Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 02:33
Static task
static1
Behavioral task
behavioral1
Sample
d355487bce78aee2d81df265237e3a33_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d355487bce78aee2d81df265237e3a33_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d355487bce78aee2d81df265237e3a33_JaffaCakes118.html
-
Size
53KB
-
MD5
d355487bce78aee2d81df265237e3a33
-
SHA1
6d7c381c0a26548213aa3cbff1381ecb22205d3c
-
SHA256
0d1943d7980120be9a086aed91c69321b166adae552fa02f1487952b1e9ee9d4
-
SHA512
d3c584c713a1bfe2d267e0117251961664d83741b45877653b5b0095309375da3372a6a1e8f0ed974e7cda4c1fe01ad722ee905d6dd71fb68d0d7e0b51b5e4e2
-
SSDEEP
768:SqI7y2ICQgAgGzkqqrCqxEkdkmomfRqpfv6dColt12/f8dYoFqM6mr6h6no5GoA5:Sny2IpgAgGQRtgg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431924707" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CE1E9D51-6D8A-11EF-9733-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0060eca69701db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000024a80a35047f8f18f3c6796e36c3444b8dce32d2f03d8861f2adc7c87a2f798000000000e8000000002000020000000e5b3dc77af8050f8d9276e1411a2d68d64378165b12766e9bd0883ecaa7d29af20000000e4872bfbf9000dc8a15248659b1d04a371386b9600b1362c34135f77cb50afce40000000d503c28849366fdd669fda89305a6565aaaf3cb2c3f0c3c0beef02b390be3cca253d0762b23a60011dab3a3a2bdf354be46fbda8d58e0794c1861c24ce55db98 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2504 iexplore.exe 2504 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2180 2504 iexplore.exe 30 PID 2504 wrote to memory of 2180 2504 iexplore.exe 30 PID 2504 wrote to memory of 2180 2504 iexplore.exe 30 PID 2504 wrote to memory of 2180 2504 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d355487bce78aee2d81df265237e3a33_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2504 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545b6904021c4265c7e934e57710165aa
SHA1d7e829566018cdda282c5370b7ce2bb415860e68
SHA2567853182ce98f0ac14555e9e9ce624bec3bc7d9d74e33d65d22899ecbfc359d2d
SHA51288fe4a3dffb1b26a734e8b2920594769883a6135058c3fd682b18abb9bbb65eb3bfaf139e3af23995cf9f4f92d4e7ce2464c0ff889bd7157d3a0e684a53b5652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba7a8b6b39bfcfa5973ac316c66ef95e
SHA14183452b9c6ad9bb56a3f6059f409e7ffa833568
SHA2566836ccc03ed95dc50e57d9ff838b17705912d3fbec87543a45e870d52d7386e2
SHA5126abdc4266758ca955842296db6f0c0fcc7fdd433bc1339fb9c217e037ba4a6aefd4ef235d64f6a226f8a19907c3f57a0d99e1031ab64f253639a8a0e3b8b13e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562a01466ed109e0357e4e0a3aeea5654
SHA14e6b38c0ca49a6e8d8e7c5f74d71d43f74c26e6a
SHA2567fd4d199f6d8015a6e2063ab9270ed7a7dea2002c26cf0fa7345f3848b7f531b
SHA512b575de3784bf62dc1313e7c2cc089b447605d30420573062ac6f6da8b62afec4d0d48da08f32650af0e2843c1386e60e8d51b7f8e7f324a65163996e14865e10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524f5963fd1817ae78abc82a00d3b470c
SHA171d932f95f9171fa089d20a7ac0a7c7cba91568d
SHA256854a6a858f1a87519bb1ff61a6237cf2e6fb98fb9d8ea7445ca6be3c5d6dd7ab
SHA512088707151e87473798ea6997dafec03d1f43ad4535cf344583442c91b330a2db33846b100671f0d2f96cb4f4198c97978f5a30cf37832e5974ae1f6bd1d9998a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5107a364d14a503060c97b9238ec81b7e
SHA1b0dae8957bdd9f81078ff3a1317fbeda0382ca80
SHA25677af32fa394d5146ae50db3be087021aede640ef5263ff4295ea65713a4d45c1
SHA5124be5f8e5c0ecf0bfe43f814577067c3bdd6e061a67187600c6320a00878a4b5d8c2e83b001f9f746f34107245d0665ee18ff86ecf38c8f6ecb5618fcd2f91cf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a65fdf68156278488160350fbbbef3db
SHA11a1fa5a850448b99795c8fbf2a37015f71c1b58c
SHA2560032bbc84e52dfd41557989a911b0f5932431ca67cef0db664310193d4561563
SHA512215d1556e9632daa89afa8743496422d0c56d475d2a855f1f39d498834a92233b1ded238c36b9fcdaa8b4f6ab27d917bb3f322a8d205d0eebb003bb9e5882e31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c64ccfeb00cac2ce3602405de03ac4a
SHA182cdf38682e1d1ccfc987f185f7f4fd559002e5e
SHA25678b572ca05c406c30848bc7aa52f0fa9f96ceedb72f80b458c8b201a7d835852
SHA5128cc1b1add81eb560227b63e6982d58da269f1d2595bb0cd66f9835c8cd9354721c7cdfbe2ba0887b6f03b7c7a1eae34aec9acd96a3fbae103dae8e471e99e03b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564e8104963213a8af82304dfbf0d31a0
SHA1ee63a110286d9fc8835ebec8f5378e2e383495b7
SHA25660f49848361c0c8e4594cebc16617b8c9719f5ac872f628e50a59fc83dd80685
SHA51275f484a6d4330e489b0c3a61bb04cf86162c6a33740bb9e15befe651718b69abc9c640ea7a71590860e659668ba39519570f30d0545e0810c06f3977e69fc6e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5327d93ff1b9b9d43a28f0db6096c12eb
SHA11b7510dfc4eb57759f876edcb1f396804e0bc272
SHA256ab9084a32cf924f463e2c8bbae01720ced4b128afa774a2a4a318428fca8bf47
SHA512c1c294e3200be12be404bf760d20d2ad5e15ec01ef906fb67195dd4226e5533540402b6e3c101c1d5cea77693ea39af91fe6e206787d6f0d59eb463057aec48f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f9a77ebcd34c941ddc710d263c88598
SHA1f0cbde034e241180c9d279d9c0fed88e59fb0564
SHA25628fafc14532329110ab0540dde36faaa7f07649031842d5f16fc31b1af011299
SHA5127407e722b80a730d941e0a69720256a67634fe8863bd2a6e483e70c190a25e465ec0cf1c8127dbbd99277563143ea15576fb66b46424301761256cf78de653db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ebf54b81fca3f9cdaa081377a036525
SHA18260e985f37ea1dec01f0c9901487d611046f1ac
SHA2565423879fa72afa25754efb6b84c35625c30bd5a856cd79efe6bba5ba70c25ecd
SHA512067a25cf9333cf4f14a08ef58583229ed36ba60cc2b9425c7c4eab2ee57a1140d16d258c0c71ecc0e48e82ce51ed74ecc67a8b38e2b35b37d87b4a12f23f58c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf93b3894cc3273833834bb36cf78e3a
SHA10fd346b07489e48fbf060036d868896aa0f173a0
SHA256b190a3258122694faf18a36e296136d15fc8db886e4c64ecfb44f84708eb8aa7
SHA51220fbda292e3aaca9e99c73d5394147c041642b18dcd69a0f47b2a92e4ba823b97a692813d85e825c713e60283457f4aa58cdf295f2d79f3396c6bf037c5420ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5352c549de9cb41ab5c379261ca0eeb26
SHA1241bdcb1fc6736c257c8820097ce274fa233825d
SHA256b4209b33f36e0c02ad1e184af025ba14a49101368d7d9f90f8c486502991b88b
SHA5121d0d6bea50cd7c2621932827af9d2057fa3cebf091929d7c666a551c9a69ff5be249c9de850e929e345a748e356e3cbae69be543de2d3ff3818dbf4d17c6d0d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511210b67cf030e3d9012eea20f50874a
SHA12b6b8d7e5975968dde0e7e919b88f00106f153db
SHA25692ff2dd829e03b8226f5ecc889f53f536ebca28bf63df4eb890f06b588b2db2c
SHA512e3e7fd8d57686ae7d56c448cdacb7495aabfa76800a4cbc54b742f2f8a93a9b9cbf78e188ae20bbab23e3c3b325bfffa20ebb4b250fb21a653ad88cdca35bc8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3bf2c671e268c22d5e72bad0b4f8fe7
SHA186844d7e00ab517085771741d7ac23355d6b802a
SHA256d43513ba2e55b1f960f20f91b1715d5c58817eb4d3eb27ea208e57cb8bfb5e2c
SHA5129f4273f94547ead9dc262cbc38a4fa1bdfeec4a94cf74ab5fc58ca5c639fc6c04d0c9e596382742f2aee9890f4473c2deab7d9822783ae6f9b748218dde6850a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ec4ba1e9e6f0c8487d3369c2e849ad3
SHA169676980878d079017f4004d74ef5ddace330e59
SHA256c8624749c309bd91983f8e9d469943ddd61c5e14ccce57cf1fa383c1bbaaf117
SHA5124cbd5311b76c2d1d89b080ca17076dd50d2fd25bfaed5480c7de9f61ef065aa9a1e93fad3a17c4112670f6eee235402e4869d5231c010f38c447aedc1d8d8140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d99b2f03077d9f656ef5e30e822a7fbf
SHA17c2c612ab7ddf9b0f228d1145c216da53aa926d1
SHA2567ce10ea5ef327e15feccb3b0247b17a625d97e530b84967880b6bf148e4eb0da
SHA5121258d4bde002ea3251e670566c2e220bdcc5b0b9750d56499cbe3f75964b6d0a33705a931d2b604912cc704eba2b468013b91e61609bf6b96b5b73b8cf882464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e050ea5225d0b9c862660bcb4f1a247
SHA1e7d9e9e8b004ea974cd575be5ac942c2ac32dfec
SHA256a5812b23f76b73ee8774285b6745a86d9e9287701455ecf647bbddef514c5334
SHA5125aa92c80de1ad2d405c0f68d2b6f41bd400e7fa247196f2bbf77427d15ed0acd380e967dc6423e648340fa15bd04a47f50d1750532f2e68ee09caf4dfb065560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2d2747a9fe3cb2de6010adc7d9c44e4
SHA10a17d197d5d55412ddb6a19b72ffb55fca5da077
SHA256ad6508df8a096a5e3065e09854dd0e0f8c968beec6ae373d0e222baa38e6d0c5
SHA512682f7dec2761c07ece95ba088160278386c50c969de6b7f99f440bb2ee808e433611aaec683dd7cb42095b6f32cddbff7b7eb9e582b647cc52d27bf5012951e1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b