f9c1fb74068e390d2
SHA512fa3511e7bce5aca9caa803edb723b6854d90c0320140317fad5ecf61c263ed5e5fe1d63de6e9c39c3a9db2d07fccb0ba3a07ebda514c0173b85fcd6ce261e4e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1f506e87e7c0eca86d14ff2c81a9d74
SHA146070d8d4884d39d7fc7ad29f071c3fbd217ad5c
SHA256a962723b8169c607539252c8a4585500737c1d0ac0f9f5a03e91671c405607f4
SHA51253e18116aa39b87ad9c7866d31ef9613fe77731dbc4610b3fed64e4eacb1d4951dc3b07bcb4d1437c9794da0a4dcfe77d8aaee5e931eea6c1c85656e7cbbd56a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b