Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 19:14
Static task
static1
Behavioral task
behavioral1
Sample
d047268304f34f4a77c828ba03179055_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d047268304f34f4a77c828ba03179055_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d047268304f34f4a77c828ba03179055_JaffaCakes118.html
-
Size
53KB
-
MD5
d047268304f34f4a77c828ba03179055
-
SHA1
e2520b5e4e22cce54b7b6da48cb4292b5672dd4f
-
SHA256
9848cf89b2a641ed7907a9a3909e2821cc4984286c8e3d8a888ee0f4b951e519
-
SHA512
a60aff9a904f5de91b4857949868ff5b93db026896802edf1ffe39df40e8eb3470f89b6dc4e57517e88188cd32357b40c0f33f2c7381890dfead4ebc363627b8
-
SSDEEP
1536:CkgUiIakTqGivi+PyUcrunlYo63Nj+q5VyvR0w2AzTICbbDo9/t9M/dNwIUTDmD8:CkgUiIakTqGivi+PyUcrunlYo63Nj+qp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f095a81c9100db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431811954" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46348281-6C84-11EF-8FDB-C28ADB222BBA} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000005dd875f91fba435409be96e85202274005f9f6b718b7ddb752b6f304323b4ef7000000000e8000000002000020000000b057b930fe18f8c86346778ceaee194f1b365105db8de175ef5975813d7d9a3d20000000cb310de3ad57f1b7b71cc3d73920fd777ff59b238bb62d07eba8cf0bd2688a9840000000e680cd50395ccf1ada62e3a4a3f3f57805ebfa8d317dd743053e51767aba2395c9901d9264f8a4ad2c3dee59fb26389c1ff0cba8f92ff65a5b0c4815db55cdf1 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1568 iexplore.exe 1568 iexplore.exe 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1568 wrote to memory of 1808 1568 iexplore.exe 29 PID 1568 wrote to memory of 1808 1568 iexplore.exe 29 PID 1568 wrote to memory of 1808 1568 iexplore.exe 29 PID 1568 wrote to memory of 1808 1568 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d047268304f34f4a77c828ba03179055_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1568 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f58f797385c9350e82b12dc4097f4900
SHA1085ee22e6a43b64f5723040bc9b48919bac0d0dd
SHA25603ecf3675c0c8f51f03fbdef0c17ce44feaa4f7670d3c3c770992b5993e1afea
SHA5125fc4cbeca87e003b11c1cdd653e51d47a6914a398f93c64aa5fa3891762bc24b63ef0d358f38949007e0c6b5527a41bf3563d6aa050c779eb841fba8d53ea415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5190b1eac1fd5650081dd3d2019590534
SHA1cea9dadb4681bf2e2a805a050493a2bcbe81f045
SHA256aa3e007579d5121263e7e7b0d873ef53e51825ee6c5e6553b081384393c9d0a6
SHA5120a72980f545e7d0051e216ce9aca3e55f18310770d3f19dcf70f399a760902477ee63e61eace40113cdc4ccb82421c3225399933ecb563bf9b653745b21537a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5588b49e4bfc97ba39c5886cc44bad79f
SHA18bbc4c543f7231c83281b3a07445209ac214045c
SHA25628a8c64beb118c0fafa147b4524a798de14c74be16562e70ce4a943e8e0025df
SHA5129cba1c75e2ccac2b9575c38b87cd35f7f8b7b1ef0d9b28b2162a16e73ce357badd7d0cf0d783e84ee8422a22d1d81eb4744827618f57045f954a0131fbfaaf4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570324e3b4d6144dce09cb82975107b11
SHA15eba25dbe39e3dad895dfc77af70f28219023e6d
SHA2564a6af8a635fb20f06aac510726d63942beea78208a4f34ad2220217018266e31
SHA5126afc6b9b73fd24b5c81948e1289574e48ec95c204fbaff12e57d5edf6f37ee525e6cb5cdc72f650a173eea722155656205044d1172f782de7e163348f7cbe5e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507d759fcd491f6115a3afd9aaf651d0a
SHA11db1b6eac8d0ad817a27535308d21617543e4b46
SHA256e61dae3bcdbb86c02c6c5734f2a2c8e4d2f58093f69bbc99bd45d4e1776a942d
SHA512b201f878673e13e71dfd3795567b477ae3f41eef9bae31d152a8c6d0b5f1515708a2be5a8a88872fa9b154534efe08d93d128a668f9243e5438039df30f8cfee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d4f5f39fc47a3f904a7daa571214263
SHA17efeaa30632e2f8b2eb07456b8a12e661f03e4dd
SHA256d7ef76500739aa1dba3fe4f6338f9003335cd08bcedc90ab1e5708b0a4c4d5ce
SHA5128692e6cfc40dc6ce8c7d09c53c93657aa88f81d0bb9bf209b2447cea014d21de4728d2e5d374ec1b5c7c9ee42adf89dffe19b949885df9cdcd78a08dbcd65b60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50020102ea62524f04b76070b2d8a5b18
SHA125eeb31b4303add67f1666343db79b8784a95309
SHA25607190fcec3039c9776a73da5fed202da2b568fe6d9c3f837fa4b505bbce8884b
SHA5120cfb80c2a84cbd8a9cc236b7610a05f4351fc0153a3d6656e3569e9f1769e6e2e9b2eaa44d83c8d63d0fc145e8b6eeeb2a335c249e70a9123c721f08a58c80f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566d35b7d3419b17ffe124f25ed3569c5
SHA129857eec9bd868c60d642e74991d00f07d0cacee
SHA256f36acdf9e8381e550f2022795487fbc15f00539410de87df1991963d10bba8e9
SHA512f4c71773f8eb07178c68fbfb397c3e1c612454e64aec13cea28a0eff9018cde8897ae56a3e2caa926c2b92f58676b40f6a2ea103fe6b4c793ab1cf0a204787c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fc66508296f63ca3b53abfb5783ccc9
SHA104ed601047cd6e8deef3ddc5581a294c231f466e
SHA2564cc115dfad6e37f57e5615084aa3b880d0d1d2e94ad10fe2507e9900a7e2790c
SHA51226fd3e819f2ffa8ec5157e09c06ceaac3f0c507b5e482e4a73828e2b614bb63c95f659ac2e37849d91f879829b06b4ce7f927b172fefca97e7dd99323a592405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b078ed5e00779eece16a7f1d994cb27
SHA1cceaed19a0dc295de438967480178292c449e546
SHA256cc20c2593623aa475886360df95948ed13bcd3dfc7f96592eadeec7536cb8939
SHA512586bcb34dfbc69b750619891a5871fa4e171bb77a7b3f0bdd9641f784c5f3ca09d2a4740f79a4b95c5014e06fab3a8e50ffe40c8f79faabbbd7df5e2ddc23bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5969cd552f96c02d68a7158aea9aac661
SHA1c3012e9f0a4de51a9b56d9dd41829b8db7e61e63
SHA2563bc3fe8c61216dcdd348d1d250ebf012177157afd1a64d30c111c1f7eba8361c
SHA512406cdb92d6fa1bff7119a84629b11d8c956ac258a1dd18f8567867d3818368dcaf309b2dbbc328184ea15c674fcd202a3daaeff23c256b583b63251aab447c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557c27278ed3ccd362438ca0ba20219da
SHA1213402323013bd046cd98319fc2ca24d90eb2c70
SHA25625ec835a342125e031311c6d6b2c4e147c3ef2cf7537dc7b1f6a32c1cff47654
SHA512fae32ea868bb83d23242c067057bd7306ce8fa7d6f2538b14fee292f1cf1da48f0621ead719f1d17097dc0997cefc1a5090242b4085f0f2e9ab63c6775b49160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527054e35bcf742ef54e4a66cfdd29fbc
SHA156bda4e5fc146734fb5305b17b8d5b2a5cbdee18
SHA256aeecd748c4aa1a57e1b18e1f7261e121c6a02528dfed5a5df7c4c8059ebd3669
SHA512e63d1290c31e9c174ba57718ddf3da500bf62c0822ac9d25bc01158b8453feb13778e137ea5db0bba76a1e92870453730d5d494e36bfcb33edd613268baeb7f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a754e2f3e5f75a3eb3ad3b294310185
SHA11b11f709f0369615ca2010a4e0252558e57435c4
SHA256c3f1f5fa04dc62eb421e5d77614d059021e2861d20b2fdd67531a3b0edf7f7a6
SHA512e960a2bd3f91c03d10d96103d28c60e9b30a005fc64281051ead5290e1662414a64d3552601d57445ac7868b82f032d9d7b694ba02239d10562e4a89a58c2c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea497119e01dd09a2532b5ff4611529f
SHA1eb6d97700ab53e5092819d803ea5efa8a60a8e18
SHA256a78c545fdcd40e6085ff694f6ef3ac003b9d11da428842a34b98dceb79b33e40
SHA51270a0ec14e5e4e8a6ef0b44f21a86ed165fed8731e43943bf104d3f9cbee399db17c33b5254aec9c80239766669c6dac24fe68171003a57898e3a2716d197aea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580b04dfa1f9cfff3934352a700c9c434
SHA16f980cc7616a50aabb8750a4e4b93f88e9eed53d
SHA256130c90b38d136422c38fec0fc212c2026e13510019ec81bbcf5667173ec5f8c3
SHA512a30554393b9cd2ca57df28bd2b0e355bf5013b4353367d0aa254cf5c5de520c9d3988add8a854ab46527708d96398349fbfff0729eb2ae139d9acd667fea50fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd9859971dba9b2cc157d8da8bbecfb8
SHA1d2c4e386650e5d9ad75d91d40d3569316ee7d307
SHA256e0abcbfe304238661c7765cd922cb7e5874dba76119fa78bfaef7463841230b6
SHA51237bbe96d6bc897495c45fec238b46e26deece8315c559e403c5011fe7924813bc110e87bedfc74ae7db6b1484f4d7a91237891a6cb69b4343b168cd58d3efd2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e5cad1a3e133b33aa798801f91a7d58
SHA12f11c35d91013aaf6f6b76fce99075bbe0e7a516
SHA2569f8ff37787b4ac43955ac9a08012f33f861f1163804dddde1a384afb7ed7b331
SHA512d554cde20d04f5a5b95bbb332cdaea1b58dac1cfd37fa0e99bd335d30a62c48ae4b2f220ea1e9a5ffe54a1ee37bde5da7ad9206e16b82b8cd35854cf39728d5e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56KJ964X\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b