Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 07:30
Static task
static1
Behavioral task
behavioral1
Sample
d3d8a5db57425210be67337908c4b17c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3d8a5db57425210be67337908c4b17c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3d8a5db57425210be67337908c4b17c_JaffaCakes118.html
-
Size
110KB
-
MD5
d3d8a5db57425210be67337908c4b17c
-
SHA1
3dff3be830c4ffb1282435a98bd99d64b4818387
-
SHA256
b3c541967ce3ada20f0ec0f7a10d55bff2af5146796739ff48e61f1a927acbb9
-
SHA512
b94beee831fe896bed7dcf782acf673f1d6536a2587ffb6782850abb7650a0b15d3379aa0e6a6780b84280e85af41a507381d9ad67bb80ca7c271d049a1869d9
-
SSDEEP
1536:AyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsQSz:AyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431942487" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000003ed0a8765da2d21bcc2b173141fa2aaf165f18ce785c1da3dbe66789e0ea618b000000000e8000000002000020000000cde4af71b2c2e6ee593bdc58b4f5fefb26b404127273afd25414579e0548995920000000847700a6e88dac469f8166d9e3bf227a747084892fedeed39ddade64e923643b400000008d45d3783fa36b4d14f127af7f0e2118360521586779eb21337232ee34efe6a2b73937ef871f25a0a5dc234d6786cd4b43816776be71389515c9316744bce97d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b04297f9c001db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{329E22E1-6DB4-11EF-89F5-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1792 iexplore.exe 1792 iexplore.exe 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2996 1792 iexplore.exe 30 PID 1792 wrote to memory of 2996 1792 iexplore.exe 30 PID 1792 wrote to memory of 2996 1792 iexplore.exe 30 PID 1792 wrote to memory of 2996 1792 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3d8a5db57425210be67337908c4b17c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1792 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0c5a211eb8c60f2067c549caacb98bc
SHA148ec79bea0e33d6fb2eb064e682246ccf22037bd
SHA25621a890c0c76756e577532bb851bfa2825f75bc003fa7394c668aa0431243e47f
SHA512e3ed6c3aef587f0ec1a851372d5ff7034efb0b9484d8fe0d66e5d6157c992b2d4621f12402c8aca546ef0e1e9d7637157e2e0dd93a949f9a545d3e6ecc25edd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f2de36b25a9641ec36672048601f68c
SHA17ca15dc30652323475147e270927f8fdae84047b
SHA256f2f98848aed108d5bbf748086be8aebc56a6180f954a10231674020605b72292
SHA5127e92e3d8a16103ec9e135a730fad2d3854d456e6e26ea9db235a6d25f12dcdb7a9db0df0bc98e98a3a64ecd61fd21533064c5b617a451c14548168e89528ea98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cedb08a33575d87a818b70053e337d8
SHA10c950ea57840298baedac5a44877e9a99f9f6c7f
SHA2568af799d393840f8242cf68f91e969ffaf9b49b247c060179e0ab008b071b7c0f
SHA512dfcf95ce2789490fc26b2ce255752292bee3d59150dbdbadb187d28ac9b8f10faede350f9f00dd2112e50f54b51524ce7349c97219c13cb1f1b3043a2bf6653f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ded6b1f91692b1c8e448abab9c18ca1
SHA165889b50357e754df9025f22819378c725def546
SHA256b6ef1d1861d9e262eb07c78b3eb1015370d2b5db6e8deb2c98a82ccb8bf09dba
SHA5128d2299c6d171047d28bb667e864d56d8c2953c4ff89a296b2454a0661df415ea7a8533a1211add33d5bfed0a1b849b7233bce9fd60ca22194ce32a4996765f33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4b81b6af51d554b33ed0c4292bf50fe
SHA1d9cbe38bf422ab36565177ab3112854db007b17d
SHA256bbcff706c67110d3c996624b01c18f407ba3b5c95c56585ce54bce10e6cd9f6d
SHA512633cfdfd207017df23b4f6c6235584f3e0b8ae1ff721887433c0aae04060022fa4314bb0f47749ca00f76ef33db808fb034ac92eabfe2cf1eb9129ffbf2ee581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af47be37a79178989f02cf55ed896f2
SHA179f79b0d6dd7c649ab839815ccd22057b1660162
SHA2569eef34fca4617f64f822acd7646c5571f5b60d513d017ee406bba52ab6fe5f1c
SHA5120883050ff8f0109a06e1e66695a28eaa8b0d3284bbacf0c2df5dd863e88c0fd73e8b25e4f57e6540ccb54bb1a1adaa875dece35ae1880f787a7356519a019dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58905ee19faaa071b7875bcad31b9b6c0
SHA13d1a7c901f16e508840c5c4ad2d569ca4dfb207f
SHA256dabe9c6c80c64d6273bef28fd640d08e89eb77942a3e5a31fd35297f14e0ba70
SHA5123a782504a93437232f63b3f517be9c78e0326b7e893d6fbabb22b097131105b7fdc0322ee21f5497db7bc4f2f173f3d12465266e3e30c355b635b6064d6545f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57abf2c612bc01d8cfb2702fe7b1a85ea
SHA1e1aad2b6f18dbb6f254b5239639159b3b760ccdc
SHA25633a2344d2fe9a8b970a4702c03ae875838251edff590741b5459ca0c7f5a12cd
SHA512147df80f859dd9d45bdc7b2c69f60e3ef589f8754be3d8e70dbf8265e18ffdbe3479e1e11f68d939929ecb39d6489a7a40bd476e5fffcef9bbb5df6aae115f71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7fb08e066fc813137bbdd0714d063d4
SHA129b4be357eb862a938ded34570d90ca6e3a49c6a
SHA256168f494ef4bc22c00a8a231df1e454db855464b4d6fcd991a75d47ce00928455
SHA51238b63407ca8d25b7fa89ba64e7596d2f5edc49da665ef783295937fdd215e9c6a8b37d9b571ff0d150e9cb55cb143f458b99feed4cbf95514d1677a1020cafec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c77747490016bef1f105cd0932faba5a
SHA10bc013374508097349e814c2d179a3b7d91a8e5c
SHA25656b861de7149becabd64d5dbf504ee3099f618286b64d6085a85b93e7e3d733a
SHA5127d0cb06dcbea8cd249518f8f885428f95c89c01c218925ee4c9db83fe83c922e4c877730f1e97c3b3ce0d11efd7ee21058c6f0135badcd794d0799da5aa5ddf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538042ea064a2aae711e91bb57733f56a
SHA1c275c00b7f1a7939d84cf86bae8afc8f7c6830fa
SHA256c09fe74a977637b89a3fc74e9f7ac9ba82959857a44423a62821981b4edfc6d1
SHA512ead21dbb894e9d35f861e0b6c65fcbf16ef2f1d6703818197d6d973b2cb881d8c4a4c8273eab23356eb2c8db9cdde254472cc22243e92145994a89382e0fdea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e79dce91dec6f7c244381897ea082420
SHA1e6b163948d2457e818e181e60130b443b50a0444
SHA2564682395c723f77b1188ced74605e2d854bc45fe88183ee09113076a17b9a8ca4
SHA512a98968260fae3f66d941c49ebbac1a2531e38523311fabab1dec816017924a0bea09b44bf39c996f2e3ed745c5bbc4795bdbb9273ac94c202a16543304a8fd37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5208518da642ee417aa718e38358dd00e
SHA1b3c1e97f8ddb60b1aeaec20fcb31cb3517a2200c
SHA256f084b4cdc1af47d64cc0dbd8a65324ebe2a326cb8962fe7d8639e25a8e4bc344
SHA512eb3789c9f00b18a1d0ce1b5ec907a34b2d5d52fa23fee144d2cbb2a8f9ca93250eff3c1ca62970d0a91a18490f6182e3ab6b15cf98a9389c190d06ae5d88c7fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aed3319886cef5a8d66898b0e50692c
SHA186cd523f2b9c576b4e18e3a4e5235d648a77c35e
SHA25611f5c338547b74a66020bcaff04d706c3615203cf3a3ff43aef89c1a9e54a710
SHA5126a4323ca2ee0195e00518559de349c3dabd385e70b41cb0585439036ded5cf210067a3878961eb08cd674ae4bd87576213f9c6e2cdbc588428075a162a08803d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3bc99e94270990c3c82f67b7388e416
SHA174005ea78450d8df20e6d9fd908cb3892f7e2d74
SHA25640904b3837f885c43a56adfb635976737ac6e22a3d6a6419826734e982057dea
SHA51221bb0b1f501026afff2327beb9ddeecbb83cc54b874ccb73b038ae4280ffb363a9bd74c17554408952c6605a9f7638526bc44815c29cab02f172b13a3b64815a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561934a278836cb93f5d30e28f520ffa5
SHA18d8c81dc9e6618b8b5c74d8dcca373e79df87af6
SHA25626d604006d8f4f966f274f5d7628f4cace0d21b4477c1a9fde3efa36fefce0e2
SHA51243b99e7a245a2dc22e9bc89164db8287d2172f0b90056be3b7ddd654150d774741f478d4db03e86f462e3939de10244fc73536be70488fcb1048614ea469c9bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b11d1f75ec32c2ae9c39e74616b8758c
SHA14f99db4c05fa86764ac65e2c73350cc11b499124
SHA2564099f27a4c4217e6d7044aaf0fece413c22024618a04e01f99ff1484c16b6bf5
SHA512a9643bd5f7818ee7093206ec2366fc6e959d3f6d7a3aaf660b782dfb10fc02043470b97ee3b6e755c81d464002dbb0840c74bd8a00af92b716e94faa37f1e28f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccb4531590fe9f08d3110dc461a83fa6
SHA1aebeca4b9805dfe75f60ec7c79dfa4806ef3941d
SHA25650171e3d5c899a9daf1e0645c85c962c18ea11da8eb0720625f1a29671189314
SHA5126c2ae9984e7a98400f71762fa0defef5e51f6809d7e05402b28f5ecbe9857a575a435f0d55d3ce8a746ec2018b2f6c3572f2092d9480393952a55ad8776f8f70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566a49c22ac8bc481e57ea2d14484e422
SHA1497e99c735196e4b6d5120087c204343f1ee3fa5
SHA256dd4d82689cd1098a5352df166f5ddd7eb2ecbf94454c86acf2a9ac58258246b3
SHA512f39333afca9db7ca7f42f7deedd9d59989059f866577faf29dd2db3b8c54656d7917b164b8bf4a3418e3e24327120e2cbd4f1f3abe83d2f328ee049c04b37f26
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b