Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 10:25
Static task
static1
Behavioral task
behavioral1
Sample
d1b692df1c1b846d951f4b0f9778dbf7_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d1b692df1c1b846d951f4b0f9778dbf7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1b692df1c1b846d951f4b0f9778dbf7_JaffaCakes118.html
-
Size
26KB
-
MD5
d1b692df1c1b846d951f4b0f9778dbf7
-
SHA1
837ff05ea3eb06aa3f31c13f0299d830f66d961f
-
SHA256
79636783f4c1271136ac3ce8b741467ed03c2a318c0d77e1ce8b653a480c6985
-
SHA512
f96bec61801b0e084430a0a5c172c60be95d6fa8fe89c0840098ead26d9c1ad7a3247b429c92db58dbfba4ad7050b45f029a98884a50248969f50c39780069c2
-
SSDEEP
384:jGXcHGYuTTWh6wmXwpYYOuYS9Va5LoOX4kBGJxJtJYJ7JYJbJ7JzJ5o+:jGXcHGYuTTWhpLko2b+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431866578" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000002db35bcbf9ac89e5753c506b22ad76ab0e0742e0913e24781add5283615d974b000000000e80000000020000200000004815625db8478c2fb8e61b136643cea7f93fe71ad04b128e906c1c92d913fe032000000037a80ed1c49620585164c68b3f66eeb1b6bb43b920ff337cc5d8b9403ba5ee8e40000000e17f586deb967b34e5cb44073d3e318ae19d0030e0f240d5526e6a01070e21245020771a20d4f51688c0a0438e01975d780c4644f742abb48ba1debe8ea355a7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 501e044a1001db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{75634441-6D03-11EF-9AD1-5A77BF4D32F0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2720 iexplore.exe 2720 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2736 2720 iexplore.exe 30 PID 2720 wrote to memory of 2736 2720 iexplore.exe 30 PID 2720 wrote to memory of 2736 2720 iexplore.exe 30 PID 2720 wrote to memory of 2736 2720 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1b692df1c1b846d951f4b0f9778dbf7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568278d371661e7665c8fc71c0197665f
SHA171795f0fe75c5649e28b1ad54931be2004da1339
SHA256bf411132f7c9910100bbc6ddfbc191c90e60f277904d8ce149c340ac1185cc18
SHA51293191f12ffd5cac3bd549b245dadd6b887713015db4eb57aae2ce71ef84c0f7e50ea9491028d595d2d8d2b2eb5817a3722d0efd520fb77a628ff19bdfc8ad274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b34d0c96ae1f519630b00532ee5150e
SHA10c89749491f7853ba10d8845b29663f39f8607ba
SHA256a04bbb9c15ede5dc033badf9261b27f60aa4daef7af39b73cde38774be70ed29
SHA512694734912340ce61a11b090c98de558e439fcf9ff9d5a5d6b1e88a63cccf2457b281fac246003d56f6ca10987bda8da0b6a2dafe375cae11f1edeeb2f08868f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5648a182b261293fd7962316bab207d21
SHA1d21f15f8637210be0f4f7ac4dde7bf37f1112dd8
SHA256cbc0a65bbebcced7df13e249957daa43af1baea718a71959f1ffb9dc5ea6c012
SHA5127b239ae7979349390be85775be2d93412c360dccbdc40b28b959b60cd14a97a348b3e0d2c1fe5b510514d8d20e1e911c101d8ee19a4292dce70ef1ad503a7606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5543a1ac10727d5531dfd917559186e86
SHA170022528cfc44b030f0ea666616e416c95abd38b
SHA25638bbee3b6299a34e78f50612af626de9492c05532358ec46829b56f0e1c03f44
SHA5127ed14c4786507f3795ffe0445455b31289103a2b74ed38d5dbe9d1c45a0a9f73e25b92c2c6a9c621ee917e5af5da187cab62aceecfcdfc2288c4a13cb3a6a9b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd1fb903f5aba44aa64fb9adaa77f744
SHA18e03f10cba0c548f2b77dae20b4d19d4bafd379f
SHA2568d4ea80781467144325e78b56b5c4b1bcf6eb6cc36332f11b0370c4b66513dea
SHA512148d7d2a40fcac2e0b8b7dcaab1c78d41c169ec50e07bed9b8d85f04695a57f8078be9bf6ed661ef5f86fc068e829bef8212d4af3e29b819c5e69cef3a879c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5503239575c29c33f80b42c518febb54c
SHA19f004b65ec3e9e9fed53316cedf5a303b5c202f6
SHA256e5c21861c4be6650adcbe6c2cb2d1ae9678616b741fe0ea0cfd4f4526e879260
SHA512d67ee662271736493499ef34aa44cb52084c96c0f21bc69c811f3cf8cfeb643dc323143edd73c8cc603187cf63f771d3bf15ef33725d50be6907110af67238d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500dcf0ae048a525a216cf14ac5ab3781
SHA108b38379a84b0f64cd8cdcc00102908d63278a7d
SHA2566ea2581661971c4e037ac37c8da9e0c21f5af77f421579f58e3992e02ac41dda
SHA512a14cf8515b791500f2f50bfc1d91a44f4a8439822d1ccfdddafa99f78a67a26828cb0e99a15ab106d40e323778facac2ae7657a0dee851e7249c86a273d8048e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c519c68233e4181bc8cf91190ec556c
SHA1969105a53cb81b53f44e31da0db2900ab6912a66
SHA2564387a88da420492bc376039fa109592f53a59cccabbccf383813b80d718310d0
SHA51253ff30b83d3720d2d8a8d1c4803e05db05f43ec0100ed7491826e282c53934021271b72b22aed2cc560d779d30ac75035edfbbb6c30606c5a7158f604a45da8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59712498d23fd7fcd8cffe783605d1799
SHA1dc85df7ba4581582ea4e12b772fbbafc20615744
SHA256799ae4cef438b270cd26960c96534391f32f2ec48f6307248206fded73d78134
SHA51299c3bbdbca356858a39bfc7d780da6027101a5b6c4420be01cc22639a583f65b3895f275ac6067226071fbe4ed77072a872d48fc6f8ac24edec02398fd02b591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547d6219273d74e0427eb304bfc6e10ff
SHA1d2edd97ace5ca5e0ceaf2649b0a4606cac5b6cc9
SHA256600054cb8973650ddc02373a0cc8f1f052aba4e66026a44ead1532169c9508dc
SHA5125909030f690dcbf96eb478ae8dc03b4c0c410878d15394c1f2d16068100a8ad38c451abc9d7a946f8457f562ba211e28ba60e0fb7e68dd0a9cc89edb10be3d0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5548e3f64d1d3a3a1b157d1e09ba53b0d
SHA1b7abf6a819c981429312430d543aec30f667745f
SHA2567763e001f6a1a65993e1c1d963921b7ca10dd27f60ac7e39dddb3fcc0b0267dc
SHA51202155a12adcbf2362902c34e860b48e1c0845491216f4e4440244851c9beb5bbd154e191665e98980472511f3702666b51f793f5e4ba11c328d349608d3c54ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f6af3f2379bd17a5fbca7dcd019f98b
SHA1b66f85e0f977f91980ceb49186e7644aae52dea9
SHA256393bb1e0029e6d4a0d3fe86e57e16f058a254f9a276925684ac5a80274751269
SHA5121b7a1c2df4b278a2619d374da64e5814ac46db42058b1e7541c2500caf83f838ad9f02b1845e98d933d03e9130507d2c9a0a75a6295642c8f30e0eaa54625804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3c98bf9f0d5720ba0121158971b1218
SHA15c4bce091e1b5ac6c0e96dbe7bea285b6a0d04c8
SHA2568e6a6afb519d98be772a11f3769df15a907b03343a11393e3ec41d12ac326d05
SHA512d12210b5845e72555884beb9451cee2f01531e1d90e8ece551b2cb35389bda329d7964ebcf41ca154dd72193d1d1e99f757d4e85adb461c2ed48ae9a5709b0f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e3517a5bef18ae3e2697c7a765e9f40
SHA1d3cbb1036ba36208ada494c12cc570cd4326870d
SHA25667e2cbbfba16dba84dc5a7029e09255df0d40b6b366a667e376ff2ae0da3f7a4
SHA512431f0ae1942b8fbb431152d0f57521a1e27c17e163bab116519dd7067eba007ff267c9074bebef8b2dd5f244527487975e3c7336419484c4b9aa4e883c058d60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5ff7e886006c75eaa766118bbeece0d
SHA18a3ccaf2fe39f98d4712240be8e9c62ffe43eda3
SHA256815773b68d6d2d47023986c2048fec625ec481404da9c1a3054dd3fe47c66678
SHA51205f04a98f3c62a1cea1cb02c5e86e146c9dfc0d0f06a39048c46f90738d97b3d7754bb5e4969d38a68ac9eaaa9d79fe467f811cfb1aabd448e39ea3111a1ce6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540296c58b4870161d40c91febe894c0a
SHA14ea77b9853ce5eee81358f1d9242e0cb3fc8d9be
SHA2561c33f29fec88ac826fbf964c4b42c76b16e19a4a73d14907fe46ff54a3595592
SHA512fd8ed2f5ec23f6955557fa98119bb9c81be222aaea9c0ce2b4cc3fe2dc9ef78e3ea651fe0e9fc4df706f594ba896a16abf5e47cb052f8c919868a3b608f0c927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507d8b9a7ed73d8d40fbd52e471c6b2b6
SHA11d6ef637c9884761d3edad8674f2f6bc754cc1b0
SHA2569659924462d6abd717ab0fb575d4fc73045b8a8ab3c88630cc9ff4d326bc824a
SHA512a3a0d8f9a4968870bddc286d513ad5032386d4f12924b623fc086afdb1d52b26a2e3466aee2b7603245ad1afcd52c97385580f2fd87ac7772f40a3dbfc22753a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf765d77cd47be04c81b36366716a160
SHA10ab23b61cd9d33d64f7f19df822ca40d19ba9152
SHA256aa9da9d28f80e73f2a4b854e8bdce296df02bcc95a24cbb4aa7b69ec02221a04
SHA512ad0322601bc010d2f5d32398aa4cd79b5e3a20ef377733034210f6f8cc64b7d1ea4a16dfbd7b0f96619c8846ac9393f69f2ba7278b214f0978ab2c746baf6034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb5f6352724806d20e0abdd79060eef1
SHA10b6debfcac2d2150cf28225885bf7db8b94ba5ee
SHA2566e6f09a69e67d374cbf38f5a61c702be2af239f01562101e31a55eafcd258d02
SHA512bad369adffc8b6ca620912268177e6b3d381c686d3845135dd6b9ac46a8251fbef084a18ad4a046d94055107af4a419db945db675ae20ecc71217a5322744c79
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b