Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 06:03
Static task
static1
Behavioral task
behavioral1
Sample
d3b4676b40b6358f2e0b78a6508a7212_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d3b4676b40b6358f2e0b78a6508a7212_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3b4676b40b6358f2e0b78a6508a7212_JaffaCakes118.html
-
Size
7KB
-
MD5
d3b4676b40b6358f2e0b78a6508a7212
-
SHA1
4e0ef152e24d2262cd9d49d0262181e46f3bc610
-
SHA256
2f7ce65129f07a13e1a94250b168dee10a6ca1577e1c337366ba028f2af28184
-
SHA512
b079a2a0bea76ff78ff39c843c3660ae9a2d25f0e0e37fd361310e1f01cec7d24f2e143b3bc43acc241f5f9a177b927f9eeaf30bb92a613fcc165c8fbad0ebc2
-
SSDEEP
96:SII8iwv0HXt08IMnoXKjl63GL4X9U7tIm6DTIBDD4HsfuyxCDeD4XKQrgFf1Gj2d:SII8iwvePfo6olKGmNvfu046uw1aPveB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1F956B11-6DA8-11EF-91F6-D6EBA8958965} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3087570db501db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431937300" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000006faea01bdcd7e8625b714dade75ae321454166f5f6c57c56626620f48d11060f000000000e80000000020000200000002e1355cf1b20a853332de167504ebce63822bd26df7e9eb1f7b10165d8ce8a0e20000000a56f69b071ac02cb7c1884f41c744e51917426996f00c47883d2603e91b7450740000000251f6538e746d1f282d1f8458ae643b204fad0cf014f022d5ae147924fd9daeaec1ab52195823c931c64422e6e671e899558d34c6bc8b7eae58c918b31ebc699 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2612 1760 iexplore.exe 30 PID 1760 wrote to memory of 2612 1760 iexplore.exe 30 PID 1760 wrote to memory of 2612 1760 iexplore.exe 30 PID 1760 wrote to memory of 2612 1760 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3b4676b40b6358f2e0b78a6508a7212_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9406c341c5a3b99c4e4fbceb2816c48
SHA14ce2dfcb31c2ae5d7c1e456719e7b246962f38a1
SHA2568a9ca60619fcdd6702ad7d705a7b22c20e3b2fe589c0e7036291ecef35ba1124
SHA512653bb1b79432a5d18573d76041473ff1d8953b0d26ba73a283d18f1f0448238bd9eb036968bd26652d6fbbddbf856d1926b2ed7a6d23dd580a6d462c337c3402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568da2b932b7194afe7dcce74d22187b3
SHA13d7b9abbea93b2a5a17b80f363d0398dc3dc2933
SHA2565cdbac9efbdd10b756145eddb52fc5d16776f4db38e8e197e7038de8d0f179ea
SHA512557fe0da8e432a6f86d78157592a0a72947596cb6152ec408ed53ce79b9ee1dcc66f219eaa8852ee29cf92dfa3cafecc84f2116e6df8fc8e656b2ded9f59ef75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd08bbb584ebaeff10ce3459431cb982
SHA1fd4b1ea8b998aa854d62cf812e0d866b23c40dfc
SHA256154c72bd02d7f0be09ed74ae58696b9cbf6953f9cbada4c2a52329a193bea1c2
SHA5122d1a43167b1305431769fb812db841cd1587b59f6212ac88c9ab7124ff9a897c3cfd888d9a5c76e9c4cf26e51533b10df0958e3290cb05c1505c38d0cb9c4fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599200f4c479907f0c6d0b1646051cfae
SHA1ff1d93cc8eaf31b44273f2f23f6d72889d8d3e83
SHA25607c02f6e8baf229ce48c6acebb372d0f82f69ca5c82468b732ea5c3b6d14aa55
SHA512a0024a5a80449964c6c2b38f525a0e8355312c16b9a032df9264e6d1fc5f437bf3df1f578145b245da32acb712ddf14b9b3fc8b7d1eee5a8505a868db86f8df2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5473a6030eaa89176a83f42451dd8939f
SHA182e479ba785dc525d7029312d271dfa1452cc9c4
SHA256c6b685eee45e54ae14b78648748be7ca97a41369243f9989bdf1ae94c5b060b0
SHA5125e87ed31deded4bb846dc326da8907aeeb8d45e00111e79949d78edfd636cb490a278c6084fe3d2e10eaeeb7d6782d732c5b673fc0226946502052bb15340ff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d065ac93db8f6d734f1cbf68387ba7e0
SHA1957af9ddad9b0417048002098745446746386e5a
SHA256543099265a14960395b87d831630e36f23f616d7db91b0e749db4e06aec39a48
SHA5120adf7b2ab820bdbc6b34aa58756d2d7be82f7647bd10a928221cf210a444bec4f1146e61a2ad72586d2f4b721e704b665cca8bd491b8e49465288bf2916e506a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556084b16710baa550420ee2463a1b05d
SHA1e0ac0ea957fb11f6764340c0606f1bdcf19140fe
SHA256bce31147ce4e12026b1d4ec4fa252b4d59f69f9186bf92cf41df3b48657b56e7
SHA512a4fc2d9f2245fb905898200250fffac2a35ff6ab1e263951d62d18a4b0d4c62a390bfc34a348cfe93718c958c47e77204648e58f490b02ebbdcead4ed1036851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55082329aa488383d8f179b0246cc8ebb
SHA1ad76b5ff045e28fc7c84076ebc753ae224de0808
SHA2569c9dbf336af522252c916137c60d9f031a666c16fc7e3f29ca8a6383f263bff4
SHA5121c48b1d28dbdacc010754dd5182e027e68d22fe7c477961fcd60a12ae9c4d3f7f6eb142818ee182d3235dd025fe31b8117a6bd0fcc58a7f480f563608d467054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f3cebaf82903feeec41bde0a4cb969e
SHA12918e8680035d556179ea2be6baa40a56ba804b1
SHA25643c7155b7f77445778ef7a5552ecce4febf457910e591bb94456fee19b6dc724
SHA512c44d30245231964881338cdf2fb51d0400a9af4ee52cb2ff8abc7054451cfa97ed4bce287a4f70f5f7fc42c0edcf81a86a8c73823d0e733eeeb471a419cb2f8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5a401847b42bf26e172a46abb29c06a
SHA138c19fd6b3ec15114c60ae0643ce86894bd54c73
SHA256e93c2fbb89f6d3daf5148b16fec53c2e8f32533cb36ed42df71a2ae4f5059a86
SHA512cb2e48b753d5d04787da4d5a766fb95666a140dce52b8681ede861812a2fe98dec19d0847ae768144486531b7d784c5629fab57b1ac4cb0575c2b8006ade7a1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54126efe5cd95f6a262a76c9027b54417
SHA1727cfa8e9bbeacc5ef0533c2962c70e131f0eced
SHA25696b777be180dd21ea01b277cd6a6f1fd95d6b1ae758b2029b4349079bfa81ff4
SHA51274cf59c74a16e20420a082c88ca9eed8f0b8909691d14886d51481fce6833dc5763f237c34622a543ee5b90ef479b5b2f1aae879bd5f6d77ea5c66dc6d89caf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f11887616f1555d2cda38c668f1f1d39
SHA10d9c6879f22a6f5603cf0a9102efb73b98f093fb
SHA256fc82edece37468e8ba6a79915850086a2482a0d84265489e17ed2061e11c0cd5
SHA512f6a51c35b76bb4e20321882582d22f19f84ed75b70563489f990dbf28ab3e15dd96b269a38b10001d23f9f6476d3f5aacee5f907e274eb00ce1d8dca22b7a0e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f75811420e756845b076bd8fea96301
SHA1779d1b1899f126047d84b84a2ab183769d62b6e0
SHA256bbf4f6f96237f7db13e98f04284f32fe24c60748486713beb97d2ce17f5bca23
SHA51224ea7caca9ca790887f86d1c900f95ebd3c5b00c7b1786b12309782a72b923f774f5c9111bcf320b5c1d5496d20519e1cb7a9be206944b5d80b157f39c30abeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9a9610e7f38cdd4b233d5a3978d9485
SHA10bd83d45738df57de7f6c6ba59085dd3ece28056
SHA256ecc468cac3958297b6c33b267e6c7abe9b67f0229472a19c66461547e3e8c47c
SHA5129ae2b45cc08c3473c5c6ba1482645748241efe162ac515cebdec6fa095936c2650066faab3c15ee12518a132df6262c8e69e08b7d4b25b873c90f037dd9b39e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ee361e3bbb5043162a42be3a4152846
SHA1c6ee5895e26383e416fbb64ad66085b456ac5c7d
SHA256e08036bd479513e387efed28b763b2954776472ca2bbf1e59fdc454fef6b331f
SHA5127f123b9f10a8813baef15ab589408bb4ab0624070988a0036dcb059bc112b021c98d22424a6154f8eba77599cbf9c3b5fa87b65dc7006adcbad37a547adf6b94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576dc093a3df5b8b9ce6efa6ca169550a
SHA1d8a4d54b4f04a94e40a9b4862f219462f4167483
SHA25645b662fcbe0252de54c6479df21a866b329d7d34c2c2392a2ccff84ed6003f77
SHA51221579c057c175b1498aee8ec75f790a37dfad057e0df251b9b474f098e10977250d3931e9ef8070e75d27b54e11521e63eff2df55172525e48375b71e5f0d1d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bc89e9a5b9648b881457ab738b2265f
SHA10c784f7cbf8c47ed32d8e088db807aabd7fa14e4
SHA256e3fa540d58bec2895c9b4354c813ec92f75972bd1253e71ffaf9784ff221f738
SHA512bb53e76182d5ef45fb91f9e13144baaeb77a123b500cdf90c8a2d23d9909dc8e3032b5c1fa3bf4dc867e62f6bd2446d0fdd19de8f632b0994526ab5bd32ceb86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f50339bb01b0f516165db2cbe34f9cd
SHA18b187e086c6eed92b0f71bc88e43ad14445efe09
SHA256429be39d9547bb9bb4130369119267da9851d7ba77f9baba378e2b47f0edfe12
SHA512088149d78616623f0ccd9520e33e879cf79058857d4b6d7172af5da9119ec526e23905f830b5f838b5d1fa9916f9d6167b78a4de601018078e0535e36bdede07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f9553c2b9bf17aad2e98b6e61f029ea
SHA1948632b7bb8ffc7f234afeff9d19aca26bd1cd1f
SHA25602c3420167fd0e57607a0ed81bb336ef0a1ac6ceb72619185292d4d3e9a0295e
SHA512270823aa26c640fc29e3aafec7ea0a670fb4b9f67642f8a7abad217ca9799d18b1529c705c42cf548a82cb8aefcfe2fd548a54db9db8d07ae5c272778662c34f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b