Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 08:04
Static task
static1
Behavioral task
behavioral1
Sample
cf1187408bdc9be2ac114d821c734369_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf1187408bdc9be2ac114d821c734369_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf1187408bdc9be2ac114d821c734369_JaffaCakes118.html
-
Size
37KB
-
MD5
cf1187408bdc9be2ac114d821c734369
-
SHA1
718cc445a44438bcd4e992a6b4b86e14330e61cc
-
SHA256
8443953bbdc036c2d965c60ae3e39ae23b846e96ffc3d9ec0d403896a7dae042
-
SHA512
c9a9a3e6cd8327f6ce9ba5523137700e9fe6bc4731c1f219a0ecf432ec2840997cf6570fd9920a81e2e3ec2992256c04771a969f290b94fbae20cb3fe08ef9b8
-
SSDEEP
192:RtrWule6t5bElPDTFztyp3VFklQyHUCoZGhQhKiOMFt8lx/rKGNKKCEFsKKKK4F1:R5vM85KR237NCl0exJ50KkkMW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431771729" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000007372f3163adb1db37f48fb2ccdd9e7418bb50d3eb372c1d87b22c9e9a2822bf4000000000e8000000002000020000000e7f91df725f59c9745ed487c54f4e2bf50e00a33c4c069afaec997319fcf136e20000000854d05f31749987bf6c62f1fb92187d6e65ba9a3fd8377784dd5ddda4816835f40000000e2172be9c4d992165e58a5f87f119b7899561eb01f63736ed48aba20f41fc8cab5882392ae85cece82d14c07e0485163416043d0e44fbc41240d92156e055730 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0209671-6C26-11EF-B56E-465533733A50} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20ae418f3300db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE 1740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 1740 3056 iexplore.exe 30 PID 3056 wrote to memory of 1740 3056 iexplore.exe 30 PID 3056 wrote to memory of 1740 3056 iexplore.exe 30 PID 3056 wrote to memory of 1740 3056 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf1187408bdc9be2ac114d821c734369_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f59dc16120e3f312e64e8f7b9567b15
SHA126cbdb05eaab5a8a6b9a9d415624d80dba511411
SHA256e14c08a47f920f18a73349760053ea065899bf1a001d5879a328d7420069af60
SHA512099698f8309768002fc19cb4fc5cee1fa36857089daf35708f09c973627a36857a2bd4ecb4382d663b9249a131aff39becc6f8d8bfc20281e3edab535d9386ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5ecc2c089e322ac349ab920a23325a0
SHA10be825f0e8e91b8565c4f37f000d65c15f257f1f
SHA256a58e3dfcee96e09027306efcf0d562e274fc69ae13683ea1be584b39ce61489d
SHA512c9eef56ffa33b055921492b495543118b4bec44b5dc1c269cf55d908754abaefb828bfc510b8d3b35159125fe3fee9854597fb9ed209ee2918bc6768c5a0a7fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558ec222b80c84babbd2952fbe114dc47
SHA12379537d0e5abf6670ff619bd1cf50279887c55c
SHA2566a3ea176f83143cc378edd654307f54fcd3c0e21a7b685204066f84ec71a27b0
SHA5125aaee2e30914e2322570e43b9eeb9656d5251111a7d515701d6558780b559c73b2a58d1bf93cb2c47191ecf7221b8c18bf6aacb2885c26880e14ca2302bf2205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563003960bca6ced8dc32ed256d8867f3
SHA1c925b42f878dc4599d242dfb023cc4480f33f6dc
SHA25680674f4d1207aa0b32f8136cfaae207854331504f70c6696e5867033fc9871a5
SHA512571802c8164f2fee589f02bbf69bc93f5d5bd0dae66f15bc2bf1e8f46a08af46d32b26b5548ceaf49dbc06033dea9dd8c73d8bd86d62627251e87aa0a8deb338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513a0552dee0a629691455f500d9c1042
SHA1ed1d4241f82658c8f1d1439803d9b29810ecd103
SHA25677d28efc9b4f30b8daa613da14f7847097c9d5ccc8f55bcc6833205fd80b2f2b
SHA512d870c6e29a98c40ef12a1160bbd7b4ec352b0b161a7df867148d14d9a94958335fa8b1a48a3f9ea37e46cc515919deeb3bff7f6ebcd1c569ed2340da1093c43e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8cfa417b0cc99341ad5a618e8099bb3
SHA1741e40ef77cb3a0c01568af867e59c8108512a99
SHA2562b0a3cfed06490c0ed05c3aad269849d1646517cc45581afac1e954d36cc83de
SHA512634eb3ca3b9528099bcf3c2302fbe35b4135b38bbf53e868747d8e07d1bcd18b70f0653334518541ebd5fc574e77ad7c98b6f5a40bd7dd58964dfcfe82b5d0da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eb4638211f3fb4e4b2c52eccc994af5
SHA12473089ec97316d7be86f1195057478671306031
SHA256fbca542c0bc5e17ea44cf290ef0415b0cb30431f64e1c3b3fca142799870c54c
SHA5121d4eb6899dab2a86f040be97afd9c500f8ece8043eacc9564325471f4e504874519aaf4080d2a9b161818203ea700dc3a193cccca47bb63b3f63d3103fbc760c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535d76769f99dfffec63ed1d6ded070f6
SHA113a8ceb1d257b408b6deb93547fef45d3633ba9a
SHA2561db53513d86b8d2ed7588098c334a048321a91f312c85222a93506db4b6f4e93
SHA5126aab2a37cb060773d978689c646a966cf7b8fecdd37f0f5927e559b5939c0ee29425e10a13f7f648db0f2699fb86828f3c77a9e254cbc0887d4ba313bf326a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5169e40dc86e03b746dc827c25a43081f
SHA1c314a351782b75783bf1b8299af1ec44c34ca799
SHA256dc82e552725c25d929d99b9064b77f27eef72869ffd75966e54484af84bb68ff
SHA51231891c87e064a0e24f35a75b4b39d21594feae763a82a38b7c4f9b4ed85f2ccdf5d2eedc9e72cd2a686db4e9de66c316f73a8483736b692b0ad67e5da7ba74c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae33a0595bb577ddb65b1bf0d1368c81
SHA134dab92a2b3c11d453396106466d81c94458c0ae
SHA256fe507d24bcda298027d2ca6cc09f27ca60f6167fd5768f1ae3f54db3da6e8f73
SHA512eb48a07c456a7eb7d183ae1d999f50a31d87e5dbbf6ed9dd9026112778b27431d70be61896c9f575f107e4672b26f1a55cba93d20f4123f085ca008238dc3b39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55efbe792696bf2ccd9025611fc913d65
SHA18a5fdb893cc2eca985cca1e8ba90a53c9fad2bed
SHA256f14f3954679df1f6c70aab6365e09763d1a93b33f43e8fad9328e7cc4189d7dd
SHA512f606707007abf02cda7a7c69c5ce916633cd7529cd43927e13bb699f1dfce41899027591bae99792ec34cfb9475a1afe216aa455ddb0142538cd4e88da1cbefd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516fda57016e23933815284deb8692d71
SHA1ba7ecd9b9542a90a278fc326721f717d72a8a959
SHA256ba6d68ee6614b0b3e6faa9bbb609836fecbdbd4165bc11e9ca694e66605385d2
SHA5126fe2646ef08b41a6b0625461cec7742871f8f51c0b9ef7ab3156e94861e9e098d14ac18252487fdb79c1812f9d6e4c84b755627ac96592503d77eb8ee20531af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5b4f9e06ac76c61a3668279404ebdbe
SHA19b8e8c609faddfac4ac71d720591bd01368e36ac
SHA256dc95f5fb71f82faff90165ccdc0d8030679c2a2b1462094a9a73db0e2eec98c4
SHA5128d11ffbf861004f7fb9c341b585e1ac32f1e7cebc8fe3abc4838ed4e5a4041ceec5295ec68dba76de9cfa5a02226b6319b99afb13320d433050edb933a82a294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5446438fc30fab786d43438738b723687
SHA135d2a567f5dbfbf4b41216b4b225cf18988caae4
SHA25684c373c066549e53ef9aa79d4d5e88a4c4de656688c81e93a94b4b8452653985
SHA5126f44af4aaf89657846bba649ce70cbb89f1e9caf393ce309f540a89cb3bdf0df6f19e09bb8801181d7dca5cd4592e64fcaba313b30d852e5f4275477b2ef21ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aec519c7d899f2181b349c961b91bcc
SHA100d781481004819feb75842c2a6bd74261fdaef7
SHA2560fb6243be5a0fd12a361d30eb03a73d1599078cdc1ca626e4108726a271610c9
SHA512e1a978f0aec7af4f46a9e4ac032a68769189983018f748abe2f74a7435716e0384118c1f6beb9d1996dd99c6a0c609493b002c418e7e261a38dcb40e32aa67fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567fc5d56734af20a5037b7266f06aaad
SHA1d95c7c6fd98acc90c5633a845cd0b22dd92fa53b
SHA2561859fd0b2d8e6276da2a847ab595397726c5ae14f5025c918f12c0ec21504c4b
SHA51204fdad728ac36836ffcf902bc70928a3fed0a300d449a21164db356d54d22b6348062c0949ee2d94d7789aec6f1ff22568705145d6f5fd0f60c268c344c3e104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5acada81bb3e9d76f5e4148327add17
SHA1325a429e90bbb7109d9f75ef8fd75dae626ff6a8
SHA256061fb5d4e85190ee66830ab005c5eb00daeecd3f92cd1c5eb78b29012d12478a
SHA51242c19993f0970f3a29dd78466f6e065c1748b007262a236812df2088ae0a516622162b3469897e75d3f9e19aef2d5d829ac9b745e97ee3182acce93cbda560e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d093c417f6ff102e6cff6d4da264f494
SHA1190283850e373ef3fb10205844b192141c92e841
SHA25687abe573b0cf1d42a0ce927846bed1fbce528b378000dcd1782bc5a0bc9e2862
SHA512fda97afe0551d0972c2d8b472ca18a7cbe073dacc21f11c6a203c2edbeb40a077b83b0a646321fa6a5ecdb73c5f23e1d443a5e06875ee8909b9108e890c840a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b5bfe9034e34f72a7c5c1bb44a93d8d
SHA1b75802f46d9c528b336d8c9c9b43782f9cf485c9
SHA2569ef5efac1e7ee5bede825135c41d5595ed7e49d537fc6fbafdf784fd60d391d7
SHA512c4a1ae838f5ab85d624326fb4af14cac1cdb2ab0241c7423c1b5ec2a816d5b6277b2281566880e7462671e23f1569ea1b56f057cb07cbdd79952b34ca3f7d317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547d0be79da80f4664df567b212d90383
SHA1344cf9f6d5085d542e1ffde698ae3b1d9992b88c
SHA2568814fe0ccd2c705a23e966e23154dedd938fba93533137bff44028c92eec6de8
SHA5121fd5e3e66318a902d7ddf88bc243fac70f89c845853f698217dafe9c944661b175417d3480e6db65352e5bd57153fd2260b21b5db50e1021c520d98a8f1c8438
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b