Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 00:15
Static task
static1
Behavioral task
behavioral1
Sample
841d2bc47cd3ae729b1badd937c39ab4_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
841d2bc47cd3ae729b1badd937c39ab4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
841d2bc47cd3ae729b1badd937c39ab4_JaffaCakes118.html
-
Size
39KB
-
MD5
841d2bc47cd3ae729b1badd937c39ab4
-
SHA1
f6404054a7ede6c35336e4052cac6ce3d81f777f
-
SHA256
de539c241692aee1e81c0499cb59e05be5dc3f58b2cd693fb37a67df10f7ffdf
-
SHA512
e7c081d598e98aef3d08791048339778eef632d29207fa7d4a07efb82cb7173187c35d72fc86125ee843a5b70d2068ab15dc514f44ad7516cf42f3b37a12d8a3
-
SSDEEP
768:SVUFwev7wN5jM87zDYXKjJRGeovgvX5jLfJASmhhfnPyEwP577Rk6UnlaHRRRuRQ:SVUFwevetzYAR5fvXZ/cldsHRk3nlmDF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d99090000000002000000000010660000000100002000000025c567cd2e927235953a18eafb48d50680ae91f6207d82b0d6e91c0744edca3e000000000e8000000002000020000000e84c00cfc8e47f6d1b4f1e75c2a06ae0c7655c933565a3d4457fe2e458b6553d20000000a33fbff93521df6377fb974da7651047fb85fa29199707b210a45b90c1fd3077400000009c92af2f195ab4bbca937f5401e837674b8737d86c11acd9bd995d657aa1f6c77349e24a69077e776f0012255ac0df9778e8f833759f819fa5fe96c727dfad58 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80fa0d91baeada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A2DB2AD1-56AD-11EF-A5CE-F62146527E3B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429410791" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1240 iexplore.exe 1240 iexplore.exe 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1240 wrote to memory of 2864 1240 iexplore.exe 30 PID 1240 wrote to memory of 2864 1240 iexplore.exe 30 PID 1240 wrote to memory of 2864 1240 iexplore.exe 30 PID 1240 wrote to memory of 2864 1240 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\841d2bc47cd3ae729b1badd937c39ab4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1240 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550411f5ed291fb163bfee658a454f3d1
SHA1e814416706a18b78131b6651e30b339c632d7a18
SHA256fa3f31272fccbddf3e71abaa46dd624d6686bc6cb9c3b3ea76a0c6c7d6cc3d05
SHA51218f1ce1e333c7aae4246ae830a29c6eccac86db8bbc32c597f6c553f555673cd89ea96be81db8b343f1ff2ec546a63c0d51444bdae828bb9b24b22112b62dcff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511bc0bfa5d2a365bd7600580884ee42c
SHA12a03a7aa43fa89f8300a8c3874e219fea5895895
SHA256240bf120419ba32e0f8d47d623fb55a848895c97375fcb51ee3d650e75223c83
SHA5127f31cc9e179466609f6262c9080950f665c51553a6e4d18d56497da80d6b68d36e2c18ad11cfff555cfe32352534f7b7c991dfccd3699df2bdc4a5302e7a6ff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9e595a943c135ca6b176796070b8f44
SHA1ff77f155642385941f107954b5fc30a4722218ca
SHA25627bea8d61d0077d0ffd23a021cea4bd100c1a9cb1d629d9624a8cb466676ccb3
SHA512ebc66cb23051b294ae1dbf6df38377bcae090fff312af50479c85aaeb278fccf286b1e5bc29be769d5953aad4d33cec7cc649858d9a855fe61e1e8e78b05592e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ad5a90d3d42437f131bdfe3e4f6392f
SHA14eee88945c3e83b8d613294890d03f2bbe920bb3
SHA2565f0be66cca7e9b3f4cadd897480d483be67c45dabfd954978ff956f06b304ba9
SHA512a1f247f6e0db89ec07f36da3fc75626e812998fd498508cf4a82439abc89129a96c9217e2bbc5cac4adb3f0b0ede06159f97cc4a556f0c6a8da8ab42e113d399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e240dada84a71c59d47cc82da21b5e72
SHA12b7e8acae1d7da07af90616cce96eb194c2e720c
SHA2563ca8ec8b0c09fb6aaee75fac7ecbdbde114a30698990393c8de14ec3c3d29e20
SHA51283643c4b76442f896cb67c274567b40c22c66b533675e446df2623b56c2f11e37c2b285b1832ff6ad8dde1e57716762cc106cd4b82bdab0a44831e29f8156aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594045ddcdca1caded284ecd81576ba71
SHA1335d6d32128c416d9b6d47128b11c9091b3199b1
SHA2563f028c55efab29943737790abaecd416ae314f1d088867450b885ad365b72ce8
SHA5128b54e706e6ef40f44cd3839ff5ac649209b8872ad0c332948e7e12c673ce7434fd885223cf83b1bb042a56b57153a4be9801e7f86f54d3ea82c8f1a81447ec3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff61158bba670a4dee3774f4ebbb8fcc
SHA1b3e3c045c733dae7a3ebe91c6c2a7220d0d7cb2e
SHA2560bcabdb19166bb404ad655b5eec5fcb333b9c054f3f149933c465bc9a313ea26
SHA5122fb5d60aff39155574799d03d89a213787f2c6aeb8af9f7d661629d061f656774b625c88a0346ff749f95c29c3cde439a3c81dd72f9ad9e112b2cd1ecfc60114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adfbb78164da247c9f63d016c08886f9
SHA1440f758c26970bf79318310be1ab31e96ffa7494
SHA256ec164d79d00f20418d57758ad95ec0e549a651498bd64b6dc8483e3a1acd16af
SHA512ec349b0a5c4c7b3dacac9fc1fcaa317eccd6018846cf8f30f41ef447ab9fa69ef7c8b68c79a459f15c74d433a810229c1285a8209b84f9687e66c9944b42d95d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa0173b9a622dca60133773b6acd38fc
SHA152346893cdb04aa09fd8c9a0999f596d32251a3b
SHA256a42a4a2bc5a086ccd4e66e6919238dcaf370e9fee74e68a407cbc3a7ce29f61e
SHA51269d9bf8f97d78b6c53d8cf7785c26be78cf52a4ccfb810b3d98db297483e41f15df66abb1b366efe756ceef9cbd0eec291f099b3671989f40b1c40ce7bce133d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548e9202fd46a020242c9834a246bb325
SHA1be2b56e5a7b4e119ca9279636172604b195e3d04
SHA256a98de93f936ff9296053da1d06fadfc800c002d202fd24565a19dfc99f45df37
SHA51284fba8578b42cc356bd982e164a045ada0589d9447c03fb82f42ccd4766d931ee61bea3bd0aa1f327f5e1ef92f80c69fdce6e7a03814df9efe2201c5d6ca5381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4e55f5e2d4924e505e9b49c4261dee1
SHA16cf3813376715737d851991ee966093bf77a0e95
SHA25641b9cf58380f990c63b13105379ad945e767ee6c0d567b6744697597e542271d
SHA51276f7a6aaba5ba376ba73ebf533947fc8fdcc0da4b06596a7ba3c1910f4a81be54fc45517f7d199ac2885efe0b8fcd89068e024e5d7b6b7fd6d0e6406d4db84d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e1bf6da6903ff1d9356e82ac951bc10
SHA1fa19d4262143c5194aead6ac1c6014c48f8a27e5
SHA25614051545e7befe9aed355addf83bf9599d9dd47c4b657b9938432ce4e85531ea
SHA51242fad86c6e030ef009d4a8fe6729689ea4d4f863624fdf34a86ab8c5ae5560aa08b2833cb1ca26444d467ff362f511ca1673ff50ec3434d0fc41a3c766023238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5581d1c60afad81b9a2efc4025ecd13df
SHA10e02f55397d868bf2e5326a94478a3b163beba06
SHA2561b55397f31e20fb29456489c7ea0c2920ec556856a7dd3a9f97d22fdfaa9ea55
SHA512ea165cab720445fddf98814bdc9d34fb99587d37361d0632552a0e036668dd46e49ce1db44ac5392982ee7c8ed4809d540774566c0f282c96125a7ffa8798859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac3c674856939446dddf5a6b75340ab1
SHA155a02c186fa05d6ca09907a8b2163d4ba40fbb25
SHA256cac1f00fddf243928d043738accae4b8e9b8d0c6d7489c203b99d43e0feb0742
SHA5125421de52beab346d867b1d7f09cf1b513a9c0212316b9d99ede5b9daa5b1568b2e82de2d14940fea2fe9d7f8d1bbef2a68179c73bf6face21596e2f5dcad907b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cee4138b0ea6d5ef14d669ff09eda9a
SHA1689d22eaedf264f07f0b1fc6277525b18e2d9d3c
SHA2562ec072b9847de295ff79b3de550f2e8b36bacc57002b254f9fa10897c47e312a
SHA512e82335f53ada7c0051700cc060f4f029fe7888a9d06fe3e979cc6b856ccb27fe954ee6b272ac5540ac71aebbe7b92b4c7c6b92a31639fd57c0e67c49d81a1387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc0a19a5796e53fd37a0773556966144
SHA1aec6f096341e5933eef71c941133b6339966e553
SHA2566cece465c4da2c44018f8cb25e8a6a0df0e965d9b1479d7ed9de8ee2a6ae1398
SHA5125330bf6e481929edd59686405a5933ff5b459fc9aac1a92fd844606fccaa26f569af7cc29424c0dbc3764133e40db478c725158864188cdbaa760b480642a2ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50746f3c7eb89dc2c96b587b9b47c89b5
SHA18f0b09256951a368320f40a7b95b37cb938206a9
SHA256adacfe1ea5c0ec708504a9bb980cab5bd0d6e8e36786028193cd7f6b63fc691e
SHA512f1054be6a53abe5983017c43a68b900fa26a6f6812ddbc10cd7d2e0ce404f7236c7065e9a565fc67fe37c35267c74c26ca84b1a52185b5a13ef87d0f97739a91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5094539a77bb0181f30f01fc20ae19b6a
SHA18eaa527ef3990c0dd6baed5c6984b472f263172b
SHA256373362038c000a1006c1a573c90de197c6d8593396fe595c0dbbd5246a29418e
SHA512a71c5b9f316e3ae5cf38143a85191c2555b047a61e276dc4a176ea6ed3cd0ef201307027cff6fc455d51c4cec401bc26882e88ab40db7b77e9d258e051a34c0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db0411190d94b02c58a1e77e43b475a9
SHA1bdff0fede534a34114cf1c0dc4c45b6c234b2e76
SHA2569c4ed582ddcd78e25698dc3bb2781f8f0f6f526fcb11253a63743960e6beb79d
SHA512dfc81c0dbeaa49cb41ae08d04ea85afe31b09ed79ea534547dc0183852fce90830b5e1ef0a338893d33125690a2e63488d258f09351e834a6562970121998293
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b