Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 17:37
Static task
static1
Behavioral task
behavioral1
Sample
52e3882bec3cabc5b1a103ca7890a56a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
52e3882bec3cabc5b1a103ca7890a56a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
52e3882bec3cabc5b1a103ca7890a56a_JaffaCakes118.html
-
Size
13KB
-
MD5
52e3882bec3cabc5b1a103ca7890a56a
-
SHA1
55861b6ad3f69129e4cfa7535c79e190456c8fa0
-
SHA256
7f9aaf22ecac95fa5675f5af75633eee67e15e7b5060e28e1a21249e853ae638
-
SHA512
ddaf96472f5eaec817d5a669b50419d5b17555b35e7c0d782c28bf0d66a530754575f4477686c511f35838f7dfe95c4ee5608a1c6565d96cc0924adc9f46c813
-
SSDEEP
192:JuU5tMEs3Z06S7ns7g72w6Xg+zBv1D/Lziuqos+5hzciRrMFeenNF1rM6TElhK5P:TDsMS3eF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000002ecec88d5029853fcc7af65271b128bff21cb6617ac97823318fbfcffad75c08000000000e8000000002000020000000fa05864215fa939bf65926bd8be08e9810d858ffa1bb4f22208c77bc3307eefb20000000dfec867a9ba3a86638b702e61826c66b3b4b5205751002416d712d9cfbeb590c400000007e4a356ca2960350cc03e337f6de7e32814d147c677a02221ab88aaeec9df1149527ce0394dc584f5673e696514a5eeba259edf269fd176fa76a18420ba9d5b4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435348516" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7ABF4401-8CAE-11EF-B60D-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01d464fbb20db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2332 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2332 iexplore.exe 2332 iexplore.exe 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2332 wrote to memory of 1992 2332 iexplore.exe 30 PID 2332 wrote to memory of 1992 2332 iexplore.exe 30 PID 2332 wrote to memory of 1992 2332 iexplore.exe 30 PID 2332 wrote to memory of 1992 2332 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\52e3882bec3cabc5b1a103ca7890a56a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5348d66d9fce315b47ce92de79a8b563b
SHA18ef279da3254f18b95bb43628f59c30b86b658e8
SHA256565eae306110289e6661dfcbe6c3d757e8f8d2a3b7c979fd6d2b7addc38c4e11
SHA5129482989dcd5347fe8f2efed3c2ba3f1248fad36dbb5435fa820ccdf65e0bfc572469ca603859241a1396a5c9b23bce56ae340cde66bfd532a6ef6e49dea50fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc95dd4eac0e5c23bb5e969d4d72416d
SHA160de6b449223e5aa60e31739958ddb5cf60804d2
SHA256e180d365a859c109ebd836606c9d43acce6112f10575322ea297327c54b869a5
SHA51234e3eef8835e65ebe3b376dcaa1ff99e71d010c4711a7e3779b23476bd89aae6ffc27b21acf8746f3b3a45a2f1427184be0133f9909da06e29c02f23b8f12a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577c77eb95ba11bb26cfb9d67515743ee
SHA154761f254e190fd97733752753b8a6468f52de35
SHA25644515d1020553af5b9481f2e1854510220ab1d78cd152cc4d31d299b5f43dca7
SHA512f3b273b3f9637b68338b40eba5ff6978d0abbd09c6b1c1afcab84ed3d489894b002e04bf95f3caf855970da7317b99d070e6555ab8f9b5ac2f425dbb64cbff66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd9f9613001a4e2b106c35101956bdb2
SHA161f6f01500d09c1a0cd44ecec42eed894b594cab
SHA25685622fc57621ed48fb1c4d2db3cb5a255dab48b7a800afeb3c99256763eb20f0
SHA512ee6d3f65c1a84536b58c87879b95f35b9126930a8ddadd414e67d4d5bd9a7362ca9dd6cfcc3b0385db4a22e36def05da3b22ca79f8bcb8bb89bd0dd2c4b5422c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a177ab9e42b97c798c8ed977223e4661
SHA1054858168df3961718072529d36989833616725b
SHA25601b729f22b769d9c8ae49362177b338c6ea383940f897c8316e5e7459c2350df
SHA51200657353e656ee42916f168ed31b0e58092bbd2a9e6a225d8b222975d302d74ab96f678db095dc235d527f2ade366bdf8ee4a275963df4850fc3a281ce5eca7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509beeeb7ee86d710311e0c7cfbac7f7c
SHA1ab6e1ef85a665e2d98b595ccff7147b53cf8398b
SHA2567f54270d051cea7c635b487d6fd176a9bf153bd4ad6020daa85858c546d32125
SHA512818d05563a39e2fb53d28a9a8909d883375dbafc561b8e76ca53abd09248b3accf8bd1e24788e41ff6825de90ad93fe2aa456caa3e54a265f5c9ad710869cc85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca516bbd0049512deb97ea7055d43d41
SHA1bc0029aee6364d78c0898931766b3acf93079a68
SHA256beb4c9d7325c190cb97d61c8399e3900ec78aa66c43dd3ba8feb5bc6c40a81c4
SHA5124507f3510af9922b76f5eee0bb9140b091e76084e0ef730095707f63c1836e2eb5b62647f13d1c6f1696a33825b79c05a8a561192965c2a808671d21102b3631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530f17af1f6136a6b698a21bcf912a2a7
SHA16c5eb082a5d178b524ae19bc6713c288c12b2284
SHA25660850545d126fcb1d939d54d9a7c4cd986c3ffe2e6705b3dbcf8b7a4c3088412
SHA51297d5890a4d7299d4aea255ff3c03ef5b9a919553578ec9f9539593630f4c0694375edd9bc1ba0f815b9401a2149b715139dcaddfc37df1c6641285e013101dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0c2c75861ab4e29cc3cae8cbf99d3d
SHA1997d3a4e841c8a6debbf17830d05041a94695cbd
SHA25651d774f70b7804bca5a28ed70a2a03e25d3bc60b311c2d43ae01f631eb7d354c
SHA512ab49a71154e12ed682a0af86fcc7abcd013670361e6b948879e259af05dff004988b013382d590866c84a911dd51a1ab9cbedea5f896fa1ec8f5d8d8fc581461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d293eb2dbc873cf52ebfe5135b9d348b
SHA1dca4f5cfc955664f7d274b5e36d9d4db0d0ad922
SHA256efbb052eba9a02b9b27003d11f833472fe964f4db4715a6b7ffd56f23fb1c944
SHA5121e69319f1ed401db157c81879d03f8697a9f6eb58e24316efeee605c930a80a4dcb5829fe172be412b00516ea4db8827b596bcc74c608c4b056b482a7fdcc104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550b5504a30ac5389033e7e8c14c7b33a
SHA14af8e1fe299f566a2f6b7509698cd429e90ce265
SHA256749a1a2cd40256bce1a6a020d60828a51cf8374be8b993b238cc7b63a26587d0
SHA5125222b91e41817c44fdb25297c18f10ed8d94c38c69a9b90fa54d6386bdd972d7ef02b214ac76774a05fbac39178c09b73ee6d8041a84ac43387de1c9e43bd073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd313b3756a5dc67b400a6cd5adbce42
SHA1e6f09382070676ea6257ba78b9a7a6a6c5f729b8
SHA256ba31e0f1f55df187143e8995f99f1486043c35594e3e60810c2f0150106af0d3
SHA512c6356041a2484a2f88d532a4bc6b724d936fec02476c2b547cfd02934e589399381d615673fec8d36d8458542e229df56032da489e5cac4faddc1fa536f89c61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50642b87bc8ba9e9fce1f5df2bdb21e16
SHA160e0672db5be4eb11d08f4a68c375c3f9703dace
SHA256dd00414ce071b60bb7c3c0c0eb2e5a83a80430aaf946a0a321a1ad81d6663f94
SHA512ce7ddb555a6d66bf518f83aba57a45223fe115914d9863214713bb17c7fcd898c431ac98f8360abecb396226b4aac543b5a51b075936b27a32073494ae4000ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1f29433d7fe7e5bdacb5e042e6d17c6
SHA1c0af09d338308c57e63aeed576bb607322f28fdc
SHA256b24125fbb1ff79ac038c3da1c700bdcaad8f19c48e7de16c15fe5849c310d1d1
SHA5128e82705cb66d15627afc2edd996af5c27962dbc615d9aed681006e17d184225048d6abcf6724d24e43bf9f94f46eae260c6c92c12fb2870a5a4a9ff94abb09eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5342e735dbacc2ccc1eeafa5cdb2e22d6
SHA1848f614bb857a7155d3b816a952cacda948707a0
SHA256a7d1fe2dab37babe84f305bae72ce3377de6a1fe233b18648deeb5cf5ea3fa0a
SHA5127a5a50d2c8622c2df79365cc6ecb4de8fb470af5eb51f3378e593061fa84a86a9339b9485cdd97bf206c815eb2a27767fe1c696a20b0624a460aab49596bae2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d67e70958d153cc4dd3b03453c3ad352
SHA12327f8a68886a9d578c83fbbc34acd94b706d652
SHA25642cd66356157888d6a70418d1f1da6e0d0ea169bdedf31a412b5c9522b37c79d
SHA512f40055a49aecc346ddbb243d4dd8cbd0cb8574c4414c79367e46ac231831d58a7970ff738ee7722cf1078a4b3226fcc911fd2068c719b2ef14d955223c2678e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de66bfe0b4ff483f58562d64775d338f
SHA18920e22922c36bc205b4f1bbb8df61f10004a60e
SHA2567d4daaf59cd740d7cbf0d0c14ddcda9fb1af1bf2b4dfc00c6c083fec449cb1eb
SHA512f5812ca3e8396c5ed14ed76cbc5fc25b9b18d7ce7895dc0a543e13e4714020b07cd30ba0f4bf2bc77013290f2c933dd6c9d674996340aadb28a148b8a5f0753f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5137b74b147aaca0b0402a09a4f4de517
SHA1bf5a466aeaf85379dd84b25fd97746a0824ef343
SHA256ff63f7619fcd5db1b83c0aaeb677d4d228d36b3a5d79c1e14e3f95ffc4ca9d0e
SHA51296b71b649f8ade3e55b611afd46d2b935af39ed3f166eb3110ac6d5a9fd8da6a6704e41601d0d7d86237c6eae6a2e0d1bada3cf4cc2acf8906b39d3af738fc70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588c466fda609104e8106ab760e95c87f
SHA114cd9419399038355ea426722fdcda484450c255
SHA256f5d95378288d2a54f6bacb82992c41e6162dd1836755e79359476b19da513fc0
SHA512805d07479cb4af19fccb8fc9ca27ad2ace1409b462a6e5a464b4964ff27601c91cd3f3c768a03800c27c02289ba4e29e658f8240908b969f8e8c1f56eba7c7fb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b