Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 17:12
Static task
static1
Behavioral task
behavioral1
Sample
52cb0ecbe64c28d9095eec7836b0b141_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
52cb0ecbe64c28d9095eec7836b0b141_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
52cb0ecbe64c28d9095eec7836b0b141_JaffaCakes118.html
-
Size
6KB
-
MD5
52cb0ecbe64c28d9095eec7836b0b141
-
SHA1
60255b547b346779e641a6994241064b379e0c59
-
SHA256
a833ac138110cabbd27f64f592d2e2bb935585561777c2b17c16a7d2262f4a0a
-
SHA512
95b9f3acdb7e57713874006afd6cb9679a0768f2b685423fdada9f67cc8a08c5e870d76e9f56725619548feae26347be44a201ff222cfc3314cef786727f301e
-
SSDEEP
96:uzVs+ux7IJLLY1k9o84d12ef7CSTUVKY/6/NcEZ7ru7f:csz7IJAYS/w4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435347021" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6050d4edb720db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0045CF31-8CAB-11EF-B895-D686196AC2C0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000007f17a81906a323adf2d5acd8cbc1771bed36189251a6b1fcf692889b9793583b000000000e8000000002000020000000ace2ccc63e86e48e2d59c9c20bb631cd564d06cbce6d635630860422c4173c53200000003514a881bb852b586848d669417a75c4bd4d4079d560788fe363a5e42d51bb1e4000000099e7fbafaa27515a164fd0d995dd81b87102e285f7a5d7d1c0c59a9a73201ebf6fa46f9c255648f407e38d1082adc536a7bdb7fec4ffc1ed35755c13ec044e43 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 iexplore.exe 2320 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2568 2320 iexplore.exe 28 PID 2320 wrote to memory of 2568 2320 iexplore.exe 28 PID 2320 wrote to memory of 2568 2320 iexplore.exe 28 PID 2320 wrote to memory of 2568 2320 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\52cb0ecbe64c28d9095eec7836b0b141_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533cc0ec73d3349644da36d9bba432a47
SHA1012190a8e416965fa200d6260de178abc51cf947
SHA25684ebc69b042b2ae6725fe87f457df6f1562278c5f3ce8538b69df4c246821a8c
SHA5128e6f4b9e29e36c7d8552461ba671b09e56fa2d28eec1c67f3219a86e64964c5944c043f5fc1e83782e5406a15660feac4eef5a1cb157e12148925b8662474151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568a3f316300838be06a6fe3dd2167424
SHA1826a43b7cb3d8e8ad8ca7929da899a40675887a3
SHA2569fbc117ed32b9d8b0c42d8ec6cead7bf8aa4c184fbd53686459ff907f5162be5
SHA512119b96b419ada667b5f838f771bddf8a0c51acec645754a12722bc72416cee77d59c2f2ad1931e8fde59952860ea5120dc87fcd3a21782cc35dc86a2ca874bea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e1322458d4206f1ad885a02ee8c5c9a
SHA1659a9d8f9f32551671204434a0826465ef2f3006
SHA256fc991792ff5c6400aca5684c761d7ffb8f7fc73eceadf7b15e6fab5b2aca889f
SHA512f533819e72ebe8efcd1868e5b8b279da52e8d45bfff84c73650eabb14bd24747d84251845597b91026132cb1ba1ab53fa846ec9bded31f776a2b1e4915e8c4e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c6d034c046637a027ba8f6893b96f5a
SHA1c73ad833292c6fa5c1f34a3f8042a46d571bf9d8
SHA256162e992e6760edbc9ba8ffa672b2596678da911759f8fc402ed22c66a3dd216e
SHA5121985e7012bb85e111bc36e7245252bbe5734d8f43a1c7a27414cc41806376041fd6e59f8ccc786400f909d6280543a345c91de6dd9a86eefc77fdcbf6d1caada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb8a51b8fd06fc776e0123810bbdcd50
SHA1518687d742b1244da070bb66ec0c77855b6a5ba9
SHA2562aaf80dce47bd08e2c96f9d15855b0e24787311e96094d39c7cf4d55370f9e5d
SHA51241ad825a67299e995f8b82dc495666ac9eb1326d3cf67b4054bddef9a612de9ff74dc9e30c6e7839889f5df8eff7480357e1938540c87e1d3f549829404e49a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b0c59cac9eb65299580215135f48be0
SHA1934f280f5480ad182334ba98c9c4aefb169f58f1
SHA256253f97f8654cd9e53bf229f12629a1baca84122fc18ee4307f76912f30463206
SHA5121cef59b59e7761ab798ca857100ba2fb02d77df7889d545caf0861890718bb32cddebb1b05c7542eb98900f1adc10edee733b126f1254d9bc20c779d668ac77c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531a0126fbb1c63e44a462fab88529e9c
SHA1a413db1bfeaeeafc81498b727282f991e725bbb9
SHA2565fd39f9a336f98d6aedd5bfb251c8a466a9309da6cd39117aec155c9070b1da6
SHA512295fd2e3e3dcddf3eddc7b3f331b53dd3b041802612e26260174435f1757be655cb92b5ee1b8ba7e10ee4ae7ad268d26547abc80a345930ca52ef76aec99b08b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae2d969b1aecf4cd886e01d84cd6650a
SHA1027111e41bdfbbb48df934b00054d28f533d65d7
SHA256ba8491b210d2fb275bb8b7145a1bfc9bf0ce3eefc47d9cff61ebabd5fb54bc9b
SHA512d33540d5a58ac45591fc6036551a3c45e82fcea586c3a5ac99405648e2ea47e4626e04891b6544f2798377a730b01dbc1a573b4ac2318fc01dbab6a1fcd385d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534e1d7f58a1d2badd98d21d46daec4ff
SHA145b1ea8512b178297dc92444961937610f974f13
SHA256e2abe7163026eeb0361798c59e91a6b8807546778c2f699553b44cb77a01254b
SHA5122cb094c21494b8c5add96b757bf8c99e0ad8264ef068770980ee3ce20ff6493843cca637c1ef525050ef7b5b085d5d6abb3280abefc07234b567e2e10ef12ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5487ca1aadd995f9bec18c6a6d66995ec
SHA16a1a600107a4daa1402bca7e86fdd3190ee8ed29
SHA2565550fe0754a7e2cdea20f23bcbbc685ad8af366ab987f5b729c90875fea7baf3
SHA512aad2dea211f2162ed10c0ed7a5a361a6fc2b17abcb9b6e3f025b1f54e37c0e4775a371b6bc4e26ccb54613ae662f26fbaf039ba9b9ed6a2646076bba374600f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e976e2e6ce47996c2c498e5421a8f157
SHA1cb5a8a2f98e8d77490cfc04aee8b3c0c67300dd5
SHA2566d55c83895dbd2823866ad84901a76cb249ed1882b653436a1b141abbc8af55f
SHA512e6405756eb95fdb489fb1b388f14eb8853562a9041c03bce8fb7bdeb468d0f516aaa6c419d246fdebaa70b7a2924aca8dac17cb81912c85bca184581d4fabbc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6096abbe93e886cbb0acc0b352b6e3a
SHA16375acbd72cd884f02afd9316b6410b880d51b54
SHA25649bec873926d07e8c40ef114ed84e40e4da75872b6340668923603026b00e877
SHA51222472696365a3faf80b55a8ee995262f4b1513149e8989e69649d0f93d5ac893a2421e466e37c3b506f6929a311e53e729198a46935c73fc4305f77266352fa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583a448e89a1f02675178d8eb4a262c71
SHA10be3df9759d9a62c163fa6cf5d49d0399b23cf0a
SHA256215941d6d5fa2de80e2b7b53d8b4400f4ab40aaa38e1a73aac6f65071b0dd17e
SHA512e8acbe20634ced737ce343f341e71dd5db1d01c6cef0d8581e22128ae8ab3fc98a5dc5f6de28ae79827d26fe192520ff9214b44d1d483a1834e002550e2860c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5542c0f62ea72e8f204bd20fad1e362ce
SHA19b546a8f3090ab5ec0c64deb82744d06b8a4bde9
SHA2561b536526b7238b4d7aa1315de4da75c9915cd7acea764c09507f890e4378d91a
SHA512206a889b405feb391d784ae4cf020f4bc729a45faf57e7ac121f4301545b9ad35d3b3be8c26fbe48983371ce29f28c5d9518795d8f2cebe062321e3c0e772dcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c78c589ae8c2ea6a41244606aea853a5
SHA168cea1791f299177683a5ae58455ed1c51889666
SHA2561366c0e7c947be3116fa97d488fd41f71c473eaa62267f069f1950c0723fdde5
SHA5129ba3c46b2bdd0d204f78bd50edcf8a4279547d401ff44e20bae08199d67eef0a997bc5e0cece80ea5a947c06b979765cf866ab3bad169e443dc8d3d1a7cfb639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517b59c6cd484a50a435b69647c79b2b8
SHA1880c551852a7eba40606e67fda96e04661a34ab5
SHA256b1c72d371ed6c563998597b018a15f31686b17029cabed4fe18f4dab0311f2ac
SHA512fe2cdfb6eee4e8627b22ab0764b86f10278b4767c3fca4a1f87af73a3589d74319b2674fa295a97747ccac05d0050b565d83356bac0c4267db6354a5212b4b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f918d64f99d9ad8e9d0ee61028f0448d
SHA1fb08498caa4d82b4b9514124d175b6127fa47f1b
SHA2569dbeec30c45ec47e01dc104048bb9844b8bfe57350381a7e077aea4bcf928cc6
SHA512604a0e859e25cda480f8d1582a1c358eabb0d0618d9ddfb4f20e554dcd22ad245c3c7482a8b60f68d1dca7ff480f4ce3bd3ae5674670f6b797adda1f90a96e42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5741d2fbf1fc6e2d6369c10622bde313a
SHA16314fe570f2ccd3b9301a0cd4fc9fb3bcb014050
SHA25674f449e74bae8a62c2fb54124d83ec402ecf41351d3366178064f4dfb33e285c
SHA5127b5d3f56c66892fc77d985bc66469c30b32b9faa68ae809d6c1858ce38de56da230ec3c6143f3f418d5074b65744f76485c008c6d70aa837ba4205f8c3da5344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582f6752714a4212408c7a0e873bce97c
SHA10ac419535221e851f8a66029d2fb9e78d5c413d1
SHA256969fe4284f5a00d32c5d0eb0ac68acef1010ad273aac5ae74d940dcb402a1678
SHA51207bc4feb966ad6598ae399b641a167ff6d9b5f3a60d9014cfbafc85bb512db126f7892dd866ef81515491306e289d180b70b8dd85006f18a17fbeb950542e0d0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b