Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 05:14
Static task
static1
Behavioral task
behavioral1
Sample
4605dcb51e98d8cbe6e3ad7d2c1b5348_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4605dcb51e98d8cbe6e3ad7d2c1b5348_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4605dcb51e98d8cbe6e3ad7d2c1b5348_JaffaCakes118.html
-
Size
69KB
-
MD5
4605dcb51e98d8cbe6e3ad7d2c1b5348
-
SHA1
c67e47213c2337e73c3f5887ddf187a2508226a6
-
SHA256
a59f5f5bbe6cbcef0bedfa8d5dd134e52ab70a9fb23f14fecfdd74935f33da90
-
SHA512
40b7b2f57f2709cb48472c2059e7384a78467cd9c1b0caca7832b8a896a566651c5015d70218c60e2add66dd0d04b0dae1645c7fb84489363d5434ec5490b890
-
SSDEEP
768:Ji/gcMWR3sI2PDDnd0g61suPFwoTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFVGN:JLWTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3071ad2bc11edb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435131130" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57286451-8AB4-11EF-B856-666B6675A85F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000aa854b8623753d8321f817a412b91d69db412d798c957f455246f29a23c5048f000000000e800000000200002000000050e88d7071da3f99e92323ef83739c44176307e7006c5290bc9866dc3f5482d7200000005438cd4cc4ee22a684e875380affc1cc1b32e447a2ab9bd4de0591fcd43bac5e40000000ce3d4a8727e8a260fcec78e2ac76f7c6099cc8ce49ed17201d3509b9b11f67ce29dc411fc135fa6ee0042c11c8220414b41ca186e984e006a2ca4bb7ecba0f9e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1744 iexplore.exe 1744 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2304 1744 iexplore.exe 29 PID 1744 wrote to memory of 2304 1744 iexplore.exe 29 PID 1744 wrote to memory of 2304 1744 iexplore.exe 29 PID 1744 wrote to memory of 2304 1744 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4605dcb51e98d8cbe6e3ad7d2c1b5348_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5049515fa911969689e1aca007d53e3e2
SHA196d1b84eef8051139f2a649aad1bc34eeac2978b
SHA256dace299a6a38be714fb7c8dd199743eacd9373155baa353bf0fc0e96b260e5b7
SHA512a39b62105c6da29f6721d184f19ab324aa2a21f1f84d9455350039bcd3846b443196e351ccb6e53c248946acf7ea6475040ace071b216efba78017f94d91bcbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df952eeb5715fbc11a19d580d7eb4cd5
SHA12b1eb1ee786eca5d2cd2593deac485ad6b9ce895
SHA256ae6f4a3a9c3412ef7bba1536951aa93cb4aeaf61c6aa5109c9ce9feab373d758
SHA5127637495c87297731f9aaa52c6d10fb787daf12832a7c82146923e26950ce09972bf33a2fe4980706de56986bf9a15feeaa2c85699a2a2e3aa66400e4d491d759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589608e3d1a4ab6859448f97591763492
SHA111c0ad2e531e39331269a129b45915a247c5218c
SHA2569e47972f59835dae1199fb5bf13f572e4744cb08b28b8122bba81e1cfd4bf00b
SHA5121fa5a835f0ac9e01e0e0356ddf685388086215eab1d151b4ea6c925979dc38a26388a7065da72d1724b901a783a18ed14844c7f3645e044ab9fedec6fcaef6a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd14c83d0339402535e830d724e48106
SHA16ad63a6cbc307623732c241988ac76637c0336ae
SHA256963245828990ad095363916ceacb88e17d7f4f51cb1efa56b9afcf012ec15d37
SHA512b6f8be3c52dc15641f57faad42bd93a8bde2d1e7e0f99b40d4cdf736b4846463dd15765fdd8d2ff8dc8f858f13ba026ef9175fa369e925d1b87b93abd2d0f276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511ffbf6c9fcb211103728bc7eb932e64
SHA15ef87bd11f44a6b1b6b07bd92bd088d84efe88e1
SHA2569f0040fd17eb936556b31b42af7c37ff9938322364b42f25064ea93ba50bd683
SHA512c8175991547b2e0a81c186d83ca5224c13106bdd385fd2942cc34d43979501dd8e6f97fa501155a01cc156c4c2b11bb03cda89710487ff8cbcf5dfe3fd930e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a7915da565dd92800b26c177597aafe
SHA18608cb6a2e2375aee9c22f0b363791870fc8b7f4
SHA2562955fda76635ed2c27070ef1a35e9106fe3aaf8b6cddd10356c48de0f2e1d35f
SHA512854ff1b0dab64d8d69cc35e4563496a86c602df63783c485481e577f176d39dd473b1dc857fb6e378dae0b37db7591c070b34bbd274be92fd8d5cedbf4c324b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573ecfaf564b9e0e9a2bfdff9ca3d606c
SHA14e35b40ead2ff88b9b92128f77ae13ef6fd878f4
SHA256a4f1cc92b4865ed14302f0d08043b76b45fb56d1f326d441833e525fe0cad901
SHA5129a35091f4b24c1877bd60699f9f5ea1769970fdadd9109ede08d0b2a55830b7cc16f2924dd35113d4afd8c8df6c7733f0feeb0426a6b039a6c2edaef7c474b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c80eb09ef32c3a7b7c696e94cce51a49
SHA1012621f92700d41bbf997cc507adb3702dd3ae97
SHA256cc2593ad9186b97fa92217abbdb02b1e2afba8d3dbba16778bc9f5929b586c0f
SHA512abd1d4c5ffc7298f0095eaa5f1dbebfd4b906a7e3a3b259402f9800c21abff1ae1bf94cb7e6548fcbd8b2c21bbcda7736424cf2b5404dcb7132ce1b39bf787b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59627b173d3c5fb829fab4f9be6c4dc43
SHA1e54aa089717017966badee9e7d703f8bdeb2f0e5
SHA25660c01e3980ac7198e7b806ae6f2aeb6730c66b8e981db429fa8d12b9ed9289e9
SHA5122ed896689b6e4c4b81648c3e9ce904eb35253b29d868da32e1ac0a42029f11acde3043d0b1fd3e3f0e610cf7bbb0d32a7cc9690963c6eec7ba21bffa40072353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540769dc0a31158ac3b75de19868e7a09
SHA1efe908b96476c515925666790f24b90318101a64
SHA256808bafb56d2ee9fbdf0d7d24c78e3547a565bcaef58cb1f92af3c2c7300516cd
SHA512ad77a5bc84b54478fdb69265b224f100a255b42596153df8a131e4db107d791101b1d3bb9adf382285ee3f8e72913daeefcf7ec8c4999d341f5f64c0251fb8bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c452e644569eef8dbd54eef156e5daf
SHA13cef36fa50a1a7830178683314074df444f9076d
SHA2566d77ed96da3ab04b8ffc3268dd8baf748847cb11ea803c977a24841321a350f1
SHA512f45e667827efc12605c8d9f505c6b069ee489d8c69a5386d04904fd9e15d1001f336ffb2da946d90615192a2e7faf4188c1290874207f523a0aa1a90753156b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb703057610c88459bd30403dd676541
SHA1234a60d748fbc4f8027301c331fe2eb241681f17
SHA256279520847685e9c187f38641be6f5537f87236dbcf40e5ec2e289694d5b4e21e
SHA51223650455a2f2bc9fdf7b0ff5042b8d6e2b6b376045b58fc24b8a6b644659fef1b79112c90a2d04f30b9d61434b8de7b19bf5deba44b105a8a9c39d85d4b8a9b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c77d2dd49ecc81f8727e3654dbf8fd9d
SHA1a09930848c348d29538b28fe16f9c432adb04dbd
SHA256ae65cbfa9e8ff67b974cfddcfdb0ee81a4059113ced6248c54ae1e89742fbc5c
SHA512b1594c5f51431a6a1e38ffea7bb4b0b6db2986dbc3307f912baa95ea8f02c72d5404a0d34aace68de92d04827089273c3813c861796aed8036650b94d3331830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ec22e5bf420639e89a6059dd72be171
SHA13b3865456a6a48b0b3bb8ef21b49579c2f5855d3
SHA25699f9f4633afa23af1dea50aaa56573c02bd4320fe58ff4487b87bd3f0c01efa4
SHA512e31674e70575f1154087c7986b7b6cf713e6b88fcb7096642bfa6016e21394f0be1ca5f25500ff1a79815f39ca61a21368f8de11826765d7bd30f29b412fc9f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e806d62e28f2dbc59f23f5b14f12d9e4
SHA1f33538b3a463ce3184f345ed2b41e1a463f0fcbb
SHA256a3925496ed86a4c1c345612f74133c29fdc028e7ee3e4ca1396e3bce67c7dcb0
SHA51287ee4cf847ef64c95c13db544ccf73e380ebf0319f61db40148719e6088666b22882396a608c02ae8f03bd62d34651124c702d0a9c9b5e104ab64e0619747a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dbd1e9093de007660a99e1c109f115b
SHA15279d47d150551a4050578de231723714a9ba85a
SHA256a0594f770331b23ac4576f6d6742f61b451090cd5483ff99fa924e8f44599657
SHA5124feaca76f575e498b0c3422cc57d9f4b205fb23a20be8be4d1042b2f8fd5d0dde57ec9e0f9cdbda030597256850daad8abfccf6cca9b6b92589196f798dd8a6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581f10e75a548539f9fc3b9b4ee219bb2
SHA1a179b5cc8a75a6bf3d368c9b1df712ce74b726f5
SHA25650d226be9192d1b7dda58f311bdf7462e0f7d0fb45e26c90e4b1fa4e7d63d577
SHA512316a751f963b57fdfb34d03628a64f84de4e0efb526238a1cc3a92ce8dd18cfb56236ef8f8adc0baba3c5dd6724715600401a979fcf135c4451f1712a4b80fbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c8bc72621836ca13993336d87ea69f1
SHA1cbc766823a1cfde9e0ac7bcb0a182d2d59b6c2d2
SHA2563d13d480dde078391cfb36453bbe9c1468aa4ba91bb575a79c1e1380222f339b
SHA512a2698b2bde494babcb93e149a45abb7ee782892f4079d1db96d0cb2e7fcbab6d19cb10d1085d22927f70cfba717cd8a251b4f708189eb5f2430971d4f1ad4353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56421f96d4207f309c7c85b6e96907c2c
SHA1bd043af0e0058e7d731492dce07b805ca6d665f4
SHA256ddb6edf7de4f6616490cd8fc453823cb13c0f699aca0f49ca5ce3d63bc0ce8dc
SHA5122709453d2794ecfbbee4c99c61648d457906f456558fbf798e8619935b27e53512db7b7183b41b4f5783abc8aead14a20ba517a047e5198228607baee3ea97cd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b