Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
d03f7971fb2c5a05522e93f3d10bd1e9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d03f7971fb2c5a05522e93f3d10bd1e9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d03f7971fb2c5a05522e93f3d10bd1e9_JaffaCakes118.html
-
Size
73KB
-
MD5
d03f7971fb2c5a05522e93f3d10bd1e9
-
SHA1
4ed595f29232ec1e4ce60eedff84639f38452c5f
-
SHA256
30e7371ee5771c3209ef7c41a2da90f23f90338117aaed2ea0500a24fdf66da3
-
SHA512
fe65dceaef211b7f5060d0937adb65b7143871ec116b35964ba0ea19c6bbd3842ea39dcd3ed09b620120c9397e7926a3f26329149c4967a8b665670be15819f3
-
SSDEEP
1536:NXcohAgphcHHgmnCviHv5JTW31pX6phgbkCSHuJDg:NXDy3T5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000069b0b8f3f663d28dd40104f635f30c20764f0a3a309aa22921be7a01bf031af3000000000e8000000002000020000000626c206e8a9f3b9f74093031e552220f9b410b9172c943ae2c4b0e6cb3fc420f200000000079194996b21cf96759f8067197b61239f111ebcee3ae1fa226ac843c921625400000005b75a875c2c221fed45422dda41aac586e9b732c0aaa1d18a9196f0799ffe203c1d0ebb7c8abb90fd18602dd9ddfb40670c549ea4762fc1df88ca1fd2539744c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5422321-6C81-11EF-AF60-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f084dcc98e00db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431810957" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2692 2344 iexplore.exe 30 PID 2344 wrote to memory of 2692 2344 iexplore.exe 30 PID 2344 wrote to memory of 2692 2344 iexplore.exe 30 PID 2344 wrote to memory of 2692 2344 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d03f7971fb2c5a05522e93f3d10bd1e9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7640008ed7cbb7888483d5a39554f9f
SHA1594b8c540e71a7914e9fc40d59169f0335c61b5f
SHA2564e75e377e720a67d34d55e035fa1558e88cff0e0919e199244dec208c3c7a0e9
SHA5129e7895d4daa4155e2dd7877df100dfafba0d302af14bb9800430b3f87ba0f691d55c84feea3420fe3a2578f6aa841907eb0982b8a3c4d513745970696e3ba4f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3e0fca67f617d9a894598289a676b65
SHA13a2826720a7834b45b65b0f508b8d3e8d9d7e8bb
SHA2568101647fdd76d58ffa2ba6b0adcfa44d682650e2dda614f806c3496f3aacf496
SHA5127bb1fa14f8ae70a6feaf15431bea33dbcc6e528880485959e6b3e6a51f19c895def5797d1a5d663c61aad73f4d00cb7f250099d608024143b5220b49597a321a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b77ad0bc60c03885ab437ae07333df8
SHA12c724ae319846229d07181f350b859916886f7f2
SHA256e6f24c309b2a9ec4369f12927f4b68b7a7e1826b04efb22ee61e22db79ec9627
SHA512c1c81b5204ddf8dc028b008bd3da62b6400fde07a6ea51d579db5894c4736839c536135a13c9d8310fdd97a67275b84bb37f8e3016c39db1cb75ff9be1fcdcf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593141fbf911691be690bfe4dbf8a2064
SHA1dc67e305079c577564ee99236723aff6fa22b2b3
SHA256af5d6c24ad8d53eac3c39e922178a073f6eb43814aa82c4946843e95b5e616f1
SHA512c5dd2cc41ae885a1a3d8ed33103da25dc699547c31c2d6d16088cb836ce0751b89222c278ce1f81750feaf75ac18c05ac77438354f9c62276c786c8568e133b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580957fc454614c232699710e1e305f8e
SHA157d1fda62a1465b6306b073682c3c99b0c49f2d5
SHA256bc18a8da954cf72da438accb2a6e2139c9aea699ff47630a3bef5cf43575ae23
SHA5121be92211bf1e168ef79597b802c3c9c512e2c78523fe8bb402fdb64ac2ec8e027b7123d35d9959a6374f7baaf96e65f14c9af9be8e17c99ae283f38b092d65eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5228b432b0399ad47cd7153ba25ee2345
SHA1400775963224458532c1d6f829a2dae3315c36a3
SHA25682c4661410ab7b05782f4369972fad9ec8a883d8cb639e3e7499a5de278ff43b
SHA51299534e014dbc7a9cdeede96078845b7254c5be6505fb06bffb3160713827e227300af4e0cc1fbfe0fbf03de729dcf7a21deaa9aa6ff4c66256ca0138186020c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54af2058e021294fdd99407db87dc695d
SHA12a2bd7da0f5e329f7860ec79690f4d87c5392f34
SHA25673ea70e73eb19f00ba062c6ec5e10f2f267b1c85f05725ec79eb6632b66300fc
SHA51208d678edfd562a4cb50e787ed405c82af8f6f2c34feecc4b8636d09ef33c144b6d629c72ccc1332827dee17ceb59bf40f826e2b677d33ec6cf9aebea83938541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fa98f38ca3948da91359d59b8a60873
SHA1ee74c5fe40fd04a63f8bf7c5eb043443804834e4
SHA256e3fd34eb93ff256208334b3b14ab7df0e327eaa72f240e8bd57ca7a22a6c1b70
SHA512fffd6d80852e6e3c2bab13f78ec26229a019eeff976cbf42e7948f3b1f7cc9896953fa0a76535bbd018b9b6b065111833575e866e9883d8f8d4950606150a484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2c38136775a364a2d3b6bb57e73bf14
SHA16d447f0e5f36fb15ae8fb3b8d9cbe4f21134fa68
SHA2562ddf260f051711a7be4a6d82fc5e114a5dcc03b28543b45ccbe6586994cbfb8f
SHA51284441fd1b60fe7d4e5adf0bbbf846b153d5f8215ff6769bbccd4263a77d73c44e652779d4ac706175925aa3fd53ef54ae1a1445a1764b9e45c9ad32d384c38fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adcc9e103224c3208516120aa6211c4b
SHA134a6be0e07a36cb159c39250f46c89b607c8c6a0
SHA2560b0405076f1e24fd82d4609ebafa530de7d832371c735ba25c25be064cdb4887
SHA51267c1838678b9edf7c0ef9f0e5cf539985941982e1a103274c1aac0037a3071fea5a002e34f2835ac23e1be4d26070ac2de9a6e760322ea6744de310f85fcbbd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec28c298f0bb8c2f76d094e1120471f9
SHA17da678c5f4db3f07de42b1a3671ebbae0f1f53c0
SHA2564d73c60dacaab519ce3ee5eae4bb261b583f945e37e2f1e92265d50455839439
SHA5129a795c8b6624f80cde7fe3056b8947a2be0c57d58c8c73fc2c1b1a38923ea8386642f2d454601d4715031cb2da31203022a55b45edc6e7ca9efbd12280ab9e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9e078734ccff094b61a35da87681044
SHA194a827fd3d12ef1ac4bd0c426d1107594e3efb8a
SHA256ef01fb3cfbe16cfc58739b4fcab6a96267ad68c2805312feea641d8d5c320ce2
SHA512fd762a6678699abf142424d705daa2c1d7ba3606acc524d5f5857f9051a299e23adc9590b4a02ffc054822bb67434d82e3ed8c812717b5196a2d55a6ce84f7cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8a5411e21640f0613e403f949dcaf64
SHA17acffd64d5e3a0181eb31b6ddc489ce91f30b0fa
SHA2561efa650167530cc8b290b09a58f9e83ec1d9085720e0aee18db3ae2d854cc40c
SHA512621c594036c95efbded49ebe8b2de02065b9b3d5f4ee3a03a4d591132d0609bb42f677a2de58930e95b31a7a020d55a443b9220b6338094d8f09dd407fc8b2e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54501135932eda404fefc69bb4607f5df
SHA1ad5fb622334e622ce510577e7a7ccf478382c775
SHA256cd3fed1e46d19d435207f72ba78a4e83050a0b38d56b167c896ba41de675c039
SHA51274f4e7ed52963e14c3ab16e989d3055fe10f35c34c8b22b1497f1a3e35a6f1b7d10085455bc2bf2d29c3683e2e1ad84abaa3d74fe9d04f1a219131cf88f8a43e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a0fe324905dae1cdbc73de01b2eb1ba
SHA1a6e8bb29872bc95bb192824d2ca8469bea85d48d
SHA2562f42b698968467d7ef44518dc055f793d0a7df4a33a8d272ce1ed33aafd950f6
SHA512204ff40c6e1a68b58bd7907b528f04aa6880353760562447f70c84717c90b4a1672c0f96a8d8740f22f8b5e32b652987440a8f38e653d0f352f2c4c77ce9ca6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501c2dc69f1634db0773f3e209e1df45d
SHA1ef1a44c9b80a5cb9d4d8202b358fc8fc5ac63a0e
SHA256ce67e835cd56f2272988dc887a34d1368df5a5367685e386aab65a37e8a931a5
SHA5120b5c842f9f167f7ecb4ffcc79c666c9d9753227c9facb5c2cabd177e062934deddc44611d275b51803ea15e141db42e003c9807d80459b00e21fadbe6c32784c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aafc432b92e5186d98f72ca6b5ddc8d1
SHA1dd8c436c30befa7c2d79064cf5b222f6da02dbe2
SHA2565b0acd1e76c91b9c33d2f55cfe8cd0a83534740da71aedf4c56de095e73bbd73
SHA5120552cdc3dcab65887c46d0664d82b8473611b68db1fdfd4fb3beb3a2c884637a8d267e38d7663dd7021f9f0c2fb03f1822639359558d9c3362976730498e0ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5272a19edd35cc37a2bddfb51c1686a3b
SHA1434064a579766bda22b006b10083a4c1eabf5674
SHA2560f1e52b043dc28fe83d88824b9d741d0878c7e29eb80a89e380f125c53bceb67
SHA512f902277ad1f74be0427a19ada6645a57b89972904fc001bcdf1fc62a076deb46effe7b5b8eb63e2c3b119ddb0f065228d1ac7098f5c2f218fe5ccb77d3387324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5252e8543deb5d0e7811c3648f9c867af
SHA10c35559cf682dc2b36bf9d2b66bb5015af643db3
SHA2568758f7c7dfb289c82edfd60d52633e239606395cabd5f609a57af3fedebc7907
SHA512aedd788778d8664bcb1409daa6190d8d673d1064f1a7442477cf5a4486f138a3c7d826cc2131595d9b4081dbda4ca5b3cd322fb8c73a65e428d85170d2925705
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b