Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 18:47
Static task
static1
Behavioral task
behavioral1
Sample
d03abf3505e4d2a88da5fc2c3ce65ee5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d03abf3505e4d2a88da5fc2c3ce65ee5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d03abf3505e4d2a88da5fc2c3ce65ee5_JaffaCakes118.html
-
Size
3KB
-
MD5
d03abf3505e4d2a88da5fc2c3ce65ee5
-
SHA1
6b9839001558e34023b66d1ba11eb171732c761f
-
SHA256
50e57db5f504d8f63da61f485298169499df290e70840ae55e80d21bd8bc99ae
-
SHA512
5583e1bada4b3d740f44ab078489173d6c86357c45fb9a203d0b36c3c908b8ad6947fc75abb24b8ff6fc20d8b272adfb5d69f4e23d879cc5718c96658b8f58f7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431810296" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000bfe745a49113dbac94c7dbaa439ccbbfd8bd02abb7cc76a7bae7a0a177c0b37e000000000e8000000002000020000000e53f4b6195133c921951e23397bb0b5b62a87ad3662acf0cbae0e7d6b407918d200000003d5f13b27058ef055718af88ff123ab1e70caa4bc36f558966274d27b96bc23440000000d244029d665f6f10f729a8eb9fb6f254a37afe9085760dcd078810ceba393b4b878fc490c54db26a9be07fd9ae69e594eb5510f713adb1db2d47d51b876ea1db iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90a307418d00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6AABA431-6C80-11EF-9452-E2BC28E7E786} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2072 2480 iexplore.exe 30 PID 2480 wrote to memory of 2072 2480 iexplore.exe 30 PID 2480 wrote to memory of 2072 2480 iexplore.exe 30 PID 2480 wrote to memory of 2072 2480 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d03abf3505e4d2a88da5fc2c3ce65ee5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5762cfbd1ba364ab25929abe6223b7143
SHA110b24b472da1c50a097d3c473ad900a1d481eb89
SHA256430ca34fd59c533561f75be8763e87cdc739522d4ad7d63e825a6646ba627412
SHA5120425791153804f90364ee3adb44162e19ad7a1aa05e9b24f21cc351df980a3a0bbb739a4ea549dc54485238a98ad4c7dd556f96afbf96a94648a20357ab9ef34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fa76e856185575544265d19abd4c8b1
SHA1ed5eafd217e544848d27b09253fb48caf30ea1d9
SHA256dbbf8a399d1025be1025b7e3eaf72c56f286d072065d515edfd32e81d3913c37
SHA512237170d974914da11f96b5c9c1e8ab86d6909bed8cb353279cfd203bcae180c4417cfff73883d4a0f103eb0b40b4a2b0534263742346b8004bcdd1e51797cf38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ad1ff22dc15f5b1d5297fe5a7a3386b
SHA1db582e18f191aa63e40c873a853ce1bf62e88c18
SHA25678a810ce5d4a20edf761f7eb8011107719fff71f0f312dc4600131ec330284b7
SHA51212e9ca216cf8b545a001e23a40d05c2f22c66d6b82fdf4fad7c57727e064d24d1f0a2aade528b44e56a350e9bc1a64887ee467286f268882de9fe705f0f8c3ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef9ca3db6e97263e61cc2a806a03cbab
SHA1a8b4d46ec8db32c7156f2edf24546f7b529e749b
SHA2567c3f081ba3f64f869e22e083d82e60d8ff92fd7e32549830ac02e31e4cd1f430
SHA5129af5bf35fea34096a4cfb5fabaceed4734b24d0f3e912f54932ba0d515d24880cca5f9a6b700b588eee9f0465e8bee3fdd4360dfeac65cff1e90892b2d59fa6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50535942d28cadb608e66fadcc7dc4add
SHA16fd91e660d8b039d0b76eb755b10fd0cecbd2e71
SHA2566f5a96f1049fb0269f4cccf6a7a4483fa5053a5adb6a6967f93ed6b8d1200a75
SHA5124e3147858ed376cee84ba054c9f6bad6776eeb2f48d54814258f6bda5b68d537002933f64371fe434d91e981e14516cc3f56b7aa14d96c66626905a92600ad3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ea0cdf6d18d77d8fe61a4ad419c45fe
SHA1bca8f1ec59af1b73a7c8c1c4c32c4b994ba6bf54
SHA25670f0d3c6d8eabff0bb20d0e5b5b282bf013cbb27805827f4a2604140553201b2
SHA512ca7e610ecddf6860a8117c29cdd8b310587117a3431349d76a2c20e568d18d8297d20a80032c5f6f66d0e587c9b14681b8e15ad1ad81c83d3154b8998811ff9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7dc25a2ca509f443f412696e5238699
SHA1655c10f470df6f830d329460b98b2ddd4ccb0d60
SHA25670cbef35112719e90a69bd7183ec3428e0c27a346299a40214443b15c4f0e158
SHA5127b0bb803e23c3d0a365da6f360cb4a0d4a62c53a6326379b0400a769fc945db715b3e03a02b1a3c7afac206b6e4982bb6c4be5d76783473cf2f8462c6dc0f2a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4437e882f7d189a2e2d6c96e6f46d1a
SHA1f53b144c81f04ccac58ff36aeb55b3c043d5b59c
SHA256db205e95624d25ad3d08be146d375a25400876c3dee8c560c78cdc7b5d8bcc09
SHA5122d3d91bbbfea788544fed6cbd03330ee60e9fbc5cd68005c86d7d6ec7f677b4a5ac5a2a703366dc22e53c121b1a38165c0161e42afe975dae229d10d95101492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aae1fb56cf86cbfbdc44b857d90acd3
SHA13d05adc4db00a352f38b92018b4a3849bf04a201
SHA2567cbb2757b46e88d09dea488145323666b862752c62a07824bd976a7721a47e74
SHA51214ce2857091a06bded0844b49cb028bec800d5c5769929ff68bd5b775472be705f09d6440ec5641bf16ea90ff1f4e201ed23b9dfb4a59db583a03c06a10fd314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5163670d6c7058615710b0fdb68631d7e
SHA1d2f66c36bdd1a8c0f9741f7b4ddd94dd9671c93b
SHA2562b98d7229950d1e747864a750eae16aabf4af9021db381966cfbac2696576dc3
SHA51216d822bcd47bdf3f701451f4535f2ddb95fa7a34121e4ca252eabed1657e15d1094b851a5938d5a7d334138791cc703bd35915cfe986a14407625c991db8cfc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cda0cf9a23eae4e9793351bf325e9ccb
SHA1359cda689d1a26ae95eeca40945202bb60b35603
SHA2561ba9bba61245057149a546b9c867ebe2dd664cb48532b8c0a44edfc6430837cb
SHA5129d64d87a814b6a5907ad98eec9a08b5e3b5c91bfef299539c159bd0d8f2cb6820e4dddf13ccdbdc9046af1adc47d8a6f1edd1355540732661808a99e6bc807e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fe6e555d8a85145230f1c1075a1af47
SHA1950f094fbaa286d1249e1df735f9129886317bf2
SHA256d61ca8183623948e10ba618bb0136e63b29cf9a0887a730137c3efeea333f8d0
SHA512f6e284ee0016060f8fe610523b8fe4328a68603d7de8ed6b28c23a22a35cb06031de1951c3a5edc892a237cdd440b8d8e411355aa4e7a51ff73d19406830190a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea4f20c0adac8869afb8621df1ae1d52
SHA1765f32a3d648b4cb595e9a41eafa2f46a2baa543
SHA2563f1ed944571634d9babae9adaa790f81c625b9db5f16a1be5b75d47932768a27
SHA512a958027a32da17b513540856675343f210aeb9afcd6b7cc916c5f5fb11bba8e950033e06b3640bad7c671753f8adbaa6ecfd9f708d2c74fe247eae6172a72094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529c1ad1e0ddbff69cdc800ad25d50348
SHA128391a7ae33e437f0cabd1263caef0060bf0d8d0
SHA2561ae113d384f38c73311e6748c59859fdaede3cb764b95cfa7c3e70e7cc844542
SHA512b5f71839384335cd2132b71b621070a1ea2b1f0ffd8b61109d54d7c4f5bc5ddfd97f7b03b24eba54541102c5d8f88921e393c399e00f016b5fc28cce01c88adf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560f0f0d08863ab2c26eeeffb02292a54
SHA198e5e2de9fb9d9fbfaac8b4ce7170a642613290e
SHA2568b25cb292f7805527486c3f1bae8a26b752b900bb2bfcf15abdfd908f9577938
SHA512896e5bf0990bc88f303b99ddb3900ff680810f7fd0a3900775cef7c79018a580989050efe60d2047741d94a88d90749aeda4de9dd5e75a21e5d12bab6f72de09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ed900f5348a3e0886b164b299abf50e
SHA176de70a56feb902b0d59b586af86a1185e9eb88b
SHA2562ea1bc071363243867c27aab8e66cccd73f6bd32aff1d7d1cb8d6b623ea596c3
SHA5124fa2f19b34590c64aa8ee1e2ef440348eb76213ae1128bb6d29c255d93eb112248f13cca2d85c36430a2dcfacd6ecfcd8aa0a16c10e06fb9c99a43888f23e8f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8fc176566731a18425e7fe3c8cbfdd8
SHA1e85b005485c48ea4473c309786d593ca68c0e0a8
SHA2560c8d4d14e5e5e713954e1234175a35cf0debf29dd801f658e686e6ac458571d4
SHA5122d73954375388c79ad927f5f1caa6b3ab4f9e9388568c0c425c4c888570051d256bfaaa5828aafecd6b2e0213df574a7d2dff43b5421578ed9663ba08c06b02a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dcff039bc5e9933c15d3e6f00564220
SHA1ef88bcf0c9ec12a5a98085db21cfb4b7a77785b3
SHA2563ab138a6721a0ebf08d6ad2287111399ec1eb29b298addc2473d1177f1918d32
SHA5126d27113dd07fcdc4e93ab4dca9ebd6dfdf81b7d271323752ff89a777e5d37e5f630b75e01e3ef0b66a249d25a87f4a447d530bf4da7fb039aaa8df973939779c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b