Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
468f2d61a41ba47790f307518a939015_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
468f2d61a41ba47790f307518a939015_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
468f2d61a41ba47790f307518a939015_JaffaCakes118.html
-
Size
17KB
-
MD5
468f2d61a41ba47790f307518a939015
-
SHA1
af449269870d7792e834d39b441f0a04643fa5c0
-
SHA256
97d10f7143f8218e21f63af1d7c16e64996f6db21de706c53936b5ce7d5ba1aa
-
SHA512
a57ec9a4f0994c9642854bffcccf9df69b9f26d592978a2a5a76a5a51c350f248bb1ce0682bf37d0cfa2fc934baf06125e839a49b7aa7ed7cb0cdbb5b6e29f33
-
SSDEEP
192:++dbUkcjG0ogndANzUr8ppwFev+AbkdHQdk60lrTfKgLK6fKEkiqRD:tQRQzAwYh/Lreg+zEvqRD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40755a5fd61edb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000273fae25f5a8be4a81b2134cde5e8a6500000000020000000000106600000001000020000000dc4d1db5c84ac8b08cb6bdf0dadf069566bc46b56205258b48f4bf1083844c8e000000000e80000000020000200000000848964e066a7671cbaaf5d3d006e97a678c2bebbddb6afeffb168f63ec060f620000000ede79f8bb0cbf291b85d3a13456439f6bc658aba8593bc6fc43a0bad7dda9e7240000000a9168e572190fd825cc5ada784b59fb00b0e3d6c4b93e3c9b07a6a165883b914c614ea66cf8d6c10e4a077a671d405cb64e3c7a03c268be8199b121fea69d480 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435140194" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{71B399B1-8AC9-11EF-B4E2-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2700 2860 iexplore.exe 31 PID 2860 wrote to memory of 2700 2860 iexplore.exe 31 PID 2860 wrote to memory of 2700 2860 iexplore.exe 31 PID 2860 wrote to memory of 2700 2860 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\468f2d61a41ba47790f307518a939015_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2804e24e2c357976f578c67350f3f4b
SHA1ee79bdaccb2c49e0d4ed6fe1f486e96eec128397
SHA2566b79d20b23a75462fb1f5354bcb875f668b3507ca4f86c373fb5dc1d3af3a3c7
SHA5124ffb66907f8d66ee4003e53f2a9517f0d484b9b824c31eda8a5059acf7c7c478e2324c04cb5982dd1e595faf607ee521203e67f5269c775bc95f7dbae30a307a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592ec5b2291efe2c38ca99ec54abec400
SHA118dc5e832a323fef48b47d063feaf4e9cf1b7337
SHA256c7568d1008adceba00247bbf3b5504168d1770313b2c543fd2f7aa9eb18af722
SHA51245377378643c4c5f10e43659f3be45ff36177ec53925b731587223cc7b719702955c24825d0c2acfdca121a714430ff9abc3b45dfefe53dd409d5fecb55cff69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51145075104418e1360f50809f1a9dc42
SHA1bf5688aeee5704a6d0dec736aa0177558b092528
SHA2567c596f2908cc9dd52fd4b7e8a8dc79cf56c80d313c317063362ddcde0dffe1b0
SHA512f130110f51acd885de046b54564a67ea4e201b673d1bdd7c2c0c5e056235373dccf0210cd361fe1322a669c6c12dde381c94c598bd2790124794c3c521ffd3d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c28cffe4b6ded872cc9bea196f8485c
SHA1001b82f5846a1cda9a2c18c6b16f3c6d6d10efaf
SHA25658ed951c47ffb6f40970337b96306d6a2e4073bdcc8982f7666c83844b9b22c9
SHA5127eb76a8bd34d4ea79b973989a6dcd6a81d4cf3db8cea31b74099390f3d594f057add2f335380447d99815ef655ba601afa2e5dd713e7954b7fe7355f2b607b49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564822579c7e176e0586e20df011106a3
SHA1b687816ce8add61578a6ca26ebdf2615a51e6d46
SHA2564524ff04b62fa01cf68a8626c2911fb02a75d369b77d060455d79425a5e98ae3
SHA512adcfe2b39a5384a44437ded6eb8b0ebc0ca321d2136ecc47fc956f45e9994ccaffb8c170c9f467f8a2778904bbbbdb7128204b0ae6434167bfcbc70fe8eb46a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ad55339741c272ec847fff11f0baffb
SHA171390819386b12b751d7225aaa5f0ba97668d0eb
SHA256921fc4ccae5f161f502114c70c298e345029cb0df38c88ad63b71deffce1cbec
SHA512b86ffa3fa939c46bdf58fd439b5d5e02ccb5d709833ce98e87146eed43c2422511227fe2647acd80b70fa48ed5814dab00c65819e21e3df46e3a88dafa0832c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56432271ccf02eedd19d6e8d670f735f6
SHA1b21890976de0a9d4ac82a98a684699a112be954e
SHA256ce9b91303e7c49b3f5f8508171b575d5d3143b4043752d9118d80f11bff93486
SHA51251f355b33c7b5c4a537923f116d8bd8e1d1f07b445133c713b9ae885f8edd3caf93641e9454952712b39440a5396606fecf834d4fb8e87a5b23c00e0987a732d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e235cf276bf6c16b9a00d4445fa60c9
SHA101421ca2d8f02eca1d0fa7d5fecbaff9004115a9
SHA25621f8e85b05a0fc76130184906d12294ee0bd336baa836c93730aa7f286f8f779
SHA512bdf8b4ca55b8660f4d6468cf4a03842920071c61688897c172fde27f859340b1dba8fdec713a59438488c1e8e792cd9f8495a803a83ffd8148ea72f0af77f7c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539659cc52a4560ad363e57fd2756b03e
SHA1bf14571c1ba288e6cca0a16acdfb8ddd07b7459d
SHA256a675a8107ed5f3515c7195d3d366d5217ce5a526acaca764408864e9710f2eb2
SHA512dc736b8034723f1567eab3d531f9df9ab7d55a57557a3d934c48b4d3e9d861cc5953de846d90f4f24ea9761141985aadb02941ef8d4c2343a37b8a6520eaebc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5629084df93d9527689af151c1b7d90e0
SHA18807146934d489438b31e6c1dcdff8a356b6418c
SHA2562813b9eb1366bcbc039d738789a2832dbee5fd8241c739835bc9d53768f431a5
SHA5122c14ea45e7aaed56a681e2513671a59d753709d530416237759315ee7d67f4b2cbe79a1f30aca24517763d9031a7a2dd5e631a31eb9f714ec44dede93dfcdfdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cdc44455d61a459d2dd318da9b694cb
SHA11e7489a92240f3de1002cc8731d7596275492a24
SHA256d897b6dad629088c071efc0c87b24170edce786f818bdd8c7825a68e6302d0c9
SHA512867d156381e426ea995f8501f0aeead2c7868a6eae309e2ec60678511c78c396d8698af1ccea2e4ef611ed531b0a46284438cb9b8f5ff0a23a82d215cb09e846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5146fdf9f54eca95a54b79f28731f111d
SHA15262b46f0218eacb6101df5c3e05a35f0e876074
SHA256223af34714153bd07fea5e5868712bbaca375c85a5eaf4a49e8dfe0bf986c18c
SHA5121bcf45b6950caef74e817e472f106d2e27d4eb06d6687c03535d340c66763de589a81a64383e6951821014cbb04b3815e41e83dfc57ea75cfeb88c7686c59bf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5555cc1bf4083b1fcfd02e443d613e1e3
SHA1ebfa0e4ed13e71fca2e6e9a377d2955248019bd9
SHA25640d57a6d230511b262700ac564a907c51ecae474433308ca7f6a2342782aa48a
SHA51283dd359fd8b5b269d2eacda0d2c66e324ffe4354380893642025a317c01ef70f0ebb55b85ab26cd9c79a220fed0b0fd690565bcf8cab3829f258f416211ab761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6010a98fe706df85a2a8a17b43d8166
SHA1ea4c5752dbcd8d1ed134b1e396da12c7c117a98a
SHA256897846d28975f1e3b3b5e859d1ef959e1134f7e2ee969293fe844fc0b9dc214a
SHA512c40a3ffcc5a7bc2c8b8352ec89c60294c7da49b3a2a693f30fab9e071423650bc76537ef9822ad8b4791838b038bb44e54caa1fa5cd5190784d74e64145c0d64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f136470f734f26d5d13c6631409a3018
SHA1a757ee0705b334a1de259c959a90c115893b1088
SHA256e6a3ae963f3508c5be06703dc8c22a4c144c2934b3c6c943310e072756de7f15
SHA51267a1eee12cde4de9704da3aa0584561b003c7d9079810845be38f06e503d42876231c2a98e26d763fd67dbd9abad73ccb32daff1ec4b80bc6f0084cf384349cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a43dce7efc4a986f9bdbcdefeb7ae6e8
SHA16c8c1620f307085f73956f4bcc24cafbe52868a2
SHA256822702831e80d8c3f629ee802d7f0bf47af61180f106f6dfda9552ae9fa04e8e
SHA512b117b2870853b0478579727c2c210312cccc2d61e904bf5b37f79f8accb911c5809c3936cd380a76004e3f831df6b2f73231a42ffcd47adaa5a1cb2329c46593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55be0859aaf8a5516652149f5695a5b08
SHA1ce947351ea19848805df33481f2c782d1554b667
SHA256ea0dd490f9fd8a4fae6345b0e8291bbba8b8438d1a0d54e4a0759d5135a2153c
SHA51237c6600a2541a15b7c9184c8cd100a050baa84660efe9304fe655c56a0d080b81b8ee0cc302e2b165d2e83612c541efd7e185d2588f36ac0c9deb50426dc04a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55799667aee0fd51a3cf7ef6acbd2f42c
SHA1994102937f5fa655d96b90a29df48aed3a6c69f9
SHA256b1b329c84a00ed366163a2bb88f35352f26897f0c17ee75c4af7eeeac226a9ec
SHA512f0f9591c317a76b3f9ba3c9a0a6341cb06e367ea41b38cce168e00f748e2f950fc669c348150e7d1632719d156ae9b49967b4ea378753da7927677c7c65915bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a910fc3b7cc04f08627a93f1be56e743
SHA1f7830a94fb07039739559f62e76e4d5ddf18a1dc
SHA256d227963b4636d580ff4ca5ecba9ffd4b52f23e6378c10ea31d05610b97f1b816
SHA512aa3cb2cef0e029fabecc3ba78c006f71a2c465f346aa2f26723388c027443fc1173bc66679bfb332e11959e159c02c51631c1eb62578f0fc699b55fe783ca0f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534ebd8f5745bf313632813b87e88c442
SHA148caf276c025f7b9619c8e1da6b81a51a91d18d2
SHA256b72db1f79acab92b17d3d8aed70d4d6204c0f5390a19db208c5f562905c5034b
SHA5124a2d4bc2ce0029e0032bf5a6f56eb54cfb4b1293a0349a1adb3292720516811aaacb7e6cd666c5fe0a585e3d7f389aea85b9a16b8cb1aee37dd35f6fa0287cc2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b