Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
439555b9ae1d51eca2a87875a40abfa3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
439555b9ae1d51eca2a87875a40abfa3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
439555b9ae1d51eca2a87875a40abfa3_JaffaCakes118.html
-
Size
37KB
-
MD5
439555b9ae1d51eca2a87875a40abfa3
-
SHA1
f835486fd43193876f4102e7baec74cea8ac7698
-
SHA256
af6143e7d0cc2e1275364deeecd1587a817bba158264f5d95d8c5f80e3d0761c
-
SHA512
edab947dcbe9a8da9c401db253b002de3f7aa451171d50059b20977d1e3749e42fa4698d945b584c15642b7c917876e9539c53fb39e81d4ae7d89dbd0cbecb53
-
SSDEEP
384:ydG5P/TYsavbEhbaBMzIpn1sfxz+UES4ODXl44HqjI7Lfbsi7FcAn9Lies1k0:yq8abaCLz/ES4KXlTbsi7FcAnRies1J
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ABF59E91-8A59-11EF-B909-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a01c43c1661edb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435092192" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000008b547b2c587f09364087b18b4308c9c0f0fc4c1ae84634f0d1e0fe39e5930dc6000000000e8000000002000020000000b98db47e924456e4936e7977f00157db108f6e965970eecc8dfb6864778fdc682000000066c49b43d538f8afbcb95e33587afeec48e886a655a1c2d72ddb9370d80b9d6040000000ea263a485ecf0c19d5f47216b8dbd71a2ec7d69e2630e88ec1ac19aca25a55e4276070be184c4658b9265ab7f106a7ff80c796d64432cfe6b055ae179f79cb00 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2264 2096 iexplore.exe 30 PID 2096 wrote to memory of 2264 2096 iexplore.exe 30 PID 2096 wrote to memory of 2264 2096 iexplore.exe 30 PID 2096 wrote to memory of 2264 2096 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\439555b9ae1d51eca2a87875a40abfa3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5dc25a03aedcb3fec44a7e7243bef5e10
SHA15e08703a0eb20d7cb6cf78b2d0a82ce2740a5e80
SHA2564b595cc7e4b17a4eb08f4691263473b606f22ad4183cda2c4b1951f67ff87a33
SHA5127ec0f5abb50e7184060c0224502ce4e78992b6785516eb320461d4cd93849a07b03a220f71984d76377755523015d159213b6b10822cffd7efbcb4a683f1cec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb096a7f14f30322d46fae3bccdb1b12
SHA1b6fed3894ea8f94b52ace25669cf5b35f30741cd
SHA25682a3bcfc816f0e616dedbd3b40e1c97274089a0f502b48005e18d1c56de7166c
SHA5127131036993295ce2ddde929fdbb170a2ce67638b3dc3d7f9907a730de71f881c9fbb5928520958a9e71b2ec6b8987badc161a7f36f3a31e5d8142c462966fda0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503c9fa640c4c633c05822c7094305480
SHA1d776f826ebe5655104407352776038b662dc5942
SHA25689cf3227acb085328f1ff1fdc40ac84b22c6f7686733724ff0dbcab54c7cd3ed
SHA512f981f1b4a21c1db238b33951a488bbb5a4f0d0f7c7fae0a38f50682f524cd767f95b4ec10a4657334e3bee93fc94dc11aef7f205f938421742fb9f9feac25c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54421ee6a2d62b0e7aa2386f02a18ac67
SHA1323cb6ddab4e159f48fa1ee1c7cef7a660ca3027
SHA256ba2700f4bc44af920445682a243b89e50e707cb831cb3d9bb092fcde662f69f2
SHA512e7833dc0ba618c134fcaaa4f7bad73bfe9d7ca5a7fc6eee009a0fd91db7fb468024440960adc994fa2993b9fafb32c9b07680089d36e8fbdb96f16dfcd4b2245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53799098d3e9146fbd7bac1361600ade8
SHA1c3cb2220cf070a62208df60e4be9721200f91c36
SHA25664e2ed6acdd4b674f7fccc0c059eb6df0d988fb31dd72bd83478ae1ec6d7fa19
SHA512deca5b74c598c9d9fb4373bca6c66b4fe4c71f1ba3457119208d1ab9f29537550f680465e22ec61eef3722fe6bc64cca60c86e1881cbe663d7d5e706a797fb53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f0713615de23edc022778bd71e91c11
SHA11ce71463e44955a68b12d06f9d232edffd58dec8
SHA256a99065db6a2e01bc1e63198d625c7606159b42ee47648245a3e4159e2f7b00b1
SHA51221b25ceb567263d97d9cf34260489b9280dc726193ba7d0ea6002c9144d9e2db1ef62c4bb707d6093f3463bf2b16bee837c1d537d3c4cf09a6334e21adb345d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fac14e82385822ff632181f8e31a32d0
SHA167dec69bab9c1f3ece35b31ad112c548f5f7bc1b
SHA2560a026c7cbc93115391923357991f241bbc2cca3027eae0a241b43f8b1cd1c680
SHA51277d8e2be7bd788e07a20998cb97b82988759f4544054cf68a4bf2e0ada903fd3fe37319a53ea870b5bff0136e890af13ba0c400ac09d62d49b84b39393d2578d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c656a008514e467dc91f8c75b600a65f
SHA1a4c477c1cbeb777b9a42b81ad5cfb0714623eaf4
SHA2564e6a59f139d7258749d2f63012d301aa801826304c3fe268cb4aa57f82d9eb60
SHA512398312ef7838a1a03531e28b30421451855e5fc841cf43ec4673cbaa1c09684d303fcf7d1440873081bfd6425b65f0dac95716e79eb07ec64750e4e5113efc6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fd178d73054fe27e101238bf1b84002
SHA15284888b63449c69ad6635f8b35fcf008b406623
SHA256fe87b21cd3c6adf5b6db06f7078c77b9c64979384d70751dd187256a71bbed4b
SHA512df3e8007376077a77f6d5a3f1b29a3e5441f9b1e94c5ebf146635780e03fbe1ec3bfae6d25d626febff085ab023ad5550821b00f1857a3db10a76fbf802f00ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b55afb4199e69a597586af65d9c7295f
SHA10ac4b2b2ca1e5d85144349bf36480ce87752a792
SHA256dbaf217e5eea49765d24e2b398796a2c97c6bb99ecc1ddabd8a9b926eddc0903
SHA5123802f3aef7bfb167bc7ebc934f68a1f612a44df5d3557ea0350190af1d976b3df92a48ad76e91bdcd2290c157ac68ea3b2bda9607722e88f6600df5d0ca5d3ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c54c8feb40a339d955ea57a2d417be7e
SHA1ba23f81fd6c5fa6ab3a88a92766ee63a79352bf8
SHA25654aa622fca0f268ad51c0dfbd6ac8514a7eee63896827e8f92d0a827bd54044a
SHA512288bb450a7a530d28c923c1bd16ef677980c457af48d4c8aeb4fdf9715ca636568608507bcab516b52f3b4f0079532fd8e7ce4e998ff3f246f61f4004e74bd76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b78b1001958a1742a9e55756e0dc3f38
SHA146803cb235d501bd65b829678d2e390d38273ccb
SHA256ccfe10cb48eb6dfb2cd6998fea8230753d22562cc54cafc97eeba7ba67a09041
SHA512f9a307a471ae3fb7919d80f84c6725594693edb4c34d407cd9467d1b03f8616923a25ef5648e00fc214bbce54a72bd2233178b9286de7577433da3c5cdfd428f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d4781769b3aa520300710c7fc28f30e0
SHA183c3e096bb68f59eaaccbad3cd5f4fa74cf1f82b
SHA256f013dcdb3131594371ac440b98f13c030d0c62da8d49a2ac1056ac577d91364f
SHA512063736dc8645d0be851199c5a95776f3e2223d5e516d9a3f06e94aafb5dcd63b90e4f4580bc447c88a8ce03bebc66177b4cf3008e0d6900c28f8ec49ee96b163
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EB0KZ1Y4\background[1].css
Filesize49B
MD5e55c5dbc726d04d84999173670eaf26b
SHA1f594a4b4cd844af7b4ab7dda9802095849273204
SHA2567ef598947e7596fffa82ff1370c3666d8616ef72cd3908c905a5f1b100c4526b
SHA5124b12de4bc7c82ea956c87cf91fd72ef7eb3758d9a5ca21ebf8f3d2159e6a71fd906d631fa108456138c8e3fe46e7a4549d19a7e3823dd143a5627bfc146946eb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZOGPI1N2\tc_loader[1].js
Filesize22KB
MD51e987e016f583bffc49ce1f6d3d8ba56
SHA134566b776d1107c7c01fbb61974502b913f1794a
SHA2563101467b734edc22476256ccdc26be8777415e3e0fc646f9007f6196cbad4a77
SHA512d6a5f34d49e4a321be75b9803949a4ba41f903db2403767f483943052dd3172232d454e99e6f5b2dbb8e3664268afae6cc338995348ea082d790b7738136f0df
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b