Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 19:43
Static task
static1
Behavioral task
behavioral1
Sample
53625342d706ff619f2e15a8f647d610_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
53625342d706ff619f2e15a8f647d610_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
53625342d706ff619f2e15a8f647d610_JaffaCakes118.html
-
Size
81KB
-
MD5
53625342d706ff619f2e15a8f647d610
-
SHA1
b09e44e9633c7c82c8589d92d779ed71170e95e9
-
SHA256
28dff40777f3b6e39c1f8a9f99e2391df936c31051b96fea71f39018c014ece3
-
SHA512
9d3be27c54f5b41afe5bdd588041d4b5fe32cbcc083012248f08283a25f52b4c155d5686c5396198ba31f501db16ee34185a122438d9c5b1a2c076100ee17620
-
SSDEEP
1536:EWqmIlNvyzcVzIHdFrjcARwhYDFQ5+Dwwu2+Dwwo8+DwwFb+DNNkpW08S34L/zWU:MXlNvyzcpIHddg34W08S34L/zWhDHa5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b96000000000200000000001066000000010000200000009bd2a8aede30ee805d1d24dd7899b797103041b7d97e713b5b2edc998d9206a8000000000e80000000020000200000003badf39dc49ca58ce2f6830503ec7012d044918d84a2f464f3fb4c41629d75cf2000000092e978da3cb15dc4eb47a174d830fa1b6f8c89379b71391d4256177c47547f8e40000000fee89d4a352cf5936b4315a7ea9a9e1537f5b03037151363cca04c549a2e380905316aef52ad20cb90e9ac9962e92e1c7507f80ba5cc7ffedfc7761e48b70515 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{16AC8061-8CC0-11EF-A2DC-6AD5CEAA988B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435356079" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50773eeecc20db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 1324 3012 iexplore.exe 30 PID 3012 wrote to memory of 1324 3012 iexplore.exe 30 PID 3012 wrote to memory of 1324 3012 iexplore.exe 30 PID 3012 wrote to memory of 1324 3012 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\53625342d706ff619f2e15a8f647d610_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582ff2260f206cb04e72a2d3e11d06924
SHA182a38867551b33fc23e7744bd6d5d1f3047f8fc6
SHA2565524caf803734aebb5a552a5a6f7751ee96a6879e1f5daaba23fe886e6a806da
SHA51269c3090cadc6fbc495b37f63bd639af9d378974283b8a8ec1cc2c66be61d47d618ba94ca628b5b9858e0e9cf0a039b18a395d1a23838504c3f020509d39bd1c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512fe97975d76ff38f801bbdbd14e0c01
SHA108d11dc71ce81915bbe4998cd2192d921d7eb1e8
SHA25643cddd1d0291e4156788abd7dc1071c812a687fc47e0390c7bbbdbbcf1988584
SHA51219ab73bf73041b547506eff26ed8467b465a97a605e0072217697cf40b5eadf4c484619ac5b603d7eab6cdd9f9122f600d35529837581f90656a6a2e2db2df38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5142b908ebc90a921226d5124bcf6e0f9
SHA1329327ff2a62d1a66fc43bff64c4faefbe9c1249
SHA256b1630a774b2f953f1cf8b99eaeb5a2c387e3319c3a86b4e658a8de6b154b840d
SHA51242b0aff0a3e9a65ce44c1080c6bbb863fe06423c88d5b77892510eb8dff44420fa0da8f4f6332da6f55cd4ee12f3d911d98251418b78e4201e47cf7e9d8f496d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54beb38763fd357831ebbc6e2dbda7118
SHA15ed48003e3843b4fb5e8d6bfe0bed17ef29c8060
SHA2568a6a946cb9d505beb7bc16921b58e33054faf5b4328bfcbaffc838ea02f00c8c
SHA512d75096438488b827ad11fddeb5e37a82c439ea71df53481ecea0236f90e4b8fcce01793fcd339eecfe1601e6ce57a66d55713b72134a964a92dd95badf862ec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585fdb5b40e5b2ddec8bcb06ab3ea89e9
SHA135bf8a0223a7ee06085288ca8619e17703c882bc
SHA2564f794925b767008c1f54150482e5e98a926824a617f6ed4151c7ae5deae1e86f
SHA5127d994ca3fdb802bb2bd0c38916c64d7cc3df2107c5c691906cb8f6b0e45e479adbb61fefedd75ec8c860441c54951d2178905e6261a788307f64fed51d5cc137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e9843459400f1373fa593a0f098ae7f
SHA19961242c862bca3eaec3be0a062fe00a03ab34ac
SHA256abe6cfce81b56a019c949a3c9324f163b37d12772e496cf34723b625957ec200
SHA5124905c2f56b95d7627fedf3341444d8ab473b4d8ccd0c824f04967bfac68c0461d8395e700b961e5a1a386d848ae7275fd46a7903de2eccf71d14d5bfdd166a36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c42685743472958553d4f7babe87029d
SHA13dfd99b29115f1c9dfda0a87b63d5d837eb37dc9
SHA2564f4e25b7a090620175fb4e6b2e03cc39394888adffe0cbdcac069a37897b26df
SHA512c683e5a0135d1ee6fd3ea53f78d14477382dcb1eb2c9ee2a1ecf2b4553eda314f97e58899bbb0dd76984eaabdcdd2600a251bf287b344791b08cc5692247d22b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa2127dfa6d93aa25dcc85f13058f395
SHA1a56dd1d288532b3e81c8bcc7e7a0d566c7dad333
SHA2562986e0e73e66297fd456fe10ed5f777a49701806b9c5f981bd41a4ea1c337bdc
SHA5129f4cbc56b76a3f009fc57b00d3671d517d0de3282bdec64a5fd18e36a06090f18175af1a0ba4b11f0206a9f1095dd360a0af5937e455f4072c72071781d2f4c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584dbbda0865b8980736e77d996f00316
SHA17c15bbe1777eabca63d609523388603800358406
SHA2563f126b18ef7685ad87495e2a5e106890fc481dae6350ff0e9aee30e6c82da4a7
SHA512db842121e837059f32f458048c819219925653573c3c47d4f66a59ebcaf6774c83817c9bef60ca522695e9193e314347ad160a2515b1f8b9d3240aa7b78c07ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d68b98d2ce5a08126edb0bf5a3794682
SHA1eff103642ff12f0735d023e2b91042d8c34e10ae
SHA256677fa6443bbe1a6e9588cde99f594aafa41cb53c11eb667968b3ea28250162b7
SHA512d8e447519723d71e105fd93672d050abb5461330590cb3551e7d184d301d3b6c38d977b489c92820ab30bd10b6c5bd0bed19d07e397d66341c1a7bbd519756ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561ce00e389b47db91bcb858ed7d1e6a7
SHA1cae17c7cc567116f1ccce4f07119bdb228060576
SHA25688ffa43d418a48504567a811fbbe77dcdfc06551ae390b17c5f94d58c8aba820
SHA512f1ee6b320e4f4f7d1f26fda0ae55290b54a1825f81f855fbeba2edca56ee80c204c5b2bd06d9ead4e585e73f6378078f2dde35b752a0ef782f980efd939c2fd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb9dd5b1f16051b4224412f00790fa77
SHA14536107a1972d6f2b687675b3fe65b8e3a301b7b
SHA256c8795cd8f25880862b8f14a4c8978fbc1a168619439d96e1b0c34cbc148640c4
SHA5128256cbb73e0af813b526c0ef4208d08cc303bc509dcf7a3481d9819cb4975fa451059688fa94b189a27b4a27f997369ae690c2532c1b5dec700bcb501fad717e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5081f673cf520e306b9120cade67bd0b6
SHA1d2aa44b646a75f59f0716ecd5476a9d3a1c0f2e1
SHA256c8e41514fb4ed9e1ae6e07087f64fb981b1b22a875bce57cbbd325b359967d87
SHA5128b5ca9fd3e7e61e12684911b1719308a7b12ceefbca54e49d1fc1ffaec7873e5aae6169371839b83f960ddea3c0eca926669bf3e8b5094cdccf2bc2b0bf9b8e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3bbb00247d9c42bf4361e5067c584f3
SHA1e31b6d7cb9c25102d6fd90cacccd265197a30eab
SHA256c14fd894ba9d247dd4d7c1c301e2c3654f23da44565aff490d6b9f37d48947cb
SHA512718c3c162fb27b7edb25ca0e982192d105160408361e734647f1da1db2b93e4b6ce4e6d85e097ff93cf1eefea76f8cbc51a480febac242eafc9499a04ac44442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5558210126892ed3acdb4393f4dd3d4d8
SHA107776f8fc616f5e4cc14cd4755fb1b44d36ae9c4
SHA25648c4ede68d90e5814930408ce85cb70ddd1498cca9263ea644492de112f82aa8
SHA512ac6b9281f972346440839f279cec926d0bd7f06b6c4114c8823b59e28dd5f28b7e3a010865b7e70f53306609e7c91d4e7c6ba3136a8f64e340403b826c421790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5003b6659623ad65a2218177eecc2701a
SHA13123fa507741f51a3efdf0009277a0251cb41964
SHA256db03377ba6f3cc74132932814368e65e5adad0c86683db36494564c91f3d3f33
SHA512414e77f8bee3f7ee6092a0c75f22b80170c7ec5d0b5d9e24a3a4b9d2ef7dff20ea967032feb17cc63a576ec2a7b1d296758e80a48a305ea7db3a52bd9f4ff2a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a020fdef3f3f3bf3c2414c7b0bac7b32
SHA11e1836f98662f398f701e189137494aee4bf5243
SHA2565867d58b992aef8b73f910cd5674622659ac7b9e34711e9bbd235260716d1933
SHA512391ed2210b5b321ecc6d76ecf9dc32be98b343f253f8eaefa2403f84b485a36c603fb4b770712933719b82383a8ba4d5eec9a285ccb2993783e09d3138243ea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e89384a57240060edb38a364f1c75815
SHA110628f68b238362ee7c686f18e12d7d6144c0761
SHA256d721d30516e448511d0c1006bc1732de8d506a1332c859cfd9d7b47bbc3d5f8c
SHA5128b80df9dd4d75ab8bfc0d39ce2912eac9e282bbd41ed556c4ddcb83508443da95ed632f9d895651634882a0234ca3197ac4a2bc6690e250137cb068874f16821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5435a31e847092237f3df98bb26119833
SHA1b3c34bbd3f1a573801ec45267176f0458e2b3872
SHA256592128dfb7f97445432aac5703e228280d8cdf6640137d3cddb6656c815fc845
SHA5123238b110a70e68a07e5555a80fa6045af7f712c13619213fd67a2ad300f3715aed26faae6ec6138f9dd68e28aee1f6104679e025e5c14ae63493ca4bc8b86bec
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5GWW47WY\layout[1].htm
Filesize5B
MD5fda44910deb1a460be4ac5d56d61d837
SHA1f6d0c643351580307b2eaa6a7560e76965496bc7
SHA256933b971c6388d594a23fa1559825db5bec8ade2db1240aa8fc9d0c684949e8c9
SHA51257dda9aa7c29f960cd7948a4e4567844d3289fa729e9e388e7f4edcbdf16bf6a94536598b4f9ff8942849f1f96bd3c00bc24a75e748a36fbf2a145f63bf904c1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b