Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 19:28
Static task
static1
Behavioral task
behavioral1
Sample
43d1b3c5ca6178036f5240640f43e5b4_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
43d1b3c5ca6178036f5240640f43e5b4_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
43d1b3c5ca6178036f5240640f43e5b4_JaffaCakes118.html
-
Size
13KB
-
MD5
43d1b3c5ca6178036f5240640f43e5b4
-
SHA1
1e6cf5fc80a4bd137bad24dbc26c70f49cdf391e
-
SHA256
58acc0cdec74706dd07359f4ea22d96457557316c2278cfa8e12ac44ff31d801
-
SHA512
3033dd369c2449e801f9547bdbdef5299612d865c9144913579541a31efe530b8036b1a4686d9547ba6874336a900bc069bb430ac4f9a3398cfd82f055441d1f
-
SSDEEP
192:SIe5GSFVsHfB/0Bw39agVWbE/CIYL/4qdRRJNXbTcDapOfM:Sf5tVs/B/0BwNdIbE3YL/hRJNXbTcDs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D2AAE81-8A62-11EF-A5B7-F2BD923EC178} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435095977" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000c9802690a37c0dd59a67eb7a4cd7c5cd2b953a2202192f62381b932b90307891000000000e8000000002000020000000b8e75a2eb75e9506a088df3eab7802a515329aecf54d65e4882e1d2e2bb96e1e2000000038625406d7a85db22abb6fb5a1c6be3e03b7543a5d7e997da1af55040764e17f40000000b98954ecbb81a25db749e60c57102b2ef20e2563a8fc68869a11559285cfe55d01451d1238a693bc9c5c5e6baa7b7566a10141ed8f7ad1252d4037d500eaae97 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30aa39546f1edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2920 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2920 iexplore.exe 2920 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2368 2920 iexplore.exe 30 PID 2920 wrote to memory of 2368 2920 iexplore.exe 30 PID 2920 wrote to memory of 2368 2920 iexplore.exe 30 PID 2920 wrote to memory of 2368 2920 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43d1b3c5ca6178036f5240640f43e5b4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2920 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD558bf43f5aa6286039da136676d51f6ce
SHA1fd95880f69d2d225fa55e539480c47059696d64c
SHA2564a92820d1a9783b22f527d539b8a525fbd9ff39731463248e6c0fdc3efd2c09f
SHA5127a7ba8b5f6b84ffecba5e3278f0e9188cb7377ac4a39724c1dc19b451a3f53fb848ecbce0cb45d00bd2dc4147365c8e6ef97bbc8fd91a4c56c6ef8c8583e3a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5903154a4c0168cb64c9dffd1a1c01720
SHA125cd0bbdac77a312394e2a00bfb466f5ada318c2
SHA256cc567eecd75bf79d382099ca3fc8c9952921bb5a796f87175cf252f29eabbbda
SHA5121b3dd7f91d0a291ea49e4b14b03cfcdd534b009b0cda3d7c9b306698e45cacac97626a84757280561e6f648f74e7a480d65b36b92980b60a7996f80426adcc7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa4d73d5552bed84c5e130b349222185
SHA112e7e02e769938c5e0e9917fe4546faffa51ea29
SHA256052c8dcff5da87f4533397faa587f76fe13253b78328ccc1d43c3bd376e6ff80
SHA512916a521ced8db6627cb3d4758a0f4f93153a82c3309e3b94330ebc25cc30c7edf0b61669e8d88e438df2a6bc26d0a8162eb87680f2a7f33b3db09aa0738a68cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508d3a64a7b36567300a6d2667258885f
SHA1c16332752bd97a8d6afd478500d4986a7e59e79d
SHA25639f304734b6b9fc933176441aa3f60aa3055eb07ce7c2dbe852d3ba55830c6e9
SHA51204ad651c4ad19ec1f4a8d06f6b27944e4584ac245549b0d6df0f1005fbb874258a78dd2602da3b14592b3397f578854d4fc7994dcfd3b8f674df96f0a4c742b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5863e7b72a4f4af8b1859b73b5ace54d5
SHA1d817a8ef210670babbbfaf70717e44bb82f66333
SHA25639d44328da97a829bb837e4eee85ad3f89e26a0c471ce7e32101a549c323776b
SHA512f2c781608cc2ec7f6db1bf42154126dd346ab62753bc40c460344e82a820b0ecf2fee6c0faeec4ce04ea11d357dca8b46c7997ca9429bec7b4005ded05fa199d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522aea6bfc6d76d22ec5396b908c7dbf9
SHA135138608bb3e5f87e847b1aa4fbdc00379b9afa2
SHA25620f08e23a2f50e3eba26a0628bdb19d17daf38bd53902549f0dda34822695e28
SHA51227ae6fb896eeee1d3b653662149d54b064cf6e34307e085b1b90477982330270df21fc6dd6c9e672b2294dd31b3fbe384287a80e6b75eb73cf45ffc4318c7d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad2449f6c237971fd56121d7f75a8d91
SHA13d190a690163f88d6e99b68d4dc0bf6fc954a4b7
SHA256811ed9bb353449a54cf02ee4d3ba716d78eb0c2e5b117b49dba3f589275d14e2
SHA5124cdabd130e4693e12518710fedfc94be7f8ad791e2cd06a9451c566c827ce60ad613b93421e44fc7d9a8e8d3544b07a899eea22b041808a1dd4f95508b92059c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5627814f3ca992f7b46ad2d2bef5a16af
SHA19eaaa33d360aa307521fa28baebce6ce6f4bed5b
SHA2569482b1eaeb78e9c3c04acdb83b94beebebabf75a3b2fb2747e1fa5b037210229
SHA512d187d7ee1026a546792e6ed111d8cb16a0de5b36a05e8f82984ad938e6511054a00365922455a85a143ed0ad01315556e5cbe007e2ba6c4aeb6120c991e08988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e63d03a5d2286d82756104a0b686134a
SHA1db4a552f7fdf27fcc34c1f6ebd676c2d589d1105
SHA2562d8accd77a841a5af0c77c0de95d35d9a666ae9dfb6a2b7bde7632dac9ed4077
SHA512ef4567a5215722177ccced2b0c8d6a335f36fcb299dba92b9a0827639171854310f501f96f8a965fc440717c359ae49baf59f4799b0cb46502a9b935860076b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bf695eef97fb5c9d88efeac2b055319
SHA1881ba6a1356018943193a7f40d1cffcc52dec77b
SHA25656bea7adeaeab5318f6b5e22844b6246a46357e01fde122771d3441fe1d92433
SHA51208607cfb48386564d8d2c17da0ed96e54a1687c40a96b71ca27570ccc1a9c0d96892a9b851b748f57f2d4c2075a039bb56326a13f92ffaa6cfb544c43bbf4d60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c957f70c44354694ce300467a2716a36
SHA1ef91ddc637357eaaf733b9dbf8f3acf95da4e93f
SHA2560da64a1ba2b5a0b39f87c29c76e1191c1b7bc98bce88123a7c2cb939c2ae219a
SHA512b3956039754e93c74d0f8e15b002ab904bc9fb8e7ae9b2ce7affd89ec5bccf47ca46f91f1268261806bf72452d971c18f696f33541637cd9e60090af0d7bcf9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528522a8b7977f20de51427202664c810
SHA1f3fd08abc0aa48acd1d0cea744e6011d61dc38ee
SHA2566588b92e30fbd7791329a2a39fc77587a500d2e98e52528a38f316a3ed9e7023
SHA51222ec42c109bcb8853263a1d39b5343c0acbb9873721b0c1e8cc2eff7c7d20f1b2b23aca6a6d013f71e91dbdb4e936347e903506f8580ddb35cbaf63c9f3b7540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500006db1a76df31be3bc777f7b4a0996
SHA1150a248fe51c2729a2e807c15c206206206d15c9
SHA25667de6725c8134c06e153f660c8cb447224521539ffb057068a588dc040802fd3
SHA5124fa61788a135bf2399072c16b216dc3e8d2eb7f0da028f5b3426a982fef530d757eb8ab6eac80af8866bcca917d48ae0cd9e1cae8dce8216269d14fa2986d590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6c0f08141283a839bf2faa6a1cc1314
SHA17399d4e38d4e6b7c0ef20cebc3b2d6a89f2e5d4e
SHA2569366969206b778cfc025544ecd389fa729989f3220a53563dc8d46674a830a25
SHA512c0bfa9c8caa6d5b192f974b819dfea96b05b893580972036d3135490f68dd158536e6df04bc1d8898c360f4d36f36ad5761a09a5c7ce2fb1b70b833ab4335052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc4ae289ac1bdbc9943b2ccce6f454e9
SHA16345c9c7c2e3e913e4501fce0b59ba694418799f
SHA2566e7a5cf04a5b6c762cdacccd3b97f4833f3df8ea1c13fd6dd52af4f0b5827168
SHA512103921d64a15d56fee6066d3835a86d084fcd8c4c97f8118a75feef96498381fe501686840b8469fd25431b69ca1da1647ec7b54baca6ff3aa96d6958b1eb52c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d1f932240a59bd3ecbba2da2eeafce5
SHA1c8436840526b3d6d534d5a12eca97c7247cde46b
SHA2563700dd298dcc8cc398a34771d8a672e0fc7b2a121691788a88936fae2f791095
SHA51261a76a0088e5e0f810f77f4f9881c8d2d13a029c47cef55b0e4b6e74b86c8f6bf0a045edb22cb10d61d4724f6b7c9e9dca0a1133fbe6fdd15c0196a0c9284ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59818ce6bcb9186a9d9b64ee40a03c6b3
SHA11fc27e7ea37d85bf8beab8819d42caf4bb40d5df
SHA2565e84d23ce18fea57a71b8ef936d30183e0c77a2450b0a1c8298dd118c5bfb9eb
SHA512773b0db62f9eec5b691409cd3d1e16c7cd6238c44f3e3454227d4d69e92512148cc8827cd274105e38100ba4bbdfc55bfde3c962c2ef906f7e56c73e1f2bf3ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b20cb1bc57cb64411db47b93a623ef0
SHA1d46669228f3c6601827734caa6d38075bfcedf7e
SHA2560ecc28f82270085e429db537e9adefdb3f13cf1dbd874dfdfeffd189160f126f
SHA512b5fd962f641c35db4f66cf27132138c72cb5156c8c8bf440949aa8a5e37314eb2260ac25200c3d203a6d8525fccb10f4cd8310a2894e02b6a5cb013ea18ce1cc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b