Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
429c08717d50d49c16bdcc916de6a871_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
429c08717d50d49c16bdcc916de6a871_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
429c08717d50d49c16bdcc916de6a871_JaffaCakes118.html
-
Size
1KB
-
MD5
429c08717d50d49c16bdcc916de6a871
-
SHA1
004830bc24e4a5e7713e4d51a6d22d4ba1a1af4b
-
SHA256
674101991551325a6ab1677a7e1c41de8b59a1d942669ba12a10b70d5981d2ed
-
SHA512
cd157e4223e68c9b6caaf2420a61d72729f11dadada8b68835068236b5c94cac2969f77afe2766b8f7ffdaa97bbb10d8d7332301f0cb480b0c4d26d1c9061d4d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01742fa3f1edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{25B5C791-8A33-11EF-AE85-F245C6AC432F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000d9d14b37a0d1421652ce72942f6639d3ddb0e401658a69364f3352fdc38c666d000000000e8000000002000020000000f95a147500b976e03a14ff9a7fba59aff9a896298004b4867da71ae28683d37f200000006fac64b3fcbace4702460df1dc49c8e368ce22cb70d9df20c88495ac8af1dab440000000f7da6ab1068b15df1643a4ec7d090124b67df5cc2de1bc502c0953eb47cb9df0cca4f57a149b503ec0944e4cd7ed42348578253524403368fa41375de71c30cb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435075643" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000002199734160a1f5dde022ceba2743eee0f77f0c4ea0c066d0910d8b3e1458eea9000000000e80000000020000200000003558f3f0e89539c59756cf5f840195f4d407b62cfc7c591a91ddc9b468ce9ab4900000001839b29a369d6791c44e8e411d65e1b26128900e5c06699e4e4aad872df5078bf9efe86d3bb72c1bd10b4fb901f4f70fa862735158a50526185b69f7106d08e3cc48e79303f4adb5b72a88b9c01b6851f1e248bfe393a887fe55dce7e4f706fe12599ccf214da05f772ebd49d6c2b3b0d4cc3e120697d4e4438f5830c380dd590ce09a348d8743973245feecf4d1b3cd400000005715b58388a5ec562df8dc0d19cfce2302199f6682199c600b88ade85b226212c0ea0c8cdfd0f3557fa18397037239fa3699ead923f1fe432c6cd07a03920289 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2892 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2892 iexplore.exe 2892 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2736 2892 iexplore.exe 30 PID 2892 wrote to memory of 2736 2892 iexplore.exe 30 PID 2892 wrote to memory of 2736 2892 iexplore.exe 30 PID 2892 wrote to memory of 2736 2892 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\429c08717d50d49c16bdcc916de6a871_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2892 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5b0a50666cef9922007b4da1889d553
SHA1ebedd478d958448891a5a0aeb7a10e4f0e9ee53f
SHA256605e71b3ac6bfb16c6250b091447059542cb22242bcb0191a5ba52aeab7d987a
SHA512d7580a52001fb7c9bbcd6e12573363cd82b9c47203911e7c56cbef011beab6fc9cc3fbea425d1cb1bd6b38593ad819aa39f31d00f374ad8ec4b5eab3efcfd236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b179e25b9d219f12efff75ed0175dde6
SHA1ad12f2a9b93b4122135983c20dc6eb771b7299a6
SHA25642fa38b7c4431619a498c3e71cc7bb792523e051bcfc7fe52e2a8d3ace995f2d
SHA512e457928cc65748fec5d6ec3cb958690a4a1225b8b2308f9ef9b53834283f6d07a72f38d4e85525a0a54714651bfa30ce77721ceec40e0ae80b59d95b6c0e645a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57348d26cf4982a23731c66a87b774f38
SHA19f6cf0740b7851ed2be11a494c31d91e58a02369
SHA256d88d40b5678c49f75d6b1e3e2d53bde7eff57cdbc9e17fc09f5a78a738e93837
SHA51200d250513c0a077d2eee2c7b07627cb6c4dd556d11b9d10c1e50212d714287f26fdebcd60bf9b3e2045a36705d565914527c4df9536d1acfe77add4cca80fe2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589b351b5b64d18d3b9d30665fe85a73c
SHA1d371e5e8a6806faff80604d55b4261f488b26af2
SHA2569db8c8196e526e3c35f0cb9983196d024ddeb8c71d698cc797d79f5980e72045
SHA512cb7ee1d647a348f8c190d1002f88b8608d361d069598fa6ffdb248f9fb6510e7f15a42ea419fc376d658bd38f4ecc7aea3486d44b1239d809b7b185d7d3c8a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5253370e9f49a1f529506b88316761752
SHA166b0d876caf642f16f0bcd0b1b861c7062a03772
SHA256d95429596baf1c53aedf66566a0b9cb9ca4640981d0b4a0967c21b0b4442c442
SHA5127d67fc269a759c624632c73ac35c9b9f720133959e351a1ea3ce0a2b8c1a20f9d143b0430b265cd6a8fd82986c34afe45e65f34412901cd4c120cead976f56a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c10be4572ae3b626bcff31921d33c00
SHA10315e5e78e82bd34f5b65c788a81a1f6f37e2384
SHA256ec724c32209d0fdc086e43cfc17617b44adc895c3136a6203c249f28865290d7
SHA512ca776e9bc8922b122c8de3325b3005a012275a718a4622c82e299e822413cfe6b1403c628cd2ce411966810228d29de5f5160183300b4f3acf22973f05496521
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f5609eab6aa06f44d9524abc713fa29
SHA13ff62ea0236a0226b24f09ef439241becd56f2a0
SHA256ca94c1b47239b675bc92765fa8b4a4b7572e54c8d2f8da9a27220e4fdf3d107a
SHA512aa13e7568bb57c5a6bdf170c78c7c0a56efb0b90d9c8cb1cf5eace5eed90b9193a3d59c8ec31dc18e73694867ecdda29caf948967ab96350d4961606d73b27a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0e57d546d0c7c08cf4dfd487f18c1e2
SHA1af597564ee4265fee641727752a96eccbad5eb94
SHA256052f017b9636fc102c7db8cf5d016d783fad96b32c5d7ddbea036678fe107ea4
SHA51220524eb48c96cc6b01e1c8bb9808a37574bf6f976dae32668da7c0b88154b4386732c7b3d07d009085e6760140291550bb40215aeb4328e8ad5467e2c8f130eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb3d4dc0d0775f03b40594cd894f0d9e
SHA1c697b9db748f1749db81422d660629c0ca9867e6
SHA25689ef4988762d0fb81e66e018c4895c7b31765da94bf6e0ea49c24c51e1402f79
SHA51267047db802646d66529a1e0086fe8ed66a56bcbd963fc6b643f5b5959e190a45358d54f61ba5a6ee11dee8805d574a793fff594741f4a30997077d9868593a30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d90084d2814dd499186ce5e52e5d619d
SHA1a635c16053310218e5ee76fe5748093201538ae9
SHA256fefbcac7e0d1679046b9d08b948d0123033d787cd369e8384c3a2cf642f1311a
SHA512c45c93a0717ac14179e20fd7f6a00bff739642b33a9d17588b02b2d453c8d907ef62cbcb7c8d32f1ae2048d2fcd8c5fa558a2e9d00eb02385c70b2d77e1eaa7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500cf145b38d7c269b5c2954a97e2b191
SHA126332b414ddd0533d2db1cd9b584ef25a5bf75ae
SHA256f0e32dceaacdefe7fdbe8aed87c2ed63d2912f105e8110545b0dd6633b9c3d63
SHA512b06d8cedf531aa9cac6040ef3ed3a718b4e695fb807c061a9ab8ec4b6f97ab9bb06d38a726007855504ede38dee461bd84afd6b632676a04b9b4f15489646f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7cc8b1f6e44e9b8d47a6fc06e41fdd0
SHA14a94e20d5a957f676a9c74caaf733556385f5d84
SHA256114f65411120715745065ebe01466cfd0e320a50ab28901e992cd3c2f5872c9b
SHA51219d731934bdb883e712663dd082876230cf83713678c7b0762b9211513e9bcfd0b297889ec40396db28b6b7dd9b246b30028238bedcad04b9b257455009ce10d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c8b8e6decf35d81e3b24f07de50d7b8
SHA1a64fa93a738cea5776f6ef586c0f6e8d48935ae2
SHA25638c31bcf2e1a7bf7149147c10243977fe320510ec036b698b6dc0987d5ec0c2a
SHA5125b76521ea87c5557555ff931fa8ad59374882492318440309ce51a03c095e831280f3632bd547c5cdeac506cc4d49044e1e8d183ae3b998bce318fa7884a43b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d9eaff02c7a9056780a4634d23877e6
SHA113938a4add41621a807d65be08b27f1662b9958d
SHA256712163dc2e82ae0ebbe47654f5948f97af6e52b1be0522dc9035f7940ca90bcc
SHA51240c49e818586117b09d6945dd9ad2cf61db5abfbfca30623ac3f3fae5598d516708d0e6537f950f1619eeab338a0b522e556349e6daa38043b03b40dadae289d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6d91b139551061d3bacdc0a2a5e1b29
SHA1d7b10a925506240a70f1da1786fdafe0a010c26f
SHA256caf3db48f3a547c485e422fc9d2acd7e2d5f17d43c7827ad1424f7ee15a2333f
SHA51241e74d900836711541800adca9bff4138ace024d0fc110565780fe710f919224566fc1ff40490f1464c489181843718cfaed6b0efb537e8830189af652c4e86a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dfcdc50afbf7c2602d0896aa14f7e7e
SHA185dc8ec959cd1148b89980ad0a4d1b3e1fb41231
SHA2568ba28cb9d489873dc3265b09571d4ed2ddd6f3ac568ddeb37fd2c7566249e605
SHA512890836f4692a870f0ec0ea5b89ff7497bc9b7ae3c24548557fb83e6a6bd0c63816cd4fcbf29609f6bab95cd41039dde89e9836b2210fe60b924de342c7f157c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5475b138d9db7eb997b10f4188aa49525
SHA1e83d08a056c6f2f5e93556ecade1a72362c29ba0
SHA256698528c1ec9235fb29ac7dd2ba3ff21e9bf6fb72a5f43e8c9fc5a917fc6b315d
SHA512f2b7e81a2e77b07715dcf8d65621f6c62f6fe84506dbee89f44f1dca259bb7f9da23dcc5715e8c3374065b2525c504ab83810b2fb9696c12b49af3b281afcb7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d2408ebfc49550a5bcb1fed0128cd67
SHA1130a973efc6fd0c7eb150b2cc6333b37ebc1c7b9
SHA256d987cb1a8d96591b0548124f77c88a7a287d017218bd76c9963073ea34c7ca5b
SHA512095b7b9f5a3be54d5649d698699edc326fd3fed89b7b44e36bfb69e79966f15551e35318e0d9aca4b65f876628f27c695f33e153ab5c34c5099d97f6941e47cc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b