Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 07:59
Static task
static1
Behavioral task
behavioral1
Sample
d172135ff9925239cd6df90e2ad88e95_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d172135ff9925239cd6df90e2ad88e95_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d172135ff9925239cd6df90e2ad88e95_JaffaCakes118.html
-
Size
5KB
-
MD5
d172135ff9925239cd6df90e2ad88e95
-
SHA1
f451e3cf6d7507c5ea3285b264c9aca8257d368d
-
SHA256
fe5da5eaa8b9950f52f148925af0b3f72fb7e894ca2f5ed1385f086a5be2b26e
-
SHA512
91246a0cbcabcc807d725f2c14c3561758ef634759c115b9fa05df64e92c04be434b266d72afe2cc896fe41a3bbe1bf2f2f148c3034c92a85042fe9fa4d06875
-
SSDEEP
96:Y43nJkBc0CmWMahUxwTUfOR50sB/0STxjTapJNlSCoys0sjsrr00sExk6qItv1xq:T5kBEmWM2a3mR5t1vNHs84k6rxq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431857866" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000003c1f082b99296267ff8ecba01ede820b4bb815d00b24656877d519c64e9b392b000000000e800000000200002000000087f38610e26b163b894ad04ff911a5453cafd7ff4ae04d767c41b1e657542647200000008027266d12895a53268f8453358b418c93975b4bd9dd8021d8fdd71c938e2da7400000000c6c07f39f1e797e024b109704634073691f3eac24cc496cf95d9d976768513fb2566e6345139e5770f280f031889ffb4bcc9ccd68e936580f42f3281b6f3940 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2DCBD7A1-6CEF-11EF-B699-EE9D5ADBD8E3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06d8906fc00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1400 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2416 iexplore.exe 2416 iexplore.exe 1400 IEXPLORE.EXE 1400 IEXPLORE.EXE 1400 IEXPLORE.EXE 1400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1400 2416 iexplore.exe 30 PID 2416 wrote to memory of 1400 2416 iexplore.exe 30 PID 2416 wrote to memory of 1400 2416 iexplore.exe 30 PID 2416 wrote to memory of 1400 2416 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d172135ff9925239cd6df90e2ad88e95_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5991dc7057322c67bb6bba8934aafa22a
SHA1998c443e66abf1c127f19e16a0afd673be74c21e
SHA2567eca56a1fec3a9748955adca4083603cd7ad5f78b8ddcbccbe67fb03fdc95746
SHA51207d2b40c3f8562cae845cf207ebfcebf3b9b31a1975a9a4386ad8122435d342611cb76c2adffb226baa977f72a4c1d24d8211e596fee462d32bbe68666b65fa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505325d7bc6d2c19ff5a3130d4ba4c773
SHA162ac0f46c98bf38fe6ef948b7592fe6e1aa157e5
SHA256ebf7314d2b978d76375a0db766bee3d2f01a1af3868e4d5ed18fee0f9f87442e
SHA5128b7957cfa196d914d6a837afc965fdafe0120e9747c89ba615976a8cfc1a03d5a8b2ce6de4f378098cc4f842c46d6fa5bf8156b0b1fdd40d9f80cd76e21e4acf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5048bc9e6fd219547179219e097c7f141
SHA10b6c68f48e06e805e05cac5a0134bc9a2b1c3558
SHA256dfc1af538ff68280c91a701a5c356b35200f2fdf8bfb53748017f374fc4eafdd
SHA512a450d041d42a7422b6581dc309501a20c28d655a2bc78fe5289b675b7dc765a680b5e48397926129bac61621d0d71b98eb7f6a3d1210d9f476dca679adc3ff95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562028ba0ac562d4ac97e1532532aec1d
SHA17ef6a248430c7c1651774fc9f2cad01badc6fc07
SHA2563afd5f13a927bedcedf2079eb2ed05c1b4fb1315f42b393a38cec2b728fbf27b
SHA5126bb18e9b21b0df299cebe0eb3b2594858e8373cc7aca7cfbd1243e041962089dd8b2d7bed9aca8f68795819fc552a3205e0cc4ed04f3c3c1353f2dfb8b84e3ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5930f437a3586382bb6b6d087ed522ae5
SHA12131343aa1370a6d5c10c3d8552add67c6708794
SHA256e6d1d63ef54e99d9282573ee820a2d3c2ca2e1b732fe22529110b930db2d540a
SHA5121cd63619600f4a0656ca5558cde8a67fa166e37f42e8ac338ac1a5d5abb330a4c7c233167a4f1f30f03313e51f4469364eecc7e1eefd8d7d0bbb99c1d9802fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a74f8a64fcf79de8db970ff1fa23f6c6
SHA1c2b67980102e038d48304405c32bd6a869bfa250
SHA2565b167ba8b9f18a24ad3d05b8a166e95714ac888f533e049ac8ef967281abe8ce
SHA512743a0a4d88b5554370dde91c8801f13a0a5c4acbdeb6d0d04eb5a08cd08fcfef92c0e9c072ab6c3132625270381d0ebac752ab478ff5903cd3c70baa3fe77bf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559d3a255cde0c53ab4c3194ad7408f67
SHA1234efab5813a1e2ad1a98288f942d77e23cce3a3
SHA256f17ccf5d68e31de6c820ffb6a437505f3d7450caf74846a6405b11109538ca21
SHA51299b66011f118cc2cc3de9f4414d88e316709240acc8123e605069b04416522c45d647a0c1f223ee0c2519294c4f117cc8097f1c41d1ab2d9ca5fc6df7a3836df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f1508d7ded7a576496bc49cf8a00bad
SHA19030bc374839fb526999b680a027fc307384cd0a
SHA256755e588aa36c669a5a21f1c17dfa64406a5c89cca409db66e9b4db59a814824f
SHA5123e4b4d2806bc1688e57fa68f5efa1d23d5dffaf11eda417f14e47649722bbf351a32c8d4f16bdb450159a6b8aba476e50bf1b34dbe05eb461eaa75b689a0391d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57733f92ba6387036494cd05829264f7d
SHA168b99837211187100e7c1ad9a230b9fed11908ea
SHA256f61ec4a60bb5be85d13262258d54f7fa13ecfe7c366ba33f25a11296b5034587
SHA512da38e1e6a7f17f5b9f15aae48356e3c8f547a5e9a47fe12e0bfdf217077aa06abcfc5e03de4f32d6ea01076d8a49e00a96006d6df430b088c66c56f0aa174158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539136df4cd4c940c0e83403748c97632
SHA16f1bae5d5ccbe0311b6765dc1fd61b026debae7f
SHA2561f4ae6bfba52c3d035c772b6769ada673e0c465156a2f6cc2441e275def64a7f
SHA512817de4cfbc85630c11d7836f78cac8c441d0655d70c4f13aeb3c16b32c34816a6094501d6d85d54f152c45c2831ab0ea46249e162982953ccd0f43fd5eeee120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560124bf6de68eb76e66a827801b3d112
SHA173a72ce2ab18cbde2319c2216cce227e41c7e03c
SHA256df798b9b54b2f875828badc939318db433bbb9c32f5a732d0274721b32945191
SHA5128ee457806db331a2a6666bc401d08ecbec939768807ee8e06f8846d69cf847a0e2b26928e4d74c4da20f9154bbaa8dcdd312ffe11590c15ff01ac00a9d9b4bb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7b4a949b2da4371159e555911f0be1f
SHA1241215d7d2084d2316f70b52500791e148a93741
SHA256341badfa5378430d3c2cbfa1767cb5b743742ab19953d7d40cbce2e30810283b
SHA5129897a5dbd0f48217dfa8e7c5668d67d5a7e9dba049128808cdc9adc73e3c5c38d1e2e4ca033ecb5bb99f12d913472ca5f3a0bb08c5f986c9d2604c9e9b48f681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fe5f738f852ec43490701d55204e9bc
SHA10da8208e9ac6fccfdacef85f96fda895fa5e1b45
SHA2569343323d1cc2253e1d44efcb58ecbe177eb92f37727b958fe3f8a8ab8230fb88
SHA51240a19b4b968077d2b42111b78eff162910cb16a7357e028e7acc837e1ac622eba19965d6326cae102886ef0b5a3d672de9a992a87bd2290c6bf956cb0549e817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53da697461fff0f54e37990f466f955db
SHA1f90ab9633e7ae1804e3ff725354f773f7ebadef8
SHA2561df40814cc54a7a54fe1081dbe74957fe7714b38f66c009ba7fae75d42e57b30
SHA512ddcc385631ab6b5887e49b4cdf18b6bd37ec5f00f1eb788ac1fab9be2537ff8832c310c0c0d698933dfe5ea02ef132ab1ff8e30adebb762b7834ab76cddcd572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa66b8604fbb6624d2c6b136fcf2e549
SHA173ba522b9c7060be71b8250742f266da6def6caa
SHA256e0b91949079710052165722c27d0e81101e63aaa282f98a7f29781b70753cfeb
SHA512052b6982812600c04b6013533f64898796998af075f34c78fa0f0bb0c4e0d5a968882436d5371a8a0a6e6ec198752e5818c9f023360cc8df276514f4efa61802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d54f19f1c322971b222e861e5e5d6692
SHA12dd309803707567641a565da4cfcffe171cc1b89
SHA256517bc403110e3ab0f092944dd9ba268a5f67df61ab06f33f9a7daf6f287cc514
SHA512bc48ff4d99bab2de419c3ffcb8eecfe2c71dba89a8230ca7e5308417f593ac6c9a2ed4a67d56f119bf9322bad40b933063c9b0ea1c922a3e7261e024642dd8eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c7079697461984e67c77a3ddaf0f591
SHA1e8628739321acb5ddafa1ab868dd1c43a9b76642
SHA2567c9c12d51645e4bb673b2be6b698e10b3602c0f05ddab98254bf426286cbf04d
SHA512a4ee06c03bf15ae984391ba6de0ced7c03aeb4e9b53b508a7137848823d1ed013f77c12ae08d794e36d2973a559df27a447277916514cd8c9aea0bfa1a218f79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5811abfbaef75efd2d3e985966fa8fb36
SHA1c8a91802d1feb6d4e401804958ad758e704983b8
SHA256f6c811a10aa88cd8cba37574ee561ef6f74963552deaf5d945ddaed47e653418
SHA512f9ad054cd08179743a2dcb4a6e038075924bd06a6d89b073dd92b09fdd2841b42f1d19b5c86c68d21a6d13d547dce8f2d1623bd9c444015e5e76bf07f5893cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab28102d33af76a3b44cb181f1d9101f
SHA18b9a7e8e54dc49af7d385ccdf140cfdce05b9b3d
SHA25683451fbc0ef391fa1efc9ca378a8ee6f74c68674420d4d5a16b6e64df202eaae
SHA512ce8c2df0229811c01c031f906de86f85738746de577643dfae63509083e34f1fa25c780e3b872c0ebd8e3143742f11a8056af42c132969e9e4b3adedc6a307ff
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b