Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 08:35
Static task
static1
Behavioral task
behavioral1
Sample
d183f16cd295f959a66694b7a405f79b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d183f16cd295f959a66694b7a405f79b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d183f16cd295f959a66694b7a405f79b_JaffaCakes118.html
-
Size
24KB
-
MD5
d183f16cd295f959a66694b7a405f79b
-
SHA1
3cb4b56bb1c57dcaf52c228ea1988d655438c165
-
SHA256
440d561406ba3af2047ec1e39ee46aa6a73e98de963a744235352d5d3e8619a5
-
SHA512
f1798af805132827c880faed04369e7e3305dd72c5c35ab2329d38b2a416fbf5072afc7c8818069b631e9138d1dba60390146d05b081ef675987a617df1d587b
-
SSDEEP
192:uqN7HRb5nW7unQjxn5Q/fnQieZNnQnQOkEntFYnQTbn75nQeCJVevo7NtIFo+Nz4:nIQ/DygcnnBb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{25D64C61-6CF4-11EF-8C8A-62CAC36041A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000000ad7f1e3fa29ded77bf7e553d887b052cc9dc8b8e8ca0eba5c73b7d5a630dcf0000000000e800000000200002000000046281432f69e3472f06c4fb9990e9e9b6354bfc5b140936962f2d3e96146c41f200000006c10ba1c47204afcd9ae94f0e0a1c015705e4712d43e92070f73043407fdb24840000000944586163ecef895884967e460326701b63bfc0c7cfe601989f10295a4a69e8f2d94c1e996034c4d2cfa23a03e5569d5fbb3f8ba88f782631ea8c65e9ae43d27 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431860001" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a68afa0001db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2668 2280 iexplore.exe 30 PID 2280 wrote to memory of 2668 2280 iexplore.exe 30 PID 2280 wrote to memory of 2668 2280 iexplore.exe 30 PID 2280 wrote to memory of 2668 2280 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d183f16cd295f959a66694b7a405f79b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce30a32a20cec9414c566369edcc223b
SHA108206b163e9a301b18ef31ef4ff8b29e4e491ebd
SHA256361c0fcbfeaac8db4f0d1fc701d12b05566c75e4d5bd5b2f0e231dc86382fb7a
SHA51226cd9eba57d8919adab1714be502c998c8162022f658714b2d2e1e7555a9c206005a07088ec48af90897a78ddb7917347a3ffe6bf751248cc06a768d3c577c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f53063395821e5caa88fd3966f3c36e
SHA14c3b0d5b7368d6f5c58820b8b29f1dda3dfb51d1
SHA256d6577cc7b2dcdf023eb18b9b848dc0d63ecc130068b595909fa26841820556e5
SHA5126309368eccdb04272b163ed9a9aa53e81f973a4ac92e592e2a972439c0fc6823373725c9f62b0175a5b71ad0c7dc2c9aad9e1415e14163bf26cd9f2b1d7529e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3035c33dbee8151dfaf4865f53de833
SHA1da5f12926fea97f01d46878263af4a151e80b0cd
SHA25603eced386fb683a424cbd4db56f2b398ebf5a2dfe4f732de2b1f4e07ce86ade1
SHA5124aa3a7417582f20be37830dd0b31222eed0062baa41aa04c9da7bdffc732c0d5e66b330c90c52c9471784ac7b39b44e162fd17246845e7f4a816486a49cfbc4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cf4759728ac119e0f897c77112ac14a
SHA12633d795b94b5fae824ed8508491ce074a03c8c4
SHA256ed80bd8dccb6428ae5fb2aa439e1751c52d9da6887e21c8f904ce67043501859
SHA512274521566c363304ebbe6d9f23c5f7c35dcc9abe9bb175c104123eb00ce629f8c93f27cf201d812b05322007956c5703352b2472352bc018ff54739a86f1410c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5809f66f75bcd828358d76221f3492332
SHA14b3a84603cafbfc10d3629568145da465360dd4e
SHA256bb9209e6f59df5c930fe501e3d74894d20e4805f4ed823ac751ab815ffd29fd2
SHA512367120967c4ea280f7f7dcc6e7a6e8fa1a8bc080faec5ea58003a61754fe87299961cc22e64b6babd47e1228a4b8dfe2f35cf8caf7ce09dd40a9c9a43ba6e71f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ed01db3c795071d55c87e795d5b29c8
SHA13af77a49a6955710ea7042c0fbd4945ff4876569
SHA256f39e1c9b165e55687181e249e2b075b0526bc84bd21a131359da606481f7d0e8
SHA51286684a2e03ff129bce343de2e286838f1e9e2064304e906412c039357b550295826c1cb390422579acaf0773136c29aace1b0b92dc51e084fbb923879c121023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500b8d815288a50b74702be960e109ab7
SHA1e04f60b1f856e60e10f83ec42eba69fc24645992
SHA256e2ed2554f2b7ecb499e0e8b7abd0e93b9a2abadfd3cfa709564046c69ef533ba
SHA5122ee34b147a2612b8df9cec3b86e7c80bbddc334c358c3a3a0b4a6e37b85ca797173c7cc6be36eb2d3eff19efdbfe5bee2db7249ad2c02bd22445b0ac8ac1cea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ea0dcaada3f225a859e930bc4ce9e78
SHA17be2f093974d62edbd7e3ab6053c50b9f5b51a12
SHA25693458750fab546589d79c8d8b8572f8431931de334a6dcc090ff87bae601fcb4
SHA512ac793dce6ef0d3997287d1132377581d4dd63355490dbc3de2ff67d9fd51eb562aa5f60748ceea27059196cfcb4b71e28e07991b4b9b7ba186d4904e30ee628f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee2774b55d84b10fc9705975836623b0
SHA1858514b221a9e9ac1ca26458a2ff1f39d58d418b
SHA256ccef48571b48e12070efd361e8ac3afbd9e35948c3d619525bd6c05c7bd77be0
SHA5122a1463495c4473bc8523103c52e667638a003517e16595d872e5ba9a8b27d3b3b26c454e080ffdd1f3045028cc7ddfe0ea6cfae2fce6532422b165f00856c397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fea8d80d7961fc793dbc5503e00edc9d
SHA1bb4d04fbb616f58364f92f9425820ab86c093975
SHA256e1a4bb9536fc4ebb960573aeb199259d0fa639fdb1f1763ec2aac26187fe98ab
SHA5129b3c6e476af2353f13e32b2fd20fe835cb7c710b496909fcb78d868c4212e48b5fb4a29f6df96551db6550df159fdf5d12bde57f714aae68852c862cb1143d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f3d28a1d0e2b8cc5062b99dbcd03296
SHA1a0136d99817d4e095efdb4476b1d9adf5bad1115
SHA256546f8bae9e6ed45079b542deabf40b8f548cdaf916dbbbad0227aade0d8968f8
SHA512ac284dab073e8124913a2c1af303095eaed15fcab077598803cd07c62b201dd689eef40e51ed36df859caf6cb6fcd3d6059ddd38aaab92a1d60b8242c949e913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b535037305f2e38b0e99aef85916a3
SHA1f68f80893a5795aa637a6d73d16972a6a0b88a3b
SHA256f4e7f2fc779d34eff7a32f3abf52e05a014566e2bca3cf21a9a252c265e81552
SHA5128771b1e703c9a3d95cd55d9b5eb5bf183f9408e7459da0ead3bb138e0faf310ea1b6799ac6d19fa5dba4557f51b787a91eaa27e4929e29bfb654fb569f428b76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58141a8a5f4c3177758817be4451ce38e
SHA1cae4949acfaf25586a80ade19b373ce6e8aeecd8
SHA2568a0bc17b0c4185797bcd6d513239d0caa2cfd430c260a62315eb5004a4641420
SHA512086c464b5b3c82e35787478ef4e128ddb02ea0978228b91d7409c9d42e44fd4b2b891a41914385c95b0ffb6cd6033a43f923e4810bd18d2de8e525e22d0ad9b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585f46f6e20bea323673fa84482b22821
SHA1fd7a5abe3df38e7f43e45345e7108050eebfc042
SHA256db796588dabd057766f5800f1be3281148b73f09610d8e47abc8b8ee14eb2afe
SHA512c2cc7b555dc3a28d288ecb99cd890dc36a0c8be29733992760308507035e235275e7ed5be2fd4dbb0a4fa8e0c3d43dcd2e008a8ce419bfc8f06faae4377b2fe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599a7972f1be561d9edce37420aeed8bb
SHA1e75ddccd7ed04cee938bedabaa7d008ad22e04cd
SHA25644bfadec3f1a4261f451cdf9995788ec61ffbae3a5296fe35b263f4d7a49138b
SHA512a00973f8b7c280548f97d36cabadfd70ef76c32b8954eace57979eadb5cf19566b64246e127102b9ee9553f8c3842ebf62493ecc7a397aaa8b4f2e663fb17a93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519dc5594468b707250bed0b138e6df5e
SHA1b2373d5439d76a10740bb103d9912e77ccb92e2a
SHA256dbbe676c109682664a6c649d14270261a5b9c8674cc048285c5a7c7ae59d010a
SHA512b283a649d0bfe05c253b9862a8bc87c6731cba3b53faba77837f772efff3027a06c3de237e8818141a63391cfb495cb2d23e0ae8fecdf3dec9776643ecb71f1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5b7e1f6264f590fa8eb640a01ccfe84
SHA12633c500d4c97b986a8d7e28e7f482f13c735a0c
SHA256c3a2fb12069c7a76e7c9bd2220ba21c909ba96933e1d3a0f57ee0daa0dde9488
SHA5120b94fd89f8e91247bfae575285bd47808c085db42ffa76c842b1b7958e1d01c34ab88e9438c0d83a4a4144639a7dea6ad2f9bff2773f352cbf16d996fa7255c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58655fac009a69a089581ab7943eb14e3
SHA1b6e5de0d067cb3a9655c1f7265160c91147c442f
SHA2561b476ce20149f22bc0903211beabc173e8c7e7949b4f23b07396a11b3f4a39b1
SHA5122d48e58ca9edeadad4052a293a846a6a41285c5a191e577ff6bfdc39ca3637e654e775a6a4215e1bfe63f6193678ff42f42ac9559fcfc7deaa2454b2ead05a15
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b