Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 00:20
Static task
static1
Behavioral task
behavioral1
Sample
d0b6bb566056dc1efead6f2998579397_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0b6bb566056dc1efead6f2998579397_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d0b6bb566056dc1efead6f2998579397_JaffaCakes118.html
-
Size
144KB
-
MD5
d0b6bb566056dc1efead6f2998579397
-
SHA1
035dd34949c2996f1ebbf1e3eecbb17b2277ea99
-
SHA256
87bd9300ce9c5c266688538799e3e149b9c6f388d34ad7f4ce228575bba7845f
-
SHA512
a2d5da7febe113d8361445ec220afa4c6c3e4cd14cd2b660028701f3a9cd6aef563c156c27ad67aa1917a098ded786e52a412c641f7c7e883bcbd9242facc4e2
-
SSDEEP
1536:ZsPuhuTIpeWw5A+rUmXI8QG4ZgsU8SoOfC+Ae9DncUFliNsIlmds78vgwYjIB3Tp:ZsPuhuTIpEN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 007e76eabb00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F1FEE591-6CAE-11EF-8595-E61828AB23DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431830280" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000a7beb0cd73925303bf1fc64f114db05daa1a1773fa4cb3cdc04c75413600b415000000000e80000000020000200000008c02e888c8e07fd0ff79863c67bff9daa0a63e154374482056173889b8c3134320000000127b41793d933edc5eb6c9748fc4d794549c06b12c92252cbd891a22479ef61340000000d55b71c682c2814edeb7b7f56c477d19bef577d0db82e0d3a779663bfb81a9cb889533cf2cf49ef52178b266539ee755b800d04a5f36b347df39894ef7625bbc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2772 2104 iexplore.exe 29 PID 2104 wrote to memory of 2772 2104 iexplore.exe 29 PID 2104 wrote to memory of 2772 2104 iexplore.exe 29 PID 2104 wrote to memory of 2772 2104 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d0b6bb566056dc1efead6f2998579397_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cae3653daf8d72ad72737c04766e4cb7
SHA1966f5e20402832f1674f7561e018699bdf94aa8f
SHA256ad9869efe749b860c6fe15c03961d102286a57b4fc7ef7fe6e618ddd747085f9
SHA512a1ac15f539b9b359d9e7858ef5dbb3a650c5e100deb7be7d966ff83fe8529df9589fbb03ec67dd5018058050ff35fde917987c153535d00bbc856b18bdf1b8f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58376a0ea6edbccab4fe712a60631eafb
SHA1055a34d2ccdc919a948bf10f20376811d353dcb3
SHA25640a55785fd60b1a21cb0c4cbe39d8849e609abafd28d7cfbcae76d5ade77d7f6
SHA512425294fa891ec36aa0191aedec230781d44ecb014526c98416fd2c98d98401d6877633fb6023d828f9c02115b6aaeb2f5f034842e614919754153a5800a964cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d5a43427e66ef432ad4cbf10ed299ae
SHA12e30372ed1716651c7247e94772842d48bf7db1d
SHA256feefbd9c577d00a56646b7ccedd9d4ad02c5b2da9332e419427766d6de3e5ca3
SHA5124e58822134932fe99012ba206f28ff9e8bbc54665c3ce38cc3437aef975838b9dc24362f080659763ab34a6e32352622954d2688ac4627936921be9dfa4a148a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0de722ceb41bfb186da76a094a5afd0
SHA113721c421cc11988a949e38c3172304ca67de83b
SHA25602e70a76fe6b8c6873850e3b429367ed9f4dfa5652b892e6c776ec2c639de018
SHA5128b171110a3b14ccca58b031ed881ddf7acebae71d46ebd409c55290a00a7a273746f95fefc40a67c3a2a1dc952743524773b010db02622a3ecc65b07c7b805ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5484c065a7fa95dd326c7cba4d9917f12
SHA13fd473142024a0f7f8fe7b2fc6654c3ff617f6e3
SHA256edd7c342ca44d27ed1ba4c4b3020d09ed5243e19713596380ce1395e63ca55b0
SHA51258c777efde3bf93e5aab25918ad2978b3334f5840d808879240a0349b8ce79c8839d845dc530b9fda432fb108e4c09e73eef0c8ed4403aceb7e3db2771a50673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcc79c3f446651e8ec9adaaa11ea8a93
SHA1c37d23fea7828507561856e7f7c6a67da8737b74
SHA2565c9dcb0bf21b2eb5ff9515f8dd587c5533613f4687f41f76e5f5e58fba3e0870
SHA5121e00a49403076ceda1463a96570677b9a71004bf4e38c6236fd8840e663ffc70b6fc3ec04b91ba3cf4571ec706b1cc28db2daa1fbcfb2647f2c98ce72c9e8f35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57373f1ce83cae07524ad6c01a5a6aca7
SHA12f99daede08b177bf1b76a3d897f09650f4c9a7b
SHA2567e05d0d28fb9c2947fcc8d8ea951fdbba4eb8417a2384e0be91d9593705535d0
SHA512a46e8cbef1abb676ca925ff244bb6584c752c8488cd58427166a54953d03f7f688a2c22c627b955dfae79b140ee2543aaa995f58885af73a5ad736ae765a5146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b045213bce6fe1d90119715b16cee614
SHA11bfeef6077c1352a7dcb419add86d7a6a1b5d653
SHA2560d88a4d80087db4ed2210d79a3201ae2905c830131b2de5239ae6f8c7513e4d1
SHA512984a70a83e8a6145b562c6d07b5b2a38aaecfe1c356a713a8e09a4c5b6c7e33b7d94917a5afc682234032383d70d88c3408c4a0a10f4d59745af03c680c2c1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5aabc4575005027d7c548e722aa9fba
SHA189854c1680ff3f5f643a6dc0a67ec4eee2dffd07
SHA2564f484c789409f988841df86f3f2f8f8b740021298a9bbfe7f3b34b043f5b80b6
SHA5123f1b5602ead621330a56cd4e1347925b43df274453d53ece03c6b4c66d9f971d8a25ad3116401b31f756a5c73ef85dd9dd246af86d31e62f04d8f7ff6ddcb2e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539930d7c1a92269bdbf194626f1fd16f
SHA12032297eae489a657233a3d3c23d7d40b1f0329f
SHA256d43237646502372d9fcb917d520feb02e8d4c2a9117e0001f3ab25fd1581790d
SHA51202fda740f9e53af16bbf7fb7fe6a3ba41bd519fe5a50970aa882172ee85ba0265f0046b9f56750827683e35a5f35c3463ea8819b52d956eed97feb240995bb01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c706a44c75c0bc365da9965acf2278a3
SHA1b7faefa2512114f5d0fcfeb1a9a0ce67d5f54ef8
SHA2565cfa47ff225c32f6d28ae9ed4f406665bea256d195a10c963d63bd01f89080bf
SHA5122043a01c602ff129013e40d914eae80c9215ddce63679c34d922966d79cd30c031f4850fa92805a5bc88cf4c02f6023d9a71c827f520413c1f3004ccb0ecf580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5adbe7ce2a7a765c7a02d109beeb93e
SHA1a07c1e7373408bce7800b92f89b5d1acdd9c05bc
SHA256d56af579b5391d1ce32c0084d8577b7c529e9d3659a9e8213509aa773415f72a
SHA51215fa24c1fba8be5b6361316a137b7ee166dc5eb81494728430613084d4449efb958ca1f2e5fd738278a060660af7165fe7278ad236012959473c809816ac512d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5311b516ef496a6ef46daf12cf86f7612
SHA1101f9162071d6f0e8a8d00e0fcfe395f271ce995
SHA256d72cec5109775ad7c203eb717520eb6084caf73ff623b16e1d3c395c3b9f6bdc
SHA512fcbcd660c7f415deb3eb1c8989152e4feaec087779c8ded3e267f78fc15adf94d396907f836e380780d7ea788dfdbeb103aaa8d1c9826dabc20d7bfaa96955c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503ed4d6bb0194aa5f92e04717721877e
SHA10d0a561cceeeec4d2e5bf6155da575d516f7d3a4
SHA256f6700b08c51ec1d0f07622bb10176903e951923ccfe3d0f5042a64179d9d960a
SHA512f543f39cb12bc2ecc457a442a49d941f8a0a8a30b398e234586014723a788ced523fcaf452ce69a392c2b357ff4731d0455b24a62f1c0ab46450ef6b65291252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50539a7eda5649369c9d612c2921a2911
SHA15a93caeb7c977262ff328b9dea2625739a4c4a4f
SHA256379c42284268fc1043f274628b0893dc445ead9c94567676c02b6b1764d39313
SHA512a464199f20d2c02f30a014cab92e7ca1037c11e1023171e510ab78a3f213f8f70ec7af9a1046c1fefe2d987b214c04932c23a5b988e4b1e9cef445b61b103602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd73cc7d636a0f65c36f2ae36e28e897
SHA1d3264145d4a266cd8c3dbb5636078e94bbde7808
SHA256ff623726dfa648d78540416a86ad3392aae4fbe4d9fdef66a061c6ef492fecdc
SHA5122f951f97364fc791e872c351cd4ffa0c2a4b03485ce170ffc76675405bed6fecbdb0df60381e78789b8f6061e77a4f4547f0757bb67852aeb436c71b9fcc0ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5120730bcb4573f8ce2751bada9b17212
SHA1d3602ed61806de326e128dee4678f93f59884024
SHA256cfff4c65bc69af8ee227581141d7577692b4728491a4d8ebf77eb394070c7ee9
SHA51256b373bd44415afaaea92f97398a72c9d16bfd98af5f1926a9be77e4c35e10661ecd2abf7f05573271df090309a06839028e8fdebe63e0960f76c93127fe4e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ae8eb6c938bc299eacb9bae57cae853
SHA14587c3ec7b3fc98a19deecc874679eed0f5c2c18
SHA2567e5bf7ef7488c74a083f3ebfdf0eee448488209c6206d7b394bcd0b8b75abd0a
SHA512048754e82a1596466a09a24942d2f8b9aed3935951b24c811acfcf5e26ab48eccb6fe0007e31a517040dc46219b99e7199a520067c5434128f8c77f643eacd9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9bbdf72415d1333affd891c2647d2ef
SHA1673b6cd66a195cba9c802aa9b6735d1d5ea258be
SHA2566b38b88dd55933f73fbab2bc1177904abdfac1ddf760035cc815624232aa8a7d
SHA512f7dca4edecf75cd6b43b7e9b1b170aa36dd3e3bc2a64cafecb5e9202b3b4cde381038a2a7c89245306240a345471e9a21b6fec668f3943afc8558f5d8b793f96
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b