Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 18:44
Static task
static1
Behavioral task
behavioral1
Sample
53254d11b178546af1e03b729cf71b3a_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
53254d11b178546af1e03b729cf71b3a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
53254d11b178546af1e03b729cf71b3a_JaffaCakes118.html
-
Size
138KB
-
MD5
53254d11b178546af1e03b729cf71b3a
-
SHA1
f939565bcc95546fee0e3ce158e37d7119575e10
-
SHA256
81d4e8e6f03f16fc30f565aafa6de2b26b6aeb21418de2d9ac07e0bbf480a812
-
SHA512
1996973c57835f05b2749e8758c74eb3901983ae86a6acf66b6536e6f0f2fc06834ec124548bc90ec09fa728e9d6f7c27ac1530b3e9cb3cfcce2cb244be6f707
-
SSDEEP
1536:SijRXjGMbSlPjv9yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:Silqjv9yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000130eab42b4a8e05ac24d7267da4fc58ebb6ba034f90d81c2201cbd5041d60337000000000e8000000002000020000000a81610830bcd486217e637eee8448cf7a24ec05aac06c8254f1844a05c565b8e20000000d77a643e478da241c64ac83145ba1502dd965f3b58d13202d8bed9db9a666a1040000000850a6e67e68053bd5afacde2a4d6187f0c86df76f70bdc622f75ff32ab59e8d682b809333db5dbe9e8790af2c4b2ed046dec3da306bd7fc4d380cf1bd5fa6a3a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E51E1341-8CB7-11EF-8B1E-52DE62627832} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d08674fec420db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435352562" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2888 iexplore.exe 2888 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2944 2888 iexplore.exe 30 PID 2888 wrote to memory of 2944 2888 iexplore.exe 30 PID 2888 wrote to memory of 2944 2888 iexplore.exe 30 PID 2888 wrote to memory of 2944 2888 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\53254d11b178546af1e03b729cf71b3a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5487cd3aa806763c13bc92ad5671a25f9
SHA156cc2c0330cfbf09b5ac3665b591ce58b0c9dfbc
SHA2564e0d432323d64e34475f0da4817e6b269cee29fed65aa4ae2c3dd792e3e0010d
SHA512cb10ba1408ec1dd8021abecd972a42274cab0d9febb31dd860e229cd45f0b17f78416f61d4c8935dcbcd2fc244c7f12edf7022e9337a17cec8c8fb196dab33c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59800d4cd2bfa0eb8bbbe7ec9b441937c
SHA1d0604113d59f8ad6b9297a626680a9d6f9d1b1b1
SHA256c5c552bc82f662cc422f8d2c08f17eac7ad3a052544a109804fb6993a24b7c8a
SHA5127b92e5e11f4bbbf89b251ccae1c723dc27a36e94dfb4468e0966b5083d4e885247adab482c7debb9d46da4ad59afce8c57f3044eb4e4341f6c62d9d19df03580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5540b3773fb28da71e06209f7ea4cd5dd
SHA1767a263ad30425e9e8df65c00469a81d8bb2be9f
SHA2565105b8a0b7e5c7039abe2f3e6cfaf5b10cae922f9bb7972a25717db85797492e
SHA5127b85ef0c6074981e9b442166381e2c5de886b675aeae1b5bc203e79d728bdf40167d300adebcdbf7811b328f871c0725c880044ef1d76d18c432d21e6b368baf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a108980972e974a644178debbb88a931
SHA101b78d505875618628fad6a303f14e5ff4ed601a
SHA256a9750da1b0513f0c8859d405fb990a66220f56d7c505a4c2c42d8a6ba8bef99f
SHA512c337c42f35c7066d95c5e39ac02c4ebc37a2a02c8d67effc3dd0df1b576698dffb8b11ea9b8f881c08b3192d6ebf4c8280af01e4e54fd8b2232cf1bedd68f80b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518795be0f868b567efea597e767f4395
SHA1b4ab1aa772cdd51d404dc3a0dc96c14031ba1b88
SHA2561178f6027c76b450d591b65eafc84762e7c8ca93ba621060534e3f5cb093f28c
SHA51243ccaf493fe08600ffe6270f96c9f27a20cd481b927b056502a8486f97bb0426643bfe3852303d9873a3db8e7b6998266439997a35f310e3301233642807f8c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fbd598b105cb4f468a472d73c7cb233
SHA1d154ce5a00dd246fe00e07090be0a245c09f11bb
SHA2567c4de7382b99d10b35b05e5766b2b011ac4889ace3409c8318a1d2e113ddcae3
SHA5121ed3af5097d6ed27fe1cf69f18de5c9cf6225b036e00931243f5fd369a1f4a5af9cf3b1e44d91d4e2e286f961e2d1fccb08bc655701bec8190467ace626db044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5660d3a7b304801d25171fb14479adbd5
SHA133ffa22525724618b2954bccdf957a99f38e01b2
SHA2562ba9c0b013b3cc9e1923429d3c425da9626bc907d1ff86f32bfdca07d4105902
SHA5123b9c3755ca45091899f7747d5af5b72ad39337652d91064c30f1bf1fe6a94fabb68ed5c7bdd1f84362b720eaf2556652afe575cce9c3ec6856b6e59d3162fb00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1b7d2ffdcfe31c00112eec1686fd015
SHA11869f03126bc2e8d1acbed104d5e357b1994df30
SHA25608635783a53329e1233b65db5712d600f525a25f984b31b3fd85705113787a4d
SHA512916d3b935181e6629bb3d7e5146a5629d6392318998b8d08738f80bb6c8a0c926acfec98fcdb3626c376d5aeb54ae6cfa2460804c771db0309b50a1ae3b12db6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e953424d2fe1f73b772b67f3e82db8cb
SHA1d9f9dc0a668267c5ef35b45cc9046c816320c435
SHA25618a2930c655894c8cb28c5cdd9a6ef6b4fdb937093e56a3187572387d1be861d
SHA51237b700911409041a13118b9c3d924dde459add96e5f9849e56588aae905415d07c5c05c1120f52fcdc097ba399cc99949ecbd7139029bf75ddbaaf2514fc580d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff2b989b4a36b1e1f8b4c0f7d8c092bf
SHA143811f24903dae5f53748424d22b7022f8db387c
SHA256e13362a225543bb42c6cd5ccf34e26ebfde60c99be1230d559110f63f0b02147
SHA51269db7eb24ce6ab529588a704401d8727791b1618565711c7792579ffcd034757c649890d2ea9c1e88d530af61d329e188412e212a9efe9eb6317f005c2226216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ff0c70014d9f0d071ca1079ca6f7b41
SHA134f0993d5c536ac4f8f8388dece2ec6f5b4361b6
SHA256167b940e0d6396b45b3259a37cf2d309e269dbd451e825b667cf5127815f438c
SHA512545ba05c5fffbe849fc2e75569e71c62a72e3651e9b74e2247960f7750bbc027e74c2ac8ecb2a7ada591af9a16d9527ba9414dcf4f383b5772b499d38503efc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584beddfe4947859027fecc97154049a7
SHA1bc7d8e15931fabb13b2e64d0343e366dd0f683c8
SHA2569516a9d23d3d7f910802e81a9d6861993bbcf46c47b232907918915d989aca21
SHA51288f13815514f7149262a1b9356cefb7fe954d31ca01312c5238fbf2d07cc2a8c7fd96df2048a2f462e36a1cd6d604ee7c4185c2ba4ede94eff75e08ff4338064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a95da6714d691f8fa61544444e225fb
SHA13641fc5c5befa00a5b61c6e17d0e57802a7098ff
SHA25613ccc9bf9429f9a146f610d90a3843a3c8f4f2302fb5c48512f5ec03a405916a
SHA51236452a38a9a4294c1e2d5739214414536219df90be9e26a4ec7545620b3c4d1b5d32dcc6c63adcc594610f54e4ce3b0934726c0be77e2b02f406e894932321c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553bcff83541372054e5201d38926df7e
SHA104f0a9dc121610258c719d6850de7e61e4572d5e
SHA256f76f80d3bc849fc4e8efa7b814fa978503864dd34695f78125548605f8c8c924
SHA512c0ca0108e971addfde81e1fa8955c8a703189135314a8fe2986a0501cd23b23d74a26d0dfd685b74736aea9f7df78c62602201cd465e7918057f248e4b433228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ef80b18e29f64b5e5b7217b44e15208
SHA1a1dd3688ade99948faa8c82b844cd4c75320ab17
SHA2565290e1b1cf45f8a6dd8e93c5085f94b8e52ddaa8820ee32bfc5c85e778b87362
SHA512f0572c3c622900e03bbce6e290229ed2d02b4b44aa4efb7bb657946d825cba6eacb1e0f34c586b41ad1f5aad9b68d57b8d1351e28bddf5b42a8bea308b70560d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5960d30486620ca6726489ce91bb7cd2a
SHA120e5fe622b4382c209a4b81ba9d759969aeb836e
SHA25674f5e6082ecb4aca158ec779b6665274ba5e52f96ee6b5b5bf8b7304f297e6ff
SHA512a13908b0f5a3f2f5eb7bf35978bca53f2a7c54b0c737ccd1584e559505c9615453858c16674a7a447f680671353daceb3c1687741900fcfb871cb94e1ae4c469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a497f9fa3a9a1d03ed189fa61d53a70
SHA15b8a84e73965d43747d9994f1f25006ead51d8d2
SHA256cbccd43076db037cca33e7ef56c418de6212e270388ddd694490501a0c31c621
SHA5126e08cb8b56672958041ef806caedcdb5920c561e88b2f2c54feea577f0090f199e74114faa4f5158ea7c7ebe16ebef80a944c98aac46bfdf987f804571cbf471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582ccac605cafa1579224b61fdd38e84e
SHA1dfc79843c7c182b63271815cc6038ce921e233e1
SHA2562777127f3b6541f7da40953f2102f597dd25c199e986e32b54372091169f4f84
SHA512d39fbd8a021560719ca35c2fb74418122e9f23db559d852804d1152673b5e378b39e5f5fb0f8700cdc6c773f6b2fb2d685027980d36111e11a8f5c0d7808f977
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b