Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 17:51
Static task
static1
Behavioral task
behavioral1
Sample
d282e4f7ba0bc4e736c7a714920d81d9_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d282e4f7ba0bc4e736c7a714920d81d9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d282e4f7ba0bc4e736c7a714920d81d9_JaffaCakes118.html
-
Size
10KB
-
MD5
d282e4f7ba0bc4e736c7a714920d81d9
-
SHA1
7ef968e88cee5ad13915e84aa3872b6a68dda379
-
SHA256
533aadca06c072e06235799460475bcb698b06c9092eae65e9a02f7196595caa
-
SHA512
3742c30067ce5009ad78dc926adbe63f1f3fcba278d4f63b1b12441ca0e1b1e108d8cc841cf655a35a2bd3fb2e26823a6f2e1dc376d8e0222e116c7ac8b8e60d
-
SSDEEP
96:uzVs+ux7bJLLY1k9o84d12ef7CSTUOGT/k9zZm3pwVCGnstTYSlVHcEZ7ru7f:csz7bJAYS/TpWwxnstTNPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000517840dddba853fda14ddcda336a0cc97dfa62043bccafe90a3167cb7d1632fd000000000e8000000002000020000000cc9514243037b1fe1dcb37c13b355059afa682fe388fa2c1e06fad0366d8b5f72000000087cb245526ab5441436d890ba901cbc69fb33fd20580ab3cd409afd68fb7c8c8400000002addab9da96514b5c7247bbef356e31f99b8ecd480b3321a28f9a0e6a620fb0234aacde33a88ffebbef09e19739ac85b7d337da8a49940249f8a2f0687c6cfcb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e09d5b9f4e01db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C8F1EAB1-6D41-11EF-8E54-C2CBA339777F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431893346" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1072 iexplore.exe 1072 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1072 wrote to memory of 2788 1072 iexplore.exe 30 PID 1072 wrote to memory of 2788 1072 iexplore.exe 30 PID 1072 wrote to memory of 2788 1072 iexplore.exe 30 PID 1072 wrote to memory of 2788 1072 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d282e4f7ba0bc4e736c7a714920d81d9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d71f7a7bc92cf5a5c8c543409e6bccf
SHA1099d1390121afadad761f7ca01d7a5415b6094a5
SHA256b5787a475400a878fa6f853e96a90b39dc7e623b3fc0a9e01b40012689d962ea
SHA5124fb19f4ce8a54d5a0563ad42aab890265016ffdbb7484454409467deb8b24cf23c25ce938c88f802b8ba0cb4aa016f1ca45de6c1ef6d4a52d939621de0b149f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e187bb21983141fc053f063f313bff1
SHA10ed58bf26d6e8ef4e8d33b6536c49f2f63c763e4
SHA256643d29f2525467220c285728c77a4cb4191224ccc7d9f5b980f4cde968011afb
SHA51213fc45f6aae12baea0af089981966d95e406e0e8e0b10a8ede043bc37ac23ee31fca6d00ee149c834b5863edd31d9888929e6b5dafb8946c187f9d690d03cddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a01e6a4c0b8cdc49048a9c044f729073
SHA1c7e5decce06f70b865388ccc57fd66af8f6d7fce
SHA25601c8401c7cad1ba51ca4a82015770934a529a79e758c77faace56886f23b04fe
SHA512d0224bb7ae9b0dcbe7f18fa2e232fac65f251a9275070aca7d04501fdd68c642b23348bde09459d2324d5948c5879ff8e70bb7e10c54efeaa2bcd87f12fbf9ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0a45a6a5740f4ae32a09f65bd5c4e18
SHA110e4dd7fbc2ec3e25fb85c841a99884f1d997b06
SHA2563077d49d25fb528849c4dafb7b4f3fb0edbb7137f33445d76d232e37fbbf3cd2
SHA5127ab27cdfb00e8e0570ae396474c5c1f765314f5f9ca8e09c54c6f5029bcb8c7a9badfb4dd5c814026cc1dc8d7bf30f447da69051514c5388aaa1b08e2614b8ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59366c4f38cc882ca6da1f738c2b0660d
SHA13e5bb0e1d2e68e464ab186087ff544c3a41cc1cd
SHA2567b58759d3a809082725bf6402bda2c4b23507769b6ba8b5334dd992e07e2c72f
SHA5121f18cd7df6a1109a6a54aa5bccb57d1b2fd54e3c0ae073d3763646855175924917fb2c4fbbe39575340e903d80c15fae91bece0b73676023be09a9586e34dcac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b530bccf05bd5bb473d55a5570fdaf22
SHA1fb2a5d050eee0cea49859834989ad906977e7dc1
SHA25686bdcaa97c960ae12211b0723ce0065991387b8ec8b22bfd6c22fe1a5a03fbd5
SHA5121d3fbd77758ffa6631cc19eff41ed2ce66e77af25ea60d18da5bbdb6f0821c10de9169c805f54e3fcf5acc59edb936eb6928f8711b384cc1c2e924f7a956abfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5994d82a4cbc2e4b4b4f54abdca2514e0
SHA1d52f39cd50ee38cd6553e88780105f2acbafa69a
SHA2562017dabd6fa6e7c9fd574f3d3992db9e51e9fb82c36757b69de400a3f81f59e4
SHA5121d4911337b3afe9706e28385197f009fe46c4633441294944e2f12995c0ba2aa3312d4d01741077e7fabab84735f124dbd07ef2516b53e261e49543ac62bd792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541932e822bc4e7fd1be46799e6db5838
SHA1bef382690798f0070c6dba6aea23056b2f30d62c
SHA2563cf5b6420f454dc2356727a17b42cb2124e81dab45dc7b9cc3813fecc587cb39
SHA512bcffd353377902dd6adb29c0ae3a816e011bd05d537747412861bb0b93e65f10ebab015cff30e4f112c894d657c0b8cef792101e39c82b23cdc633f1965aac63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9b50ea9a0993ec3f73725f7e2850999
SHA16c6fa1142b69c033caf9437bf086b64166ca2919
SHA2560f1f3654d5537ed1f614aa93771424ed262b3d1a07cabf590b42a96cb3b2707b
SHA512f002fdc3ec178d2b0347045c2d0b6d1be25f441369d7e2f913d29f5ab5ca6831ea278da9bc67911cf6e9c587ebebd928e0655c39eed0155c153f4d56114997a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575c194006624362420b89a20e53012aa
SHA136ceb86d501e2a447df42ee493835f51a4eb25a9
SHA2568e1f176a5e38b4a84c7d6bfa092918745f089edccb61b58ffe1b5131e8ad1229
SHA5123d11409715211a5bbdedd0b15d8b7fb62bb61fd7c2ec738e97fa7c081f0a54b7e00a99a4e380da3e3cf3ef3dd81ad290541250eb6d62e4bc0f70a8f29f907b02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518d49a5bfc8f5a373abca9912e7f691a
SHA195bbfec70928dd8e98bcedfb06e4ef1ff9a71b54
SHA256aafb8b1a9c5f32b09c15c92cefd3e150d0b68f0576dc46b0d9d84c6b7817e958
SHA5122c7a0c642401cc590bbc923261c5d7a6d03a9054e8675dfbdd59bc7995d0e15ff67d4447bdb1dec25ee6883db0151c0680df2a0f51b92da972c8ba70d213892a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5165081ff401986888ad6bdb076c196dc
SHA1daa2784ff4f1c5274e83fa262ae531c127641057
SHA25612829ac60099f05a3b001d4a387b745ca75ba82dd34253efa87e17039f94c0ac
SHA512166c23ea9642732a4efcbc50280df565b931435ec19e833115c8df009e635ad8fb2bcd034f656ad8d716f4753e063e167290675c9e9ad8f1b2015de8a9c873b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee9734a852ee39291269e610c59b15fc
SHA1ab60218ac1cdc238828c221131d61b340ba6d69a
SHA25678fe90c3bf80343b846609a281e78ec120798e2f1466e96e8d1b54b0186a214e
SHA51231db379cae339e7d1e96872b5bfbcb6fd5a9dc04c28ab981e6d8eba6559c594fc02732f246f22ac5b947969dc6d492060ab9b674b0fbc1f433ac1253c69a21c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bb8fd1a9387c7be7c52316f5af49cc8
SHA19f88c3f9e9e2499da9d1657995bd65241287071d
SHA2569231ecf840c61b4917abf05715b384472c9b78dc73fecdac7c779a5c0328f6e4
SHA512dab15313ed9d972b5113c0d58d45c596dad7b2f1a7041312f129d1a1991e013cf4bd6ec3752c2a6a116941d0bc964c5adb2ea2d552da6e0e7c425914c79c9c37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504f7f9f8080af5a182ea439562d7da36
SHA120f2239c0bcea6b43d08f88e673360b17c7d8a9c
SHA2560300672ef3888eabaa4c591cf1ea810780d7eda5b7f9bb0bfabc8e03b10a3b37
SHA51259bb63d36a94837eb2d3c020138c6e4bb75f714364bea78b2344dbb839e17d5995b579c3825df31995abd205a2c21ed68d3fd65ef4d4d9e4919447840234d347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e65031076df2e827d97b3cad4e12f50
SHA1ff826a0ec94b09a87bf744fc34c948cac095b19c
SHA256106875ffd815931b946b2d729e6fce64890ef899249f8a4b732e22b9865f8f8f
SHA5128cde740976e2228d45b98ee9a6fca6627101a79eecb84e63e8c4b4482497f48094af867d235f68da11b1442da379fb8298c098415cd7a5f286f88469410bb324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd4ab5e74ae725a38cf79f7df92ba6bd
SHA1cee55124d9d3535f7f2d404f0f49422a013facf6
SHA256c9524eced350b916cb14958c782bd97fe4474a3f8bdd1fba2f02d9506aa8cbaf
SHA5129775679ae1e44554cdb4c1168074aada5ba7615ad341347d2f03daf2d3db6d483e21415243fc9a829a1834e809d695961273383b15c8ab0e4e614d80741e97e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5519760ec8237fd67b2834fe5f6b5b27f
SHA15a055242c3a82ea65b93c296869643f5e2aa9e31
SHA2561136d28ed566ca218824bd318fc03cfa75203c9cc292f1bf8826dd5004a58a56
SHA5122e6a50164fc73a51c532466a62326c2b795a63eae16d174bf98249a1fadf4524f3e72cc344a0911012b15e3581144af5801b67b0f8f0cbe5df7df645b2ec1d77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c6896c7477b547669a0f12ea76405cf
SHA1c81a35f66958cf4125709e7ff4ec8b4674a54ccb
SHA2565ea36164efbdfa235de0e705be900868c8e57d030e65d351f64a2c6812953ae1
SHA512f5597c89549ddbc37fd0cc6cc3f38476f5a3cfc89bd09d202fe4b05270e0e35035b156aa675b8c30668cc6bdf13b4b96f3a7bac0544386584077cb64c732588c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b