Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 00:34
Static task
static1
Behavioral task
behavioral1
Sample
44f376339804259439c90424860e6cb6_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
44f376339804259439c90424860e6cb6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
44f376339804259439c90424860e6cb6_JaffaCakes118.html
-
Size
38KB
-
MD5
44f376339804259439c90424860e6cb6
-
SHA1
bc4d17dfe8b6d4c7d7bfca56f571f1f685fd8ba3
-
SHA256
d27b5b5f0bbd5da5af6c840d91ef688bcbe873c0fee3c61c6d7d35bfb634f3cc
-
SHA512
c6af0d80002fe8d7d06e99a2a6a0ba4135d70b836dca87a8e3123a7ce3768daa770b15d0fd92614e0552f91cf69f458e43797d524da42723e5512a66413e9898
-
SSDEEP
768:NBAK7El0s16nrHNhX9U02wGSffy6WNZ5pYufszOGdoWw7:NBAK7El0sn0DPffrg17GdoWw7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E778421-8A8D-11EF-95F7-72BC2935A1B8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435114366" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30e020259a1edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000d89665bdc15d958a4c36a6bab791e5c8783c156529096e7d2dc098673eafcacc000000000e80000000020000200000001f4dba730a0328399db3b62ce04531abc283656bb784554ba582bf41d3cb1b33200000001d00323ded2f00f3f54a92241095acab7cd75f32df5677e8c492e304d1ecfe04400000005b5053d3076faa242869a11d103523b45f80d36c91fea4d7ab189d6934824a438288d5f8d6d696e15b41880a347b137779b96135a32f509f0388622bd79d7d77 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2636 iexplore.exe 2636 iexplore.exe 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2604 2636 iexplore.exe 30 PID 2636 wrote to memory of 2604 2636 iexplore.exe 30 PID 2636 wrote to memory of 2604 2636 iexplore.exe 30 PID 2636 wrote to memory of 2604 2636 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\44f376339804259439c90424860e6cb6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5127315afcd59547f742775c4c49d01a8
SHA1b150e1c8a8cc1bc37a19db72bf775e44cb4120e3
SHA256a4b3832bcce62abd3c5a9ab66a4eb4749398ad7f04bbbb4cb5df84e1ac0f68b8
SHA512f5e3a757a23087aca8f0e62f8800144451c65246624479bb2f058d3789e76cab825caa64026cccd8f8fddd331d97b6d42e38ccafa489053c79ad4eed3ad738b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5413fab4c1a16a65a9774dc881d796c38
SHA1131004a0137707e331ee8a7b955860ccfab51f29
SHA256d6124283200c933670e7872486832b7b2b4d0feb12008c8c02fd32275c1b0ae4
SHA512faf0856e3ad0b3dc27707333d34625e07b737d438d98f43919076ed354c75a3a4f171af1561c37fa02db6d034c54c1aa4174c0f0cd40b68abe7c85f49047cd24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5870a7e78e428e8c0c2ce02fc6df3f0a5
SHA128c2c9dd12e85bfec98d0af17bbdafdf3da0ddef
SHA25633b1a152e9f8fc5c133537554270c77fcf32f41fa1d69b41b5208074a6679db5
SHA512d639b50203d4ae8e9c7159545193b39ee93271929cc2be25666c11c0fadd6d8abd037fe34b6056ca0269a22032581270e1a6977935aac2dd3364f1e8b46e3a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53009bd1a1321cd27f417966ee6cdb361
SHA1586b7f3616a83269be318fd4b8483d0e28421cbe
SHA256c89312ca5b31a777a51c30bb582f2533aa21afae52d78e01581c955d589de9f9
SHA512fe1eb09638aa6e0a9d26788922edb8d35642ac3c737fabbd24bc350ef55562d6c0d4467bab30ec480064e96cfccb878bc22a5d2acdef1675c7a1ca1cee97e9fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c3c9803cf7bb2f1a00f36425b5f9666
SHA1247d30261520c0f3997c9815aa5ef3b565524dbd
SHA256bc588dbe4e3e8b5684543066ad58b1fb06a8bc54b82c319e19e5b33b799a397d
SHA512f8d6d236a1b49f4c50ea2a2eaedcda8b957f69fb01779a65e512bdb4fd1e34aef0802974f994d54fe135438615157d32e9f88a7b6c3a6a749c0e48bd7afa3007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ae696eb479e7ba6d017d219f8348242
SHA1706ed50197219af33f4123a8a214910dbb56982c
SHA25693e531fa5bb66e6a808c2bc8412237b32fd4b8f71e67c91905738dafeb674b94
SHA5121a0007c98f9c9690ed0f01576d722c41910893e80266fae9090d0f3921403adca7a070747d4c081fc76c2c8af64c53ab6b7a23ff7e4ae68b3d3339e7baa6aedc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f800b91ba4cc61e5909f341b7dda8a4
SHA191859d2cf958534767b359586bc9a7c045b898ac
SHA25689fca90809a99e99fc075a9379a6a21dbdb4a19bf22d8788018bcb0babab8203
SHA512711c931cc967c502fec04d995f57a8900c3de706d6748a0138955247e35fdc7054869e0e729c1c55d5753206d7152a13f84c498579e48c59b667b2c935d164d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520023e50bd7901fd0e3b544a82c453f7
SHA1e58bb7ee78e573623c749bce113d0da5aec4f7e3
SHA256ee3c0c2d9cfc7cad86b33a318759f0457346e0b2012bce4233b195d530569713
SHA512a537e0396a8fa1613b952735e4d0af8b4f4e807dc8d145f156b5919b14ae05ecc394855cbc921ceabe3442892e418ad76d33b43afeb6bf05ed263c30436df03d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58876010fc5718ffb6b66fa069e498041
SHA195dc617dc2d18873cf3d00c4371744e105eead45
SHA256de1ba6a864e0c0530cda90f427769da23bcead68809308d4de80f1c84db55b32
SHA512837682376ae84320c5a6a4a1f5602ac162061735e5517bca5ed078d56aa087774b71fca0644cd1312ce3c739d23f236fe8f0f153a9440a09d22711c2df519cc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aee273ac76beb64714b3acd4265bd918
SHA19d488a2cd0093b53add1ac28202df1c312c2c754
SHA256ac98fe1bcbe10b665f37ba2ad779417bb89b9f9b83853fcd5a48ec5f81f58140
SHA512784dfd1d2e2818fba922bea3a42b66f349d09f3f16c86556d8e801e084ac910fe66d733b34a9d09ca10ec5b259995ee1acedd37e1350c9836a76f61d803ea951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ca40a54359dd99d8aad989eb1dbc65b
SHA17703f2204156ccc14fe1d8f48673dd6523ef5f30
SHA256355b2648b60adbaab4f5772e20c47b6b77008a62a1b989c2db42fa42db01d5f9
SHA5125f60cae573c2b59a085a77fe5a0610c8f35ac4a7de54fe2b1fd377138e00dc2c182ce684d1c2d4a4e4fba3d84eb7330df865854afe9f560e830fdbbf062fb0db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5775ef07bb84bea1ae0826b0bdeb0cad1
SHA1e25cd3ac4bfadaa872a80d3506fcfa208cf54f3b
SHA256da928f27bd23e1f64b9fbe4b59d2ba7bdeb08d9487a2d13cf7876a4e8bd536fd
SHA51204cc8598a5f307a367562995318d9baa87318a485d798dee2974c2b08c7bcf05480c194f4300fd006a764e95cd2cba9e23d9444dcb292a63dc107db1d53a40e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d6c36ffa3260170ef900888e8e4cb1a
SHA197b9fa5f9bcbb7c134231dfc2cbdbec629837ef9
SHA2568aa4307edb70295022fc5877672b7d2639dcd9c270737324978f795316820890
SHA512be2bb0b7487df1f13627a748e4825197c8ee19f49502e36bfc31239da10b030dc64f747e70bb334d442fcdf06ff104683d8ec7712e983079c8110c17eb2fc337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529dbcb825f1bf7c9709291d81a8d32ee
SHA10d4dda4d381eabbfcf33b4eb45da0d8332ddc741
SHA256df464ad6534c56f0691bdfcf34072e4c1eae4be918a69f22e0cffe5b160c69c5
SHA5127505b8b4beda83fd1ccc09cfa5560e8dcb70b13f3b27b8df7e879655e1ce760ddef64dcd39e703f49c62f93751a0b49272b93f2685a58e03f882f0c09f464bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588aa3e3ed8c947b0e0df566d4b19c0eb
SHA16cd8882ce1893cb4002d18e63ae79095d1b4ced2
SHA2566c77f5971673920365751be28b5c58419ddf90aa6e40197ac6fc3d26a5303bae
SHA51253edd9b062ae697f5ea9fc54f363cc30e9781027a30cc9e7483e21168f9849865f6f497cbbab3b1c4583fa31825abeef3c5dfcd5e81365b4dd2e62eba56ce7f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb8b7eaf71b25b6fd18e816412ce3f2c
SHA19b977252668b0ed8a68df2ffbc2cec524c52e0e8
SHA256a4bdb64495b90c39e2bfe734d9026bcdf736a638cfb34fe1a770cfca44478ec8
SHA5129ae67e8f73691ca11e6e9bea338cba68c9e95505821dc9339667e9686d804638daa67e2926db748e734d117ebcf5cf1c33b3e7830cb390ffbb292a0d5ac05f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546e08a02f1ef4e1fedf9423fd9046b9d
SHA1d453172205667a70fac3dbaececbad475db852bb
SHA256f8d4fcdca024b9e49506985f8e3b3e91142cc815fb4ce25e5ca1616af40011f9
SHA5124a2a089c94c0addfafc231904e7de8ded471be3e3cbdbd1e3c022038858c89945887226673da902453c5d74f5546a8bad7368f2b0747a508a248c54b65e1ecee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57303db376c1fb0b1d80c979e24ab1115
SHA1762e60df57cc3e92daffb068cac3da6a1788ab01
SHA25655055c0ff39559fd24939f508a9dfb6350253f492ea766e90c56a05d27188b07
SHA512ef28aa07e473fde613a743dde974f1eb5c2d5a00ef08c4223a2dc56dc0ca0f85e200cdfb0a36a5a29a00af86ddb1a878b9f1e274a296011d445db09c94058876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5692237a8e33408270db62678a4ac131d
SHA1e87471ebc23448bf7f964c8a0df0886ab7b17d9e
SHA256e1bb62c44a5b62c48985857182168220b71eeb8c6b830f05dfd8461b7b36d5e9
SHA51259c54f42e32e744ff19b6a30b81ddfe5a7d1b4e6383dd8f8c7ae5744a0e00f455b2c61eaba94ffc0f8f07cfefe263603dfd7000ac3d2fc20132e07fe52c0767f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b