Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 20:26
Static task
static1
Behavioral task
behavioral1
Sample
539122f6dc43c14a4e88661170180234_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
539122f6dc43c14a4e88661170180234_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
539122f6dc43c14a4e88661170180234_JaffaCakes118.html
-
Size
7KB
-
MD5
539122f6dc43c14a4e88661170180234
-
SHA1
a3992a7de23ce0af0cbec1b60d7812461f4ce60d
-
SHA256
acb16aa1887441a83b3415a9ba7fbaed2773f24c5b19a169c0fc79cbce3972a8
-
SHA512
12dc0fe0897f51f1689d95b6852438d3284e2d81ad437c274ff3e2272ad191317244341534e9839b412b22f677e45bad9be05fa8574a05deae8ae35b5d51a8f2
-
SSDEEP
192:qaZ+sSN9aY29fTpUEfKPTUueZo2Gtttv1eQB++skmhHYNFiINuGVaYRQ:qaZTO2TpUEfUQueZStttv1eD+skqHYeP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435358665" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1CA0BC61-8CC6-11EF-833B-EE9D5ADBD8E3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80fc5df5d220db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000830eedd07a8af2fd8dd29ee05cfc29e7d2143057d734b220cb14deb0440a60bf000000000e80000000020000200000003519579eb0b5319caff36a4ac288802035376fadaa377881e3f7b91d0030a1d720000000ba666a33f2911d4e8dad26989c4a613dd759b844c2d060a46393d0f1c43bc5bd400000000ccd6977de0f8f699d7eebe2ec2d60a64d42febc0918f8bef4304fe021e1fede230fef7dcff6e766f104000425bf16a757a9b3ea02b84fcc29ce115fbba78046 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2124 2236 iexplore.exe 31 PID 2236 wrote to memory of 2124 2236 iexplore.exe 31 PID 2236 wrote to memory of 2124 2236 iexplore.exe 31 PID 2236 wrote to memory of 2124 2236 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\539122f6dc43c14a4e88661170180234_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520211e62adf577f4602ce1b4af388bd2
SHA1870823b14d4077e39c527e464e0349044a4b07ff
SHA256e38fe1160c0640f8ad5795ea51fdedbb18362a575e35c344fb797d709be15446
SHA512fc704d507c0074be6729de453eed473e4ebae40790263897b818a90184140b99229d94d066d70f777dc14b3b587ea4efad63dc98caba4eff72464e1da49ade65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b58a15583d5748f8104ddba1857d91f
SHA1fa9d3481f9cdfba490f711596097344db72b847f
SHA256d48c36a4e7c8708450e309b22a3dc4733c60afd5656bff9e00e20c234ea81fa1
SHA5129de5db342fa7a125c83c7f728a3f41af6e874921a1223db965285648e48ba8d6dff81e3b57b596e6de9b9a318629191d5bf4da0d6c7995007a73458d1b838c5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db2649af42f8f3bf9e870a87d2863922
SHA1610677759519af467e7f8e4b636117de586ad5cd
SHA256ccd45d60288f798e7d28732fb66319acd51df8d31fafdb270ce4db3b0c4485d7
SHA512a4a08a9379193158b55928aee78c0ad60c43f905c6ccad3645a55baa9237c591742ca6af4ae14a00071affced2fa88088bfd1035aa7d0185fdead0287f103ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcd960395977605c462af730d131cc32
SHA127536654018cdb3fae66178c8b63c839814809b3
SHA2563129f4746d5b6d44e3b722dc50dee93198ac9472d8809c9c8fa65cc7f9d7fe8e
SHA5129151be84d9442b0cd1d0f881d425f563ec9662cf13a8bbd19d4917c9e2e61336b8254c8569de5e75880339f173249abc3e8937dbc69cc672e0f9177224aa3a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc17b62596a10f5cbb5c1d8c83a38797
SHA1db9ab5a50725cbf8feb0562cbe08a158525c61cc
SHA25684fcb18d3f48bfa71b688cbfbe75cce71554e08faec44b392352d3ef607e96ce
SHA512da568be17dff9f338f3c5e27968a2215d475c4f52ce87caa02167aefc87a6a10f4155a22cb1c789a9721eb83e20bad4019f60ba23ee37008c0ca9ef09fb2e231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57492b261204df44bc4d784f5dd03d0c7
SHA166ea5d88a44d2b67b7abee73530829df32686c86
SHA256711e172b90f16d0cce2da8ed929167bb669d814e6360dced803f409ec0226c08
SHA5126292b8c9d45a8c00af4d418976d9db1e1877c7be1dca3ff7f064c2722d67afa07e94d0cb9c56bcaaa8432da5a85ebaafc39bb3b5d661a31a9ad326657691bcce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549ace896762d2f743dc42e5dd57c89cb
SHA11ce248cf2aa0001182b5cf8dfaa69469aaa61717
SHA2560df380307321855c4487c571107a90142378711cdb4c705cda1c5b924f66cda6
SHA512f25193a804bb411db858995899deb72cd5c8fccf3a81c52d0504f88bd6baae9f7090f25c67f7ec8e0b39ffc4adbaa44813b2e898faddc4510013bf854a6565b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9ba54dfe13dff81783e568c07f4cbd4
SHA1bafb69e9a5ce67bd0b5aa3cf981f5f69999cf943
SHA256c3ba11200fd9bc838271bf7e68bef31d5ad06d23eed7794d66088026d31be655
SHA5127ff38d629f627ee8671ccdcf58338f55f622e8fd33fa09bf91ea18ea192c801625fcb800aeb3f44be07681f7b513e893e971c2425a45c2cfbf96bda309a27404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8fe6e0fc49288c2bcef763fe30949c8
SHA1115dc45701402b53279fcd6188364be1e87762d6
SHA2569f36cd3faf8fc48277ce793e1c4889bf330a15e0f0a1d0812838d73436d9f6f5
SHA512d78ec7d8dfd5106b99a78a9b7dec47aa578e3fe0afa3440a7678149c01d5ef291bee05ec11c226fdedf998acfe010e3ed90ccf387081f9242d5d326d63b5a45e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a32e42f0c3635bd6b4d32eb6283c2eb9
SHA1251eaee4f29d604798ce181e54a6fdbeee6faa74
SHA2568198e9e7208f5ac0c67919a759ecc8169fd3366714b02e4236c410edc7cbf2b5
SHA512052fb9336ddf29e66fdeb4cb368127b5d61d1f7dbbce331222c62fc8b9787eca75c4ed17bf7ad6d07cf3873a48b64d3341c66959e5d4b7b0f7f1b039ffcca26b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d89ed22a6563de77e11567ab291624e9
SHA12355b324fcbb7e97af5cda31e572eebac574fcd3
SHA25662c63e79cc282fa2e9de86161b28d6988999f462d34567d3017af6007bda8e96
SHA51231f845d101bbbf00d4bd6416d4a98bf26eea2b5ff8b9c6373182b7ba24df3869685b364e80d6123f87dbef7fe14cad216dcd3e7a474d45d21945fb25e1f45b85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaf767f5b2ef108a2871689785fc2d1a
SHA1789901b5a5665a5a9b118ecba1b54db22a08e70a
SHA2561eade8d0f0167630114b88fe7a588c160e9fd39371b832ca3371f32f8f0f6d79
SHA512d29b5737d3bf4d97bce3b078f7f7f72fb60fe85d7d15bafd5dc92881bcab29a9c80179e600b4afe383442cb4656eddb53576f0748809bb7d71d9dd414e7b54a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5559edafa485bf30eb9e93ae73602d9c6
SHA11a3ce4c62e69dd2ab219cd66ec58f87894df2c06
SHA256d5e460709e9692b841a0fe4b4d94c3aa0af5048816af00756c44bf01a1ecb218
SHA5125bb4752cc5b84f043c21ed3e8875baa22e874281a74c961baceedefb70b05643387fc00a16b82fc5a3fea318541745c872451f8fe94c908165278276588646bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0ca1675bc8ae1cbe1f2e9f216d3428e
SHA1a9c7fc0e903566572c6ebc480a7530451947f173
SHA256f8ae0c3da3bb515f5949fa46689b4cd549b646cc1d446014c428c64a49b9d8be
SHA5123ae7c7c570a316af935823ba1dc25d65969af70449880fc222d6fffeabb969e5254967960fe4ec3f41362726ca9e12669a590e0686f4f4f3ee1438f80f95794a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c4f3310f568df16ec63459beeedfa3f
SHA148f1171a1b886ab4908df0b72d44e2622c96a716
SHA256a45974757e13145fc00a5504a981e0e714f76a24533f5b024f6cf084b2519d53
SHA512b04bfd4947c8e9449478b66b99b3af60ee795ded9114627edf066d9f90cc99e9ae4e7352b4eb0cb817fba9896100a6cc605afc57e9b9ef0b07aa4b109ba04e79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51213e1cc9c4eaca3890fd21595dfe2c7
SHA1f4d8b14b305cd60c4e2862976e38989353e2ea49
SHA25635607fbca2f5cbc5466fdc62f0c2426424924533ab28b65bb80459258e84363f
SHA51269630aee65997e8697d1a8d838ef18064771398f1db9b6b9be57ef45f0ada47b766166f3ba81832b15897fd7c9aa7e53cc8413b9cd59886c4e5e7071f9e3ee8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dd6dcd5670b1429619ae479e385e343
SHA11cd07775cda1c2a703fdeb57221f93eea8643ae5
SHA256dae62ff5760dcf4582728b7f97e0a1c634bf3bec737a303fe6c8f47c68b2790e
SHA5128ffa0eae7b5531e07f572dcebe762af02b52cdcd5372a65746c0b5439ea07c94dc5f95b04f38539c2ea9688228c1fdd7200fe6fd29bb5266261cc773434bf76e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\ga[1].js
Filesize45KB
MD5e9372f0ebbcf71f851e3d321ef2a8e5a
SHA12c7d19d1af7d97085c977d1b69dcb8b84483d87c
SHA2561259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
SHA512c3a1c74ac968fc2fa366d9c25442162773db9af1289adfb165fc71e7750a7e62bd22f424f241730f3c2427afff8a540c214b3b97219a360a231d4875e6ddee6f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b