Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 01:35
Static task
static1
Behavioral task
behavioral1
Sample
54c110f3c877a441b55ba209f1e8b86d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54c110f3c877a441b55ba209f1e8b86d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
54c110f3c877a441b55ba209f1e8b86d_JaffaCakes118.html
-
Size
57KB
-
MD5
54c110f3c877a441b55ba209f1e8b86d
-
SHA1
81ab62c81f2f19f5766681e7c722132af3bd7326
-
SHA256
b3d0e60b76d368d3b7ac9e83b293dd815e9c4293855456c1d6b81ba7260cb22b
-
SHA512
9e2496cb62370334a26219ad7e0d6f525191076755c357588543c7e06b5a077adc0d44a7863b7be5c37f585180dc95474aede1a8fb8929e94b591edb754aa430
-
SSDEEP
1536:ijEQvK8OPHdsAuo2vgyHJv0owbd6zKD6CDK2RVroRtwpDK2RVy:ijnOPHds22vgyHJutDK2RVroRtwpDK2m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{343EF961-8CF1-11EF-8F55-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0659612fe20db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000e5eb47e83437fd30ce944c23ff01f0e56c516efa7d5b402cf93df658ab34a5b3000000000e8000000002000020000000c682137e7836f6f27b667d6f5bf8e095bbb2df8c951cbcdbc9c541bd6ace70c42000000002f7c24e48611a31f30474f3ce5bf70a0a558cd6e838805c8b83449127a66fb0400000005fad0416c17945d7f83e0fda1a183c35b9c65e4d17d0c2842103ea2ddc41d638dfe51b01e306a581194606a094e075d6a6747507d4beb7da074b9a0b84b93b20 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000c94c8c264943549a51f4ddce4dec3352b47fdd91a95ff3c4b64cc05206784250000000000e800000000200002000000015a0359b790887b924f670f4c9b5c6a00deb8a111f50c6e234c082043b63313890000000cc2e6afb958b8f3ef7597725493f4fdd6b82a10f16c24c76085a583fe6ee94e20614f1f8671d6ff059b999390bc24de38b689d706baec3868c77f7c14a9b34a495c6bc8c58bd403e327777a8b35a35ab793985da99e95f7ee88408cec0b9c94712715d82218b14d337ca40768a885c1514c3737162ce793ee8a451f1a07996fd4fae099f9e7868e4f98242e7732dfebf40000000f73331cd44d0813094d15b7e030a1b6baac8d8483b480706a2c5690fa3cf108df93fa08e1fdd14089607b265d3ca44aa58f45cc325919e43a5cc6936eea7d8ee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435377173" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3052 iexplore.exe 3052 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2812 3052 iexplore.exe 31 PID 3052 wrote to memory of 2812 3052 iexplore.exe 31 PID 3052 wrote to memory of 2812 3052 iexplore.exe 31 PID 3052 wrote to memory of 2812 3052 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\54c110f3c877a441b55ba209f1e8b86d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5dff6710e0a0365a247d0e3d911bd57d4
SHA1ec757bb5fd83bda6778600f1ddf48c78233de2d3
SHA25612ee23fd16713f4f286f983202dc08154e8d395c7673adf22c278ad49c2c3f15
SHA51235489f78b97666ff0373c299ff0c974b2997a38adbe62c6703fc337130d7a3c5c7b54014e6b11cee4f3e4087e8eecdbc43f6c3a2af4cf7fff17af173d60d96e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5931a779413e7f72105b997ffedac0253
SHA13a144d927e7df63c067dfd73b03e25a1a2fdc7e1
SHA256791ed9a8839ab3b9380d1be45cd945757f246c4b0cde1b21a774b4b1a54b22f3
SHA51294a64a733b1eb24bdf1da1b165b5340a6c45a0ff63e6ef3dd382e7ad9f4cdb9177a16138887fa6c4fcb175f31d630e0c32488e9800dbf3d8d7dc06b09211df5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ca3edba264ca8d1f898a12da453a486
SHA1bbf06f1dccb32fe56d8fcedfebf82c0ca7d142a9
SHA256d1206132b29a51e5f13f16d82316abc77cca431975e71b2a24bb5296f8ac5694
SHA5127c9bf736edab4b373bbcaac988386b29c742a0222d8877b1a77f6afb7cfaab1a55cf2a557354aaf07c85eef53c7b9bb6cfa019259d5c7fd1f36f2dab35a69cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5913a1161a6a0ce6f5b1d295fc0460400
SHA152f6cf20bca875627374bdd7c325b0d84bb97f28
SHA2568bc78e421f03a9b7bbe33ff75665589a42477d3f104416175ea999e04e079e5e
SHA5123c713f1258b5ddb3f7044b726165798e38012a65d61c569393375f4b4c99795ea12e828007e61ae31b90b6f54b3b3dd3825d8db1d20f7c941993841c6eefe0d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc23dd263765d241bd3245de5cbffe64
SHA17ee00e7e22b419a15ea6bc31a5b74023d417240b
SHA2565b0f2d2bc4f7f55810e95bc8b0577280caa55d40db1eeb47dcff3ffd7f9bc201
SHA512d299e7538d9ab7931e8b79acd834f9f1668d819c4a84ab3da4624adc29538fc84b542d5a4e9625cd170b879e97e6bc615b7e98a2d3c7a843b16552dc7682eec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5000be80c4588014d1291edb098d6f160
SHA198766dec02141be220c19a0d5e261865e01ad3ca
SHA256c5ad3579543e789a792761eab053381fa4a761ba5c032269fe301c7662b5bf63
SHA5123bd047cc2ec9ea624f89aa976ebd5ec1c30516ba3adf95ad7230b9477970f43774b17007d3e716f0dc79c4263b822c977bc0c8a1dffbc6d2b759e69ed08b0286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5491338f2a9358e075b36b65641fce434
SHA118b0cfbc3a3c334383fcc70620a5394d84c12738
SHA256b0b4160027f1edde4fe47155cd5d2189d7b4e22e0284f4e664bcd4d96c3a8729
SHA512c3f6b10184c8498238c2990df3711fd1085c2edc26a422c0f4cce1ff596ca40f1a52924a9be0c70625a6daeb8dda8f912f72a16b81fd8d5b6ab2a8ca3471dd83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b14d38f0c0a631842cd5bae1eef137ca
SHA1b3801d4b720028e86ee725cdd19ac691dd00c3e1
SHA2566fe78ee1462204da094c801fc938a29ab0a09ed2ca2d177df66316da15839b9b
SHA5120777666f3c6fbb5003e62f0a4d5b8c8bbbef37bfd3bf5659b90ca0e33f1f7fc30dc5573d997b9a9d6469a14e18ea4ac28e2fa7a2fe7d0ce176ab600a7479ed1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516fc96adce823a148a3195e2340872eb
SHA145d4fe508b3bfe6690aa6a19cbe36eea0a99af7d
SHA2563a89c9a5e2e851d65a2beb1e61b5cb87c3cad816327f8df3240ca658f98cd6f4
SHA5121490e93760b47f2fc1c2852c6050cba31e725d0cd943bb8615e1e8f76da18965a70077032f0dca2baeca5b0d17ab577ca9d2f5345fd1f353aa73e5f3357f5bf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528b9aabf2337b0ff568dd538dd537fd8
SHA119994346c86885498b4c829724a57a49c06e8980
SHA2560bbfd6ec0f3284fdceea5f1ad9a06b1cf875cf21232a11f298c8c6f78b02689a
SHA512c9ba3b656fa33528c45144d354592e3121084d522d1420d804062bf5fdb42e11cc719167061d0a35d788e0b5609e28591b7a2ceae277c7bcb13626485b2c5cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca32d9773f9e8e48621725de3d044831
SHA195b3aa9c3b57e77a300c86940092712b7d9525db
SHA2568e2fef018c71c3b8c786eda2699d22fc8e4da8a7bb4da2ac71b36958589c3943
SHA5127609870e67e47e583e63afad0ec73d86eaba3dc17eec6f92afe285b56117b201e1689bf2a65c0495fc899e8aae491a8a73eebd0688a919e5a0c2c0a14798a913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c568ccb571b7e31c937a3c783a375c8d
SHA1d1f79ddd575495862762551fc939b6c1ab9e0975
SHA25686f42dc7ffa730ed0be3a8c2cc90f4257431d090cb09460716cb3f03008016e0
SHA512333c3f3597408bdaa6967e247310ee399b6ce0f37392db7c4453c3c2cc8b3e14c27641851ebfc3d76065eb7f369717e6cf30ba737d63eb790d2773fe87e6fe23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cd741cfc6afe118908f8ce7312fccdd
SHA1a3df4b014aa916194e8b1658aec5932068d8d837
SHA2567ba5f08a68d0d9a282b2e5358851576ccfe8f47b7637464035db249a68ad560d
SHA5120704f120cd97642482aaaa7bde8bc1c7cd5a99a93a17022d85772af1fb39070fe6222ad132d16c125892e49365c83baca1a0a9dbe06f44eca855d9946c2ad56a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50151992b44c709e0b99fcf16e8523bde
SHA19e96885edc9cb29c2ef81f67581c6b1a75c2a2ca
SHA2562232698767bd0ef031513bdea02d5e00aa27c520ef5f72e819be70f1e0538bb7
SHA5121c71c1225c6b4b84ea78daab7668e40dee5e90bec07e7624d94cea5cd4cccfab83a3315c4281f4056206db0ad953cad42af1fbcbdfefad775db08e121b997938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51452818a053393bcfcb14022e05792b4
SHA15e15594149e20c149e70a5bb1f6a2cf4117d799b
SHA256560549a313d7130885454da004a49f441939a28cb843affad03f8df06484dd55
SHA512363a511a68cf5affd3e9b645412177568f38871a6eac3cd7d57751ff7e81db1d84bb26f6e854cc0710956e31d348ef645087d71dd0b538af4d9eb57d9cac2930
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\f[1].txt
Filesize40KB
MD547527cecbf223e82c62aa7b9fceebd35
SHA173fdd1d8a0b7889ed00b1123e3e6d446ea5fe9cd
SHA256827dba66dbaecd86771b7bbff53e04d43afcb02db2ef59b87e620b633ac6eb4b
SHA51241e268551b0651c3d87104e2d1e1b5afa6ded96c93ee270adcdc0ff61ca3d5489696d0c49f18194e3a57427aa551fb914336b8ed4d25785b60861055e0aa6506
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b