Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
d33c29f3ff48b1c9669aadc40deab3ea_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d33c29f3ff48b1c9669aadc40deab3ea_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d33c29f3ff48b1c9669aadc40deab3ea_JaffaCakes118.html
-
Size
69KB
-
MD5
d33c29f3ff48b1c9669aadc40deab3ea
-
SHA1
c3246f74fc387d274e7a5ba0397268ebbb1f8004
-
SHA256
adfebc30f0daf648577c7acf39f16efbd47feee6371dcf7bd71e15d8ef3dda22
-
SHA512
c0a1ce2a4515f19fdc84bda68fe1f4eb5aba1b968725ba20800594e5c7e4193326479828fa7ae509e6e755b5bb2565a7a939bdfa1f00fdaf809879b85b52329e
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sJ6Rv5HRnoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:J3whSTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000003db390d06ec065704be082a91b431bd8960f2b00d14ad0b4149ca597f18064f4000000000e8000000002000020000000530fbf0f0f58f3c5d5012d1425df8e61e33c584ccfe4541d1b1bbd1d2863a12020000000464c9f04bdff4a3ab4f441d29810c6ae220ba9eb3adb194d55dc5935a017ea1c40000000dfba20b4ac849601c3cb2061b18928c33a9d0ebacde41d48834221874430e42e6e7e9f98a69c90f5f63b1628f61d723b25e06f67d541831d9cf42118d063c31d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0b6e44d8e01db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431920697" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77689C81-6D81-11EF-9CED-F296DB73ED53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1652 iexplore.exe 1652 iexplore.exe 376 IEXPLORE.EXE 376 IEXPLORE.EXE 376 IEXPLORE.EXE 376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1652 wrote to memory of 376 1652 iexplore.exe 30 PID 1652 wrote to memory of 376 1652 iexplore.exe 30 PID 1652 wrote to memory of 376 1652 iexplore.exe 30 PID 1652 wrote to memory of 376 1652 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d33c29f3ff48b1c9669aadc40deab3ea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7790d773a40c414ea0bf50438cf6ab1
SHA1546b2676c1629809e69a0c72eb16be7caa2cc3bd
SHA256bc3c8409d5867b43b6d6e1db9a57ce8fa1d5e8d46be1a95dbb671dfc52f029f5
SHA512e93923e082710d82985870fa337e1f260479998f143aa75e9ad9690d535f4f5475a138afa16c53540bd3d2f9e5133e3c77873dfbde7e271b1bde295c07d16b24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582814145343e04482df80a874a223230
SHA19579a94ab0181f6cd460cbc75b56397cb089edc5
SHA256dee5665b9bf1c2a4e875f82317be80ff78c92d3c627e03ea8b4789ad0ac9633c
SHA5128c994a5109bae7dbe4dfd94ac380b2e7d36696db7bcb56218a4e6f1fa667d55492fc7d66a8ea2b018064737aff98cb46ce3e826c5c5f2057ae687b81b52cbdc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559b4458b8e6b1b4918442a56e9cbf114
SHA1895987fc13f5460b92a9ff82a38b961ff252ec2d
SHA256a9d0a51f883bfee0934b5689459e679843872c546cff44a118d7f081b9de2f2a
SHA5124522c12eec34c045c3d3a59788357c3e388b969abdf317f5450180d4a2532b2529720cd5430cb0afdcb2eb52788192fd0775a270abb5b2cf9d3f9cdd7b8be19f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c512af986927c0113b51b771f38e39e6
SHA119762a660962c67583327a9cbf5f6e156d8c6fca
SHA256633853654e28314a246a8b582caa45e3ad747591bed0d873c194b642460d7dd3
SHA5124d4fc64ccf2994348448876ec55c5d711100ba5cce607ac127a8fa3ed3e4057ca1f124d363b32fc641232ba387e1da82589f7d73bfe4565ee9b1122f6ab553e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fc4e26b9357076df27922d27b0a9905
SHA135a49953df71c7307e24b2347d9792edf78d0bdd
SHA256db1669ee215969db096fdd0606b8d744c041778a1249c40ab49c6b4c732fd4f6
SHA5123b33d90a411a4c40c8a8f4ababab09f4927f4d42d32ca91f898cec3ab00617f1be232c4c54b1ca062fa2dbf50b423859a84efa5c15e6049e71cd8dea95b9b1a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aeef03371f3e4a370ba4e3073382860
SHA198322a4ac013cd03ef48ce6d3aedca540118dd7f
SHA2561c1afeb7dbe89cb874f74fcfc8700bb3de4ff8c7b12098e7da6e44cdc47b78d4
SHA51250e20c67a20d0037ea2f48309e3041396fda93b8634620461197a0f879d4cd8ef32027da8822c3358805a00e56daac00d1dd5bf5fa3e549feab926b8d62d577f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ef6f2b4ee037607cc68dca27546580f
SHA17c537f95038d3d3ed219a4926ed810752a4f3256
SHA25667081bdb86271cbd92ddcf74ed49478469870f78d39c177fca693323409a3d40
SHA5127804c24d7777e3fd336e03664d763f4047d32a3f866ccc29912ed4740fba0d3e402372cb45023ce96cb48039ce7537a10834164d8f57f09f25b10de316ada336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5367b47a721277899bb19af545539e2c1
SHA18e22c97eaafbcc7a82c0641ee3cd44c778e20a98
SHA256dd6e84f0867f9b8541ed94934fce02e5fceb57af04a98b13a3bbc83e5ce8ab7e
SHA512cd58a3e37de21bec24c119f2dff5a5f24f98adb329ac069f9e10dcb4db172315137c1760092197d07123ba520770014245c4d8b46c524fcb37cd804bfc6fa969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f09cb3daa6ea5b21800cf143f8b31f8d
SHA1121f4a7ed4b7d8b75bcdd7c00741a42afdc66954
SHA256b19ac8b9981a8bb922c372aa4f07035174a6e430b22bc8dceba2d55a12fb5f21
SHA51221c9628aaa015d0d64bab39dac74760fc1ab7177715ade59abe78fd6fe4287e1f8863792e1c882a0cb1909ab82bf477fd37a32f4b5f5622f24681d75bb09ca67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b623f6631c02bdfcf45811d2de93da81
SHA1d309d9acc62fdf2de77e4ae065ee9c383d22ebd1
SHA256ff5bdb5002f254e77ec6ab974031c3fec45e13411884d3c18b5c930212eb5797
SHA51274f9778b327bcd18ba4820cf83c34b1380f0fda2cdb4abb62bd52bb498c802a07980e9082deda910a007968aec021841f23b62afcbbd46e682930c913b3e791d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea1d1923eb6247a34ace8dc5d6c4a2f5
SHA1adfe43e01dd904073163d14cdac569b54a11df57
SHA2566e90afc21fd6adbc6833831f85ee362ed695f0d638ae766b4a637e1a7175aba2
SHA5123c413127abd9d747c4f16b43e4eed92582a4d3f0cee59bfe894a501fa1b66b0f743711bc9a857b5caab8933dc350c0ca40e04cab2f9a3d20df148a7909ed0d8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e325ee03a04ee2a49679d6df35f93c5
SHA1f153e3c74e9a5bad218881e589d606764cf143af
SHA2562bdb0a0439f6e1219e136355a1c373a16aa29e6e178002f2cb99514cb7da6edf
SHA5127095f20dbaeb391eb6511f5b77a5ac063ae4d0d92aa3a157d40274577c9d1ad20ecc26d63ebab3534b839b205989c8d8e646a9d6514eb688f084f48fb63a4b64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573055610c172bee5fe694c2060376e89
SHA18356630266e513ce359bff883bfcf41bbd39bb0b
SHA256c2b9a58609322f9c1b3645c6e0e797fe7f6f1d549725a00ad198f2a0f45efbf6
SHA5128d19eb999bd0219bd1c627466e2dc4c676e1ad597c2f672787a242adb5bb04d338de98df8b6bb093ce456cdb047c1a66b43b2dc795c72a99347a5e8b1c038987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565beab2b2f5260a12a9a582991064cf3
SHA1ea19a1890cf62979eb325a55771ec22d5b01e05c
SHA2562582c8a0c00b98bc20035faa738aa230b747138b3400b40a968779d24570e2ac
SHA5128a6ace155943c819919dc669d03dbd0a5710efe5d09661e13db83dee22aa3668b1d77bec2f73261be2176ed7acda401217499fa6b41358fc2db8219c76dd5a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568b781b2c51ad598057c82f95db83c94
SHA1ba6861682b5ba4c62a8df70daa23d805703eb77a
SHA25695c2c1cfdb47cc1bd7f1ed83217e325d5e94514d0bc86ecf24c0053f881c59c5
SHA512c5b604d075b3360433db25b9afac06afdcf7ecc63cc8b95d1dd56dc11e3f9b878868cda6f974ee8e17b25c16cd466e4beb19bb0861abe68788d9298fa1ae1ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ebb5f3c81babe9726e4e62858ecb836
SHA1ef1d8ca82c4940a03297c63170a44713d370b7ef
SHA25623dd7c10cd368af074fdecbc1b0fc441d4c2e5a6bdc9119600b38a0520cc855b
SHA51237be621ea52344cc2d6604f97cc6122d98a2675fe8bf26995ab7828039e4b0619b5a8daa64dba4a4545aba03caedcd6fbfef90bca604140f55582c9ba6464fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d11d2b9819db337ff3deff9b76c8bc7
SHA14fb6abb09a0694d2ff0226a71c9e4ffc717a0c1d
SHA25626e10b2c7e67c5b00e9b4e0dcb5a06678a91456113d9e8f2288fc3a2a450c8c2
SHA5121e5cccc293e8124ecba249a0e11e91e57ffb5a228cf665cdf35722576cc4ab2031c08ad9cb42a747ea3ea00651270dcbdc5b091da9dc909fe453771c989a9af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c352b103171a518dbbe1e3d41db6f7c
SHA1de79e7b43e23e8147ea906ec8a9f08afdb982ab1
SHA25626e602ef3478973013b195199094020d0ee7494f8f1e44a3b7b6b20b4ff87d50
SHA51208025f93cef99d36768893151f46a4270e5aa6f4e7b7137f76c150d7a9fc56f262e5f701521bb7aac1b7fe9e356de1a2eb2917aaf1d92e0c8123682d5c05f497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548f1f921ed7c0fdb4ee6239d005f82cb
SHA1fe34b8d74dbd1c8c7befaab3dfa53b3ba0a8aea9
SHA256522b5b88a864a397600ea7553fabebca6d6ba7d4e01b04eeae40d4128aee99bf
SHA512b54eac518cbc99d4ec35f2a8b8e0d7b3f234a7d248d3f3497953221df9ac1b2a1bef58bc5e8d149568ae2167c57a5e9b15a6f4daaa26fc26c3533a014644dbaf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b