Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 12:12
Static task
static1
Behavioral task
behavioral1
Sample
d1e828b17e6b5e755a65643a687b3031_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1e828b17e6b5e755a65643a687b3031_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1e828b17e6b5e755a65643a687b3031_JaffaCakes118.html
-
Size
6KB
-
MD5
d1e828b17e6b5e755a65643a687b3031
-
SHA1
eebe440abaae1e7d01a03cc2a66d2204babab9f2
-
SHA256
c9f9466031115a8f70644d67efc273e9a83feed2f2020be8581bf54163db11dd
-
SHA512
3512303e66665f2daf52cb4286c62fa10647eb27c18d18d4240ffc48f948ef54b360917a668ac49e5977dad62c9272f75da5b886e65c2c72d2dc285cecd0c597
-
SSDEEP
96:q9fwOc0FBFeke0f4ffmHxoCsZ46eLvRzflQNOvcqZOvkktifIIRxwUbfsS/+:ufwOc0FLUmHvQOfZOO5R9zy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70861f4c1f01db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431873031" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7799AE71-6D12-11EF-BC08-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000033a9e2d71751e94f4dd000bbbe5b275b9e3b2c888350971a173d188840059b7c000000000e80000000020000200000009c994d37d2a723211988999ed9fb4f5ef15596cfa059f72fa8bef47ab653a8a92000000078acf93f4edf5f38512de88b6d9ea7038697a252fff4c1afa6d25bb18e21df4a40000000acf3443e3dce5fd56e5de9d3b2beb5fed1f416e26ffba223eba0e3f77a310b0c38e176f385ed96b65d6a16afff5a92c0c6f5e9205cbd12d75bf599b0f7ad9dc4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 348 iexplore.exe 348 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 348 wrote to memory of 2520 348 iexplore.exe 30 PID 348 wrote to memory of 2520 348 iexplore.exe 30 PID 348 wrote to memory of 2520 348 iexplore.exe 30 PID 348 wrote to memory of 2520 348 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1e828b17e6b5e755a65643a687b3031_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53418f0016f9023577503ab19dbd3cbdc
SHA1299963332812cd74639decce0cc8b4e812110932
SHA256878e2e48f73f972d7f9e77a8b680a40078106df19126f801056e1e51d822bc91
SHA51254d76b3168e24f91b0d67a36728c4d1a99c02ac41ab3997800dae4e907033ec4f3484f98650de36729c522e0233067afd917e898eca65a9941b219fe70711b50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566a40fa215b0b93571ebe68e0099ccc5
SHA1225c321a031c6fb746d5325f37c6df0d9c7d452e
SHA256fe6b47b8dae3d3d89d71439b46864de13b02a4c8e860e7dee3c8450cb53bc863
SHA512e56e88877274f363da4fe076590e7dc5265705f4858e26f27dc30ea2b69057c307a1bcc6fc5db69f3449a3be8b865e3a098b9426e840a10b336cb63cf7466a80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c6212c15b502f02dad9e5cbc5d626f2
SHA141e252f064a2583dab27324e4ddd1ffb19105d0b
SHA256251651669a6f165d3348c3f1facd91c4c42e25cac1b52ee23a31164971abf4a5
SHA512906d30841f71138f4422a5ce6fd73fbbb56676e709ac43a4e8e0c5948e19a66219eeca44426bcd12231e9aefa926d3382b4942970520e122bf166ff549dd2177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5341bd77a5fca6c9ee607d0e75f021afa
SHA1cfd76fe4c9dd0baedcca18b68a199be9f882f9bc
SHA256cbbb1175cebc205916c67e4aef5b30e8c020f3152941a20fe4519c7b2762fc5d
SHA512ea4929690983a83a4fa9bc09b684df84fd4c4d772f685e8018572e3754976f1661cf9d7f2c04f0e96d058a043cc0596bd63455214beb5a28602f745a84929ffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a5e86788bf5b0f91d7e9e119b44fba2
SHA193150bfcd98542c0aeacf065e64289e01a65e3ca
SHA25608b6fee6b752985f6b643e69e7f5a24f004c82081d2bec83da9af5612c7ad4f4
SHA512ff3fdb3b3d15086d13ac253d82f812511cf14b8801b2d362c11ccb41541a675fc5199af9fd42875f4350f89479ad48dcdbedac0e2286817da6ace57e6256e187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507f75d7724e3811a50f1594504863737
SHA18c71cd91ed38d404a330b37502426299a67be949
SHA256f84be8608795d1dd6c8e9b837a89dc1b33579e635f18740b6a380e3f61b39ab7
SHA512debc585c2441062cc8a2e2ffa906f17fe7eb33c1c17cfb75004bd51e88eb66943b8824d26b771eac22926ca2372efb9a7bab990bc9552950cddce4023ef5be8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50244b4bc7ca369c4943dcffe06510634
SHA1af0c3501062014816088b64ce20616ea80e93304
SHA25668b8e76200144df36ef0b0aa018ce855b7f5ab646b46a08c7c4f4183b332815d
SHA512bc87e328693b786c3589a12f989b3455cf177f85d8b820c1e0ec8be66a13b19c053d0edf7bc407506a0c5d3418ca19c99c00a169157869bf9549150fb67965fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b950f425bf9826070009d9df994a122f
SHA1172bbf6ea0c8c58b1e20e629af87b12903800e21
SHA256f34f16815592034d0b841255c2e6fab77dd0af51cadec213df799037de6df25d
SHA512c7c6e27421c06cc9f2476d502af66233f5c9849cba96db3048b60a0d04189cbe3806fb0bb8ab27448b98d8450ba9a293dd78f10a14f6eb8a34fb90b911222a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7dc0c6437bacb8381daf8bd3b0cf8ab
SHA136a39aefea2913f7ccc6b923a5322344dcf0cd74
SHA25607b809ab29b9de89f83d4c6b562a1ba44ceab81ed410488de9658a96e3775ebc
SHA512f39874ff1c307ed1e1e5d16f93998e12a354844600e86fd42c0dd6737029e4f8b20b07e58a37c0ad346fe315cabb0326bd223c434bb87a677ae1ce21f79558ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500d559e92f2180fb987a2e85e105dccd
SHA1409a6d790720d1646c37c9dc7bac4c3ba5ebabf2
SHA25606ad64ec56bd4399c69f81bf9f029f462796b0845e71c833b92ae4101ac5a47f
SHA512faa1c974edd778c9fa2a15968aecd87411c44cca4026b935783c9be568640143efe380b306167ea377e827656e2965442cdbdae7909f9460b2274b3a92cbf3e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b2ed7c4d3e7ef622b0bf85324adbfd1
SHA193be40783bb1f6d316a1aa9632884e54c3cefc2a
SHA256e15e78ab619f4f708f2670901b693bfb6223ae559be40a7aded28fd4d9fbc55f
SHA5123e097357ee612a3608837ad74435788faf0171c0bdf10d879cb998e61fe3cd2e669a41c0fd036ffacb483d5092059dd41d8adab01410f8f42525d8e5fe9089f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e61c24a37259842641be58058174bd2
SHA10e50251511a7c228a67902c8af846731b720531e
SHA2560eb154c568362eb332abb214b8f7f0477b38d361d6dbddb28cd885b40cf60879
SHA51257780eb732a8e5859f3352158b0a42c12920f31701954c6956a8176f363bf270f6837ca9acb799a7926dbb821fc41a2ec071e009a7818cdbcaee6b9c095c38dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5ba5713b81b8e3b88654970f4408e6a
SHA134e2fb1112b7205501f25e3122236c7080a8a5cd
SHA256d4c9021b6b4d6e200f06c44730573f3b4d4ec26a11755f9b4a1c6ed8acc45755
SHA5123c34ce8db074190ec29e91888e32f4a567bd3a8cdefbe81841eebfe93caa4ffd3ce8229d84a6f527d41766125b18a0891e42921b71d40b571f7aeffff2d8707f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb6e831f813b39ccf23eb87e3b196bf
SHA152b0330fa6beb74b5295e45dbfe83049f30deeaa
SHA2562ee2ef801791b904fc092ced85991a5dceb53cbfa0224c34a1f8b0784617944e
SHA5121e54372e7b650281417eacc3388c8d4f592f855f9aaa7343815dfd0e617242df81ed0a7eca89e24087760f14de182965d55e7f65fd065de68b8046c69ca665ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52acedb43909b55d361c153cfba9f0a49
SHA12d3940065766539d6ca56898bfd2d30d23f82c7f
SHA256ed9e98dd98179880c9042386fcb4462ea634d0392ea70f3bdfcf4cef53e4c82a
SHA512f3beed56a7cab55084f17f6f9dd00d795fce1f453b3db0e6c5e1ba9429313a237368d7e4c574be8e05d42ade28c33ef198661e17a0ebbf0de7620c0333471518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51196a221398a2abd5c056f9b7f3df304
SHA1cf7d4e3a1b8f88a6987796883d6999ae04b94e86
SHA256c422ab699e5881a25513de41fdf9cb7b92f64bb78d0afee7af378a91e6b60d43
SHA5128952863b12d9e01917dec070b8cf394c8f54efbbe21bf54dc967763ac90d1a9d2d978126d949346e1fe82ee86d82b3b5154193eb9127bb00cf27c6382482c4cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59201ae00b565f38b30beb9dd1383896a
SHA179f4e68384bb358535ddb1e286061c2e2effa390
SHA2562b0d138a1d628713e9bda7f7a3754112dd609d3e9501be72d981d01772af01f9
SHA5123f2e660f27e791eb468c04b0170bf22a97035589c9338388b1141020ac6be17c903730cc9601cd39e570afd066227ccbf5f07b9929f35477e4a0d06880bee561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571e08d18ef3873f84ed3643ee1878754
SHA1582c1bf0dab15442e123601f8d8f04cfbef9a951
SHA25641705e9824696a190c5870ef3894a33f60f50f26d398effbd93c9afde72cd00d
SHA512a3bcffe25eccf4a7d6c3fe6011fd4b163c852efdc275ce4b3f73663abe42346ea1abf80eabcf83e009160cea7c903c2ba09b320f2ef808418bb7f975d613d191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0ee2ccbc7b5aaed69ea66188fa2ea6e
SHA16ecc7c183383e87ef25f878fabdf1467d84d7be0
SHA256e7166e841b1c32310f0ee89c824d35994d92ccffbcd242fadc570dee55a652e2
SHA5129b066df8bb9d3a3fed46048d721fa88b3f76a53f9000c7521e9bccdf1dc4a6da71569000110a316ce43a00163fbc5f0dad393a56368630f619a52cfc7a53c417
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b