Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
d2d881d74c4fa5d048a37c26ac5b7fef_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d2d881d74c4fa5d048a37c26ac5b7fef_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2d881d74c4fa5d048a37c26ac5b7fef_JaffaCakes118.html
-
Size
11KB
-
MD5
d2d881d74c4fa5d048a37c26ac5b7fef
-
SHA1
bff427ea9630bd988a5f12566f1549daee578a23
-
SHA256
c0ea8e442c0a756a2f2afafb92313572aaa27715f75b2bd99e81460d83dddb73
-
SHA512
b48e2260078278b7b28db1ea2f6455145fde2985a752f1e2b358c0865bf6918aa2a402e925de8ad0c9583d0cd3e95a95477a36e96dbb7a1d625e89acd163bcb5
-
SSDEEP
96:uzVs+ux7w6LLY1k9o84d12ef7CSTUrGT/kkXpPrxcIvSPxuOv8FitpWmRVDlVHcD:csz7w6AYS/6aP1gPfv7jWWPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DDE28211-6D5D-11EF-B8BF-428107983482} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431905409" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000000ce0bdb2e94e5f260a9a93303f1aa42c7bb7c6e93e84c7473222329edb72272e000000000e8000000002000020000000ccf66dcde428d6e477e948d73d8b0b688148b1f3657aac486b278435bbb4b9ea20000000bbcec2149ec3a63febfb391b4b46ea629732f82dc1489415421a8b07711fd71d4000000023604fb416e25f43872c3e32375c70a9a90514a464cb96f71e86b1a12e35e5cd575a3e02d0611a358fc241f350857674b6b2d65f955511b8804cfd90ce23cfd0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4015f8b46a01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 1796 2980 iexplore.exe 30 PID 2980 wrote to memory of 1796 2980 iexplore.exe 30 PID 2980 wrote to memory of 1796 2980 iexplore.exe 30 PID 2980 wrote to memory of 1796 2980 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2d881d74c4fa5d048a37c26ac5b7fef_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfbcd00487f0228ce9cd7cd6e06cf8b7
SHA19517b106e8f586772259132dd2d29d0cd017f6a4
SHA256091531830e06c75f1e95910fa82b6cb20db1a6679eb95246f50ef91b4bc57d63
SHA512725c99ed1744fe01d2fda4562e560ee31e5d9dfe623f1cb4e6a2405389daecdc56caad756eb2cb98fcf412baa70013b014f6d0be49a2a0ac19d6e0304ced415b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de5c4b9fb662638b8a3a1bbb09981382
SHA198d151effc1bf73e1e63a73d9bda47a9e67ab6a5
SHA256547dcb7e8f1a663fde2641ddb6857f51426410dea33ae7df271dcee64ddbcbb5
SHA51253630f8e84183ddab6ccd234c72975a630c206858c35fc87fbfba392540f9c8b5d1f060b7416c5cca32e72fe9a4ecf92b5abe31a08efee46cb25f1f87ed14aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513df649cc5b2a0845cb8b738ae38dde8
SHA1f7b4ecfaf7df8b54376be03ab3d269dc1c2eadd8
SHA2562a6efca6e81ae05047a42d2844b5ceea89f04ddaf768a4a144c93b40b425fc16
SHA512326626ea79ba7f44156fbb4283dac9568f06726179066c1009996a061162195c5b6a805a5c634bbcdc019fd23a1df6c79da83fbf2e7db7fb28f24712f17d5fd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53498f2ef74bdeef89a52bde16952c517
SHA12ae2dfd2a9800a6b08fcebb549a484929bdba026
SHA2564bb435b1a05b2ae659df1ce4474c81e8de0b76d70f91ee66ae41a47314ac61a8
SHA5128fdb9dcbca383aa5b3e18a338cba51bfcaa7518205a7f7812a3305baa1eedf642a34b3475dc6659b1c40c505d05e5e4ddd2765f95d30fa5b513810d776ebd99a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5667bae2732b32b343a9443828c7ea59a
SHA14e7b6e89a34cfbdcef1bd8e3c05861ee63bea34b
SHA256dbaa9e87103598311b2c5a94d462c53858e8fc03dd83e77bcd7ac7eaa9ded746
SHA512ee95fdfca48b889c2e7d255d3de0f87090d51f87adf0c33bb22a0ed0f51df3cc5f0d3a19f4d3dbd200c91545f71db1b412c471323773ca7e48869a955309b9d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f70f773430c5e43a7269584294f0e9d
SHA19f931bc6aba0c432b424c5e89f459d89f4744278
SHA25606f3055ee717941721e54de6f7cb861c6facee9f532312081b3ca8ba9a160162
SHA512081b86bf6d289b10933e9a44324161e79229b66ced889b4112de9c8046a027a59a0e010e7944969fdc3d49095ed20c08744882f1b84d66ccd2fae1dc69e9090c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510c0e4ac6ff6a3ef633ca650ce04f2bd
SHA1e4d6df899df3bc456551a3d84a8066cb9099077e
SHA256ff17b6cf7ff84bf919b9247d08c62c49bf54c6dff930cbbced024bf791172b74
SHA51260d1413c2a45690d9f46fa37feccceda19d8ad3ad4b4a415c95680c29aaed975c641f36afb8ee32f9eba21b4dc0770f218cdd1e9cab788b915d11bd201f9e36b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd03784028e4a32f374b2f89ede0472d
SHA1e0ff22256c95ee7e34c0f3bad9dc71e81c6ab437
SHA256b4acebac2922c7fb49c070ba223017f5150ab92599d49d228cc54bff02ef587b
SHA512a7417a90177f1ef2e6b73ebaff3c2ea5a3bb1ae61d1942bb0d1ce692a54cc1d0ec3bb1e9ad0ae3208e10d316176cc880542abc434e576037d802a7837ae0a90a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efd381150c6652cad5400cd9ff0f7792
SHA159ebb2ab286c03bd904b4bef581899cd06cb6b87
SHA25664547e248bb23e922997b9b1165ac66a0d69df1449c13e5c3136a5edc9cfb9f9
SHA512e540823181f2a4c0326d213bcedc105a36ba6f6e1a709482dbd37aa71343b149236477b0f545922436348c61159ba69a99a08b9306ff51947ef3f4b45b536cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d02fd0ef04bafc41a8c70d7880a8eda
SHA1bf807bd2599f39d63265d39c4ec5a43920ee39b9
SHA25634d336e766ce7184f33d29484c1c948d85cb6d7770a8d75a647e315b674e7663
SHA512b2fb26c2bf8b30973c3585aac7acac8879e3843540e8e9647a51bda1fe651819e916db390a6d9959aadc05b1d456ff7858f06b6a38ea73b258cdd3d096c3fb0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7074f41af10213e79b0e20667944208
SHA1a535ab9ad2970113b9f7325806c8fd9e3e412d96
SHA2568a004bed05a08bf24bc80bb45004e24f19b31d64c604c07fe4ec4c9ac24cd3c7
SHA5124fc2e3eb1d5efd7d3d80c48bb09ecf8d32e075474774125f713559fcb8f761c421af230e9d05c6ecbc8ec6782217efccc9ab66098b702b0bc978442644c776f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d872ef26d5162661f8f05524ff237d33
SHA164f12555d34bf14c1df3c95d140f7efdbefe663a
SHA256e4dfeba308ff09262806f322903e3e19e2529f6b67539b3bd3d627b392fcd1b7
SHA512249d1f796af1e18c9dde569e69faebd21d7d70330dc462d7349e130eb90020729b975340bd0d99d0c566217fc0e439f054e2933a7761c13c7124c1d1bd0a6a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503a160b54a0230e8992c125728bf39d0
SHA1488e607c862b2edf6c7e0efc799f0e7ff0913cb5
SHA256c892daf66e1cafb94c0226badcd734f31b2374d1caafb57c643035fc1238c486
SHA512fa85b277754b9ee9bc090a35c710905c05b8684ea2ecabfa3cc6918b6732d7d4823e6a8790acd919d777714de2b28cc5258ff0eb589133f57869aa9f9df5fd8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586c3a0a923df360af021589385b814cc
SHA122ebaa7614b7064c9346569ac32a20306d6e87cd
SHA256c796f73777352840a3c1633275a19dcae541e9d343ab2c197ec41ef8577515d1
SHA5127a248efc8678c1a4f1d3908b6bc565a68f093fae06756931873f3c8223d1ef4234ca948a7e47272db6558dbb8472ecb99ecda70518551690cd85e7135a621bca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577115a2d353d384a5d7a69d11a6e03cd
SHA11d065c29f17f40a2000a2225aee0df1f8b5f5fa4
SHA2563e616942fce3ba772603d2073bacba6da835eece5ab2d554d2c45d192bf4261e
SHA512a83ec2234f97583a887cf4d3c7bfdd0b6f0c3b01c1c5f6804f2b60b1d50e043c0192fdab8f4d69290fc939da2a8158f1a06338f8a72cc0f2ed453e2b2f297968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c421319b819d99ea6d847cc2ae51910
SHA126c57323cfc4bb16425a273d7401ef0e11e155dc
SHA25625bdd6d1673a38a323dc5481c197fab6464ee2df13be3d89b797d171983e0f73
SHA512358764e43cac300b1d15b133f5b89d58e798e363d54a45863521063604012ca95363c4799f7ea2fe12a3f1850cad49c0467c39c732382bea78c28a0e218f2305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d77a52da682976d6ba3b4bcf13841b9
SHA10f924817eb992a4305f9ecf2cdb0e46a5b9762ca
SHA256a63ef58b3e9a7112c05a05a56f5cfa33de163c31f36f7672c8d024059594f1dd
SHA512150fcfe442e232486056bb72b7cab77a1f91e6ebad92cd7305fbef88eee760d06b2e09d52960d08956b0739de9e063f58616037063ccc18978df6b35dc54b6ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b740670c9627bf7f7e951fb0d155051
SHA1fe55f657d8a30ab578457141d49c16e818eb6515
SHA256cf1b60ca42bb91705561faf04244cf4dfb9572f828e67939cb2e5ceb4f9e8792
SHA512f42f2edc67ed7ffc36e53ade5e875c373a3167dc730e882fe8791ab80249616ecffea8f4b75770a888761b0d8f185c5cacc3f520c06716698c0bfcf9ddd6db05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7bafd1a01646ba0d163338301dd353c
SHA1f714d28ce90dfb46b1133e908e6f84b591d7eadb
SHA2564210338efed00018c5fa6382416b8dbbceedec5405c4723ef3eb62b35a7d9406
SHA512da320c3d72d40b5f19194fde5266e3b18dd983fa88cd80115c19549748a0059d59e88637d0536a6076ed2c8cdbd475f83a8c6d849edc449afff89e8b1126411e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b