Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 00:47
Static task
static1
Behavioral task
behavioral1
Sample
44ff7e8db1fcfc1342b07c84d7354494_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
44ff7e8db1fcfc1342b07c84d7354494_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
44ff7e8db1fcfc1342b07c84d7354494_JaffaCakes118.html
-
Size
360B
-
MD5
44ff7e8db1fcfc1342b07c84d7354494
-
SHA1
d852cdfde671aee7604326d8e7d70484a2812892
-
SHA256
c15c1e8de34f7e2425aad6de1fd2e7142466b292c6f09c5bac2ac93a0e0665a2
-
SHA512
663e5ab4d0e68dd44dc0cd38b519af31f9b3c4880f6b055e6818a3e68b973e27db5ff9838e92e15fd9918fb1bd13580f0ddb6e4d11cfd023c9db3d66d8bd7969
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0061D271-8A8F-11EF-8BDE-523A95B0E536} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000c2a0385a511db1703271216259c743fc0fb245452006b99b1c53625f12968157000000000e8000000002000020000000b028667128219581710cd8784f0b6f043121048d2de26ff58be6c28997cbfc7620000000297de448e0ea092e6a9d2442a63952e75a873dd33a417e8572120bda783ec615400000006cd6d3fd685280e8acc142229d4f0ad94e7051a2b950981a1201e75cff0d0632cb9ece39008959ca9b43fe123f141bf279f0462839c2efdb4f46686f724e7065 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 204302c79b1edb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435115093" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2844 iexplore.exe 2844 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2708 2844 iexplore.exe 31 PID 2844 wrote to memory of 2708 2844 iexplore.exe 31 PID 2844 wrote to memory of 2708 2844 iexplore.exe 31 PID 2844 wrote to memory of 2708 2844 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\44ff7e8db1fcfc1342b07c84d7354494_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f83ed55275da0a64403cb69c32bf99
SHA17a1d4147511886616c4c45671ed11241c44e5b24
SHA256af78b7bf69a1f53b8844511f5351b532952291f8766a6184f82d23d80674c6fa
SHA512dfd20161212f427f7de263140f053fa682d7f013dab047087949032bcfa96d43b97114d60ba5472b6b8a7bf2b88caab0fbdb37d65f6f7a826ebf2b85e5eedb79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cde83af16cd611a1032f50d4e980e6b0
SHA1e31fcc571cbb8a84735984615b98a7ae69bf3e08
SHA256329f9fcff164ed7298cfb6e386d926cda704ad0af5cf137118d0dc327d06910e
SHA51215bfbc40d483dc05b04da91e137f5dd542de201ed64fc5ab259c312ff593f04436eb88e678008926446c2cdb371daf265d3bd76167dd246c65b7f5c0a7c5f3fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517ceab2184ef3206155ca0bd8170d0de
SHA1614167425fc1f60239974f7728716c180700ee60
SHA256627d611da3512338011f583463e1860eb43dd053cb75a0c1dd7db3f06873a881
SHA51261a3efea1dcddaab884fc993a2ef355aee79009fc69ed9280fb55e7358cc2572275b0df27807d93e9634a66d30b788d94a4e8a5bcfed751fc81f5a778f8d7d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5841caebfcd37d465395cfcc9d8968ca0
SHA15cd0d10aee4ca9997712cb94ca494078d583baf3
SHA256ccfbb88f9d6a8519d2ab51509105d8f774676a2244532ef93f0855f1c6108ebc
SHA5126786a9b61dedec5a94f8f746f136e774cab7c61e3693ef4671713cf6710e75e64d305be122d1d65578321418a48880ad20719cb8306472714b99e0d4f188bb54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514eff39fe7a7c8483c96e240117a57ac
SHA1068e36cd632eeda42df4164667dad5e67610b5bf
SHA2569f7f5a3c6b4bd451315966f2769a9cd997a956b840f5784c8a8d4e9412227197
SHA512c4e3b1e534f9d9873a080ed830bcb097f37664a258f7d3293e9b0147a3286d6e9b90842087265e458ae8f6c53f0249cbc6512e4f549306be0decdf3f959b5bf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a8b4736adc2148fe8cb735c4e32bb70
SHA1a051d618173800e4a7ca3252483e68274c4ca56e
SHA256d4d38f5e403f8c79d2b4b873ec1c328cffc5fb58a02106d96c515b44b0c48fb4
SHA5129fa1073147e1d182894d2f0832cb2588f4bca0f0c841fd1ceadde654a55894fd86620c87656aad93178249131cf94067f66235954d20f31335005f8a7c816e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb084a4762491a9b693d99f744460f80
SHA1901d9bba28272a37ffa1937ed445d30c180a9bc2
SHA256a8ba2fea5c1f28d636e84015b932ee7b00a86f403da1b3fba4cf383f29a2b590
SHA512e3f6729f226678ba79ee4d463b7409d9e2b4b3600a252f89af870871464e92c56b0b4d9aab0da5591c77aede96edea9c4aa4ee6f86b4bf6e7f789574f4d3503b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a10ece17ccc25742e504e43e6a2fc59a
SHA1bc85376ba767d217dded49416b789acfae20210a
SHA25639394137c692c61a21cab665ad2711c8113306d389b2febfec7e64520fe5c687
SHA5128a599d22fcfdfbbcdab18d48894dbffbbe42ac4ad6f45d8773336a8b8395f285a78719648a7018cee381b7e865e59c933ccb36217cccfe883b2da5f56653bfeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f67cbc3c6cf376ea91ca9c13bdbea7f
SHA1df652368d4c3b9748bf6f7dde2bc57f020cd7831
SHA25600946605eb4e5a46585220958f2c863fd271b5a6416e0c1a6966025c729a808f
SHA5125defe211bb853179a9c47fd376f8cc52bd0fad541249e79f99b26298ca82cd1d843b2755dcd974101682bb7037a084dcca615c371a930b5804fe669b4636aa65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59593b1bb986fabafe8d203c12558aa9f
SHA1653039917bac4f046f8b9b5a1e38e2d3bd7a7ff2
SHA256846d2e169a47ee660c7f1861172a991bfe6862bbf09975e48d4958c20acb5c12
SHA5123e8d4d6af40d4d2c48f8640661c119732802fac45b25079334b3187d97c87b15e32041ab9b3c70f1e3d91b980d48cb23c6a4f4a82bcb8c12b7058c75d6c434e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5370c786b4994d44b49328eaac299c1bc
SHA1ff8bd3112cc15bfbe38a6aecf9bfc90ba3ac9bad
SHA2565feabb7e0aac2cacc53feefe99fce79e5199284d063301d167cd7c62dd55045f
SHA512e4acae779a0179875f913560c74d4239875bb282aabfd2f515e0b0d77169629d53d75f7e095afe724af7d9c32d7517f68a2549dd664f0a61b4419627014a9398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a240ad7222ab6472e611647df6cec36
SHA13c1118ec1ba7e610c52999d0c9fe964fa895ada7
SHA256b9192989daf36ed01242ac901aa494174e08c1bb86457d604d8c3f8b873e6cf3
SHA512326d1a9ddd5ee27e869b124f70f0cb25a3395f481db92d79412c649f4baaaa0c2d46f2e7eda507f885f675bbcafdb79d22561cebdc254086828359675c087647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd4c4b25c8d118e2d6a3dba1962af8f2
SHA1bf13a070afbcbbd54a7a5424dbf6ea55d3ea6d3d
SHA256f9aec1aae61aceef1ea66c070a038b6605bf3ee0184dada88e8b8aa0ae3341c8
SHA5127ffcdedc1562c8a38254ed60201ecafd8cb07bcfdf08ecbee56555524dd7ba634094c7a0e6b2e3e86cd7aaece36947f80422d9cfcd71444e1bbaf34647afa5d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e03260c74e0a9955edd734817decd73e
SHA1635363065774fe2f3b589679b3790ac3aacd183d
SHA256ec5a52c26f089f9fdcdc3b418ab1ea3d474cb4d5e9fd5abe7598cb96ce766c83
SHA512e72c4fbb6af00b7ef7f8aaa54543a9c6d4f77350d844362c96e85667e1e0baaa450648ed6b138e1eb54fef5b0614e74613fda300ab5ba836b1b6227f6ff6e1eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e50d87824fced55bf716b4e2895790a
SHA1cf98c764cae5cf101836e65f4a3c931c8876c9e3
SHA25602a383bfbb8d9cd1851c0aa73c5f1c8989947b8586d30385b39dc11bf27a7ffb
SHA512ba23f16b9403bce767e3f2ff09a084e7119543ae49e91d5e0330def278dafa81f066d3dd55e99c3218bf62e6be5a1fad4cade5c8b817475a8c7b485f886bd8aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c022ed5e75803742227eb2a3343ceb2d
SHA1053d91feaaaae9995bc5cf23108febc894ea457e
SHA256a9e151c6a37c8eff1670e126632ba566d4fab3797da98f37d924fdad034381ef
SHA5124422cecab93b8f0422c7836d8727eb45061d32b7156cbd8a38dfbdfcc500d5af7e33b5f76e9de0fe417a23803a0b6f805545cdc1376246d92e6609e4e84bf229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7e0e06819fbf99adc87580476d20a95
SHA1c408f269b06851b7deb14b89a173b4792895f308
SHA2562b1ddf1515a7c93b2680d306032fb64b385c76dd6977b2311a65721298c0ab2c
SHA512a0857d8181b7b4ef5fd3b9774669ad0d6c64a7a8fbeabaced60ed28c3251b3c927ccbf5a5e165b3ec73bf5d2d6b9d52e2ab1255372ea5b52712ad6e36cd33df7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0c08c2033990c2eb140663519046786
SHA1fa3905c10bfb73c3f3fd1a549e2099f0fca04de7
SHA256b323e42a851d25f6008f09544d7485309d257079733b3e80ed11e33ad488a4ac
SHA512b98fc7dfd96599e1e2b98018eaf8647dc9daec3858777370c038ce90e83c6d40328a2ca600bb3289a778f2111ea0d3c04d1fbcb029270908acf566a65764d212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bb3323e53702bf391de420bd409902f
SHA18725b7373c7533048165cc5f9a0eb1c5900e0557
SHA256cc83d1f2b4b28a4a2993cb14c14795ccbbc11371d7fcc851d5a25cf0bf1e432f
SHA512e7622520d86f461fe16695ba2e85bf0bee0391d161751193d91104cd28d452286ca53a99cc42e97be7fe18ff0300868168c50c4d8e79935171a409f521953694
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b