Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 23:24
Static task
static1
Behavioral task
behavioral1
Sample
d0a37525854955b0d73917ff2bcaa816_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0a37525854955b0d73917ff2bcaa816_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d0a37525854955b0d73917ff2bcaa816_JaffaCakes118.html
-
Size
121KB
-
MD5
d0a37525854955b0d73917ff2bcaa816
-
SHA1
86d658b9ed2d615d0ed6783783429d84fa672c52
-
SHA256
431afa1d206ac427d1237e6eece4b5ae5560639f7b827ce11ba2c1a89c280d99
-
SHA512
ce313097e38b6570e078d71368086a1da7100af9840a462a2752ea44c789b7a89851fbf0051193aa566d43a7cc5fc09bdf61dfdf5e60cd270c82e412c1387d9a
-
SSDEEP
768:ex5ySh9mATWvu9ShkFvKx+okUwTuXjvPEVo4LAwPcjQm1F608chdhu2UY7zC:efD2CShkFSuyAvxPcku6Hmu2f7zC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431826951" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6079d023b400db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{326F4D21-6CA7-11EF-9F4F-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000098bed00def9ab8e770b5bc6650b6929d48304edb5da7eea5b30616c3b4bc9ea6000000000e80000000020000200000002090cebdc38c16124fa3a150294e43dacbaa804f2c1a79cc48ee44d99324f373200000009e56f32d7ce61c2378902f930d84f9b23fd3216299d1c819a8ad6d5d1178fda14000000090473cb4e5a6a196eae696f589ad51b4c04a39be6f1a76829b31e813c21d0a9bd3a6be566a991a484947bb90b570447ad555d3b5919812f399d5676b8c0447d4 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1620 iexplore.exe 1620 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 3060 1620 iexplore.exe 30 PID 1620 wrote to memory of 3060 1620 iexplore.exe 30 PID 1620 wrote to memory of 3060 1620 iexplore.exe 30 PID 1620 wrote to memory of 3060 1620 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d0a37525854955b0d73917ff2bcaa816_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51658748e4158e752d2271b6bd8c2f857
SHA1b54196105c3b062e64e15403bb6a9855599a1951
SHA2560c7dc86e7b50978973efac10074279d6d7f860303ef9b0cc4157262b1e50de4e
SHA51213ff861093f8bc324c6fb0379d15ce984717d67d62f477e79c2a8999a305c9913a75d0733490a33f95053ebf64ae5a557c26d8d7f221c7d21e2990366958c1ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a521a1b13270a230456ec0596cf35b73
SHA1dea11a7390e1e60e359ad4133781043cbf39880c
SHA256edb28f30cd48958588eb5a1987fd5d23a2372d349e33789d65d77e04ea8e9f04
SHA51243393e793a820e92357e2c2d0b0d9a66fdc02e86e4ad285482846140593227b299532299c7516bea25abf4b876f6aa32d8bff9e90774ecf14578b627ee92a361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd8372af53bb0423128f25a614c52339
SHA1cca27ae832a4dd19ab27a78958f0db45fb6a5a18
SHA256f49c47a7a6c752d5cd486043e22d8981fcbacc2da0dac9ac46a64873a2712836
SHA51211e151c0f96a973e1219fe352eeb9d33c924166a869ce227f4de98047504417720231da59af2caa7d52872800cc37a95433a213e9522f071119739f7c0e57204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e2a4d434726411d11cfd675c22c0d36
SHA15303bd470d4cd785ea38a4a6d553335655b73d3a
SHA25658b4e4dea8ba24183a6381f5109e0e2516cc95783db208d590dc98a94d395604
SHA5122c07a5a84c6e6c218b9563ff94615e5c4e263f5789c5c870724e881ea9ee2d58e0c69abd61bb672bdafba6059f2fe68d1ffcf31c449ad7ba28bd467e5c770293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baa1d1a2c6cc9cd4a4735cd4a88db539
SHA17f2ba2d25c6e5a7b38e0451dcabb24e126af54bb
SHA2564304beb252bcf87c7dd5874aaa5822c8dcbd84e02a3c1e33d65e1632702c3772
SHA51279dab9f024f4e1daca23996a63243b7e1c43a452ad4038aa5897f3ccb1049126f5d2c794a6abe0961f000379257755f8d44c8c491304c67d750f93a501fb8b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f330ff48e47aa278788675f404bf0a2
SHA166967a2ed90272c137d246c76f3610d02061dc7b
SHA2560c0d8c198edaadd3c4b351e2a058ff1a4884b52f3f0d50e3f8525cf6cb686aac
SHA512a3b4ea947e53f698b38fd26ccc7bd947955d57cc13f0127322a61c8f87065d572fea4b3e5edc2fc28d9ddba3fff64167ed89e715d19a321aff6acff250fa57a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dee86ac4b176515344e717816206af58
SHA14285ce27198d8e04f2bf128b9cb001656a5efdd3
SHA256cd39c4a27547932fc2d69800f97a13863762af88b7d79a7d86f53c10bbbde26f
SHA512c0d933a9577aa1be0f3a22f32f84aaf2ae732587d896ef4bf907242386fd3bca5ad7de7490b5ada4f2d453ddb6efb125311cf041a82a6ae674059a49c2a0411c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58572046f955e6f3fa09d6be2c36523b8
SHA1d87457f434aa081ff7562bbcc0e5b494583bdbe6
SHA25616df29686ed76378797f0bbea7e74c9153d0b0e260d7157ebff3a25fb4e16f24
SHA512a5751d7b5313f97415c304c2b93cffb17ac7a3055d25c2947c7bdc234adbb8ba50ff4332f92f22248b8978e5e7c76776a2a965f8d511ca828a3691b810540e47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e7f95174e9694c8e181686f6eb800ab
SHA1ba199c1e3c4e47dcb29b8051b0ff49af6c0378c9
SHA256dd0fe45cb3eec0d1eec7d18856ace6b421e4a79012dbc6a24d2d0bb02d81c5a9
SHA5121745f143e8f0a6aedea1e9d7132ef267570d879457380ce5f0d1f713ad201bf2399087a33d2af4fcbe3430d010c9d42d037e5cf6698adbd36e59ac800909300f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b62d57d91603a3ea87eda6025d16907
SHA16df07a6ad45583a3ceb93f6a508c20d0a37cba6a
SHA256956a7a4ea3c265c982a945439aff16016dd93704385283f06fbe3d75b47e1fb8
SHA512205d5375fe2deb34f15ac20866c5edbb02dfdb01cc64daa08fbdd3e6b7bbb125b0bac073c001ab1458c13a531e4fbf8f6f944e6ab713bdb39aa927069f7ac14b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e80898a46dd574863e0b2d8c988790c
SHA1a478459f9c98c5e95d0af11ff6d75c60a7a72812
SHA2565573957112642155c280e069d2d504b4d5d9bebad4c2f4aa8c78368594c0a64c
SHA5129c80017b2238bdfcb2a1fc2d039aa33bba2d70855830971f1feed67246e4c133c5a11a340a6cc81305a6ed10f4f2998fcfc54d68105cbe300b8b4350b8b6958c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c17043557873234ab385a460f282c3d
SHA191f04d9e887c6cec2864f24c286907e9a80be23b
SHA256b3fde1e02badf7934db9721ae15417ea81be97eeab5757d0460c62ed1b707a09
SHA51211e555f8de8adac78b56c379a98f711ad4bae862905d90b19b1f3f48ccb6ee32e1d6fd159f1703a3cce0ebd7080f0e20b8a56c2940e55477ba4d738269afa7ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeb89356baddaf980ad2e6d5a6db217f
SHA1b709c36f0dc1187128471b6374af031364c77298
SHA2563dcaf9684f14c9d02f94f778de7b1adcd2d822aa65aa9b42d91b178b61108702
SHA512eaf8c7c6c22fe40b1b68cdca9f7204255fedaae3233e59355a6101e6304efaff552476ac9a54234da311d3bdd4cf7d375ac3106c7255f94fb13cf90d0a82bffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e2d2a0c378bec264d75483a04e4c234
SHA1c39f126bf3582b1107ef526a18b1a56c307553d6
SHA256ad4673f52aa845881f226419f47ff02241fe3bfe2d7cb17cafc32abe3f7d74a8
SHA5124f14c7129a52f6ab3b1ea6c1dd38c2e93e5b834f9952e60e4e1217082a84d270d1ecd3dc9f00a8715c7e44831f8c76521a97c271353dae17959dc36c56dd26d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5380298c28473eaf3ee3d7e31178eca8c
SHA11ef81e0a031ed3c5d4badd24cf7526ae4489bfbc
SHA256d8a73d6869997bb8782226228a2563029336e33f0550409c3f1cf7b7a5c58a83
SHA512d83b5f6d62afb08f9e442e84d4f391f706fbc0c7e82c81c7491b2a284d831fab5391282e14c99e7ca141df3dd9bba827ca94897e1a9883de9611794b3818bd2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ae93c0fd7baba57b55979c085497c99
SHA138025bbbd9a3799e8e9f87b8a102ef1670d195ab
SHA2568ffdb720366023773e44f33aa29f2f0252651d0f5dc25291a9836a6fdeaa33d3
SHA512e4152b82bf0ee684a41b249e69b7ff58cf11720710296f48b7766b64483fb229eee7abc7cbe942d19262d719f099dc7af24230eedd317cd2a130fd0105646978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a685bc1c4f226dda1290f2b1d982000
SHA12f5ceffaa2e0c401620a3eb67a1ba7d3057298ed
SHA256f4de3040d0eff08d903907703860fdf9586c4aa41dc744d51ce3f2b3f85643cd
SHA512234f6b730f5e51ac30824fa7359ca20c1a6f628f52f72672c3fbd04e538c0c28abe07325e71fcb63d03e516a14d55e22047bd65663a99a873d13fd09b0570c1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524561acfb3e2e54a8263c5690d3e6e6a
SHA10b977195a45d535d66c660cd12ca36ffd2532b99
SHA256d0d957c3ac68670d911439e9a26f65a6ec24f584c173ee87a9eb7e0619db51ff
SHA5122e1407643d682e704b2dce7378d5ba2cf60f2dde1813c5bcf753a661d166931d9aaca58eb8d23825e527009c48b3cb3c26d1b6ec3d4f9f462ced31135a00ebeb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b