Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 18:30
Static task
static1
Behavioral task
behavioral1
Sample
4167162b27fe5afeac9fd4c7a1382f94_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4167162b27fe5afeac9fd4c7a1382f94_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4167162b27fe5afeac9fd4c7a1382f94_JaffaCakes118.html
-
Size
6KB
-
MD5
4167162b27fe5afeac9fd4c7a1382f94
-
SHA1
f5b4df52feb2410b708e9015f9da038ac1d5d2e3
-
SHA256
b3d55f6a192a45fab1d8c89bf33de00b1d1c03fed54be383e78b949c965a9b80
-
SHA512
eef6c4dce6b67a7b8fa77bf78e87a3076d3b7181cd60b0e90e06c29fef2200b9692d76ece111053a06b8b7b408d5bf36b1620b214d445d3423c65730260d54a3
-
SSDEEP
96:uzVs+ux7yLLLY1k9o84d12ef7CSTUIGfcEZ7ru7f:csz7yLAYS/4fb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000f6a3d665f4678e50d0c1bd8eb8d9c9cfa61343c89139ada9887e878c305adb44000000000e8000000002000020000000bf0ab965bf57ef8032eef42664d897ad60f9f4c3a60f8adcab6e0f0a65c6de27200000006529bc4787d2429d597e33a7e260426d286df2210b4bc28bc3e31da250d7eebd40000000667f9c265eee99f5a209dbd829413681b33330172a2814ec4c0d444e389dd664b83539132945930fdbec527ab304038d83634986e86cb10faaf32f9fc8914532 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3F133F81-8991-11EF-A2A3-4E0B11BE40FD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90e6fa139e1ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435006106" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2268 iexplore.exe 2268 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2812 2268 iexplore.exe 31 PID 2268 wrote to memory of 2812 2268 iexplore.exe 31 PID 2268 wrote to memory of 2812 2268 iexplore.exe 31 PID 2268 wrote to memory of 2812 2268 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4167162b27fe5afeac9fd4c7a1382f94_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547e44db8db08a6aa9fe2437161586d9e
SHA1623b452846f1cb7a9298d4a2114fc02af7f7288c
SHA256aebac38e24b0130b51448f9d26071c83b9de3666bbb7c21ab594e173c9ab1e5f
SHA512821eae2b51fee3caf3e531854b978aec90b8e830bb795ff6f4884dac5bb02ac1e97ebaac6231b9220c282f0de9f9c8175f34dadd8adbe51cf92493b6c7da8ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5118b141b17bc3d64326727c32ca08ce4
SHA1af14f82e6eed563074dcd700df899dfdc5a16ba9
SHA25617914fe2be484560d37b69881e0bc6984bf11ada20168db0772534eed9aad091
SHA5123a796988a4e26fb891392eb6e532e46bda6afd6776676ce25d3feb1d15c780c8b326acd6f6c78cb8fef3f6976d3029206e55cf91a0e2a1afd98c1cfb074c9fbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fca990c4305ac92d8007faa380fa4e5
SHA1568b8fac1cd4052d08b766579cc169e94d6b7f49
SHA256c7a9a534ca1a76ae5297e5a2f523a35b20c03311f76199885309dcf49fba36cd
SHA51294cab9c935a6e828894c1107d3baa4a411bbfba4349c690c03ccb5fed97839deaf2376b8973fa6e5238057e384891fe5dc0a70b84ccb116af6fe77277ee50ff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5153ff829027c81cdf610862d93f291f4
SHA1dbe70cce337d7eafb5a34ddc8073cd43452eefdc
SHA256d7c06321fe883c71b96041ccb9693871b08eac0b58855eba41e338b313c93671
SHA512de04e22ffac3e889cc3d4a8f33f80860a576bd4684b24b3332254d208788e56dc029d51d7fd961f7b8b2eb8bbc2232dddaa2899254a748238750b789afb39fad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b000e07c696595db247fde940200d335
SHA1de8fcc725c923f33f84aa6eaeab4a230d31f56a6
SHA2561de69ad20289862992f467f7961892369e04f0b738b648084aa0963d0f81dd9e
SHA512bb54f5e8fca76dfdb210489396b3fe84af9220386b3affce03d4ef9d72d765e185e2ced1b91bfec2a2de6ecf3209bce8c880dbadb5ec43ce412bed538b7079e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5855713312c985c2d9cd8e9cf6a40a79c
SHA1250f3404c02bf8b305fac8e19a8ec96b1ead4294
SHA2565c44b975b06255b09b1a76ef590c9d50f1ff229d47927d703f3011b2772b5f53
SHA5121c9c74c9a15e648eb07e4e5e1a2fb33d5c75c40bfeb19a1eb8f8612f95a61fde9ba804260a49df8d72a5796f33f30f8e5eaef9c28d028203c55e050a06fdf448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5552b8acbe603c0cfb5ca407bac3575ab
SHA127e119f21287202d638c91647035b27a78d1f1ed
SHA2561be24414b906a0991f6ae5448c2eed4f53d402c042abdb682c28bddce274b803
SHA51210f2dc44623f9afc36daa6d875bac04aba9f18bb774d802637de794f6afc6d8c672c21660967855658d3cedb114263fd31210bd0b8db797a1c6d9b3cc4cf599e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a822e4eecfd56bd9dd81f1bbf659fb94
SHA1e4e870442606dfa18fe92a86022a42186a456e9f
SHA256ebd4339594a0f69ec5a4852fe681d621d6a73645ef86e76f7cbf3d8b3e66a859
SHA5122dd4b56826fde621625b31f210503db024170f4ace6f649bcfac687e4dab421f3251b9ba1aa226ee4ba6d2a59ae67847a643ffb5c41a2ae81fc2be8610ba89b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a066eb6d8e048303e72d6bf356511731
SHA18751bf9f6d3fc10e04867353215593d2f78ba596
SHA256c767d33e55240b33bc61215ecb5f10e220f55ee50b0f03b494ea07b6c27fcb46
SHA512c44c874f08d4a1c9223f30810b617dde485932f87b21960368b5e47af0d42619eda56f025ff38ba1d86302fcbe5b79830fbcbf7314e35f80365afb073e531e45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525d540e91724d6932271be041f6c63cf
SHA1f63c2d75b39abd52a21b227f7ae8dbdf39c30248
SHA256c43fa6efea76e8bc1577136b596562072dd2361cd99d83d0ad2ca46899a05851
SHA512d22ba1d3379aec9ab21c379d7112a01c0303464cd4f8cf8e3e40cc6fe5964ad999eb7bed0ada1ae4818d7f9f3405ceafa9ee2051d799a7a09399d06c28c376da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d36f3c52781eda4f55d137de91411840
SHA11df08ec3df39f33162d3b3f185a32b526df2508e
SHA25689abc522f7625f7939c7b8203d5f4fac5c14fa22cdb551a7e6db6ab35a974c6c
SHA5129298934b79190094b635758f26ab82810876c045e13043cc5a3d9545f32918a8afb6bf01db547d5e06957b975ab27746bc8feb31f05ab383eb16dc1061959d32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57804ffcf8094fc4eb70c82f2665ca6fb
SHA164eb45831bc05f437e2a6fe8087c4f3a5e5ef892
SHA256147353ca0ee5310e181046c6ffe7dc3924c1fcf94e969ca02a607546bdf9d42e
SHA512230e65e985e5120b0821614933e8895186577c0983ae15a9f5751c4c9a915e88743438ee7889fb95b625e28ef5e60156725a71b4b62ba0943322a884c1c42da0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2d4ea9e18a6afee2d762a6e84e53f39
SHA1948dbb775f40157a56095de0d6eb8c04259779aa
SHA256abf4bace1fb1690d649059a7a6798412956b76b6c5245cbb839afd190361d186
SHA5124e23a45a7862b9705ad741fca08e168ab69214286e9cdb158f2bd21bb70d0b5cf8e0928a5da73cea2b902243eaadacc9a05ca0f955d4b1eb11a238b4d19d9f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3e21ffe36b1c1c58d4d68a9bab32ef6
SHA1caa119f823d0603d640bb785c728e30a1d5f3880
SHA2567980a650d721b1f23034ffc610f5bc2bddcc933b90601fff7e9765bbed39f296
SHA5126a682ce07f8efa7b83a69eda33afca24b6a35481113c9436c7ef606f060ec4cc68323ce849c210ebf1b81ed5156f635feecc11caaad91c26e8f4eaec120394b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505b2dc90d928f424f0a6190ab38fd400
SHA1b383d6d7c1590605d0b9398b33bd9257b1dd8653
SHA256503a8bd39de6d5fa5331ff23ba8b489310ee512020a6a538af8d09c79f62b928
SHA51225fad97b6314b799c016e1ad4c05f49568ce7c5b9d2b9c60f098a68f5605b8794bd266279b44e2b955a0872c4fadfd9c4bd42a3c9b6ca27b0c2c46c69f1c2640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570a567acadb0f836562c444dd94b1d9a
SHA1f250e5b04c7f0a25d1f741826db5a37e10740020
SHA256e4c0758bb924a41096f8a8b3c26f1ec2ab18717ed57158838cc5494687a6ecd3
SHA512f05288cee1fba8c25945668f2564a904f1114bb34b6eb76c3a851cf1dc678baa428466695ddfdc9c9d086238f929b7d89a5192e4d701a322f07ec5956e4d7ea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5338cacde8b1b9d8cca80c7d0fe761d21
SHA125fa941d21efdff108bd31098fab37dc5eb6e5d4
SHA2562e5f85584772d429e4bdc80b889a43ed9074cb6dbd0a0c3f356f3472ed1c823e
SHA512687a729b6bf92c2e9383c841d6ac3237d7334e9cdf7d6f43bc15e6665082c65310d00bdcb957d84b5fb8119957984085e88056f78f46862a70a06f94a4044e54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d465b1841b9751d942e082f33691269
SHA1b898a330f2ccbf48942f05ad2ba81f7d60bcf210
SHA25657788567cdb8d0f1b1198a2f2a4c08a425d7eb161ba947d85554061cb603717d
SHA512b029f4228ad14688f043c9feb895fc4f335473ce71c0a1750ac20f49fc80790788c222cd765e1e230446b9070ee7d6ae5e3ba44456490c407d722d2cff16bb19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50312cde19d797fd13cba69684aecfc8c
SHA1f5f50474d688ae2513974909a287204d4feaeecf
SHA25696b3c0898a43a4b24dbac036333a5b891e85647217208a0524bd6cbb53221009
SHA512a3b8ab31bd1ba6ab0b8e5b0ad7420ee991ba60d4d5fc752df5a958b6c8b7b453cdb5b9b27c7481bff0fd63418bd61b7c8d2c0f8f9cb835544083d210f336bfde
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b