Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 17:55
Static task
static1
Behavioral task
behavioral1
Sample
d284b2c0760a037987ae2e9beb302019_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d284b2c0760a037987ae2e9beb302019_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d284b2c0760a037987ae2e9beb302019_JaffaCakes118.html
-
Size
14KB
-
MD5
d284b2c0760a037987ae2e9beb302019
-
SHA1
504d570b8024dc0b84fb771e7b3b317fc5821c58
-
SHA256
d31629d1ff676ee6cdd491de0b4285d6282545f7390d3d06934da0ef1e02dcce
-
SHA512
31cd0391a6d1bdf62d27ee0492e774aedbb0dc6c34063ad93cf560e8953b847afa2f7d0f98305fca65ce5e4ea17a924202ecb54d13c4edbd51a43e6378be1964
-
SSDEEP
384:04lI5NHSMmmm7mmmdoLzWH/mmmT29mmmc+mmmP:0LN/mmm7mmmdow/mmmKmmmc+mmmP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 105374324f01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431893597" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5DF01151-6D42-11EF-80B1-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000001a2b5e85015528d4885c909a0b2b41889566cb11a8c90a16a6d742c519849872000000000e800000000200002000000059234438f7951d3ff8f45851729b945430447471477246bd2337e3d6c041eb27200000003f1e99325a5ac7b669bc8df7539ad815f79444827669b835769b2406d8bbb23f40000000b3f91be9a465f19a1a5b2cec4eeb30b07c76d4ca34daedab98143b3a3c3554b330050d92f87f492ebb0590036057a6430eb04a7acbc938a8795944ce803e13e5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2920 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2920 iexplore.exe 2920 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2832 2920 iexplore.exe 31 PID 2920 wrote to memory of 2832 2920 iexplore.exe 31 PID 2920 wrote to memory of 2832 2920 iexplore.exe 31 PID 2920 wrote to memory of 2832 2920 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d284b2c0760a037987ae2e9beb302019_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2920 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565931bb19c215efc965c84cdfec43b88
SHA16cc457c66afbcdb69ead694305ab63e3eff5497c
SHA2561d854f40c7218c234ffe5f1f1f42391e8f4f5c55e96c864a7811d34424b45dcd
SHA512e4b3e584c91eb332af5361f5c2eb19e71213e3ab0776f8f372ff026aa766844f222350930ab661d6dd4d5568d0971910b148679f2dc7874a330b09afd2303529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55068f0ca7319cf2a83325bf6d99ffd7c
SHA1a2215fcf72b8a2b675047df2d578724e6bc12d8f
SHA256e876d5f73d9a6800c61690760c1c765cdf82801ecd77f277e1126afa55e18bdb
SHA512005f834fdab5ca96aef1d97518449459695f7b8a16f0fe176e147e5fa6e055c14d20d2a9d6e54c6e0235bbd627be8a9d958ad537c13c7e8f16eaeeef9e335f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a1bd280ec9e41803202d5003e577f5f
SHA18d89d8e0e877545ff474625903c2d135c724ec27
SHA2569fc81bbd2c7b53a2cf3a2c94dc2190b625ddeeefaac1c3811cbd9f45307cc2b5
SHA512693d35dc9502d09534a1d0074cb8d2a3777b067573060463e47cf7803dda7fd833080ad3b574924421088b1fa1004aa74a214c11fecf91ed3bc8144f717623e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2015536e7c4a107fac25c89449dfaf3
SHA1e94b27d6f13eb7ccf5ad8e82f9bbe00d92fe83c0
SHA256f443e29e22b05941d05e6f08060e82c6c7d0d93e5179470685e3803db58b4f64
SHA512d528c8481d5405a5686d9286e8a38fa5f3c008653b41ecd406ded482ff41c9ce4d150af27d782ffbad113c041af34a55c4660c44a7280327cd3fe01103ff5f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65ff96bd8572abc7b79ebb1a33df18a
SHA10a7f5aaa2c09778894e50a7bb5cf3058b9fec57b
SHA2564999c6cc3d2870707e804d0764c489ded7dc04f12b4da2eaedd14be713f5e9ac
SHA51266d42464826fa535651871ac61d46a318e0d6bb8a9a74d6e23bbe81f18a71e823e3025515718ae862a2667c01484aadbe0c9faa70bd6d33dee1d6d15b62c6dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa9ca4fd2e2f8fc5f8a61e4fefbf1811
SHA1aaf564e3f306439a117d62c5adf61cb5c61bfef7
SHA256530f6f1da23a79fed05752ddec76ab573e7d3cdcb08281d6d899c16780244920
SHA5121d24fcd7fd0e8e965eef3842e441e17368393141a539c0347b5af0658b5f6a38f974f227406e793522a36b264b9a8ff8a3a8071b4932148a4ab3090a5165e3e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a7828280d1355856f609b7ef92f2c31
SHA1cdc6d24d110040e62cef9c1704c56f046031f8b9
SHA2564189e6b148e8dbeef7d5184180f51c15d210092dab35f161c4dde492f848c642
SHA512b0a574c524e11dbf6db14aba0a83267d3edf77614babbeeaf004537027a016ec76ab0f4b69a7d04cf0e2685b478a133f900d5e1e901df7eb34ddd03f6578e264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2aff1763f3855dcf0709797e5db9439
SHA1b8cb417ceb44b5578a7b74327825750d9fa5b512
SHA25603d5b876af8316aa6bbd75058009ca03f9cdc5094a8b977e2ccb024f12515947
SHA512b996b934619f72410c4bb911717a46cdde84d2d817235a903d88ad26c4c03b5e54478037af336ee93800d9b616373517ea84d3573745b2c71122dc68f045bf37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530e01a47c891b8013eb2ed688eceab1d
SHA1634176b7cd1d4b428d203e9dd3f58cf0bc8c460a
SHA2568567e504e494e1960a60daba74f755471dfd22d3cecf83764f4cc3e58e80be4d
SHA5121c146d801ba5f48ba2fb46761cf5f4cca7e731bbad04e62c7d5b45d86fa8128397609daf671820893a15f9c40037898947d0e0131d57087cb5a70ce4e39888c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d230dd7097e1508f2ae9e9c155ad7fbf
SHA1909c822e19ec8413c6ce427c1dc6887df18cad66
SHA256b224b9bf77e3b526a36171825b1bed791cd5235542dd9d884d5572cdb0ae1bfb
SHA512ec5069571a8bd6df6bad92aa1c05854fb5b7eb0dcde12d2c6ba31a1d3a5ff61d43cd0a60fffd5906b9af1ccb5c8dc4a8bb10a42fba45b0721efbd3032f008146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb138b41c0b9320bef382d39f01b9ec0
SHA191a90312aa82c001a7a151c4db1dbbd08c528d92
SHA256f9827851759f1a0a80eb3624eea10e15c1ed74fc3c72bc6b0489a370773d7f50
SHA512c194580580d87249cbc89b266611830d0e4fcee0f80e842812dd2e3ef5f4f0d51754a51f4527417d55904e5552e5e4c4d6c2a1da22a963895556eda209e64f57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5f987afd383c1c84cb944d0a0958eec
SHA165fb781dab075b7e09c53c4c11fd5c241099f060
SHA256f0b2521f30052be7fe0e9081621f9a5a431ca7c57c2ce3608f6a8bf070b567d6
SHA512c4f8dd0972932ceaa21b82c3fcc570f3d531520d2c574ff7e7d2d58eb81f1a01dfa7b85d98b61a9e69c6ee6fde8e2a6fb90115b8cb4e330dafc8efc343f147ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c52cf876e66365976bedfa6e063da021
SHA1cf4e0526c5582d90c62a0de47f251e75d5fb6efc
SHA2562c06cd3e9d334770908a95fa251390491737f6239300836d06ab05aa58ad716f
SHA512d872ae2a521e0bf320432f52db2a99760794a95be68b9c53ddd46af673c265eaa94ef83145db112d11bdfd63823cff583f2cfc470156e4f60b73608d64175835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534daf9830fd05140c5e9f9d79bb1455f
SHA15ca5def1ae53d04fc81f7ff963de14798b9477ab
SHA256c00bf54308f8a48db5c94b6d6d01782be1480249052a18fbc23d45217578386f
SHA51240584ce41950deabf3781814ae16467f014168fe365e39112748ca4e59a1ced7b42eae107263b279f277e23dd121a3efdedbb7bfb38878df17558601145f33ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5150ebb88e631aa8aa98d0d9f74be9815
SHA1f3444ef10ff1a2499cd6799ea3f5f398f672920f
SHA256075c09554d24aa8d2b783e2e30e2cf86b5caf3a275bac860f8b988b2cc8e2899
SHA512df058b34961e70addf64856fe1cb14802965a3c5adf61bd13925bccacbc872d28ae6dea7d027948f23d1e696bce7a6b129b8a2bae311ce47e59f65a65f688960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5549977f93c94da6a92e14165fe48f08a
SHA1fe33783d757ba39f39db6dcfb3c33f1c69c8562a
SHA2569cd7755fc88932a00fa169e830aa047baa006c77efecfd82bc5f9c7ac9314193
SHA512994e25eaa3bba0e5e97b3ace0c9b31efdf03b668733da4cbe822cde113c8f0e9f927c203e8558ddc0d105e605dc7787f5d3724780dba852a755a31aa0ea3e2e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5b32884892676263ddf2267dde49fd2
SHA1089016e80532cce264416cf6dca27d5b6c370d65
SHA256ba1f4a7d3c8265e4589c630170357725c384c188a35eeb229d52b57040e5a107
SHA512ad105d262ed80a102b713a72ee911c7ca5e2a6a008905a96a30184a7fc05b86ac54e7e65ccc46a58b6ebe8f7a573bfe43f2b9532d034948b8b9acdb241a7b015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592b34788bcb640b425c5a04f2d0aa3eb
SHA150bbd16be4272e00b2e85e4789713662a3ff83b3
SHA256f030952dbab14e5b7df6b7b7c4b0bf8e2a3a92647ed0ace747deddf80ca7b760
SHA512d54720ff082d763fb6f35e51c702cc2da283b3f68797207efe42df945105de88cce93e274b8d8babb1d2a37c4a125be089210fa94335498903735d052d7b8fb5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b