Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 17:13
Static task
static1
Behavioral task
behavioral1
Sample
41167493b3cedfc7c19976d99aa59d92_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
41167493b3cedfc7c19976d99aa59d92_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
41167493b3cedfc7c19976d99aa59d92_JaffaCakes118.html
-
Size
138KB
-
MD5
41167493b3cedfc7c19976d99aa59d92
-
SHA1
5d6f90c3bd474a7e35c89808f896958d08a5ef59
-
SHA256
5664342116b7392d74ad096d9ff26665ca3c0d5c51f1eb6589cac79e26ff1f83
-
SHA512
aa424b1af8114f2f25e3583331b9f6b3257daa42793d21795db36b80fa90140d649bcd9883c0019977ce187ec390e6f05549f2de8ac2597ebe888248992a1f5c
-
SSDEEP
1536:SMVhzilJsyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOZ:SMFyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435001469" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000695c345550355543ba1e0866f8b6eda500000000020000000000106600000001000020000000b59ec2334b4e5c4e2811d3ea2eae5aded61e5a73c4dd5668547c26c7fea7cd80000000000e80000000020000200000005f7557d75ad40b1a5ffecfff3930e466453bd99845a1f2e1073ccccf4bbeef6120000000573bd1791ac1d2df0593ad26f62c2a6f581193d90c1f44e86399f1ef1fdf7349400000005c0eb2554f041de7378eccff21d8e5521ad544f0b24b3b482505e045275ba485fe516c84e7cb551b0db9fa66c8e916d2456ea1fd7a7d17d5f93520d111837299 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a05f508b931ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{729EAFC1-8986-11EF-A207-6A2ECC9B5790} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2360 iexplore.exe 2360 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2432 2360 iexplore.exe 30 PID 2360 wrote to memory of 2432 2360 iexplore.exe 30 PID 2360 wrote to memory of 2432 2360 iexplore.exe 30 PID 2360 wrote to memory of 2432 2360 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\41167493b3cedfc7c19976d99aa59d92_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5017c3c12867934602b00d2de3ff3654a
SHA1527efd3cb182d2f81b61df4f78945229541c6f2a
SHA25696275b8c1abf0bf2eb657ee0007bd35788dedfde59740faa3e8adfa90bf716b2
SHA512d493215ba50259b5cf0b9cccdee20a98912e5498597f9e1d0009fc5b9c4b45808058a29e1f6b371f5d2828d4e2f1453eb04e74570e188baf64f61d04239dc906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3e6a7b253cdd7fbc9772b1931fba088
SHA113777ebde210e8c344d87af332706e451f700c26
SHA25645c7f277e55e855fdb517c4ed81a64024aca1eaa3915771f59d9ac6afb0acd2d
SHA51273ad00a40b2854c62a8beb165b793f7d428d38979405aa3479fb0ad9dcf60f9c398b97cb16bf34a17fb8e9dfc524fa921ccfab35d0aab03b2d918675035c5a3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594b48409f4c63edce005a27e7686d308
SHA115d55ecb997b3286b682fbcfcf5a522a2368f6eb
SHA25639e1408e4e4a0c1e0e5035cbcceafa0e14d63bde199a53aa8cd3d9671e4f15b7
SHA512ff9d53c774350dbfcf2a0580c0ff3e1847719e29cb9259bdde29b0bf0361522a29ce8078de9d142e44ede423d661bf1266107ce9469f90ebd9c3d9d6f9b9d640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595fae353017433c6b9d06dc307602ccb
SHA1b144aea6bc62848f730769f253925b8c876d88a7
SHA25679f5804512149d71179692dc4b74a90a727731618dbab4528ff94a37beac51cb
SHA51298fad2ee63d81a6db06185e50a8ee96e87d20e9319c9ccc3514c20416821037b6d702558d3963edf16294f04335942b025a07bf89817300ef9f620e5bd05406d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5d4af495dd52660c5aef76084064c2e
SHA1dd45d1e72b103557b94b2c50aa58aadca4526ce8
SHA256d31619aa0a283aee1a1d4ed55580863d503d422823f44111ef5eee47323f9e64
SHA51275314b5609649baeb5677cf5f84935d993f82634f62b5fc58dfd38816e25c269b63535152436a478d0d7f27d936abca024d198b2de5bf11d1f4103c9396b4219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed067afc78c8107c1b494433c9a65a6c
SHA19ea73ddd5aad154aa91b6ff3b64d01b64e4b3662
SHA2563c9985701a034d8a2970bdce85395635b5f1cbb3b5a7d1e419788e4df3e94dd3
SHA51274b2ad71be43efe282aca62ddbd1beeb941bafcce104614bde0bc9064184a9b7d7423d57bca4c9a4365e33ede7751ff71029ae83d932ab8f793db9bdd23aba67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d92503b049f103592f2617d1406b670
SHA1d79db91e04c86a0ad9e04ea9610929069c891197
SHA256c941d76cc3962e5889359e05dfafe59aa9ad9fdf6325ce3445a23c82961e2568
SHA512ac248b7f988e476e263bccb8dff31305da8f27ee15ee77c00b3435477c1566d4d2d2fd85e1d985cf3f4cc0d7676af132e3cbdb963e47ef00e7866850c200fd3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4d6d13ba3a703512472730d2bd57387
SHA195a67c26f46c8f9f5c1acd2c233cd2a4658680f5
SHA256959acd328b02582baf326d7056477e6c1236042e98b7bd9db4681217dd1ec0f2
SHA512638ab2593223cd5f158ddb947dd6affa6a3123a7b07cee4ecadd771ce5df3e44a72da69ec48ff69f1b62ec06f7abc79a0a7e2503cb4c7b57ccd0e7314032dbe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54248ca0eac49ddc0b17cac0a3b446159
SHA18db9fbe5a704a08a7b471616c592cf5a775289e9
SHA256074c10ce11fca28cfd96a4db68cc0d9f7d4e1dfc72c5068aa92bdce7574e3a08
SHA5129922e6e1deaa614912df727bcbb86a1e010606ad15207816be7526fa43a1ff588d33b226677386d21c2c7f0011223bf448ca95456b2099e4f85a042d7b48231e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542a9e05a27107c33e2a939e5004e9d44
SHA1a86db1e21590c8077a2952a2f4ed4a417cc77b1c
SHA256c755b94626b14dcc54060eec66738e36a2ccf8ff962e0fcfbd6766fc2732a5bf
SHA512815c1e6943a85252143d0994bdc247aec8561eef45c1f574a84e124a22fbc933dcdde4a2e38ca7a34e8b5351e6057fcbf0757da5fb2abbde3c07863305750785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d153bef310ac10fd34a0b5b935678f73
SHA158172e0773480f47deeb463c93deadd449d2da4d
SHA2561f14411782c4ae2704dcdef32a8611c949330a3dd33a5ccc01cd05b4c096c65f
SHA512dff4384ac032b4017ab63dff20af35115d45438b42c6fded69614aa964036172050f3cc58d0fb3dc6667630ec94de7e75a06288814dd7f11f694606988f17f2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53de6766c16bc0695999c72e5ebab4a0f
SHA1bd4dd515e4061410f3ae0b950771a9d235b18ca1
SHA256e0f73d1d2e9cdc90d9f862897fa9a66b30ec47f381ed2f63a297f8d6ee191bbf
SHA512ed6b9a5653f45467096e20168522e985f642ad3d5d677b85f15f0eb2cd312aa328b0a0d337397ef4d3eb476d232b95de5e5f6c1d133bf4e4b4c99db3d5114290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564c2e4b7b5abd6e5168ad36f713473e3
SHA11d5ef3f9d7448ca7fcfafba464e4913ed620f047
SHA2565f758682738ebb0c949152ecd7c470daead95b8f8fa6aae37b6217041e736543
SHA512da2bb49c8325bebd5c2320d8f82c4d74b080de924128d9819fab6ae96a255278507b39478dc9cba14b1d8cc38dc26379a701362b3955a83e97c16d182bced233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d16408c1b9dde9b4abf8f1487cd0419b
SHA14a0ff247e555e16109c421bba7873c1fd16bd0d8
SHA2569e99aa768b96b009235e0bc35e988dd1d49f1640c0a57b6f9494ee1995158d0a
SHA5125abd7af3df4f9c1483c45a69015a86af4d3a0ed056fac84e09a607310b49829e9abadf72b6ccd44cae96dc84246f71c0882636c09d6d2ee9ab61a9525ad60401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521786a5780e16b77c657ce53753d6502
SHA1782c5f104fa9e36bc6856273b84fbc42809d6865
SHA25672017c819a38869880f4cf2555a8c6039eb5c6a74bb2224eb98db0531a59ff5f
SHA5123bfb45422b192be3c05957e8f48e2ed41e06da073adca6bbe9f2a4686f6cb64faf50ba324794dd32f5590806f5512285b291ba6d66db5d893c8b0aca1167b13a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5215880a90246d9b95a314b35002583d6
SHA1e4a8a45e5fb9aa73f3a13ffe824e35f33d62d580
SHA25653df79a9290aad00c380ada90091229a5ff7c898d7679237c8fb10f811b1ec2f
SHA512b63d28b54e73d04983fac07d4cde6ecc417d098f0c63c1bb200c948195eb633b44de1f17eb791424e07d0bf5ace8ee25e27d2084eae1a42fb2a908a301fce7cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585e54b1e0f1f9e7993dfea6fc3eabe06
SHA17760fb948d6d6090dd8270e13ae06d89b4b27277
SHA2568a638948620750678243e1154fc822e3098cf50d674cb18e06ac918cbdf926fd
SHA5120f612cd0c65ecb85d2e7ffb16015ad21c9bf3edc8227d3d6ecc02f9942c1b024bf5d20d4013ac4b4e3a402f4a0b1f2a0e2938c1eb1486f329868e555162c6636
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b