Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
75s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 19:27
Static task
static1
Behavioral task
behavioral1
Sample
5350b1d76479735a6ca154566099936d_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5350b1d76479735a6ca154566099936d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5350b1d76479735a6ca154566099936d_JaffaCakes118.html
-
Size
24KB
-
MD5
5350b1d76479735a6ca154566099936d
-
SHA1
6f3c90ba60c0fe9bc457c6cc65300920fffebdbd
-
SHA256
60c0a7a94b2cdfff04772dc659d698535b00736a0ed2ba8cdbe2d56b79eb1003
-
SHA512
bd48d1584ac69d93e7cab29e70c6093eaa9d8bf2a0ff6b4b41cb72eab1f1b0a14e87d6a7c02f06c18630bf32ed223bf06a6ecfe778bf735f12a15bf0916f864b
-
SSDEEP
384:SLJHpxj3CgFZHuZVEJLil47hnVESd57nQ+GZDcKIS2u2701d3iqZS:SLJJ91FZHAQpCt49Syqw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E87804F1-8CBD-11EF-B232-FE373C151053} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435355143" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000db94c85392ae7df0df9adda0ac9360e2902b82d5a5f015b1bea32c97a2f2614b000000000e8000000002000020000000ff2f88fb87ef06bd4c5d7ba5b234600eb7e805da68e2726f3652e505d445066420000000622b8b11bc94955675b84972c850beb3c2cea7c7987e0da2d25d252b18f0efbb400000002ba52db314a3c3790dbd1bf741a45e8500bedb08008ad2ddbcd5c3f17ba410175be217b7ec30c577e87b67973e7279f834ba37b3dd47644a9fa472d0526434de iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00c013d7ca20db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 796 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 796 iexplore.exe 796 iexplore.exe 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 796 wrote to memory of 2756 796 iexplore.exe 29 PID 796 wrote to memory of 2756 796 iexplore.exe 29 PID 796 wrote to memory of 2756 796 iexplore.exe 29 PID 796 wrote to memory of 2756 796 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5350b1d76479735a6ca154566099936d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:796 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f574e4e9a57ac40b5cf09b8543e1101
SHA1dc2cfea1b099d6f5a9fecb45f2e02094ae5353ea
SHA256e69348cf00e7753568a7dbd270e9b37bfc4ea6b56504eb6eca496a8343db4912
SHA5129f143508b82ca7fc6919d5040135bf95afc41dc7ad6284dfdf06fd83ffdefda170c061409d290986c0e1a30f7ed447c832d0d5d07fb2828c9cc7b69604061d65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524b7b8a1881b8b03bcc34d749e39fb59
SHA12ea10006dfa8e85ed2c4f7c17d3667bee8e569c2
SHA25616d0de1ca6735acb5ffecfbdf3e4c1e6734b6b0575f8273d590a4beaa29a259d
SHA51218c98d3ea3edccf71ab7b354ddc9c7ca3c5980d26c25b88ea6e16521f4bd7fa8ce5ec82537953ca0bbaf7ad4efd34fe321ec63fbbd20a8842237a99dbfc8f84d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee9219c32fc67b06cfe4b06220dc0931
SHA1897890dd35a16be90bdc42d0375452efa04fb132
SHA256d4873c6e7c174990796f25ab6364575c18b3345a5d5debee2347a59b300c20ed
SHA51201a92422d038be7702f72b0cd2f733f673c1128c19504905fa866e6dabd745b6560b31c04c00aae63add488d73b1a35c1aa43f6545dbdaa1d5f031c21bec9a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3596542bdd2b91740119f1915adf8f4
SHA108334bdc22b648e3951e0fbe00cc032217baebe8
SHA256a35a724c2305e709e6cacf58cf560d7fd6fc38c05e21b0d2d5c37bc8039d929d
SHA512cf2ca7d6d532678110da4e80c69f8bf6e6c2c98be94fde35409563aa054a9b529b57f98944dd6702379aafa2ddea5d78e2820935bbbf2956f924b0be6d160064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db366be629d7d12bae086a49027dd4c5
SHA12204d63cad15cc098eb8c6e2d69def82d2a6393b
SHA2568159064e6a8661659cc50b2d8074a681e2ea86817541a0266888fbe71774f5fa
SHA51209ffa681209a7ed09aa51af092c23af67999dda882b8d103d3357bd9e717f8c38c0a12d6f8cbafc85c83d813321972936a71b90222bdfb83761f78fa4cd5d699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fba6225dbfb613067f42831f92211e0e
SHA1511f599cf5e31d4fd249dcb961063b10303eea1c
SHA256866813a5e2237546eda61c5fd0916b49764914ddeb4cf3f24cc823b4b3bbdcb1
SHA512425b8d25d5aab93c046ac2e8b3a4ceb3d5a27c6dceab460438e41b16adac1d8447fec7d018631ed816b773dc53de8bb02c9a9b4afa8e1a869d63e2ead80c27ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae40fea7e1d75971df6f1f3ae51107e2
SHA1d5b59911174fbea27756a83c7fc47478b9026353
SHA25691738f50f3720ba438ac2bd0cad86c4f85df25889b0076ec4fece0e4c95a717c
SHA5122791035c0dec423352fe90e687e8dee468cd6d1a076fd4d7ddc23c094f987d41c0c52a5a56f856aeee09a80a07d2f4cea7e41ceb74fd04c8c659bd82439e2e1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd8df9b32f6bb6b8fe1b46732ad95d24
SHA11d32fa899bdd649542ca93e6eb23262fdb86afd2
SHA256da54ce512c83f6a1f453712d6f5afbf0b8f310b37361d4e0194bcb4b09e32ac4
SHA5125203b1a56883b826257799227d6ce50024816815e1d1ee3b0321cdf79fb9fc6444a9853d3d1dbb02fad611dddbcb7a35c4ee6b43bd112a97f1d67c08cfd411b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fccae36f0215076715267fbaf8a67447
SHA10418eb796698d662493fc24d83ebbcf9a0be5166
SHA256e8ee5cf3787c01043db3f6514249cef48a3b5c3eb1801a75eac26b3991427fa1
SHA5127243585008c159aa6935487ad2935cf6df49888d3ec510919ca2e74ef340f7a71079ab117abc13563a637e6b94463816a86c73d81f3c256785cf8c6f42bc1817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55248c4bb1e3aaade2d3d9068953429cc
SHA1736c770b80dcb7734b386d4df199c0eed9a6002f
SHA256d1737c33b7c07c423a34b80009bc7827c565a60a181f8a439812c2253d855c1e
SHA512ee7506e2fd0dfb605a7b1f61e18f1628252d3e0e625e4e653bc7bdafeb6e6fb50584e4992b316df709d56fafff7c8ae4c682af50875b889dfe478f43fb61dd25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f06be7068e26b32787f66742861d2c7
SHA1256222c67a364c106772065e369b420ce4a01eae
SHA2563edf891c81b2491a92962e7278e29010ded4d5bce013f8a467f7ffcbaccd99c0
SHA512b50b9cb54a935283e53063861cb1111dd97ff295fead50d118302c0ee542f954b43e5ae7103b7865970f8cd3637fd5318285f1fd83acf4e7f1347f7948b1b5aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d289606316ef564834898fc16a7278ce
SHA1dad139185ca413f6596d0b5217150a3812a44bab
SHA256481276d9075603bc29f88742458bef41b07a981b76862b760de96e2acf08aec1
SHA512008d2d607d063305644bcc0304f380a6bff7068413392a4bf208c76accbe0bc869cc1c9b7eed7ed8f307a2679dbc7d785909037ab125a1e5968be9b0e8e42a32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0446e4dfa46b61cdea0a295e2a02bd1
SHA19442c3f5ce59c88924b51c3b67bed098f4ce8e8b
SHA256ba34f6268349180f553701604889397783cef8367065572557a183fcdc26c8af
SHA512f9f8d22e538b4c8cdaf1aaec8bb6fe0a32eb4387560fe844d5330172261b3a4b8be993793251d0008585311d4312004cbd078707310720810bd3ebd279a45ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afcbbbe6f55548afbbea5e61ee03a4f9
SHA19b5c90c0be25c63df5933dc36a5435932e772f08
SHA256841c73cb68a22c3575068e6ae54d8f878fc194869404158d99dd85ad6741e212
SHA5125b032637845608e6ee34a0bb2bafe72020f94f2debd142305cf290a99a2a70e3af3caa246a036d2a76ed489d7b25822ae02166383ce2021b472aef6aceba2377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500dbf22e01d0a4b454a5ef84d1d47684
SHA10bc415d80abf05dfc0ba4043c8cc5251ca883343
SHA2569eb5c634f7909c439e9c5de2abf28b8d79507c88cf7cfb54c94aa9b7d641bd12
SHA51229c270f2c87b49738603eaae60b7256f8b978b9e767c2105cacdc7d19f36e836465ed3f91ce856fdc0f3bace9311926d3b45aeab52b43748efd06ceee38e17a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd0a318dff84e9e1e4b98124cd8ac980
SHA1f1be6a0e2c0e9095ac520cc4ac09451e6c46b016
SHA2564be6433e88283f13d67c3c485fd1fead2363374b61edf21730bab112ea62375d
SHA512b2719bb1b15d1bd99a1dd0024e5485c15b43d84384aab025c1641b3b84a9ee2ee2afd8be1b9bdc2530256d77ec6f57c708380319c602d432b8a8bb764578f454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d76e5181980f60f8e587d13124ec7d1
SHA1a882982c98faea6c34e1d13d174362b84bd8f35d
SHA25654938b869b8e80e2ba9bc6ff08c949f386c415fe9fff6e9ac2617e9eb805494e
SHA512bd86dbe8a75c0617d0b49afa063270fa9e00d029604fa0e9e1fb641452e9a138f8699d0fbedbad852d16da1c90588ce60be9af487aed8fd7e8bc6504c716c37c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b