Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
d0ed2076ae533b799d286e252e51007c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0ed2076ae533b799d286e252e51007c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d0ed2076ae533b799d286e252e51007c_JaffaCakes118.html
-
Size
1KB
-
MD5
d0ed2076ae533b799d286e252e51007c
-
SHA1
b50f2daebabd0adcffe1bfc1d789cd5ac84bca1c
-
SHA256
1ec6f5b114400ee3051ceece107f22214336245ae27797653b6b249983d692b0
-
SHA512
961c8db71eeabeeae54747da461c4e95f3b7c1d198e45daf1bae8d3d756a9cc64a5a62d4aea4abd5debfb45bc245a11d71c832731b6f97653762abf249be050a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6CDE2B81-6CC4-11EF-A7B7-7ED3796B1EC0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431839507" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000fe4ce76488802deb63251b008b24007235f98d30e2275b65abf99f1717e55b61000000000e8000000002000020000000f74a546d4a5b409f3b7884377e660b51bf678d4da2ffc18167df9ac13e47201420000000c21c616a0a607fd97856e9856af7b35457d473a4fa3dc60dc984be71e21bc14e400000006e07bca049b2522f60d34f3bb06e9dd39be08fd6d66b049c9a9d06bc575f0b7d1f20f382ea0c5a67a81bf9d359a2f93a0743e2782cac3b997e0d3c9c8d0e9957 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10e68750d100db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000009b3e46327a0a2d1c79e5db379c124f3a2668f8233ca21afa8687391bc3234b5b000000000e80000000020000200000005808071621d054ebdbb3dedaf100e0ee10d4a7cb92d7b161d0c16402cac70f49900000004a29fb1abab7e488e0bb0c29efb901bdb510f73407b90c13d5129c2d846b08bfe81ecea5bf624d9361faad3c5ade70faa0340860ed103a0a25f88ef70965d10a43c9bf6a17808cbb3060b7b3cc15484b05e757c6619f59bbfaa0fb652ac7b800f18957a8c17ec6f1cecb71245d489a049b8df46bc57ab29f428abd4ccc33d43295d2e49badcc8f4e1831f845d3592f9540000000aa0e960ebeee39e782b4a3f0c1fb6c3bf31bdefa2bd654d4e9698dbe96b95c168f4b89db5c479ae10073e56d7480b3afa84881c2df658399905b4f0fff63e917 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2488 iexplore.exe 2488 iexplore.exe 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 1628 2488 iexplore.exe 30 PID 2488 wrote to memory of 1628 2488 iexplore.exe 30 PID 2488 wrote to memory of 1628 2488 iexplore.exe 30 PID 2488 wrote to memory of 1628 2488 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d0ed2076ae533b799d286e252e51007c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55074684a05c1c8ba173f2e64f3d57c3d
SHA1590e0e7ecebf9ee0f7653be7f347119f326392ef
SHA2561fc5a2d7424d338775ecea4f1b19ee224eaf1c26ad8362c92ab0ecd0c6fd352c
SHA512a3f0a14cd91f2e8fe25cfbf947c1d3c5829bbee0a2292a85596a7238417217f31e3637b40343a257a0f9ec1ccff79e4e10f8829f55d05059bb5e3ca691e6feca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c43ab5498ddb66e007c9ee7cb4abaed
SHA118c952f16dc333b6ffb2bc581e5e67ace15253c7
SHA2568203f6f4edf3d02cc0500abeef333d571146856e8e6fc79fc09cc9673ccb9f88
SHA51220a94b045c37d35c8595a566d49d867981a71406269fdcd78b6867e40e5741ce71be16c213de87417094e724b9ce594ad950c65d0aedc6de0e3ea562416db147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fed1d9448648ac929be9578951bca11b
SHA19dc64dbd1d3d585150891ed20ab35ff1f3d8fb88
SHA2569b2f634e13727a5716ab5e01fdcb6de99895a2716d5730d7a171b27d4e001025
SHA512651ac6d901901fd822852a7b8a0dc4d21aa89bbb04fc00b71943f556f90e7cf90b90394d1ce75f1959dd1a65b435b7f9fbce93f1688a35a9e32abfa99833f43a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5ca10550018b5fc4546397a726c8021
SHA1e6427e914858d3b7ec709237f1ced8b73197b5d3
SHA25652ff4d6c90f5e60b5fd6b271b59a95337a3f10e1a4a484e9a5bac8763319c7cb
SHA512b623710f84d98497ff9cfa013939c52c9ff7f1fd491f8a82068cec29ce23652164ffe8f85d7425ef94ef09745b4e74267c9b0c7b3c9da5c6667e65fd69b85606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55abb63e19cb764e1a90f16b851c3d57b
SHA124806fe1563a6a6678a20142d94ec20a4400d5fe
SHA2566eff1d2af5600aa3a727bc87fae44ce73fda25dbd8413fc5b0a31f398b1ec2b2
SHA5122b2ce861405eb2c7b55bf984bf630bfa2ad88aad5e027dab3514f439d3f9441b7218ab7b829ad475c7b86c6f782381c1cd86b5b30a0c0f04d59f434cb9eca9b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd0cc820f777a964d17f4536ddfbbdc4
SHA1c25715592af1a5d0ca67c1b6fcddf40ae65f70bb
SHA25686b64ee6696c23efbd5570294012812546c5f3489e1d18bbd84f54eb094f799e
SHA5121eaa6d78f82321ce7bf98258d8fa9bd8f8b945eeec2ad6e5a72f742a1953e73dbe7f49763de9f9bfcacafef66d0b0f6027f18f015cd632c6804a8112f24d6d51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee29f49885cf2c4256b181842e8e5263
SHA1584886b5f622dc4d69d8a75f6c5bb7f9903ed17f
SHA2565d053b5bc047bc072b661dbfb6b638a7f8e0cd8e0309773eb57a50f9f4f19443
SHA512481b6ce9781ca2b9db26b73cb787c4c43a1e47b8d75fc59d14843837c843b3f8ad019faa3acc433509bb9956c5ad223fe743d66f44085989da0abc8714c10707
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cea340e73a32a6119f7cf1bd2ef6f76
SHA124ebf1d28f98aa57c7a2bb56c987b205edb36303
SHA256be6e9418ab9f2f6c6790a0789cd866056065bf536572c91dee3bfbc598edc508
SHA51215794bef1522389f41b73008c224edad906f29b717f8cb394283460dfb0fc58021a8bd7843f7be943eebfdff8ba5d970c44ee769db8f2e2227c6db253d3540ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fdbfcde38a07af1985630fcfa25f670
SHA1942b7a0b882cddcc150ebf51e4c356a86d2b6537
SHA256edef95b6a07676ed48936d2657ea75df9a08a27f43ea036542ec2f7cc4256ef6
SHA512ef45d1525567bf3d11704740a8fefae2545e4ca29e34593f00e6f4cf3724f36586fe126c3edaabca9089781566ee54a22b318bd795a1a1ade7ed360fa10f7215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae64587c72536cda754a04f4fe004386
SHA121835ee1576041c8f804c36ed4df068e2853bf72
SHA2564061fbc029f4c5f0b9fde0dd68d253446338cefbc7731af4e5eb3066ace841cd
SHA5124e895f397f7bd1fbc37da3e98658c35fdc917bd32ae0940455ef4613ac71a8fb88e0f0b3ca85abb8651d09ee916b8ca37def93f6902b944cea562b28f193b602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e52c824302ebde71a8da6132b193f79
SHA1106fba4809e8208127412b1a3714a12f6eb868b0
SHA2569ad75d92a7089202a77efa647ffae135e26900fceeee95404615ee52cc4b096e
SHA5125024f3806c812205a235ea8b1baf6f47d875dec4240b89c266d45f221c544817ed7c0579812c72994b4e5d05d7262afa9695014418ab85538f9bb22e0197d4d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a16a04fb789c6e02b5385a68ca46e3
SHA1b42a5bb648e76c70d6253660d0b9693c10c1e554
SHA256a686ee04ad4cfc6c06293859c40fffb5cb464da6dbc28cee299b9e7125702293
SHA512463f41feb0372da7608ab81d98ab521dbbd5aaccc6a69cde40d1d00810aa2212e15b7d6bcd3caff677a02c0769d77cea3a2ca91c042d3a3a7f0c4effc12ad57c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af223096bde04abc11370b5412622928
SHA101bd90977bf7e948cfc9d042e1c727206a395809
SHA256a7a169ec44f64f56ef3ac7ebe7d1513115649e76efd75f8907a901832e753e96
SHA512f6d1de28a242aac36e6ed1b7a5a2c006337a4ee615bdc7687d95c4bdf183c6a034dda71be67239325ce65fb968a6b0a4a8339f3665c9c3a079d90057735a6af5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c43c25e12b04f8677d91868931369b2
SHA15f4f43787f5782fda2df838fd66516e13a9b8327
SHA25685b9e56e1f721a396347ba36e2713889ec0a4826a8d29bde13c92e31509bb9c1
SHA5124910a65fdf357ed79d60d6ebea178c03822609bf343ddda31444d46ee860ab88b98947c5a0df11bd84547a506bcfac7534b223606d2a2d5cba709194216b8087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ceae30a055bf7572f561f11196f1b01
SHA1649b50fb134b3516bdaac5751d5d75f768299639
SHA256d8aa668c8f8080dce5e10d2387afa086095ff9129b893803e4f34a2f389a9e66
SHA512d9545cd792ad02b25b1179a88c5fa01d66a77a7c04c4d4bbebb880a41c0c750937c29046684eba8b1cc10b235d41d4f4674bb4fb93648dcc334fcc28f1be4c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cf7406b7498099b86042f43f9cf0b2d
SHA12b2c25f5a14d6d90042706e0bece1a83b51f88fb
SHA2561bf5b6a583e0b1acf80b4956dfe2c376cd0b2487e8b599b662047ebd8f7fab5c
SHA5122477fbb7358903baf91f6693fe529a30cbad38e7ff13eee8a492d11530a2eefa7defdb65fd4a36c174176b41b797f001c25861fbd7f7606ef3750a8e05281f72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eb1c2f6a94170a0acf524c7f7725126
SHA157f400a0863b5584da504cc81c3b549edcaee7e1
SHA256207c95ea4d4bef1317dbcfcd27f80b11579b2ea9aad77cf08f657cdf2a52ada7
SHA5121abfd8ffa1050879ee5f0d2d3e7a40d5a54f33fa13a5c9c495833aa1a530e022c6349e29181caee5a2da94dda86dd3d208e5bb12f169a43ac27e56d27a000efc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b