Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 04:11
Static task
static1
Behavioral task
behavioral1
Sample
d10c1b5a97cfffc3ad2a80cc72d0b79a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d10c1b5a97cfffc3ad2a80cc72d0b79a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d10c1b5a97cfffc3ad2a80cc72d0b79a_JaffaCakes118.html
-
Size
13KB
-
MD5
d10c1b5a97cfffc3ad2a80cc72d0b79a
-
SHA1
7bc9c9d97729ccf29d51fe57fb593ef420fd8c60
-
SHA256
efc11c6d9aa19645481ce76d60ba8e74e80659f018190746f13c279fb6e3777d
-
SHA512
3e264bb95f24387058912731681259ba255fb4f57bae6972352557c6308b24401f385a84c4b22d1e56a8c3a9e0a7b0504e943141b9d2a771f20a01a17052d8cb
-
SSDEEP
384:+Rc85j6Uxij/jIB90/ezfvqsvPrTbn4jYW0e/f40:EDsjIH02XPrTzcf40
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80d6661fdc00db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000df9f75ed5c5f26feafd469319d3f906e8a4fab304a9496a8ae2903782431c8c0000000000e800000000200002000000088e8e031d7134fafe35c31245310e8b754e4f7fb2cb8de0b5b63cff9cae1b6b02000000089701b1151d6a1d552581d17a1a1ac0e0aada3439073a64cc8d67fde30e775d4400000003ef989bb5c9a88d75420703a9d7262a8a1e5bbf821f8be4cf820202049696b2af603814174d6392ede1abcf7b1c28b65003fe93e711797652fce84458501d0a5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431844167" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{48919041-6CCF-11EF-889C-C6DA928D33CD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1708 iexplore.exe 1708 iexplore.exe 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2248 1708 iexplore.exe 31 PID 1708 wrote to memory of 2248 1708 iexplore.exe 31 PID 1708 wrote to memory of 2248 1708 iexplore.exe 31 PID 1708 wrote to memory of 2248 1708 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d10c1b5a97cfffc3ad2a80cc72d0b79a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab1614609402f61f5799dfa71ee7fa9e
SHA14398be0e999fd1aa43de8700415e8b32e6f3a077
SHA25655b86d7f210018d915bd57f66f0561e3425d04c4b10aa794dc1bf20b2a65b167
SHA51288c7cc349ba5f647a5a84eaf26e361f0dd43a28a0d3cd46a409204c4a2c28c90d6f6c353b2d2eb6089f618919fef00937d6c2d65e66af30e04c1c1aa8bba3fa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9101d5cb33a26d0b15a8cb19ff7ca4d
SHA16d925d744e2e5b985e853556cbaad15abe5716f2
SHA256247644e81e5dedc0de802113360da1b60748634bc43192f9c2acadeaa04f5e8c
SHA51251667c57b02418231c15cc4bd442a9eacf0c8571802485b7b2be126541ab51924ed249714d2c7cf33ef3882c992a3d00c2728f6f5e50537f9c63c90173c32c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb693e912026dadf7747c9b1b14e5a44
SHA186682ac7dfe90038fb5cd261c0b234d39e1c1c8a
SHA2565099aeecb86a06c963f8501bfb5873e393dbde6af106f1be6aeecd2251538f42
SHA512f4c6bab543107a3ddc59fea6d80c9484775630a8922288b611d43776ea5fdc5ab6d56282a9a9b56e44af23412465e3b133292bef656477e1e3b0dc2a7f3235e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a5c15b36d5b35701f33ad06ee6d8aa0
SHA17df1e42b51a87476b0bc3ebd514b6ea30979924b
SHA256b0ed02c2c04e85c6fbd1bfa61599e4f240d8c564fd1fa6be7a31ab470a5f1825
SHA51231dfb151e4347fe4fc9352903a7ca8e15006cc1f1a9bbf8b69cc05eb441d82a680c7ea5517bf5b877a42b046daba4d5b08d3f7e2b0f3714e9ec6a59e939a9c33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5575bcfcccfde720cffb4ce0c2e47a53d
SHA13476a8e2547a2d4aeb92df6fec1fddad48c91d41
SHA256e28950e92ab05b53a03ba7c5be9d670765d8f922476f02425dcdd6993ddd6296
SHA5120b39ce4ad21a342781b41713d9c24d1980bdef2500fdc21964493571c4a20c48a299b5fe72aa8cf632c6f292e326fc76057c1de92906fc39a53f4842637e1405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6e538f73e79bae4a647193ca5d193be
SHA1e15e475e604ed8bcc67169af2be212b895f755ff
SHA256547bc50f08a3e096dc977f1a482a33c3a6341f3fa535fcbb1b0aa55f344eb869
SHA512466c3887919092a684e73c86f85dde00716ad3e8d1cd8c1b3b90aad0bb8725318da48c43e0cf01c068b06dc66d82ccc2313c06cf4bf9454a900030bb15a7c5f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580106354183f2d6147e1d5b02c1b2333
SHA14ed018714f85a5c7d2636315822aa3d526962719
SHA256208e066c30e4adfd4479acc9aea60ef67b6fb77bdd34abf5b01788b91c463c7c
SHA512933e9283be1bf54a65f9fe736a40b0dc9c07ea08b1d797162adc1916374ac8e758f6369b7e0c99916860c82f57faaf2152f7dcc0cfe44c14377d33f2a296a7e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554d74c0532de400e2d13c48145d7720f
SHA1f83de0daec0e46c9001c2c5a3c8398c998408492
SHA256fe3e03c4131935266092760a7db1c7a6ee2ea37277795ae128782726b39ea1d3
SHA512467d5b5cf0b5199b37a44f8b8b4a26f480eb091cbc99b128aec49a73c94c2c5699d1375dc130252f129dd39278a5ebacb57cdd10b5b4109901afd06665da3352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52beeb0997dac70f5d66f0ea71ff9d215
SHA1016e83e40078bcea9e86d829ec1c584c70b0882f
SHA2560a1b04af32d6a42a366b4d82ce3ab4b1b450953b253d7dd5cea9f464d896503c
SHA5126c604efa1e58d872f72e25c4471b90d57e24f9cd349fcca2a0bc23847bb73e1580e23e91390d5ff1e705069f640cca9e4b652f484c6afa17465dea93719ab9b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564885070a7b003a90fa34f60e658595a
SHA100d43c1d25c28fa300168740f22e72d756363dd2
SHA2560872ec0d332b29cd6a915ddd924ecd45848ad1344cc03bb764c41554715df892
SHA5123674dc11f4df8285ce21fb2ded0689e56e016f1965b5c9d788d50791efc3107c7216f279c40213cadf6ff70c9f8f95e87b39c08646a89c2d0f47a3330123632e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507f7d05f73592b69368287a625a790ba
SHA1586008307226bf2da19c7fda0a31a7387cb30854
SHA256abd7952d819e06e9d2c7c3da565f4b06487ee83d1b48435bd2d39219fb9f21f2
SHA51268532923e38434369f305aba350bd0be8ef03e89b8ddb4bba282e7fde5bb11d741ceca7a3680c155e8becb30276fb891993df421d28de7ca9da683f102fe67eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515d299e0933e13b2488a69e5e0ee2d25
SHA1cbdcb12d5785f37a5e53284092e2ddf99b095200
SHA256da558fdb45c2750ed4aa12046151f421298648dbea0b319eb9faa82def89d575
SHA51234bfcd01f5ffb34f87b1a943a4cb4315bebd1a8630e03dcaa2ea3dc72e117c130120ab88103a4d5b8728e397be4f4e063b938ba50f8194576e8833bee62e2dc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59047335eadaee5d6b2bd3144cada4df0
SHA18a5e1a5bdfabb51f5fcf5541021771fb7f3e2e26
SHA2565ba4ef074bfdc69b583eca8809f787ecb5bdb15e3ffa98470c0666df1dc9eaef
SHA512d2edbecadaf3f7a4b2c08a50d0b123e9c6eee1fa2f3ce3a5f1226907306eb214381a2dc67b3f846f778d055811c366ca85146f8a2e13ac1a86be8f67b25b9a3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2c5235eed571570b830af4e6ed0c2ff
SHA100c39b363df0303696d93e8ac1ec2b986238fbe7
SHA256881803c2151464abdf312f46e7c2a1aead12dba82eb2dbaf6ed7e671d15b192a
SHA5126c88a714668b454adf902525931a5ca000e30211179ab3c8316694280ea2fef5bcf93213c2460e21c48b3aeeaa65b5bb9767cccf35892f6da14925fd285ac4fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4b1d860e7a79c65f933aa6fd70f5c42
SHA1637027c0eac1896a1868e3ade998031e4bcd6a94
SHA256bd609d35c0f83e72fef24171ffd7f1f6811af82a82564c67f0adb52a5a038dcf
SHA512167d6dac4ba0faeb3e028918b9628c9d15a542141d544d13ffa827bee4eed708378d467d75d68ed93de09ccc426f63371eac3d76e5a0b4e5ad2bef42fb5822ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af359bf1e94601ffcd440d591f1bcc24
SHA16d8d263e54da7ad32d3162f893b0c18465c63174
SHA256527dbe72251103295b6ace582b91daa34d6c1b93ed77743708c0b5cdff8a06bc
SHA512c4751870beaacd2395f1e5f4570c8d579db8415b412bbfb59fccf2531514e9c267ec55c52bbe5012b74907a34de8d09d66434571c846b32caba283682105a392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7dc2a6f1a0b979176eba4970a2b292a
SHA15a6931434acbd0db87a19ba988de12eff561e829
SHA256d5bb07ac756c28dc376b3acacc1ef48b017e4d4fbdeb20f8eb7cb50b870b06c3
SHA512b87f6eb2bd35f8a807bcb70ad803616510245473dbe70a7a9adc4c69916182b9a151350bc77b74d1eb68b4351f75734d3d956576e1e70aed2652b25f0a92fc98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1b52db7123996b337ee3924285a5265
SHA190e2e9b8dd6ba9e63b7f63b9bb797dfb0b23f912
SHA25653451046521de39718fef13cd948fab4b1c5d3c6e881254cadc3b5af4975b2d1
SHA512ce130c43357a3a01f115e4eb5d78f804942a9d9f3cde828baaa90447a17168b467bb3ce71ff0b269c6f5bf7bdcc6ad50dfb0d6d348f69d3440f76a7842269b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5597daf84366a924f2bec1c6de28b46c6
SHA1dc04f486994634c078c79ee0f26dd8efb3471f53
SHA256cf96bfeaf2fd718ac6a8add92d2132a33294ce465bd40147db40192d1ca1f528
SHA512573769e416ffb6fcdc64930a564b01d98a65d7036b5f28a6989a5af9eed51b0a170f5cf5d89f1f2557aaf5147dc8d33202b030c7d0fe3d7294ceb1a6cdafed99
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b