Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 09:44
Static task
static1
Behavioral task
behavioral1
Sample
56be1c94202cdbbff894dc6195accd9a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
56be1c94202cdbbff894dc6195accd9a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
56be1c94202cdbbff894dc6195accd9a_JaffaCakes118.html
-
Size
29KB
-
MD5
56be1c94202cdbbff894dc6195accd9a
-
SHA1
a3ed24b362c829b5a1fda1aa46c0ec9ab19ec7bd
-
SHA256
e1c30fa37816331b8b07099ef0dbf771a4b6268b57df753774b515715652cb38
-
SHA512
0a4a04d15e166ea7a12895e3505adc1bad69e7f189a736001eb75ef3db746289062520170ac5ca51d4c52f01c6e8a94a75c6ccbfae50d26660cd2c06a4d42d60
-
SSDEEP
768:9jp6BVuSHkvwjczN8+p3qDF1Ltx7+0o/0hUuH4+MUYcDDjbr4Yub:ZRXP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ced46e4221db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{961E7401-8D35-11EF-B0B8-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000ed4525bd6efc2bd8fa94611f82a0612a621c3cd90ee1e1baafa7ea5c9fcf6481000000000e80000000020000200000008056f9caa04ea0ccc798c0dfe20a40d9a0cee807b4b161968e16acbc34e65a42200000002befdee0f59ad4f117c209b9363882c2b73c1e9c2c7cc3d474c9b290cbef05bc4000000036e4648b56510bd35a793f3623ed3fadd1c9a4fb5b32244626ab744ccc2884c16ea897e0085cf47150b4b12c758909ed2c69633b3d5f921c0c810d52cd327fdb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435406544" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 3044 2132 iexplore.exe 30 PID 2132 wrote to memory of 3044 2132 iexplore.exe 30 PID 2132 wrote to memory of 3044 2132 iexplore.exe 30 PID 2132 wrote to memory of 3044 2132 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\56be1c94202cdbbff894dc6195accd9a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536a3f12d3d3ed3a58bdb66443ffd8cb2
SHA1fec451b0911ab7befc302f9f7eba88e5ab4046f3
SHA256619312c1b3e714306c30f7781578ddf108edcda93ec39f997afaaae19a6f66f1
SHA512eea484538876816620cbaaf3603d4c90e1f01fd50fe23be21c0ae054e458be23c5d83e283686d421e44ad05e56c709f5692474b2cc6f8e0b15d054c96e313ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c73262884a22a780b7ee4bc656cd7a
SHA1373f00421f5b9ff4c636b7da56810345e3f7ce3d
SHA25638d180fb467282fd4ca56f140089b695c00eded92814d29f9040cd4ad7df4ef5
SHA512b3da1231d86f9854ec498cdf85a8b630bbfdfcb6ba95badb21f0263883e4f7480adcf0e8f77a678c187c6f4476521ffd8803b1718a4cd31bd228607dd75f2800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d6700d54f0ca6106a028b81fa0a5afb
SHA1e29abb0f9fa543bc8ce0e1673504e711ece18477
SHA25689225f8d36516feaa181c1dd4747b33adabf60f32365d47786ba2f067f064966
SHA512aae415c98d661d2249d9fc0d6d34a079c6f29810da90ca1ee709aa15fdb926607fec1631c21745d32c38b0b402d216a123ddc6751a2dca46965509c7f3aa61f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596a55c4a01d6f07c7e23a1db450568ca
SHA1baf1d66dd69194d30fc4f258ce016185c75698ce
SHA25620cc18f6fbc28c739964608cfb45929980a2a9a59b14be10223c305df33d60f6
SHA512a8865c3ca5749561399189ad03b7c1ed9ade3e8da75fa764de280754b831abae209f5e1e4757284eee1e19afa9a83a2ca461081a80dde84e861fc66abdfdda4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eefd33d40083f70ca191a0f86c7d700
SHA1abffd553da9e38d626eb6e11a28fa4b39c34f17e
SHA256096f610b15694a790dccd3ca019c5e30cf2070cd197d2e662cd803c1dd527304
SHA51299355ef3a541b41ca4697640f443ab7c955fb39a8441532c372532b84579d611a5a0d8bbb7f8dd826bd6151a36efa4d39b15cdbff986034000e7bd1c695251a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fd40c495671220cf9991591d88db180
SHA12bb334245036a7a0abe045285bde3a84532b240a
SHA256f72a2ee7254cee4fbfc39598dee0c041c5b86a2ebc4c123d4b6e62783121e6ca
SHA5123fc9eefa6392ef00d5e2601aeafe12621b843e6a332ff7dc6903686ece0af25ed3544579baf2002dcda122344d2e0e72eaa59259c6686c545b0b62cac004b50a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df0ce67fcf922f3613423842cee5f296
SHA17e9a389543d775a84c4e2665ef42b8e8ad4ce3f6
SHA256bf5ead8edd0c9e2cca1b7bbe48ce7240f29b98479278343a53a027b4451396b3
SHA51291185152086c25b3d01d55a5cd1d76cdb3d73d5f137633b0bdecfe7d8c6770f9f28611332cb59f8bad90ce940c6b76f52b4a5c6387c0bccb4bf2db63294a7fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b158ec099a993ce5dbd291caaee0fa3
SHA19c99a1ed3eac6a57c9f78b453e9e6c7181e1e8f4
SHA2561030dd0d23a4490985b46d8ae799d0d66d210f52205ac67f62a1e2854836301c
SHA51245cbdcee09067d76f72d07be8a79f8744996d38e149a545d27875ba9542bc84eb73ae56925734371279f1fa0e2f8e70813e67b3cb4c808a4abf4a6e3b2bec528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a09fcc5496704f98b06e235b89613adb
SHA16022c4ccee77cc3c2d1b13672ee10f9e9c573212
SHA256adc3a11c57ed809c6bf26e53703e5ef49b15ab7bc196a6984c963d388cfd1a3d
SHA5121e17114fb995f97e228f505d1062e088f7cb965e1b895d49f3bc3d2aaa1fcfdac4a807bd28db657f775f076d207776d0dce3c5acbdb39a481beb1455b0515672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568a6a3b83e7e4bd532f466625f0fd404
SHA11627097e78412ef0a206302def5f2e5422a3de6e
SHA2563b40de4caf2133c8c7bc018a1150e75866a9a62296ff72b34103f1fcc7738056
SHA5124764ce0f689c841112be0c857ed9f29c43c0c3a6af124003b582c0066af64010c49545768c7db29ce2b936e8c50ca206a8db36ee9ab6d5a8145269bac2666916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caf293432983d7e8270e3f0d4fcecf78
SHA1d2c71f042a2517d34a02a76dfe991f1b54fb1dbf
SHA256746915f6795838e3d55d17d5af36ff1a517617c15320ea80398140d6dd8d9482
SHA5124c7e4afb37422c6a0c3a543206737c647a2102410f09f2328f2ae85425d1d6ea531efb24e6d481a4fba85839e4b17227036b614423e2c116c34d7ac396896fcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596055c503db858b334c4305f5c81e93a
SHA1220eaacb32bf49f486540062402bb9dce561071f
SHA25667d20e3c9893995d24e18b5b71f44fe95b2edc28edee0d7be9001e50a8f27e71
SHA51262ec1c4284a0bcc70cb9c3f73629fd7e924e3942f5ff0cea92ae9dbe6e5eb6aea9c51709a9a9713d77888a6242db9cce2937d1aee89ce077df81f1057de0bcaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571a46e43ee6760381a46f5a9a647bb7a
SHA1d0296dc678f5736f2e5334c9747ec240bdb0ebe2
SHA2564a0993f1458a9bdf80fa69221cd27c0831353ea2381e86d750af7afb5f3fccdf
SHA5121c0b68fedbb2de92aff1ce24975442ff8e1b86f038a63f74d183eedc5ecad144a9ded64e9907368d3b0e0da98dd0cfded3149dd2ed705586bd141a1e660f34a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509b5e4172f3b141619a3fc2334557cf4
SHA1711421672d3dba17029fbe700d9c5a94e3992b8a
SHA256eb8e3bf9afcfed37ca3933e6c8733084cfdce5d9d6c9521d5600c9716e5f7bfe
SHA5128882227a2cd7b5ae1bc48292a2ba568cc94c4639e83524ffac78b6f9fba42b73eac2b498b2ba9b7d158b8d00a287e26c8183e978eefdb5311c26529b92d5daf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1298f35ea01131378dd626f8fa73936
SHA1a8c15e4dd73adad8d821230253ad9ef7ddda1ddb
SHA2566ea8ce07b877522e7786f12177e395f1e239785026517973995dccdc596a8565
SHA51258d5d712c746950caa4fabd4f952b80c48932a917c81fb4820a6200b19e4af6d6d63e7e879a8a0c7266f992d06d07a434682d36d01ae1ad4ee3ef592e8934199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507e1e6983378e243a90cd2d66e82ae91
SHA14cd21324689e938f66cd43e2dddc17e761b5771f
SHA256ff994b9a0eec85600fff44f7171b76c2d09e5987a25cd3ec8687d146362c101d
SHA5122c89ae4d23df977f6bdf60c716f9f2721b0a216be7d5c745568c3fa68e86faa9ac16875abb7cdb40bcdf55132b314bddce1e4c0dfc057d5c73fade555a15b71c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50369a359022f5d6a8dfc79c134bd667a
SHA185d56d8f5499fe0fe2d49521fcd644e5fef13e20
SHA25663e89cd45b57d3d91c533200ba8bbb8c3cdbd02078487cf2d0a47fc264bf8a8a
SHA512cfefe03fae2ab3fe10bf02935788771ae45e1d94aa7cef21f28d6206ccc9c395866981e863e85c75378a7afc9fe9f57c0692f9809abc6d4cef9318a01748d531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6bcd690d4e790f9b46d28e0d7d8a858
SHA19c331285a0aedbc806631bbc13c5b7a012befccc
SHA256dcda22f70a1007673b0756e0bad9ca6ded5b15bba9672b3986d0c37079bbe432
SHA512b442ee453922d6bd3d72177f6414e19acbb59f61f106ef00923c03ddcaecc2920533784bb626c3fa82db774c33a3ec886970e61dc111d63cb6a24a0dfc5db7b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acb79435dead311c0f4517ba1a536362
SHA11d9f8177a981520f7753f4ded933b0919221f820
SHA2569fdccf26953216c0f1a0d20c93542738bbc34f851e8ca3221a25c61da12c21c9
SHA512b2f1337b22738afd2a91bc118c604b470e91d8fa6df7dc155352f8d704f7f66cbcbf9f4d19ca2daa5595e2561b0f3863e6ab6e3f64de889ba174a0431096c932
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b