Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
55930f022f84a1ebe009a9bfe9f02fa5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55930f022f84a1ebe009a9bfe9f02fa5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
55930f022f84a1ebe009a9bfe9f02fa5_JaffaCakes118.html
-
Size
26KB
-
MD5
55930f022f84a1ebe009a9bfe9f02fa5
-
SHA1
24d75aad43126cb5699be91fe83319c0ad28e1b6
-
SHA256
f56998414757b79db561d27fcd047eb7e9797be91a11d96476ecd12e93176c51
-
SHA512
5321932ae2e52f3fca8ae0532c432c6b92b2305cf4493b065f75a6aa1069cf376b12c43f2df25ce738b877865c84407821bf90f5bb576ef89044b777218ecbc0
-
SSDEEP
384:PD7eKpj1Osy4I7GX87STPwOwdlYrTnmbCPg05:PD7eKpjYsg7+TPwfYrT3PgI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0278ae41921db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435389131" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000078b654f9c5d73b5cae4a878c935129284a826abf6406da93ad75c97dd5cf2c18000000000e80000000020000200000005ececc7b4584956badb96814a0b3d4666ca7b32ba0f92f744ec1f6fb42760e2d200000002cee9a28f2ffb18374259aff41525c89b0f8073f07f6de8009f59dad4a733d6940000000294164450c7135297331cda29b9a53499b9e2eedec57d8e0c2748933f173ef0553025d5e2052671d285ad643fce1987372150ce24a2bf47a616eddc696b7302f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0BBC6CE1-8D0D-11EF-A094-FE6EB537C9A6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3052 iexplore.exe 3052 iexplore.exe 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2284 3052 iexplore.exe 31 PID 3052 wrote to memory of 2284 3052 iexplore.exe 31 PID 3052 wrote to memory of 2284 3052 iexplore.exe 31 PID 3052 wrote to memory of 2284 3052 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\55930f022f84a1ebe009a9bfe9f02fa5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53308e919f3e23c3b889ce2a427ee5630
SHA17b1186590157dcfd6e95ff58c144f0f58ac4ba07
SHA256ac59736825478f8c241e0226c1853fdf130670bade03aaedc4f11d1daf67fc69
SHA512e9da499bfe29fde45b01deb1eaef660babf5e27516bf1a5ee5ab54f966844ff785b3e0abe640f6f4db1bdd272db0f504222c95d2ab37c79e757d2af3a10dbc4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5363c51a6042ee062c035c968a3598242
SHA1a8e90d9f02dee15765d12b44548516d9db8d5f9e
SHA2561757fbb7fc22752e6ecd780ba4ba45e36f059948901695628c6f92aad3821572
SHA512f248a5d4c15e212d584f1a1692fac47d72c109200dd81dc02ec165046518f11b17c264211b45886fa37ebf55a983dd679e01c2cd99b2fbd5a87537db5313bd26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d701e715e932aa7a99608f95a2d67954
SHA101b4152d141d9dfed670acfd9720e2f95d4e853b
SHA256262edaf0a115bee265711c4ff28ae19317bf5fd9c50612fea8c8fed431d67009
SHA512c8d2da14e568ec69c93c841d062d69766e3c2fafd94af4c8262c4a2c542182f8b1a149c45f56a5687a4843b6be26fc5470dc442c19f3f2846609ccae138c2b46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bd95d001185d0b0a8460630c5ff023e
SHA194d60adffdb00901201e3560e7be69b1d2d7ca05
SHA256f127fb4cfbec6e12b1ef9b2e510e18bfd6a9af5541bd2c735f1a511b10713b1e
SHA51293a00f9b199da75f4f7f1943b048294a9079f6014d52413e903072ff3ed8524c6aedbb93ebf3f1ead65df45109042101825ac5518823c0f8d2f1dd88976607e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594c903de6cfced8453fd901c87101499
SHA1f5014a9f5ea9d60c493adcfcce422e4d18b2b0a8
SHA2567d53e11a0734a1439b9dc9910df8517ead4f4885fe112d21f98958ffac2965c3
SHA512bf1590532497464b434b36b8380bbfb44e08f098d38f22b484871f1f7b1433c952b7408cb5f247225d101dc70219d19c548b94411c3266f120451c544e468979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6bf1e9fe9817faf9d613a47cb22cd57
SHA1dbec35848e1a314cd142c7b81cccf3e78665bdd7
SHA256ea03873b90df00c8d26638058cf57425e43ebca5558007e8cd0ee503c611e03a
SHA512d3820ff2e81c1097792d58f8892d6535a840fca17e4382113aeefa3ee02089c635885de2d19aae15527622c5eb6151f469521769ddf770ab307c4ead3c4860d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5616c2179f01244a248c7f07ce6acefa1
SHA168ad28db280c4afc1bec0e994dc6d11d351f9c5c
SHA256ed8449c19cdf7a94f6b6d7ca1a6baf10eaccee8c5d9d79fe277522a032543ea1
SHA512e9e0a52b67a0d943499ea5e9962ff6d5ba14d550b34557e5212c820d7548aeda84320e2a940ad5747d94ee92af67dd263c266e4bd81d632f86e0cee6ad81215a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542dc667e197bc6576f0497c413022936
SHA136117a064d22cc9b0017e5ef1e0020748fe51949
SHA2560e3d976edd5b96e41ee601bb496fd8a88cbe6730a48495ac6abdc376351a45d0
SHA512cfa119961d104eabbfdc5f20f966fc0ba9c57eb6a571359dbf7cc63f179cc10e1fb2115c8376c431ee22aca7ceeb78442be52073970459af649f89fd699aa5ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556dc5933b8fe4203ee767554375b692f
SHA1a18661bfb1a43ca327152b42d5175b0e079942f0
SHA2560778d0a73a67828f043cccecbdbff3b1204e6183f3ffe1fcf4970f57e1dca39d
SHA512a81bfcb6b3672d6bf02e0eb500a3b519db2f37bfec251b87b06d637193163e49f0f70aaf80c223105fccdb3b18c483aba06ea1b2630de405d232bcc0d785448f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbe08b7decf79cc5b3d99951bf956577
SHA1dc3061e0391925403c5ea549aa4112495dc2f7e1
SHA2564c870ea4552b9d8332f339c1d10464a5147c6cdd5a9c9f3f7686a0e37baa7c36
SHA512ec159a41cf723b24717b219825b8d46845d14fa4155fda5da57d30d856bba218f245feded453f7897300b4a5848bf93e871165370567fa8477865ad1a8f99ff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5044dd92b3f6c3051b93b2c6821dfc53e
SHA10d5c11f0e552401ef03cad3904d58bc9b4a24ad7
SHA2563ad793175d1b6e46aa78754e995dd1373628c83c3036f97eaf9caffded8cfcde
SHA51210f8c3c344108fda47e2cd4cd4fb19bb250636bf87aaf6705e71547177fb7d8a0445b3bfb7f9f76a45b359473e31acac6de41c581fdf5800823fb88fdb19da6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514eec9678fb3732ef719dc81abb5ce4d
SHA17d0139153d293dd24bca58dee93c57d7cd5d57db
SHA2566ec6ca073938acf753e77e1ad40e4125b8150853f0e6600f42da2a6d1656f2cd
SHA512dbf16b680fdfa375a58c2f7f74949bbc4b22a53e7598abd8ac2f50348ebf52ac75adc07b2fabcbfc079bcd20a968a71fac427491718462c4325cee8f39d4927d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520f186df815c9241192bdbba9f93e51c
SHA1e07491e52fe4d8b12aad14c26df3924d25c87607
SHA2562496c0ec045d799e6d8545cfa0f44dbd6e6d5905f8b894296874835304a6dfb0
SHA512cc7ac085a89cf2823e87f371d66a5fb58c2936610df486582ce4324d43e17a0b7a66c487e457799262693c20f9f4d4292c6ea3e825dbd536d25efd25b1778886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b21ed56948caa8b32d1c7fa8fce2f7be
SHA1d123df273f8778d98f19c987fd722e98289462b8
SHA256143f7cc20600a9767124d57364b4012be0ea7f11a6cc552e8d690f087e3cadeb
SHA51232ed6bd6e1c7ee67990cbf80f4353b0535bb38fd2f3e2a7c4e1ea028a39e2143ab574a3b4b8780b2ba2e7ccd8a12b775b7837f3a28ffa7cea76b898bb84d29f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a12a5c0bd8005a69a11c580372296196
SHA184dbb8450efd5159f0980065382c895ab8905bac
SHA256ac42d69ab97747e5a65068330fd50b22c19bf527c0e9abebda6c5c64b3258f24
SHA5120557ec28ebafbdddba2719ca3791926aef7331fd7ea67be0117efe83d6493233cb0ae7973645982814e9cc8186c491d73f630c4ca99f39a4966f4d59316ebb34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fc02899c03df17e8e9d2d0b18cf06fe
SHA194d8cad2581fed38a692aecfe6f82765d07dd1d1
SHA2567717df1e04e4a3755986ab835e12930db88be10ed02a59a4c7aae9bf5d095e4b
SHA512605dbd60826315358725b5f23d05141d6d143840ecdab12e15ccef80f7273337f4cced100cde967ab677b739a711fe494caf513b75bcc5ec53b2b75b05dc5588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5582c368c2d99e96a8384bbeef8ccebda
SHA157861bfa4e55c172e4bb6f88566013cd18c80a65
SHA256c9eaaddfc39ae5f623feadcea9f3e5a89e94922067a2c637f1531b417ed3b2f3
SHA5129d8b346e0b7222dc6220023130e36b48be55d98776f5b356844fdd8cfe0f6e51e0dbe14f23268a192e611f58c1140970f5c774260127bf7bb1c2b34084d35b5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54610f0a935e91574ffc95de018b5d80d
SHA1ab6b5cdeea299574d1bcb4ca734c2c0f81efa31f
SHA256a0e7b5541f708953085fbf06f52998144aead5f38de84474097ed8b1cbc9e80a
SHA512a243a524e68244387da302803c4a647058c1560aef8106ecd7e5493f78da57b1c2e192f8834a64a58502957d828ac9e43e8db99b2c5855e99f3d115709b66b47
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b