Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 04:13
Static task
static1
Behavioral task
behavioral1
Sample
45c8143f07e9d15c601768f73cda97f9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
45c8143f07e9d15c601768f73cda97f9_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
45c8143f07e9d15c601768f73cda97f9_JaffaCakes118.html
-
Size
14KB
-
MD5
45c8143f07e9d15c601768f73cda97f9
-
SHA1
ded5aacaf6d0e43f32e5ebaf99f4c6125190238d
-
SHA256
aba46eea9cc33ed8aafa2bd7704fb814bb0bd5dba5d0e6e0886dd8ba13180f68
-
SHA512
78b5dceae6256b5c4182555d0594c182673901f57263243bbb566acf911466c86b82768fe52fc7ba5f598978323ecdf023e658968804ad58b9fb8c2de8b9f1dc
-
SSDEEP
192:/w2UM/LZWmZcLF5aI5YNttZIP5fVj8yyQdvpLa1UxlF0k2:ZI5YNZIhfWyZdvQ1UxlF0k2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30efbf99b81edb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435127450" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C51C4E31-8AAB-11EF-B267-4A174794FC88} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000003757202b83874c09c1f7610e17741dd44ab3c914d808bf964966c44d558cdfb4000000000e8000000002000020000000c3200adc177033de3c1fc60c0905fb235afa03b4893ebf7b4358636d33280b3520000000d07984a4fbe0eb96fe14a1780f7a2cc03f38aa8538239458e37b4ccac6ad282540000000b5c7ad3ee183c8c12e5d7e997ec1a8e17c3b0e0a5c609b62a55024d0d28b553941b33c79ead27a056f47928a2bf17e1f5ba5eced315c21fcfdb82a8ec15854a9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1808 iexplore.exe 1808 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2336 1808 iexplore.exe 28 PID 1808 wrote to memory of 2336 1808 iexplore.exe 28 PID 1808 wrote to memory of 2336 1808 iexplore.exe 28 PID 1808 wrote to memory of 2336 1808 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45c8143f07e9d15c601768f73cda97f9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1808 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59da44c09897c9fdcd1fee9ec41499c62
SHA13afa9096f1e12bc9a2cd7fa67b0bff15dbebfc25
SHA25654e442831f2f392b32fa0e245c1c88dd824afff7a162de6b3b4284250e3792d4
SHA512ed543390b68e65a8cea5a2d0fcb0068bce73f69ec39605b9992b3f3efd12aa6628bd116628fdd1115edd50dd0bf7bb603df7c3393f72b20a7b590996d5722344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e30e97b61e40dd9b68414038863effe
SHA16f3fd5ce408c9e87743ad4f429c23f4f56296343
SHA256c92393e3948821eb92168b5f0cc97a10d664018665d3e353990ed062a80499a3
SHA512d1284257be7943b1ab57d2c3712faef06b88a2009618a17392b6f81ee2169dccbf4d62122b1624d2bd9607e962a3ebb5f2824291f1cb0fa7ad2f873e2cafcf16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5637df3850b69b186419d958722df60d2
SHA14dacdacb652bf876d5152168b4882e8d939c1671
SHA256d78acea0a16d8d78057511d20ed46f6d5f98887276ab55b0b8445db15a701a98
SHA512cf8a84604dd9ed66a122e65d4996de675657967743ae02d41c2db1824694989916b40785bf7f888be34c46e2e744b9c401f06e0c52b03a026cbc0ed50e50b591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc528bc46c2565c5539a2b1a2bdcd2b2
SHA1f9a6d446e974e70a021b7a576e80ec07ddc1b712
SHA256da9c545460be09bd57c8eaac9c048fea69305add60dee00825ffc42cb6cdc7b6
SHA512713737500004c319c52d4619532889e86be289082d5ae51855df3442b1581097137cf530ed35631d0cae643706491c750b6ad7d3ddbc4e847b67a5536324ca6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d880f954a0aee1ef3e7d582ec5ab191
SHA152e7b99964e626151e10af12e42c219137255a34
SHA256264c05f44ac8dadd3c5beb95517b1e77246175528239e8cb73c2c0151859495d
SHA51254db0ab3eb7e98aed04a6026970c6fd80cb216b946ac90617ae1267c5468288681d494e1428222aa864a8a2e158b3266f01f2a769aa8f97c495f6f4e3f30f873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506aebd0b57635c5a25a1ee52c228e30a
SHA17f787f1983ab8f7f97675d460414cd99e8bcb9bb
SHA25665faaa251dd860eb7db543e648129908015f4f7d40358825beef8bf02aa0634a
SHA512152f711cb3beca7f6b8951dc54b31059da9c7a68a6163e1d5101250e3402a6cedf7956cb97d8a38de3f3043fba873e38bc0bf0dd97cba9f3a39a141d12cc4808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f05fb3153199bc1da248e0dad25fa801
SHA1dda4438cdd685a854567df64ac68467d2beb26dc
SHA2564ab6c91dfc68ac72a89fb8493289a612c5f9104ff21efc3e9dd558faa15e0782
SHA512a6a045f700b40847e6dca5551eff4e3d47d03aa5c00ac561bb6161340546e0d8ded37f0bf756a14f16a9456229b668f234c9075d4e59ff1665314b1cb8bfe48f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2047e98f892a2d6ade6dd2a834dd6f9
SHA126a1a3e7a5ec91cf0e8ea8718a2c2ba6ab1c3132
SHA25659eec212f4398cdb9bcc147f8814519e7bc2213d07296b3c15c8b758673fcc24
SHA512c5694e1347ee910855d8db2aad1925ad736b1ed898911964744637163cd1ceeb0c861ff56d5485376d67afcbaba981a842215eda1b456261a3613739c9d3f6b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b8ed06f041cbe4baae2e2689802b2f5
SHA184b728d362bf64996d1baa982550daa6bcf64db0
SHA256bc9501482cb9f78fee45ac93c72782a039fb563d922155612cd78e4481aa6c16
SHA5121e8f2af17123739dad4992c76f9e4be41c8ff4c2b6dea2473d1d40f785c68224eb748eea2349da905a826743b1f086b97c0ee5a9b68c6e763e87882876102f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc3d5b6da869f1e920633d28024bf553
SHA11fb2d0f4f665e69ae9b3acfadcbb584282339bf4
SHA25647c0dafe444d7e8e62f440eee346d4d22517e1d964e7579f095b2b2100601f61
SHA512730a810b4d77d40d9a6a461373b653263f4be53959d69086be463fd17472094897e89a9ce964e97067678aee3436a7c5aa39fc7799122d631cbf02ee18e2d53f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54241d64c4eb9a5349771af09ff8029cc
SHA134a603c85c1a6ed81df7fbd70046b088cb8158a2
SHA2568da22de37d636cc7d113ae393483489f53617066af591054806bd9f3a65d2419
SHA5124b72dd9a41ea67ae6acfe3a292df5edc787259675fc4ebee3d7cb6ebdee85b50f02e3b829da48eefd55db38ee9b558f5589d16b533619c0b2db42e739b3d0715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ae40e7337b11e2f1e58cc4040884f39
SHA19fc650eee7d8a4bbe84fa953cebdf97feb975d63
SHA2560660bc21acdf848007fa88d29ab02add2bc9cfd432e9ecc42420b9c41029e85f
SHA5122f93eb2bf1056eabfccf2c54eb740baa3b7ce8c87be9309f5b196e2c1b646535714d574bd09ec262f45f3380fceffc075d93aab61bb627c412cebf62241fbed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53839ed210b0345f064ae441aa99e4ea7
SHA12d40a125742de4bf42c65244f2261b6c00f062be
SHA25693b6dec49ec540f6941aa661d27eaab1839f92885fbe242fac019f4ae7b7fb11
SHA5123be0bac180b6496ec2af3fc6f74d0507e8814c52c8691fcb223b644dd30ce049d85ef13f8011e3d68b8612225dbe6ff6638d233f7b271c01e43120214e7324b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548c7c0bd7d4b1752d94f46fdd897e7b8
SHA17b01f002c3419c02d0e5e6977cb64f096ea2a27a
SHA2564bfd625059d407d4fd4d9ef4d6b82013e2d1caf45388b52dd8f65ae8bd304a55
SHA512ff97739260e5f127c88249db3152d64d38c72d2fe1c5738b9bfd6dd37cf7447dd24704d6ef0d69d0717996c62bca22056f341dda0db320442a9adfcdffbaf023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52db126f6195aee6dc6489a02fbb56e83
SHA197b1c9bf9186721c0bfe8c1723b9113fe12cfb7b
SHA256d0c4ac8cd291a6c7a2bf38b262fd78e54cf742f2874c472f238bfb9d45212a0f
SHA512b59bc1af366b40339e63f4829e2cd7ac7f51c40bcdfb4b1ed165c1938b3eed999670c9a6b9d51f0d01f35baf52cef660dc0d11cb85296f577f894dfdcb9895ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d0c789ec61f63f7951d12fc7dc35950
SHA1b247a198d5b3b8796b56125c2b1749de7c70f3f3
SHA25688ec2cec1779a542fa5cf3f8378e9d51c04e8644bc85d6d19d947febd2c47e45
SHA51272404ca73fb121bbd937f57f71d09e5a00775591d464010424b9c426f0d03037ac29a34a09cf0686f4b824bb737855b25af68d770c8464d16f4548c4959a1e1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a1e6f3cb2b8a8227dc63d052a2364bd
SHA1688576aebd87e9d903787dac5ba31d1a81d80e04
SHA2566dcf1587754785a16a73162f80ee3524baa8756beae83f341989597ce8a37a38
SHA5120f06f8ba161314f0ac569768ccceeecfac9808168e894f84357a6640ce62fb25ce8cb62f9835f2b6db9c7fa844e5a28699b4c5e42491cf99d721c47c428d9458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519153f2edcb59b2c9bbcb375b17cde3c
SHA12abcd73fb3044c434d48b8d7bf7bb43e607cb2bb
SHA25671e51948adcbb9c6e4882189ee8ec7061b260e37f6727bdf4b75f40284d2c766
SHA512d610ead121f8589016f5b11ce81c5f6294a238df049ac9458b024c2b81f0f042a465d6a296216f35f5fdb7b9e025f5ac3ccb77c58eb2e6b75752db3cca3c3c2a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b