Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
542df48bc966a781b404a12cce782968_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
542df48bc966a781b404a12cce782968_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
542df48bc966a781b404a12cce782968_JaffaCakes118.html
-
Size
27KB
-
MD5
542df48bc966a781b404a12cce782968
-
SHA1
b6e5632bb4e22422b2bbf376ac514bd2f709ac80
-
SHA256
817a824dd470eb9acdf9959ecb495e5d0be063a38dff1a430376308eb6745052
-
SHA512
2dde637d209a598147fe9c76709a2e214e2a88fe2e095063f98a72638f8b7bc1595a7225617c5f3083de7cacce2a6049d2ea7ebe5d98f2f9a301a34aae5deebd
-
SSDEEP
384:4miigGNeNq0unxg9c1Xa/igqyYnqPUhQvpueIoIOMY0r9heqq0unxg9T:4+eQ0unxgu1Xa/igqyVerjet0unxgh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 402fbc5aea20db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{841C02C1-8CDD-11EF-88C4-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435368718" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000cfac6ce8ec741b42b5de71083465e0fc4c1943fdbdf81534e86ed94ba06ed61b000000000e80000000020000200000005a355c86f4f54531cfc94ff1af9c55320cd00855b685c687f790ee3598ea746b200000008bb87a87aa6799b5eb88c133e163d5d2d00255b9ff89e48eeb8a3cf7f1b7d36940000000fe75d269ce46c541d9b26308adb7214f5c29d835a1c125c0dc4015372b0554f6e4c59d518df9cff817dbcd3200d83a7e9b0a6b00b63ef3649007a7876151254a iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 1368 IEXPLORE.EXE 1368 IEXPLORE.EXE 1368 IEXPLORE.EXE 1368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 1368 2480 iexplore.exe 31 PID 2480 wrote to memory of 1368 2480 iexplore.exe 31 PID 2480 wrote to memory of 1368 2480 iexplore.exe 31 PID 2480 wrote to memory of 1368 2480 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\542df48bc966a781b404a12cce782968_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5e3c0d1bcdd7dbbc2e7748514de4b4763
SHA1f2f5af1968edb176ec6073a78552a7a6a1f7cdff
SHA2567800765c7ba641423e82a7c2d58b6f03e0ac24d606a7b3accfb2b8f4afeefd03
SHA512bc492718ab15df37bae72108547247b39eb4d29ad27087ade3aeb3c0b95c4d2ac091651f3bea4885f483f35c767f133ffead15c726300618bc455521448798ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c0964986fd820c26faafcc4f2f0e6c74
SHA1863fcddd55447046b26a46c762ae9784c2d743f8
SHA2562c51d0f233c370325d6e9ac133e908625a01afc9d76a0347c0ee0043eea8571f
SHA512b668632cc18b6ede8bfefe07061593d1e897f69785a2b6342750e6c84df1df12a5e8185405c29bfc6e5529ebd490a49cab44f18a0cdc44f5145fc7c409f60d0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0d196ce9911d22c2253b81262b4ee12
SHA13c9c5abd3ab8ba431c3010c6a4d735a7387a0050
SHA256eebc462353812cb68fdb98c6248c375bacda24c4d19e72f264d1ed12d96e7047
SHA512ea7bed58287f5e7753a607723e7984148d50c0e3427760185ac0bd86d91faac69a067d50cb338900b51765a721f88f839371b2ac1543b07da0717b517ba245e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5da036e7d25a02ce745143a6f58427f
SHA16338a1349c5ad56cb7649ffee9ee89b00344e384
SHA256851d17ff8ef8c599ed915da63b5390c220933c49fb35031097e5ce67327023c2
SHA51291aeca8e62776e1e8032bdae693afd384baeb99eb6825e3ddfa583f0021113da19eeba9e832ebd36e55647880796478814e67b5a27f59f15a3bed7d7101fbd4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d84837120edab559bc507546e6ce547
SHA1c5ac0c3a72693ad7ae1bcf4c74b39ec707a82d1f
SHA256817916c3f658eb578ff1db77b554b89aa27b835df821397a8720aeea8de42726
SHA512089b2eab0b565581cd03b2a5551bb500e67fc412b43dfcda68a893174312d07d21106bf7ceb5ce8a9855b005f7780f227901663fa87674b06b9ea5493d3e9ff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e60edae1741732650d3081db154a36a
SHA1fa106c53aba043e98273ca7fc3f60fd8067492f9
SHA256aa2af16174e88370286b41a26cb4bd90c75f8afb329cf4492c8254b7497eabff
SHA51286d05c9f9ef4776810c91898125ee3452c398b531ddb088f7fdd68f86f88d118bdd0c42a623a37189acada40c7f3fc309a77d3f24f712a47edc363d5df4ec423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572ec4c0f3e432e49712f16fe43c51c15
SHA167151249b9df86f2ee3fccef455f644429b55866
SHA256875bd678ca197f754cfcea1f110ccdc5baef0b4982d783b2e96591d75f8459a7
SHA512eb390eac09341dbb29251dc7e0d01120e0dd1f3581deed98f6cb14db80adf35e95a68015e10b1c3e7e562afa40feb897b023abc0429ebb6ab5ac8ead8e29d3a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51126e8ea768b41e19ddc211c50a3aa16
SHA188d4ef0ec061bc9133693f7aafaaf99aa8afd9f8
SHA2560b2b8a1d739e26ff1f99eff649bcaac5cfb46936c91d4f32a998e35d964bdd05
SHA5124dd7d7acc867815a16d4bfb3ddef8c15108996d78bcda89a0d1f60385f953c93bfb974bbbb5ea1526ec5c8c9b165866f7fa97b1a91424d0c0705ccc86e0b87ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561c1d14750522da599da0737d6ce5f52
SHA14827ad0f0ab0dfebeb0ae79c4eeb39cf10076815
SHA2561acebb628b46bb68c532a8dbba0a84762e344678818f7a96afe62d121acb74f4
SHA51256e1ad2d8bb61a7a18189ed801d9409a08faa8adc25c393c3f05a9e94fefd5137c15f78975f127f9d820aaea002af6385455181ed6bf1e78acd8cfbdece49750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c814127c7b74708c2d55f54bd62a278
SHA1e8b311ebb6653d595644b37663e16aef6c2a3d8f
SHA25689cf64e14059e42aa7601f0f3c7b6e92a90463b223148b9b600a911ad3cb577c
SHA512e30525d6b9a4a6dae85e6505cd985239836e410aedf49343569d8eb0bac1692a9e83cfc00c8a4ae0e8bd1b53d9fa822cd276aa21204c1248b8b3b21efee5a48f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587eede79ad66a527d802eac65eec3cab
SHA1df92a93efc09e77d96cc18be1a5db8d915942a0f
SHA256206a4f1d19c8c0af4e78df442b42638523c9c262e8834e409b703aceb1af3214
SHA51292ee0f89a7761a4719e5011bdce02ede1ad23aec1d269ac63a5da12ad14c884e3b1b533ebdc89ad98819a808566cd5e274e4a2ac90a79ddfb95e0af07b6a3bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5300d3f765cf9039cc8f48ae5fc404671
SHA18011ae9e63374911536bca2b48539674b01f7ca1
SHA256b34bd68a65c015c1766b5d5c5876262ac2158a52a0ef6a8b57043df202e5bf1e
SHA51230ca62d38dc288acaea06cd066c5d55635a2c3d22fba4f1e8572314b3b059da335a9a791044ad86f2407a02903fb2866638dba069a9808e45a131291afc2461c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5089ee4ec38178a12ae0d903705f82348
SHA1e01610be03244c424ac3246c80aef997d5120335
SHA2561ac936b2f777c4316e9c6ec541ad79ffaab74162ea738193acd76eeaec296aae
SHA512ede661e9787d18acb16c6db2aacde529382d401c376ae85b0f2d969a9da22b3830c6dcd7f893148aaaa9c66e0a77babe7eb04df429a02bd7be8e2fdf96d32bbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53a9c7dad324893eeb8b5bdfd3c8e76d9
SHA1d2bebe18d435f1534aa4c5c10b28d7943fa0a8d3
SHA25695370d133df41c112f71f47d97e7978ab260c075585afaafa24f3bcc074c3635
SHA512026855e81f0959108dca9a4e1481c6b4abc9b333962f070d7e69c408761d6f8504eef66524ff94642da360b667cfbe2da26075fec294d438f5d101989c5f3e16
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\searchclose[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b