Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 06:12
Static task
static1
Behavioral task
behavioral1
Sample
55e41de3f7816eb4a04f43c84be54e07_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55e41de3f7816eb4a04f43c84be54e07_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
55e41de3f7816eb4a04f43c84be54e07_JaffaCakes118.html
-
Size
21KB
-
MD5
55e41de3f7816eb4a04f43c84be54e07
-
SHA1
fd7f0870f9fa9d207a6f4373240c56c6e823bc06
-
SHA256
5f7d47bb496a12801ca734e9e3b69b29ef928340cbab0470d08a04f5701255ec
-
SHA512
0352388b41743504341cad4865cce411611ce319d06a7ebb6ec4163281f3ab1251043c247ad5a51fd13bc86a57cee3351722685410769af0426c438c0c7dccd9
-
SSDEEP
192:C5LZswk0pDYdKsBlb4gVyQ4/Mg8e7DHmHLlOewuZhELBgtZIV8xcCnXjrUtjXIuV:gZswOdLBh4gVErXHm5E6IAX3UtjuE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0612D621-8D18-11EF-97EC-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435393846" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 708f94da2421db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000000854f427b92a555f1f96fc0950af9571615c024a78f0ac04f66baea2afb9cdf6000000000e8000000002000020000000e600a1df4cfbc2563aa24bf00f4fabd8564ca322327762a51df31e79d773aea4200000001ca930c2008eb1c4bd502c717de55b1c13c267fd50eeb8dffb9103125b894e34400000005f699a9cd569aa3cb8b51cb5cf551675e8c771940a6a0f07f6609a29e546d155cd017688e259ae4857cb15c4ed297d1274791efbb972bc4cd467867a2374a5fd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2008 iexplore.exe 2008 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2304 2008 iexplore.exe 30 PID 2008 wrote to memory of 2304 2008 iexplore.exe 30 PID 2008 wrote to memory of 2304 2008 iexplore.exe 30 PID 2008 wrote to memory of 2304 2008 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\55e41de3f7816eb4a04f43c84be54e07_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7b263c7ab31c0a8877e0ddebdc1ce6a
SHA13e81a82e803b8e5f7b2ebb001b6e0c36bcf654b2
SHA2561f3ed45c97d1f01d974e02a910dba3b2791d04038cb2b065b0523c902e210735
SHA5129a3b3b44f1ea0b6b3761601e090318830915020f46c70653a63c6ead4e936a4108dbfed2bc8d83d0a96c3f8be11b93ed6f20fcc93ed4f673de891ceec2afad46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51acf45ff9b9afab5f1796dc72edf69de
SHA1ee2ea0f8ed13808b784f4849e7e162ab3d9c1e24
SHA2564a0ee9965fe1633726c7e8b2a278f16cc665eb11f0263e55f4bc26b08645c299
SHA512f2a634b65b244cf436d4d419192fd09401f1725650fbcd270e6a6ae2a6cc63be5ac55ab33cc7c5368e3a5c42a6499a34c89082c1cad69e2bcc77d87ad16cfabf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b2c5d84af4108fa6b99d57030db2ffa
SHA19f2f88d2c1e8708131a471beed1cc778c971a04b
SHA256113d9afe62ff4b075f86f4cfe25f65c6a6aa0a70e30f9033226a1b7441a9780b
SHA512f0beb49c168bcfc01eced9af4e71482fe8e1c09958c56eaf51bdf73036676a450a63e2336bb259dda8422664ca2695507d397e710f55f00900fd7dee2578a999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541e83de77dd9d67f0aab64397718304b
SHA112769d78189d4eca3ed7aecbff813a47b47fe82f
SHA256709fd2c9540ffeb4603fdf6e794af1ba90651d6e24c82eebbeb9f49b58bf2175
SHA5127d6580f8e440b528ff209e61ec12e6143a494e5fc8b14035920c02ca2cacced513998dc48f9bb219e8f78a7dab9be199e757dd9b00667e9551ec8a7627673573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c108600380061ebe678a3392e7785d8
SHA1e81c814db6ca3e72aa47c8f92f96c728c63b592d
SHA256272257ab1b55c90f65287a63402ea9ebf2a5f85964060625b439d15f8e137848
SHA5121e187fae6d93f4ae6cd94e690a7b607bcc383aa3fa983e358b547a7065e449f0be01932cfa2dfba97a7e73109de96f89532088272dec0e93f3a0623785a55904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9ce78f4eab17ca8248b7cc7d582f4a3
SHA11ea114edbe1fa0ec9a9aa9d2327268d1aca85d63
SHA2563178a31046ab9794ce15491c582361a0481d7d3b2a2127e2770ff9216e6e956a
SHA512b26b50f12b4a8887a3150afa79a49bb15139c73914bbb922508cef09a0eeab0d85f40c7bc6fe53f95fca5c6b5702296ec5e36ae6e634bb46196f3303a217ccb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b166acb2a1bfa15fa5bcca2a2bf71f21
SHA108073377d897755ee92848b662b0c5c418a4cf72
SHA256fd323f7a2bd28ff670101c515d7ef89193f64aa36d28561c1d92c0db4d71ef3a
SHA512cf97a8bc86be694b9f3c3cdd3133a5baf35551a9c61a428b68e3b8df8448cdfc7dc18145916cc87f497f45c40d6e8f84a3a263bf71c65b5ccc0eb45e2ef5a8a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54508a4ac7fca855afb4ad7928e51c5d4
SHA11ace4d2a1b3fa42174c940ba50da22a7dbb9b25f
SHA256a7c0efcb0b11dab85d40f8f52582264308af3b59a351ac6cdc4f029284474d22
SHA5123a70fe6e8de71dbb7fea3e3f2f1af287524a9a66fba7a578b849360d1c83e8276e4a78d0f5ed16fb14b4448b6069210a06b190d8be326c13c502707d4cb6d7bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9ef698e5c1c8f4b8069ef646437e1ea
SHA1f08e91a955166d16a6a0de72cee17d1f3bc77306
SHA25692d813a0b3553bc5621d3089a141d539a61075635697aa83bfcc6cf462b4eb2b
SHA51252ea0e5b37a1c4369bf7e84fe40b5425af07b19cb697c46d25ee0481c53a9ae4b5b5726a1c442bcfd8c3d673ae70f1b5d210a70cd65c317b9a512a47172d71fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57896c6c7625c520cbcbd11a1d956d6eb
SHA1c50cfa6d7511468adc58c28db5801e1d79f6846b
SHA2567accfaece63eb552cb7867088b5d0201ba19440170d41a8b8312841d7e376203
SHA512d9a9d3aa9401b156c04bf9999c945e35fb1e03db590654c434d01ce47ed3c5007da32804368ea3609123331c3385de513efe47b12584fcbf96cb4854224452ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b898b2e7bb33fe41c1644672d34322a
SHA18f14be6d4e757094f91014e18bd2ce934151026e
SHA25667d61b7d06215dc4898233925183ecaf8e2cb455ce31061a52a9b521b796f153
SHA51292f3acb9116eeab6888191dcc851cecab2c0a35f53f5fd1b47ae6623012a19fb146c7fcc8d5504260a23ebc7775b0087c53af05e33ba5f614bb000386fb03ad4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53048f7de96b8924ec1c0b7e91bd74f87
SHA1e123fb81ff7e3a6d92412a5d195727c5f4d5b9d0
SHA256c1219195b343002151886078667b4f62be181c29293c5ffd8951c46818de494b
SHA512483a12854746c09183afe287143c965b0179507c173d0d0fa5c7d5aaf47ee41030ebb190abc899d36bb7765b5a232da8bbe0a5b4a747a832ae21fb2b312fe1bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f91cf1ef0f602addc82827f5e3c720d7
SHA101ee793f10f6bb9b075d1780cdf42fe4972e697a
SHA256c54f4327e04c8e3ee0819dc80d52d104b481da2887433630ada74f22892dc9c7
SHA512934e95883650a99f7880bd7844815614622ac89ddc7c6786543365eb29f580c9fdeb9929067faa519ae4d60fa11e6c7a6d78f85dd050540d3ac6810b604f7c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7eb8eb9fa18d2669970d660e76463e2
SHA19370d35e91daba90e6017b05e9041abdd5794572
SHA256cd48c26d7383bb03195dee685c79fbc6df8a12c0dca1b4236c6ca5d87d8598c1
SHA512812c9499c8cfe811f5d33a3d2f9c6aac3d894bdc9467c097c6d056a843f2b708eb5f8a08de237fb81c9fc32535b5a9fab7e245045fac39df9b4f3b8272ac0691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef2cf3a74560c23a5cfaebb902f78828
SHA1d4544f4dfeb92e43a366f5dd6ef7e50954adb4a2
SHA256d99742b556de3e28a85fa8047f5fd1b5fa832194547b59dc88befdf0a783819e
SHA512f373955bac4bdf552899d2dec1db10cde459106859d7b73cb1cc3885b04b6821ef4f4f6f895066fbf16a9c09b15ca21b7f99df09b2e26219280130aafe64a6b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da10a190d2bf586356770f5cd9572b6b
SHA1290abf48bb61c14beeb99407481adcbfd8bc4d35
SHA25637dfc6f49bc3b49da9d9f0dc1758b11df41b22c2e5c3ebe9cc53745999d265ce
SHA512dbcca8874e0e1e52fabc68de1be797b37001b832f208a8cbbae3dc41e21a6537226faaa2bfb43558c6f36830d10a92dd4d1ca4e4cb6d35e3e9ebe0ef373820bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac4e2a56ae128672ac1be1e11fd69c61
SHA1e9839aad6e0d99f0a608894407294b0c4408d6c0
SHA256afd0423acc9779b33df8816481516267251c94caa8dac4c23adc65137aebaf84
SHA512fca63f9b1bc2e39d964e3c28c4c4863e05baa926bb1c1bc48ad6b28c7c251b755327c3c6ac8d233fc199ab69a8e2ce01a1388cf9e7368177b299f28fb0193d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe520dc177f2c5bea1173599559b3ff0
SHA1584ca89b9e7780aed41a393ff2ca3b6acee33a33
SHA25677348b359c2f4b7e5ea1dbbbab916f826409146d2c83e3d411058b80d40d94b7
SHA512332a44e089b2c4c2b01ebf81de5aac768e55bddd95167657e711d12425d0541e52bd5c4cd06681ef0b236d5851cf8e9c3c9d859060e37c8247f5cb46afe948de
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b