Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 03:52
Static task
static1
Behavioral task
behavioral1
Sample
d379c5431977564c3e68cd93bc2b7fe9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d379c5431977564c3e68cd93bc2b7fe9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d379c5431977564c3e68cd93bc2b7fe9_JaffaCakes118.html
-
Size
1KB
-
MD5
d379c5431977564c3e68cd93bc2b7fe9
-
SHA1
4346e1fad337e3e0ce5868fdb2481effd5381a44
-
SHA256
2d499f5f6bc2d83773f67891a4804b148736eaa2bc6e5e3d910cb6eae28866c2
-
SHA512
f1d0e9b24257dab0d2b9e0d0ca374ca07ce36206d8e6f1d6896af4f6a120c81b65a4c8512f68c4015643bac5c46d162fcf9043b7d5c48f7b47db9e91c6fb525b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CAE36E81-6D95-11EF-B954-F2DF7204BD4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0d06c9fa201db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431929429" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000004758a3a7cb85944bbc4d00f1c13cefbf3507c49da76f14256001a9804142fb5c000000000e8000000002000020000000c2e70821d1444e8d4630c7533ec54bf6fb7885b8f88d37c6e4ffcd506b6e1817200000001a92876f636b62fea6feae3c279369dbeaec2c33aa0e97eff716c4ef568bd977400000008ecd3eecdba54e254b68cce82b2bee3cc085dc50acf95b59c12676e12b845ad906382685abb69cf427b2187eda4ddd4816a7d45a33943040eedb3a24f91f6682 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2708 iexplore.exe 2708 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2668 2708 iexplore.exe 31 PID 2708 wrote to memory of 2668 2708 iexplore.exe 31 PID 2708 wrote to memory of 2668 2708 iexplore.exe 31 PID 2708 wrote to memory of 2668 2708 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d379c5431977564c3e68cd93bc2b7fe9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538a064bed421c8d90632b0869e1faffa
SHA1423b9f20f4a17be930d77ac2facdbbadd66af2bb
SHA256d65597fa158ce8b9100c52deb4aa558395d2ed84db19cadf19a0279a37a55594
SHA5126a0f9356007d83d7bf4b5142aa2346bb0cbbf4c961f883811ea6319e8f6314cf6d74a903a710d2f6c03d131497e18f81c285208b7f9a5ecc1a469191acf15f02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565526687449d891fcf7826cd667f8ce7
SHA18cc42aacd5d5284f1f1bbeed0b0cd238ee521373
SHA256b3b05351cd32a3bf1845fa23fb470635dea8451a4427189245dd9b7f1c9f040d
SHA512927217b5562fe060241ab6a9f9288c8316177891d5a3a2147848e55f44ee977e27f9e93752258344d684a83790c29572b359a060fc58b13eb4ef1ac6c6cc10bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c08719b80e6bc159f2a183bd230d869
SHA1af16f59a7d368d17ded25dabb763ad8b280ab6ba
SHA25620202d4732fffceb5e7cd0a8b57927c9d871662e6b4504560570349aa69f94f4
SHA5124f1765b75453d7b996659d6ee0a904e54faf58efb21e31bcb0dd48b071aa8f5517acc13821f3c0bc515b966e71c3e133ad6593823aff5bcec2806e1942297103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5025bb3ab62d85c43d498319700d1b4fb
SHA12d6ca7acf3779a0ce51e00b5a32b3624e98fa475
SHA2563991795b8c538de4a95138c4979d34d01ced6814245b0067b5f442154ee097ba
SHA512fede516ee0d1861ca59455a9525a9d79797a182bb0f3c9061e6717946c3b7194c16307148a8526e4494ebc0d8229832c6fc2f90a40bab791084e2fca82f4b249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa5da4942942e0dfac15b7a3f7b16285
SHA12605a1ce369bde2c141cb854906a92da0c436880
SHA2569133898b1196318b7efe0fb1298475890a5d42a0fdcf5c12770e386c4316a0ca
SHA512ba6d2114ea7443746d464ebb9aca76d53439597f9263ebc3f14ae20a4030624e4a0c5abdbcf65f7710088d47ddcf622f025d8dacfe58cc18acbee8f308f012f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560cde163f858b7bb3c7e0e6eaf737818
SHA17b59701f59a6b11317bc53b9ca689ca3bfadbd60
SHA256add330041c73c69c691029f1eb1889f738fd8dbb32fe178830c0686ca14396aa
SHA512e7a7780963fe8a94ba1bb8e5b610ee03318d3dd7062a57dbfd634541c8bed32059fa5da1e804f8561024ef00bf20876d53d7aa0e4bffd8dca4031702fa0a44a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5840d00712560a045c850e425d1709614
SHA17501f73588d6b73ba7d53fdaac1d4be05ff62a2d
SHA25610193d6d16b0769077ef2b4204b0054d7156f08f0d0529047ae9d1a27f4fb705
SHA51217319416240edfc9bb08b0feb06b09e7e43995d3fae4d83632f645d6fbaf2c31ed1ba8528430f16146d9f0f1b180887cc8d56ae33a766bf484d889752c5d9291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b45c1c85631bce6e10fb6ff8c0eda7c
SHA1bf9863127566cd80635bf6363c35f85861cebc98
SHA2566e0433b6ae524404d56db8f247e1b82cf99d2f9d6dde76a883952146a4c7de58
SHA512212e98f10463cf07ab0171a270516a6499ddc698643d8e72dfecac607ac51169f87f348c2493808d1c598561b47443eaae375ab3eb6cfc65c2e5e5d03d1f1d88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523fbccd40ddb179c806fbfb173c25b0e
SHA1117938b6f0970141f8f92ffce800fa1cb642839b
SHA256a12a4dda4c2966ca83217cf71a18b1fb21689720bae55d755138c441f07ef3cc
SHA51210d56bd4db85c30e0407a2876f19fd0e7e0bd4d181e78e01b272abcbb2984380556b1a5f55d4b8047116831f7295745daf1dde4fe1f7f249de34eae74cf5588d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0bc2e6f7a457253d9eef677e266985d
SHA1d6e15b024b3c4c86df245d81abd88d43fb991d0c
SHA256764604e1c21a971aa6913e64219790bcfbd31428d7ed1a008b6c9faa02639d37
SHA51265ef1fd841e9cac429388d90b0b29fca0217cfeb8bce9ed9e9b1e85bf682a2f01ad85525dc089630d77cc846648e56ea1499bbdfa8162519ac872738caf802fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a2f990a368f4033f48f494c43ba7a80
SHA1184b1d5aa1117cf70e39f810f6f8d4d127d0f523
SHA256985b17845f1df8f1a359ca0f5b9a4c5034715d45baceeeed5b36b82e6da950cf
SHA512e65ce6c777b6e7a91395af60dc687d908cea72a2a36f329c09cb1cd7eecae3ed851d2e5e55002ac38b716049209975e7a8fbd0443497af2af17942e77a930aef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b8831d5ac4175a599f83b15a0ebf9b2
SHA183320df2c3ddf3221173250ff84c2271850ea910
SHA2567645348ae243ce7a10cdca41b2406bda9375b9bcf35829c207301a46625328eb
SHA512162dbb11bf6c5bf6f07e4078c5d25e2a5aa630e6095b06c3ddec9e954e2eda9e27383919f89428e6208118c80dbf9acad953982881dfa632c81986b03209671a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5066087cc3a934f054ec3aa30e46545dc
SHA12d6a2d0d368913295ece4f3b2fe3241c98b4dff8
SHA256562c000a0d0d4674e3e41130ffd5e9e271182613d3fdbde3032f394b4f079d41
SHA512555ca329891f3a4b93d77f3a498b3738a3803aa81322d71701c7972b51974ddb14f171f94299794350a8e29c3b92b29d6304efa37cc0442778a12cb705ffaf17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0cbe5b3c1d86f65db89ff08e96653d5
SHA1f6fe5dc4f842cc185b55fb12904fd92e5b37499b
SHA256d65196165db5caf98ffe83908eb6b726c515d13596f71bcec789a16c74a428da
SHA512985aa548b626e658f3723de69430e430956841d4ffd4a1ddaeb0d329f441d6e422b8dc1621800bd1b4b3b3c9ce517f7857d963e91b332c026b05f8d16e6271b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb456cffd25a0766be01f199350626e1
SHA157a537d87cfcb3267375680047ab21505ccd3f14
SHA25653856856f06e968fe7a48f18d29e1a1ab0ae6229cf3469d57da8efdae502d9eb
SHA512c07a3a77703bb2b56774c269eaf467c4fe615df450e6a8c08b11899f8f707603b7ac94d7fb85d3cda3c2c958926d700d2485b5e165b6809808edf6625450b73d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4030f0067f49a1d1bda93e0be15583e
SHA192abb002a32a3a30953db663d4abdb3ee2934893
SHA2562b6a8cd5ed58f81227874533944f1a15e5d7b65ecddb20a65eb54882b03797ec
SHA51288a3bd7c8d78f7ee68c6ffc2ed5afe1efd848df4ef935b75df3fa68575e5747dcd005a180eeb720ee81a9ce03b34029e3caf45a409f4ddfc1b95525136ab3f2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5691e75be3cafd8e428d574e352351f5f
SHA1fd9a5fe32b00257dcfbd6fdc8a22e2a2b82ba4be
SHA2565d54570fd8411b1092915b3d45bbaba10d6345074e8be8cce4582123a46e3b17
SHA512b3ac30a8666dfe5fb4a2a5e8d1a83eb687bf8471275b87158c9eaf0b51390a5adf682e578224e8608c202d925e37e8f9512aeac028c48951caa7f78811fcae8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bb6317edb5b8f7bf9c48f002b971e31
SHA1010577c691558fdf9a2d2649927567f42d1190bd
SHA256e0da7f7c490e100236f0b844283368a416c73b34b36482c5b98fd5263adb8917
SHA512ca4bd7d832312b69ce0f91781737b2fe75381a0ba1b7a2e281884afaa64ee1b695d17f6c2c92127ee4359ffce69c7406aa9a08adcc3ebebde6bd5b298a7a6fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5b998f363064395f7a2fb9787b10189
SHA1d4721a7822edf381f061df2aba7f0e1255261add
SHA25607d4e5ecebe0bde924e607df299fb8536cd81def3392f8e42b57139edf9dd0ff
SHA512cc6c27406690a52864bc6cd5ecf94301e858b01bd485c0a49f27278b95647fce874af01278d9ae776088eab49f87a3555aa1c08b21ba9e32d588121c4c9f213f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b