Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
84s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
d21d1efd0b6f67fba17a6a0278b15220_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d21d1efd0b6f67fba17a6a0278b15220_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d21d1efd0b6f67fba17a6a0278b15220_JaffaCakes118.html
-
Size
67KB
-
MD5
d21d1efd0b6f67fba17a6a0278b15220
-
SHA1
ff70311f80078bb2db6228d4d363002adee4b299
-
SHA256
2a1245069f9686caac2d35ecf01d5b2a3e0b667712249f116902202ad734d0fd
-
SHA512
453400628bb1257269dc5ff3e79062b811ad2bf574280d0297f2cbc686b962aec1a8e03154318ae397cd44d44c055ee6d4387a1304344747c911812747e74a3f
-
SSDEEP
768:Ji3gcMsSZ8tN99OIsN7wjeHHgIoTyfQCZkoTnMdtbBnfBgN8/oygcR/QFVG8c//L:JNW3TePec0tbrga6cuNnzIjv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10a6748b2f01db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B5F50C91-6D22-11EF-B956-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431880009" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000de62161f52766ebd24f7e4004f13ef8128f036aa122d01ebe2ea07a4d15f5503000000000e8000000002000020000000403001dde535cd22b2f4f981e4c7ec8a2a5ce80f4e95d611debc0fbb0d8a281e20000000fd5880f938795532665783b2e9280bd791cf3523c838241d52ab19f0d8c83e7c40000000dcf46c50485605f253d8819b30c2e3d30581f657bb5def4ce0ebdbe0f6e616b3d76b0c7e60429f85d8f4603eaee1145ae1e3dd7e0cc2877c7389f1f57724198a iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2888 iexplore.exe 2888 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2820 2888 iexplore.exe 29 PID 2888 wrote to memory of 2820 2888 iexplore.exe 29 PID 2888 wrote to memory of 2820 2888 iexplore.exe 29 PID 2888 wrote to memory of 2820 2888 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d21d1efd0b6f67fba17a6a0278b15220_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e099e74885a5e867d8447f401eac8ee
SHA1ae9bdc57cace8c5f4f14aa481819392b1a78d0d7
SHA256e8d14a59b260a9e7d24e29fada2b711425b0084da70f97be89426c651dbcc239
SHA512630d0c2a567bfa8333883d6c44a830c91ea626379a82bcbb284fd756960b71c5ebc5ae245107700d56ab94d019853de2d03f88cff1ed74fbae1e4659d047e2a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c07d001410f08d2d7c3004e88a3f3073
SHA1ca46be2f96500f2773b9380bf18886c94f8ec119
SHA256bf923aadfc12ffcb8f9816f64f29ea2cc19f54a82467b1b1f4a24b6ba5b4f6a9
SHA51236133ac7106dab57bfe7cc50f2362d9e2b72ec526c0f5fe09ab2290f2d88169e327fb16738b5926a438049bb45c5ba8a0c585c08c57d33cb8f4be5a5fc2cc493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536224d25b443a16439462f449abf7cb9
SHA1cae3c67fb475097b7acf92ab7f3122f4595b9e3c
SHA256ae7666d3440319179b0e9252ae7406b68f6ece064feb3f11de85aa8e72c0a32f
SHA5125856dc1efc574577501cfcebe65a68e3a8bd002965fdf99461057009e15ce73781beb9c88a331be8dcd9c60adc29dbc4ab53204f2c5930dc4e478f26b357784d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c69c2ff2089894c09cb0304da1d51f7a
SHA125a071b725fceb40ccbc7ec7af043320cda5cf40
SHA256048c2f76b63f3c2c830f20989f8bd22aaa59b422e2d854d570425507ec53e97d
SHA51297809aaaa5d8fe4e90b0648b1d7e408e2524285482e28cd9f27f8f83931187ccabda9e8e7d9b3c95a0c1c957b4657c3e4a13d66438d7788fdcf9aa2250cb06b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fa2e3c363375c9f43f126d07a420db7
SHA1c927482a71736677790b9efc0034c4383308ec55
SHA2569d3829b1ceaa3f631c2f65797842e9fcd7566d5091aaf721420c7bc8da77f690
SHA512503994ca0b1c17e11c567d2aeaf314f94738b2c964b7f57cf3c1d678402b1fa2848e44a18dfdb5478e0bc7fbd9c765c78d7c02077f8c614becedc1d13b93afda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d808d2e8c2e239bf6a6ffd01b2d6927f
SHA103416ee97f5c4c171a540cfcafd8147bad89ccfd
SHA256ab498ee4e971f5907a0c7cfe29f331ef5ecb41f7139c73002bc40334bf7ba5b3
SHA5129f3393a5a69a8ca5d8a85c9e58783544a4161c59b6fa311c4759deda1ce0853b3d71143971020cb38dbb850714965e282047656868f9c382469d350a5b8b75d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530985b807936ecd6d55d69cefb698b31
SHA14844ab86094217b230b5bc7e98f65958e4f63080
SHA25633f5872aedf90015defadfc13258e76dd242061d8d487e8f2d216d46737411db
SHA512e36fb7cf9ddbe254892daac2814e2a801f27e9687cc3da6aa98a02703627004f5765dc67b95c739809e0630c2d0e62e57f0ee9668a58fe3a2ceb9163a40c95dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5204c0c28112067534f233e50c1fcb9f5
SHA178528d5051a6277108aa0dcaaf885833b2723999
SHA256b51ec4edd2e7155b57259d1974449a73b515b406447fde5334e55292db3acd6a
SHA5129c69954092ca1a2732b1e2819044e0bd398eb55e11e75f481f792df240deacccc8f3e599f587f2557ebe12eb404ddc5a366b563f742a80779254eb4177388996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5935c87c4a47b87c831437c3507012dc4
SHA1aa7ad6e522318f8a3451a7765cc0d36ebe8f8c05
SHA25621fc3d42285b940d58e927afd4706d7f0b3268e2644618ebc891623811da7943
SHA51217c3718bd5a3920b8b14201c53b219b1c16c884aaef31a552d3117c0dd65096db69ba567294dc1a9ffbb23556997edd215fe17724a30f6fa2130b20af9667542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559df80836003b56e0a16ffdb1bb60dcf
SHA12f7057a60ac0d748119c7a8360efe3b6530e92e3
SHA256054cff1d334be44c0955b4e65a10dce01795430521077d1e290d6379a116d8cf
SHA51202110e8c740460919bb39e0df03473fdff0b7ade06e1a2cdfeabcd65603620fc9251496cdd07060ab90a7fc9a9d00cd0920c6db016a17b3fe35fb0b8c617b308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5192362af64b46587255b7d3aae057e8c
SHA1851ad61cc9d380ddcd4db2d261b4fd8aefe0ac79
SHA256cc00ac1a2958933dd88740ec7fa015637ba9c7b892055766abb6c9472c4ea459
SHA5125565fbb43ad4e88ddc9d93917adb739158c55c64f448cccf6c8176224ccfb31df8743566e158b8997a5c92f025ad88fa39cb3228e2732f289e5731765829b93b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589811c26aa4a2ca8c6f7a836545fd4e9
SHA1bdb127ad5670bc5ea1e8477ee72221ac85c6db48
SHA2568deeac5f2cadb0ca177b83671f9434d5ce452a1b89ea41dce70b961eba5c2e28
SHA512db123ebc7fa1b51cfe05627a11798ff5829b2f02845325dcb8bd61bd9366cf927d4d0b2e9fbed4100ce46f68d7651f302e14aa6546a91a4e033de7bfa31e455d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fec819da3ecbfa8b0628c109a6eaff88
SHA1c22d3d14302b1c08ba844510f6a40bd0d099c5bc
SHA2566428cb21113bf1d6d982519e6e17948c1afdbc5ba5cad0e653f2165fb41b065c
SHA5129e2470906a06e4fb6d2a932beadd96402240833c1bc0fc99e5286d7c64a89c86d2175b900ed721792294f2d6d09fb6ca462dae0c50f94d8c0076d5d23a5fdf9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50419bc55eb52994d0d2a03457c25bb39
SHA17f930000b1e7a036f73d0dc549abbb6e552f49d6
SHA256cc78e4db2f1d353c2e4fb7eef04bf7e7ea90255baf16574c1851d4c0c837a9f7
SHA51252f81e0d3c549014d31e2bb8073a3d1f61343a486381df72cc34fc5d73dad08b5fd2507a59d8aeb973189fa7337d26d1b904a2c53ec0105888684140c03859ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529fc41501ddb82136b61bef42864b630
SHA1eda6fcfabecc97aae569897d320ab81c36b8002b
SHA25636a7ebdcdd3aa413b593a7f405ed2495b3a7a2a253cd752bf0e26ac996be6a37
SHA512ca23f0f065b01bcc10bd32f1d99cd879836954a28d101cc7ecbd4d02da46bb2a8f06fbdbc06a8ceff0f2f811bbdffeac4171c9d49587e05f717642dd4a0fe3b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b900dad1ff1e0b3c876c0ba04ee7fb84
SHA10319a0d1df8a5db8a600207f78e2fa54bec0a6a2
SHA2561f5aa3989c1fd3203ae530ba931de04cdfe077697769ed3bc208ec275447fd0d
SHA512c9eb6b7fe2a3e53a5ed10cac8e3fc34a3d59df7aea3c455a98cd76e53c2ae0a5a89312abfa68dd32ac12a51a0627b5e850297d28dc5ade8cb92f1c55bde0162c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58595974839815a5b4cc384fbc4430a01
SHA1a6c5068c74e394f4aa4ff136527881139514f5a3
SHA2564fbcfaa996d5f2bc7898197f0ed9d0341c845da08400f8a2c4cef53c3e95eac4
SHA51235da4343a76714184e92a8c47d5cb7e14bff21c2e334dc8d86924e1a3cdd10c95cf25b1d52c6c16483a8bafeaf49c263b61def86e715551c24943b24ba5635d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecc33bfaf3513ec82d04bbdb06314987
SHA169295b0ccdfc75d3aeb7ffd9e7d7703ddedbc936
SHA256ede56374d11be1bcab7070e0f4c69cae1b83106c1e4637f6adc33183617247e6
SHA51259016a11f5d53621202bee121d8834647b25ea24e8f210e87d359911990d77ee3cb2b97584a8ab3da27dab7fc8b40e1632eabe58454d8539ee5a09713c4c4ee2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b