Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
458c39b52f1f2fea47edc9e9abc38334_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
458c39b52f1f2fea47edc9e9abc38334_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
458c39b52f1f2fea47edc9e9abc38334_JaffaCakes118.html
-
Size
1KB
-
MD5
458c39b52f1f2fea47edc9e9abc38334
-
SHA1
0a7799a51632f0e16a50ff9385b3f2a7475f8ec0
-
SHA256
8f8d91c340773f8b2dd8c5809f293cfa05a91d516b32c2255ce48f62fb62ae18
-
SHA512
79c9252af91586909b0615bd999b57f44b39b525007233de576778e1425a25a05ea0a5184407239d8e9e9ec99ad62543810e7e2c87117d47509ece9211a0688e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70595a12b01edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{39000E31-8AA3-11EF-9358-7ACF20914AD0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435123781" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000004e1f2e17d47d736c70dc47aa987a4f02bbd4e77bd85700291b04015ded2092d8000000000e80000000020000200000004b659c1eee6e15e0ea5ba67390e3fab96716ebce998d91f6326aebc74daba6572000000044df61c21540930f4c067b2919a6953273857772a936a4855bb274c0cf697a314000000078d632d6f40f8d76bcbabadebf6bce85b9f6c56cb6e20aa735c80e8419aac073a8455a8cb7cbbf00a167bd6f70fadc177285334538d80a715f0ca49d53d7564f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2880 2296 iexplore.exe 31 PID 2296 wrote to memory of 2880 2296 iexplore.exe 31 PID 2296 wrote to memory of 2880 2296 iexplore.exe 31 PID 2296 wrote to memory of 2880 2296 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\458c39b52f1f2fea47edc9e9abc38334_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c81a06e1d0e7282731d6440a19f01647
SHA174a4ce049ba408b31aeb5c9136eb0994f976e674
SHA2566694efe24cff3bb27d7dce0dc779531032c491c4d368314876d7806fe66f8eb9
SHA5123851f420a9bed1cab64769d771542e0ed9759c9e92cb04f0229738ef42dea6a10dbdaebece10ac6606c4d0632ec121f1aaa5457a76e5d91d0e964cadc3d1f455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52898ae28ac433cfc5fbbf1c250a46ce0
SHA10b570dec5621cd3fb49e6a3dd6a494a716d77acf
SHA256b6fe084260e84d8dba7a3aacf5bff6c224c1441729dd57f68be41af6fecd8963
SHA512613fc4efa25da7f5e23b99e018103b53b0185609fde60481345b4eac8a8a8079f072bb4357ffcf1c458f4b093ea63362e612f9a7d8c8cf8d7ddf2fc29af3ef1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2ad79361e9d4fb200d6a398bfb0573b
SHA111f04d6a3a73d6c5a35669eea46ff182d91fbbf6
SHA256d53e7a0be8328e3f10c44b07d2e7a29006ce210256c6c6868cfcf12caffb9adc
SHA51234cf40ea5b29bb8a339f788d7346064d4beb9e9a10e27129e48f9ed986835abd4370fff7968c4ac611707107397d137387a407c4267db2c779d526c69fa2a101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5032ac58990a0056add348354b9bfab
SHA1d75093853e5a077d73afb18d07ce3a84c1993db9
SHA2564279fe6c15a25316985ad8574e2c7eb09115cae7d39f400a9869fd319254ca86
SHA5121549774ea18fe9ffd0cdd71baa805d908375321d85ff731c4100c5653c78a9043d6d48cb26c724826f29ed75ce5b1e63e0ad67e66766edb466dd6b2b441a0f49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580bff4d0a29b7c54c6bdcf7214e34d9d
SHA112b00f560296a6a6e021ed875dc058c99998ae85
SHA256345f9f04bb5aa358a699fe2de4e007c60fb4be928b5e3685ed8c094de33af2f0
SHA512c0f8d1382da61660d58fc47fa7eae06519297cf61ea35c4c6d1c636b299928c4673024d49c932e901c75f1358664d09cf73603e0d11c423b6b12f9965d17e4f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2c14c12c47ec7e14516ae4c61a1c6ac
SHA1aa85b1252cee406ec960eca1df8221063b2d60ec
SHA256d0b4361a4fad667de9aa79ed3f5bc3c4c072093081a18480e0d48a0aee43f739
SHA512cca2cb309bfbad8010a3d1826fb322b757ef8125ea66a62f02ea5fbd19f21ef90de070c6813513103293104644875b2d3cd7c54d9b0c0359ad1ce9411e338402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e53f2ab738977ec9dd213a53581079c
SHA122ae1f9401cb38488f3cc3d86fa08f4ff6fbc08e
SHA2565e622ef8d92b5c9d9a89b543f6d87e3c17077a10775e9beba6f9936e41faa78f
SHA512128ac9c00f8923fb4fc78bb411e321c192f1a8bf58d971da718fa13c270a684e44beb6d742b6ee23ab01c65ddfd628b88431f7382e4c9b9917955bb42a615fcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df63539b92087d91c47941433e72feb7
SHA1bcfacc809cf23a28a211054f43aa31fd945cda42
SHA256be502021f5b69b5b5639b0873aab27b005b691fc8b9304e11da903c46b148255
SHA51206fe11a94c0f542f8b4f146b67e91e61dcd6cb9078eb6b00a498f33fea61c40c637a32287cc63a071447c5daeb6275225c33d645b3f3594b011a6ec8ea59f65a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f0b0512eb1f21d15552285fadd8a548
SHA1537fb140de2839d8ff4dec8340446c12d3ce344f
SHA256c1cc071aecc99d8fa6277ed4036a39bbed06713f4dfcbc4adc78b1759757ef12
SHA51239be787988980a532efc7f86d8311ac983b8415acd89c0822337a17da8fd6beb6d38a34d214fe3644f327bcf53404a449d988fa619c4e686e5c309b969120618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe176b97ec240b61148e89d124ccf720
SHA167e1455e26cc0ff979835075dc674525fb1649f8
SHA256d553acf2700cec3277de1e6530c4e96ad0330447a65b10fc4f429496fff251cb
SHA512cae145c830e928860f874bb34d0c117135c5fe7e8c662eab9f57f52e163471f7bd1c4621e7d327ac8efad3cb9682f670c489024a24d13769c9fb92ad9cd90cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cbb97b5afce92ede4d0219a2eff00af
SHA1d2691f32d8c17dc106498c732bd64a77206516f3
SHA25602d00bb71fa0f31a8a6508bf6b7da2f48952e64be2e8a0324b2ec2283b38c0d5
SHA512f85cf7d9ebb4ae5722318b4c43fe45a3a3a570bb2fcb659baebd08c91c4b3b4447266d1890fe8bc1d31a688ffa53c6c4b8b83a6bad383c98765a95f1878c5a4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa36ad0f880acda3cf212898b9ca6e7b
SHA1299b856115c1504a368a364920780dd597bb1f9e
SHA25627c8299c8d7e3a4ea4c42558d87d45ea64e09098b98305d90f12912b2b557854
SHA51239454ef9e5e20a164fe79871114d57151704fdd048055bf243d519958c259399aa00d91e6cd397856ec54375c66c491e2779f5e939756dfe134a09a8322faa0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d176fc1b82463f2eb445c987c308c614
SHA15bccebd2a8ccb560a69b14fff76cd1d69ca2fa6d
SHA2567314daa3f341af16c104e8ff8bc3a162c57e7528098b0788a9f32b923416f3f8
SHA512718de3fe2064c9249f36f9f2caf5ecc1164e2c52aa5ef004be20996b844ebc22a262a81ff798e4766ae010d7dc134fdab698730157cecce55eaca849fc349e09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df8fcfdd375fc87e750d8efc6bb0a6bf
SHA1dcc7d2691270ada673a8ce77f1cdf7d05eb8c2f3
SHA256cf8a6760ecb7ee113875f20a811be013885fe3a7ea3989eb29c4e707690207dd
SHA5127fc5dfdaf1cf3aa558f56b136010166a2d851d95112cf7e1f4685245dbc9c8df33f1e8a284f4c540aba3a4e96a5dba60cddb1fb93d282945d03b65bb90e07bcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53028a5ba6b01732bef083ac1f49bf31a
SHA155c73c8ab8d89369c9447c86a5bc6412cb40f19b
SHA256593fc17c491d5e73451455915de54083656e744b7d78506f3fa718396966e094
SHA512ddb81d4c0e7d92f4d974434c89f83d9792937a9d2b05ef477b89f63959940a91bd646ed6f6bb44ec3987dd739593cfffeb259c825472a58f10f2af703cb7c450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571a56aafcb8bdb99464b0cfb3fba32d8
SHA184c8a08e1daa6b15d435aeb56a50233b7499714b
SHA2560ee8402d8d74462578af7a5f5ef8bd0d089879e34138854099c5c1dd852396cb
SHA512b3b66d05ce49da13378f704631e3b412d5d2ef32a99254dce4ca729aa7ee47a11db07c027392f7a96dfc9640c8a9860e906197b367a78c27a83b630645d7c986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fee4d136cce1dfb012172dad5fdacb30
SHA1f149b2f5b22753aa0de40f3ed89da2ba49128d64
SHA256ba18fd57d10d6080b9134370b5d901113419890d948f510c60ca2fefd0e496ed
SHA512a99a419997f372ff55760b90ae979b5ac3b3dbb868c11e56e78a0a3fcb004ca568e02fb0e170498001a1dd9ccb583a399c2a2b64650387be8d6875b94bfcb44f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fafe169fd53dadac5926479c08a37789
SHA19416f6b28555d55eeae0ccb0fe2788aee1c23ccb
SHA256090d465b3103a61761d8d92b0cabc981076e10005e4ccb52e90dd250186c74df
SHA5128a1e6b404493a79e9531f5468a942a0bc7ff1a33cfa7f92263e17f3adc07dec9450a84fe7ba9140b96eab175ea5d829ad5be8d38a24c38142897d9140aab28fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59914a7e8fc3137a7373d3826e632dcc3
SHA102f48b86afb9f489563e5666a680a2b8d3abeb9f
SHA256d085eb046bc8d479922d2e49cb9c3af56a884802ba2f883aa0223688707d729f
SHA5121a7dc283bb1a6bc4c426dbfe52a6155ee94f5fcdffdca3a8ef9b4ca34ab4b0cae40e7b205fc7b019b70352014cfdf5f0d0894bf152c2000aaf30e8cf0cb4a7d3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b