Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
d5232f944fe3f55891e4908c4af7606a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5232f944fe3f55891e4908c4af7606a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5232f944fe3f55891e4908c4af7606a_JaffaCakes118.html
-
Size
496B
-
MD5
d5232f944fe3f55891e4908c4af7606a
-
SHA1
a47b83183e36c54e70656b2487e86762ff3e55ea
-
SHA256
ca45f84d85da4a1418654ea71f651087e15b29c060fe603efcbb8886ce119362
-
SHA512
b6b8371c98a4bdedb5fa3186f9ec672f6d9cdd20754337efd5c674ae355d822f5b3e7fb0b26baabcddf0f6b0ae3782a7976c7daf609373a464bca4a772250c72
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5EAFD731-6E2B-11EF-A094-FE6EB537C9A6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431993669" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000f7f2514ec112e6c93e3bf385f3d8c81d33641abb31886a69d2dfc84ace8012c6000000000e8000000002000020000000ef483627e2477ec671f877dcf6fb6c22a0d2a8b61f74553511e0b130c9e2e5b5200000004e1eeb267e66c26637caf0cb63ffb41fa0e542977a1cb780c2d352703dcf4cf140000000c006b6bc7b737ecadf3cf57ddfecfd58747377e6e65e68f0b9e841f9ec28a5d26ade4c9a4e86c8f8874ddce6d6a88f23fcf22bf2cd2613de5ea7ec8bb21124ef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90582c333802db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1708 iexplore.exe 1708 iexplore.exe 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2284 1708 iexplore.exe 31 PID 1708 wrote to memory of 2284 1708 iexplore.exe 31 PID 1708 wrote to memory of 2284 1708 iexplore.exe 31 PID 1708 wrote to memory of 2284 1708 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5232f944fe3f55891e4908c4af7606a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fe04807476d825547a36badd23aa0e8
SHA12d1aedeb695aa13c1364233972c8e867345a4887
SHA256be786efb920f8ee11bbde37aaddf0f21dd2cd9f85ae2561f82173b58ed9d0718
SHA51275d01b6ccc4407144b26ddb73e0371262cc5f1a2fd287a94819ab9ed166e67f298d9822804de5fcbc18fadce000ae32922b9626790a228119ffdf8d2f9d45136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b50ffbafa3a1243ee4983e544043fbec
SHA1521c18dc0baba510354b6fbce242ee74344dae82
SHA2567d2fe8dc607f1e97468b172cdd83ecd0ca2db1f2b0809a569e99c89b7d4e9309
SHA51278761be998bac8bf9ab3d279431dc9cafe0611497e9a03ec33df8b1fcf73bb3ad1c343fff9a8c9a7c9535c216d5020205adbc016162f3bf180e400d17940fd50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e5af8ce5faeb262aa1ccfbd904a9a1d
SHA10c32910fa88dcafa513e5199888fa1a778c85e34
SHA256069777efb32778493bfac8900f89fe37038720b791d6c07ae55378eee8f0d1b0
SHA512beda52cbc2782df6df37a9ab48885fd331b5fb2080407bf97eb64ec706c39dce8d8e50db8031e8f67ee99217b24bdfcc5143ccd8ba0626f47517350c0c352867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a11899e68d68a57c1f179562b9a9973b
SHA1bcc50d648032712cfa23f9d10a446250e8ff7bb9
SHA2567529fe88df64f9d3a8878bd9f3508a064eaa43dcbff78e7f1568ecdb1a1cf63f
SHA5121dc7bfe6e9c378cd65c6773a22de2952de6c141a4cd9dfdbc161467bf069f61ba468e06de8ed3a223bd3ebeccbea911756ab046f08e5003719d2e1c44b04866e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f5e181f6ad2a328ac020d72618fa66e
SHA1f53d2cdd66cb197d9f8e24fbb5e4dc747af14721
SHA256ce8251fc3452e258aa73866f6ae9dfd620455a663565ea5f1a92f3c82078f148
SHA51296657f1f29a4e26eb0cfb5758532d2012c5a9fe667bd661127c632746cfe26c6b762063cd376847d44770c508fa67be1080e3c0d3f946df38e7a915fb8caa2fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5000de8c0070e0363f8c9f2e20e90a682
SHA18fdae6e47444215831ee125c229dbccd42de525a
SHA2567db59b4dcd34b76ef1a87c150ccc3434010d7fc953fd9418c09bea0f3a0057b4
SHA512a00a9060795e75f99511200bd33a6e06c32e82888bf2c42a36667526942d3b72cc233e3147ef2dc3fcbf5f7c49fde0189fc35c21e8c06634cf91be314f272738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c025052eb0a2a953565195c1c63d723
SHA1121c3b666d087766e39f25989211ead87c6d1c2c
SHA256e03ec7703da5d6abaf99a4bc05d0aefcff3c76655bffc25992c087162b0abf3a
SHA5122c378f7287c8cd324dc5c49d472d4b3741fd497b5920f450476c9acf2251728f6884ae2052c12472c4004f37050ea62ae2c073fe54abfb994a1abdfa703bd12c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54153565a876027eb8e03551b6f6d002e
SHA1bbda1298954fb18bcfc268cbb00ce99c83f9ee17
SHA256a43d883da3ffde0ea5f2b8d6ed5ec0931459e1383ecb4c0a0b28c580fbfd7e31
SHA5129099ffdac33dcd8f1d50a28f3306c8d01d57bb873d646f46acec53ea0121fc1263602caff7975b5f9d7925d43db5ea852a5d9d00192ed7e3da9595b08a1d6b42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eedf3a73f8670e51a670b2a54371fb0c
SHA13d9651484d96095eab9697d342c35c64b8ff546e
SHA25686e08a46eca7dfa7c066041be30a6c232dfa54f97e2e4ce2baa1d041b480cb18
SHA512dacf5c2781df3f7a2d42066ec79c5cefc80632cb3bbe2e4e55036bd0c6f1bb14ac1e7b4147ffb13184db58c9017c3d585f4bfb1ea90c339136d7b5f4b2037296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538f61ebebf4bd07ecfd7941a107f3643
SHA1bd50e064f10480afd8cb3e1774bccb60edaf5195
SHA2565a49548dd900947087db58e2465f685aff8b74c4d04d01293c0e7b44145c50e8
SHA512fd9ff785255c24480122fd572fa25c809cb564e72d8ec03c15dae0a0bb8f6ce5fd68a232f0279e41127b60c89edb48998579317b9871dec04c1832cf9833fe70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c21778e48afa877b2c961158c479022
SHA16bfca89a437717bbdfb09dcd76ee66cbd6822b9e
SHA256d3e71d5964b1ce2431313bd2057c4ba9fc668e9ba1bbf061e488f40dcfc181fc
SHA512729f72bbff4db3f98f3e0113231d8245d3a007fdbd991340a551ce5f99ae704bb749a24967d807419f2ce8f9d6cf41b312fb9322a708e6f063af0afe0d971997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4a8476ee924b26b52bce44d3cff8b22
SHA1231d046dc9b387680ea15f9eda8c3209de4e1b05
SHA2564462d868a4217d6fbca39b4281492c70d22d301e65a1c8ec01521a64f5481d8f
SHA512f949d09ea564e9314f848851bf1196e8312286a70a32d34cec4d668e62a437716728a6eba59fb610d09952af67e118970dc693f6cdb5d3076f3c0c7e4096c5f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54869bae5d4bb8eecb643fa7811e52017
SHA1b09aa98a234352c33c9f54aa57b32ff34d1f2f81
SHA256aea0decd8c2f057217e61289b85507c4978abc0babe99aba2b4aae7e39fcc85f
SHA5120520ed65bc2a80dcf9d9fc49e8cd17a9878ab0ebd03e422f3a12be5577c9f22fc4915384d0cc54dd9b9fb915e406571cf9df0146f374525f9b9dbb8d4edd520d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58afa8497413ee71604e6a60bde24552f
SHA18c63246c9881936d3f3aea88a212f0b6bcd751fc
SHA256a5696fae07812d3eec2ed0673e5eb9a599a0f5ae75b10c84c36f33779b2fd8cc
SHA512489dccad7f1344ac0cab1ad19d1d27db3eb2a102c940d46a71172a8ecf212966ba6e220473c8d5e5d35f4a6558658f346f183f6e0cc23dacc258be3e90a746dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec98b53a46514c1cc9c047cda8d48f99
SHA1beef2b5f8722ff52c00c0ea4bc756985558fbc7a
SHA256648c18490992fd16892fb33f6c3ce4d389ee02b19bb4044416a9077bf983b13a
SHA51218dc645a0c7b430b17a067de63a694c4f9a2fabf7417af0bd8fbbfc7db9a5844fd1f17359a1dae06c36a1206f3614f26fd522b77e227967d0622ae8c07a17a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccce30e977b725e72c1fa5b5cb0ebcb9
SHA17f37599232b65589610e736afd371982fe1b9981
SHA256c36dd88c716805d2441337619b963fe1b3d921e7cd9a7ddadc1da1f98f4ae190
SHA51279042009ae86bbb2b34907411035b68fc03b7ab80cebe70cb7fe8e8774d591e0e78c583864c877b40e0956bc46cee4d12f607520510bc126b311a71275f83b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a703e93cf816378fa7db87dd315ab1e
SHA1738e16a2692259f70f179ccb67cdf0b8b4fd1919
SHA2567b326737d30941dbde074f6d16d8c6a92a835929e22e8bcf6294b5ff9d244915
SHA5128e0bef2bcabc5d668f493235430c1680677adc19611dd513239dbf340d6fb23ef1ecda7b84b99cd51e075b7e16371c3010b8b99f56056d9ff903c15bc1ebac25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c5da070b2e64482abd850cb36180e4e
SHA186c127a5ab11bda3d3bb8267681a445550b7d0f7
SHA25673ba33ec4fcb98364bca47c75bb093a219d371ae9142a7f7a6ca43df7748a00e
SHA512fccdd0f9c88c9b62915e41149fc4085a2553903845d1f3212e40f352fa34b25f3322587afcaa0e769c867e68c9b96939100fff6808f914df5ba14f3d99b0bb26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb66fbaaf4e664f49830738a8d53ea49
SHA15fa61c85f1d3876e6473b5c9cd2478f59d23617f
SHA2561c43846274de868c0731ef85cc302030445a5484fff3f65afa997cd9298dc72c
SHA51209b2557878a0b680aadf541f2f5fed93f3e0fad3ba88e143c7749a49bffba9fd7a215766899ca65fc5d951e0ae93e5585f486a966fae75b1a540c1f926864c43
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b