Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 10:18
Static task
static1
Behavioral task
behavioral1
Sample
d1b3262580e90a94adc89983e6a74375_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d1b3262580e90a94adc89983e6a74375_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1b3262580e90a94adc89983e6a74375_JaffaCakes118.html
-
Size
114KB
-
MD5
d1b3262580e90a94adc89983e6a74375
-
SHA1
df21a523a61f265ea25c30c5f67cd08db3b48918
-
SHA256
0ffab6b3bd0d54a4fe1e7749d6a1e478ac3d7698628159014d2b664a4a6268f8
-
SHA512
a1008efd870addc33fe3eba59f71c7a75e92926bbcdaadd0da4f13f52305df5a3cd90f1eb635a2bb997e43e697d0e3a3f0ae79321d19baec294f046ea2e74c5f
-
SSDEEP
768:0mVgpBSEOupweeeXOs2u8X/xP1DEvTHTEFETpQRTGk+FWPGY0kz8aEjNGKfODj6U:02gpBpYeeeV2uCw8ZkKctSZEm4NM9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80b77a650f01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431866181" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000de9ac01ff69e824720fed8ae5d3c3d68128492d29df7b7d887b1a99d30938a58000000000e8000000002000020000000ee34e97b9965d2629f4e210086f20aae72f4e1ebad68c162f8ab5c26d7356fec20000000e18f78b834fd2a5b94bdab668b05b453b2f799983efbb363a17553beee9ca65d4000000073076042b7910219f396d252732de6eae16dd207cb7d05cfcce0309a6bf3048445f3e25f58dc40b0dd0c6db8924c39ebbf5dfbc3f400d8c59335f8fe104f0446 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8955BB51-6D02-11EF-AAD0-E29800E22076} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2276 iexplore.exe 2276 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2684 2276 iexplore.exe 30 PID 2276 wrote to memory of 2684 2276 iexplore.exe 30 PID 2276 wrote to memory of 2684 2276 iexplore.exe 30 PID 2276 wrote to memory of 2684 2276 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1b3262580e90a94adc89983e6a74375_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD59f13c446f14a831db191965241fc5e23
SHA1d2030bb9b0d496caa520f4440b521e5a3ed1bea0
SHA2569cb889808f8467220b3fe4a7c09a593ca4017e8bb59bb20b65a788e91d7c85ee
SHA51249152b16beb7e347a06ba9b1c97fbae1ebb48d6efda316d0f18e18df10cca6687ee357a7c318e80f8ef089794bf6fd5d8d6489f88ff904e541126ccecbd6357f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa07bd9edf5f85a1961f799f1ccf016c
SHA13eb3833a018efe75e26f5a699e72d74cd888ec1e
SHA2566b26a24f878ecab3937f356fea537defdae56890fc1cb5ab4dad63fa286c1a17
SHA512300f69b01037dfacb853afa3cb67980cc420df8014ca2e04dafb24bde4160c7133450f8dcaa6c573545b8e09896bbcc3debc8157f280741e1c1fc8782503a32b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ab497ed897c9e9ec3e5dab00c21c1bc
SHA14eaf65b63f86b1ee24af05772d7e9c35fc588116
SHA256ec6d83041fdfbdc7233eea71d08768733c66fccaab1c5f34919419167dec69f8
SHA512b7e9fcd2606d2628a65c5ab9c05655bf511533392f4f8907521bdb9681dc50b0a6c1ab941316a80be13cbd0e763ef994769c3f42ab8a9e46e2ee50a524bfdc30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad5330b2885aaac54afd729c1ef537f4
SHA1607b927943cad5b6d8006a05b821ed7f6a7144c7
SHA256cc373de865a6394345e246ee0b2722e4d359e80163245d52e4e51f51fc912440
SHA5128478bb5adf79a19fcf01d767744f8a02948443b29c8a5c1845f6d0dc4cac11b0de0555a04f0ee61031e7ebcfaffa82ada24609bc3c87eecc325681c3d160ddcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50daadc126cd9fedc5075ca5d8b1da70f
SHA11517fc3644fe8afdc349b280275d5a45fd19cac7
SHA25649de001ab61a0d681a19f2533c3bde704d20e9ab3af65e3f32b5397b6e5310fa
SHA512d850db041916badb5bb9b1281199f06169218815037261d562ee9355b93e2d87fd425a983f72d616a72ffc3b26e09146af33bdf03df8b8e6fce436d5fd7c4990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c3aa853e1fe7cd966b2bd56dbec3d9a
SHA105cfad78bae2e25a7a6d4a1496a5a4f4c15840d6
SHA2565dbf9ae449ea69290bd25f7692e61f291158bcfdeb1a9706997fb23bd3850a8f
SHA512174e368b10a5e9864989d875eaa46b1b18f3e0eaef24ea71eb7984e1f20bede675541add923240498a94f65aeae050bc48b826c107fb195eeb9114a30585bc5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f50e5df6f7233b88ae6b645aec78de3d
SHA18c376a12c4d4c82767f9cb4630914fa44115ca95
SHA256afeb1e5f14250aa4721fbe68ce35d48e465fd66c1ff8e06f6353d52abcb16767
SHA5122e4f1579c1b0a1fe3f538f8633a2f6c5154f7705a0ab91f7e68afa65e69ab2c472bf558c57246e558d7fca49d3f7e87bfacef29b79fd160bacb09bd6547c858e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bbf41986cfc98ba68aa7d3b1ce1d994
SHA1ee082148dbbbd26c1050a5e503d77b049684d815
SHA25670dd2c38e8485c4205a2bf6c43e9866983f4cd018e92f0b7fc3f9dbf9b5c557b
SHA512f4a75eb25d43a9724a4fb58e81746e1b68a4c202d5f3102ff236e0c0e89dfea66e0c2eba0567bd976709c894598fe3d681b377dd16e214bd226b995d14aed93e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54da6fddecf481e654e32bec622bf27da
SHA19dfc2a102017facb4c8b91c65a6e04f0f4bd6aa6
SHA2567acd3f36cb5525013646bc33b5c8adea39d2826ba9046f6b9cf330ae3625b749
SHA51273c12e8bee3382e4b1613f85705ca089854bbfe4f686a2559102437ce3a9a816f8c2ecda0b53afb5a25e8b2a8ebfe67cfaa9638e30671a7d930cd508364df8bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b49aeeda905055405da42d6da5abaeb3
SHA1ba7edb5d893796bb0d607b3e5685a85cb675a554
SHA25655716280fad2c89c706750945dbd08c1be87145fe0207a5d12c4ff140b489f7e
SHA5128c994ad217cd2726d144438fe5615a933e609d218168c844a25f95ad732f959980b905692e4393202fa9b5298307032011c365404a9aacb2163a27079c100013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5991eb7d7fba8072670b0bd39c36f535a
SHA1c36e6c366a9b2e912bf65ce8fcf1bcd82915def7
SHA2566cfbbf9b59016e2d9dd7032896b1901e35f5c97c231dbb906f8b567ad4a28948
SHA512ee33fb48549d0ecf7470f2c2e3770cf2f0d65b893546e9519be64be986b64083b50720049874f95ded30ff02751b9352fa5d6039ebc048a62f554a283cd8fdec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59efc4773561879156c4c9c1ba0c59578
SHA11d27decdd38a011293cb8013a94a062d0776ae4c
SHA2563e5171afa1bc97138a5a507009c01d7f671e582c412dbb73572a19aea3c17d1e
SHA512a34af334395159f3110a28e0d531334d0361f8f5e56b7431ceff47fed09b4833ad9e540f0a8dcb3b8504f51f389b7257ec301b04678c90585cfdb49033b9b7dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5214ca6ac3afb14f39105cfe2417cba5b
SHA1e747e719b463e28dd71446c18c4cd43a673549e0
SHA256098b58572be1f92c2bfded6a7f7dee1ee7eba155bea476f4b8920680e25d66a3
SHA512282ef58ab1a32cebcda8eb28300b16ad1ae3ced180ea3dea88dea5942ece2e87e59c54ff90248f4b96c60228b561a51394fe34840d6a1a1eb488cb0797c6c2d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514c08cd6d4ff4b339098bad30ff878a7
SHA1198422fa6c5c9622f773e87df5a5c507ad49e9d9
SHA25676e44b1d29fae2e7f8e47c566f996bb251b9e1de1b750beb0ffa7c16cfb47898
SHA5123fa6ba1c57fedb31dd92d3ed9b17a965767109efb6146dbbebea86fdf5b70113fc9938fb0c5ef9bafaeb0948b4256146743c38354c360e0bdea5067b724aa3d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6aa6e233bc99c1b778487476628c1eb
SHA12f906c903647f34aeb1907aeec4b9f2f03388fbc
SHA256fb8e095c4d0ec4663c95841d4d5566a8d6ec2f6c8ffda16aaa6026e54a36d6f4
SHA512182506f661953f1feb851a7a8bdd8b6327d1b5fa2bed7891438b85aca52f2b831ca6145238d4f8bb5cf0a417dedf21929ede05a7b2e031dc419654e555c2ccd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ac62ad0cb3a6d62101cb9dbd2a1fa4bd
SHA1340575d865ef813429d9e31fbe10e20b3378fb06
SHA256960addd023c37412f0c1fd8aed0e5581e648df6cd0a95a10deb57254c680f324
SHA51277b35e5ca7c4f3d29c433145e2875f1cdb1c01b6a74829083edd55c0ffb5c41ba99ab6a26af5891db41c00f214dbf6ee3e5cbc579f75b569459dd09433bfa19e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b