Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 05:19
Static task
static1
Behavioral task
behavioral1
Sample
d3a158e3d70aa476debcd3b6985a8596_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d3a158e3d70aa476debcd3b6985a8596_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3a158e3d70aa476debcd3b6985a8596_JaffaCakes118.html
-
Size
73KB
-
MD5
d3a158e3d70aa476debcd3b6985a8596
-
SHA1
b1fcdcba58cdb2a80c4940503fe0bbb89848f287
-
SHA256
d88acc4b5543cfbd14def2997c9a7a835118f9a7ddeafdfce84d4cc81d4e7a82
-
SHA512
e268a4f37e8ee4a1e1693a820e79d7c5da8185059b48cdb02fd51b30b958cecf810f86520466d4de67dfc78d5e97c9dd6a0c174e3d1d826521dc80496fdaab9d
-
SSDEEP
768:JifbgcMiR3sI2PDDnX0g6se6bc14ZqYXoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcc:JW0DXqYYTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000ba9d7a279f6c344a50cff3d7efd930beb33608f1d60b0e11a47e33cfc9ee695f000000000e8000000002000020000000c0f398154f05622b9b222e8440e52fa520093ee93afd8552f0f80815fb58c26620000000b817cae76421d8ec7a29c9371fedfd7ca02d9c16891222dcad853309b1719590400000003c190c7b13bfe5e33ecfd1e7620646cf9d9ec3290777cb51469cd866ceddb03e04c4aa65b7c47918f22027c665f779043d2c0e99adc49ad2e302b95c0aaf43c5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431934625" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90f60fb9ae01db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E3EAAA41-6DA1-11EF-9112-4E15D54E5731} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2712 2692 iexplore.exe 30 PID 2692 wrote to memory of 2712 2692 iexplore.exe 30 PID 2692 wrote to memory of 2712 2692 iexplore.exe 30 PID 2692 wrote to memory of 2712 2692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3a158e3d70aa476debcd3b6985a8596_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5206d60234c39678f90fc7717405785cf
SHA1c8596ae3f409560510fb5d81b0758a96c3961a60
SHA25630bcb25379ee01d6457e6ef3f2b83e5f76cdb9bdbc76d570979b859ad472a56e
SHA51223d433fba20a02d56e55420044b6029fa8efe4a29a7c3577b15472e2d6e4f906bb357d6a27fc327f0ae5d50756c77e3c4ed3000580591826d2ef6b2f2f5caa22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b73cd46645c76717d71ab9665f27533
SHA19bedbd19e83c7742d9770513c9693967934b152c
SHA2560be35a6d9485eed5878b756dbda5e4c320c8b2a43f2824ee5cdce5f760557249
SHA512f902d155f477d43b1af80ad0d0ac0ae5dece0634ad11d4da9dfbdd3fafb155b143746a0e870b3b4fadd49ae7543bdcc54ac603ee53f1a3bb3151d5584406f5ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569edd6c26ee5729023bb6aabc7d51171
SHA1deea4efe7a139a7e755994fbfddb227dc52d9726
SHA256d7ede73bd8dc38e27fa01e84537503cd8ed8bcc4c05dbc4bfa1c9a11c726b8c8
SHA512a7dc2a2c4356451bddc58541294b5d0573eab72f1a8af9d0c280bb21f42784ef81cf28dad2c487528ea28931dae7fdff5468c51e4d225a9c4d46d1a3ec51dde4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545a9c9ebec0dfb49b2df95d2a7bffd78
SHA1920705ac8fd0f5339bf587bc82e6ffaa120bf314
SHA256c2cfe65e90c0beb0ddb91f58b9bc03f0ec8ff1ecf4e61f91bd79cb5233ea47c1
SHA512b8b6849ea338bb77f2f28dc9655e87ec0b1326e8c42b36e7b3e492f26f175baaaa6bca3b54598be7d0cd90e92f6ea92083628e7c825bca88cec7a4706f274143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5086a9521dd5f22ae1d28e1937ec1c915
SHA144b3dcd2b5a201ffb42c9831486e280ff24d2f7d
SHA256df21a1bd90b37e3d46d77fb4dfcfb60282229afc6fb1f8e0820ea2a9465c6fb3
SHA512e600d2ddab6a33936d477dda0414da377102630c9a927752f3c55b2f515005c201484dfea4cd23fde4bff070cd39c19f954e009c3d1af7ecd64e3ac9dd6f838f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5035fe75b0003f2e58692a1617ba6b76a
SHA1d97d4566113a8d52691082b80b4517ee33ff4651
SHA256f7234b8b55c19e04abc892257f1f02a5cc5ba11e13e182bdf50afdee0c4c2d6e
SHA512db06c3c55253377e2b6ca718f6d13af46bdcf395a1b044e689634c2ddc428f39fd8cbbff9485a14f0b1b37fa90b3b45bd5f04fca2664eec814ef9825ccb798ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e04b3755d581fe0357d2f99f34eaf406
SHA18980bc382d5dbf2534c15c1d717ac4ceba1c16b7
SHA256db2841cd82b786f75c187fd5081ba1fc9a0c927e860704082ea73cd0a54455ba
SHA51202f170d9ad7cc242d66c6739f052769aea648988cc812d2f4ae56e461c25733f27722f9d242020d2754766e92010bba62a5e2aa2bebb9f10e4776e44a4d5ed42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c7e32c40759017428fc2cca3286b238
SHA1e8ed906117c5d8e59811d4e9094ff9df44c7eca4
SHA25641f79416a7ef3e8dbc312c2d3696fbd9d796ae74dd90795743ea0c85b5831217
SHA5123e5e7fd74b015f2c7700bdf6df5ba07f1031ac1aa05a815481b60bec9387906ccd378de92da8d85ac1af63d3812f395d500c6a14f6bde75fb0e94c3c4e177df5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b112b515ed068dae98bf178d2f76e9c7
SHA1042cb4975d3478e74653243c126ff2702417a16a
SHA256b233bd61be57c96b641365a97691c8fe94ebad9045c95dfc57370a4d9805a2f6
SHA51276e02e2855bb50143088e8fd812abe6ff93da41c0483437767c883f4057f8f17c6c9d7289499c7251ab40dbd387aad41ad0de2586a7763fc9eacf7b218e31882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c24b10fcbb2af99d02569201268478c3
SHA1f1e541e2b91668e12f383f4f7793c2c70698d794
SHA256ae76a177e2b9caef19dd07d0dd27ea80c74865eaf4c1ee805d29f357dee68088
SHA51209d7bbc45467492b73464888ad3d859335fe10df0be5a7f456d8acf9693e85d8e3d2ba307823c620eb9f952c52b8ce82b48a436c903e2ed13d0e063204275196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee46679bc0ca822f59f8eff6db2b3c88
SHA19b4f92187787d106263b579226ededc99f12f578
SHA2568be662d3d97f615197c9b87d117fab3f8aaf93e0b0f65c3af25654be06596662
SHA512cab82fd53b5b783864717a0b29a0e7d47acda270b7712051f8a5f4234dc0e68125ca89af5e7ebf702143c9026a072071b1b9c03e3f043ac05516335f32481cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc74841ba1356f66f9e1a92e46607403
SHA1bd98ad6fcf71575a3188c7ada91107e52811d76c
SHA256984fff214f4f3312531c37250e63ee7fd535794611b4157bcc46ffb84be00fec
SHA5121f6020e58d9e1895f85b4de2634c064956e7b4d3199d8bc481c9e5304155297eb20358883718c47300aec8076ad2ee469676b60de2ca7feb1285d1f2d20aaae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5867877e7cdc5251f8d4ad46ec2dac28b
SHA176c41f69cb85c137e495ca4018ba222e3a3915ed
SHA2562e5a9edd2534d28ff410f6e0222e2e6cad9fce1398b59c78af82ffc343336b80
SHA512f245380ccfb84501ae649025f309572446bbcc39cc722792337f326897d7e2cdd8b84a2a1bd3fdcac507776713ee3bfd6d03e8414f740f75061bacb70f4103d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1e52c0db39da0c1efd2e7975708c0cd
SHA1f04d5394c1e5636175628a3103284675be5e5c8c
SHA256fde09d84ae78694d9d6dc735d9255b8e92c08883ac18f3f09b7be9875b81d141
SHA5125b8e0fd69f3b3afe01e3c51695d799defdc7b0e7f14cad66c52ddc4ceb6d0d0fda223bdb8b34ec1ac0d7b620d8974ea74eb1caad3366010fa4fa12e13aab9268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57af5712fead8d2f2c07c7e2d1d0a7725
SHA16da9032126ba419b63b07ac342de327cde9fb4f1
SHA2564116717f19c77f684680adef36380ac43387bc05593bf6a0b12afbc5c0c58474
SHA5127976c214094e89e083b53dfd2329811def65305da63606079b4b260a2c5b4d8e754a9953e962b3b7b2677b0827e552f3416bbb7e9baaad8939ee6e3086f2f4f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fb7b216dfc862c5599b8f1743579a7d
SHA11b041de8c0ba7c2a1e20857771b172dcf31ac7ee
SHA256f60dba3da060da5b7605cca63528c8d9d0e6521763a5eb5fbef2b851f360181d
SHA512196718d779159370f19bee361802d2050cbd193f46f6969f46dcd54127bfe085323ab6f8d6d8396f377b2c2b47e4b77ef6a15ed2f0d4e6358f8a9e90ffea0350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdfc7c76d9999aee5c119c03cd8dd5c7
SHA1cfce3e9b039e03973df428aecf3b812ed0e50b9d
SHA256416ba9352af2f1553289f0dd7eb2ea8822b7829417380043bbc64fac3fa31162
SHA5122b097a1cb0191e3e8016035a2ac723e900266a129c406720dd197a50be8818cfbb689dd3897343890fefe9dbca8ec51e2077799dd8b1c49396fe09bed9c84fa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba38f772fda6c3a76e62ff9a46f0fc91
SHA1d89e62dfe1c417d27287c596f0c0b3aaab6ce6e1
SHA256a979ab3039136b51ab79a44885a0512197a7e1c2bccf690ed2e77cb81f2f28a8
SHA512bf58647884275d39ebafb3066e3ec4e54650abcb5d8b060cac3a5cbce113e204a076eb176f66b626377e815ad163241728cafafc3baf90ff325a7564b8615038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b6c0d7dc43d28155d8526d0079b184a
SHA1cbbf23081dd51beafc5682ef2019dd36c1118177
SHA2567e3e341d570bd2da8a1b4a4abfdf4b2855f79c938adc18c8e47aad8d2996b006
SHA512245bb9631a7d7f6699cda23476fc3a9bf77d27e60f9586c6e7ddabc115d119e53a094e0760ae6250d81d1ef194a374ddeb1795b7bf7732642b284e2c1966e941
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b