Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
d406f1e6eeab50a665e5165b4d16dcd0_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d406f1e6eeab50a665e5165b4d16dcd0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d406f1e6eeab50a665e5165b4d16dcd0_JaffaCakes118.html
-
Size
23KB
-
MD5
d406f1e6eeab50a665e5165b4d16dcd0
-
SHA1
5509dbdca3253c1eabaaa04e81c99254b3056c53
-
SHA256
397add70793687b914013f5a1a5837011ff4c74e86e8603b41623a8f683c0ae3
-
SHA512
078e911839d8656b1eb4cfd0a1b16091878944f4b957eb64b7f118c4474eecdffe142109f6473871c80ed9e96660e62b0e04f1d3d960ec2058bfb71448c72e07
-
SSDEEP
192:uw3ab5ngZ8nQjxn5Q/znQie6NnCnQOkEntVlnQTbnNnQNGLnLnQt8qMBaqnYnQ7f:BxQ/sGd4I
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000636023e139b1cd19e6c686b6c4de2147f19cf930c0f4449f59f14dcef8be5395000000000e8000000002000020000000aff4fbebf9f896b0d6b46a3b84c42fca8b8a0db80b0664af8ee8a1dd1e9e5b73200000003174f7ae7156dcb1c1a606589afcc5d66f82996f25536b0d40b08804835a3dad40000000c6f947eae09bb5bee054ff649ced9db8c3937cd6f9bc118cecdae6af267c263a183f623228a5c5481b8e3c4a3f4fd9aa204e0363f808bada89f993542777d841 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431949124" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A00D28D1-6DC3-11EF-85F9-DEBA79BDEBEA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 309ff374d001db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2264 iexplore.exe 2264 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2772 2264 iexplore.exe 30 PID 2264 wrote to memory of 2772 2264 iexplore.exe 30 PID 2264 wrote to memory of 2772 2264 iexplore.exe 30 PID 2264 wrote to memory of 2772 2264 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d406f1e6eeab50a665e5165b4d16dcd0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca0e27632a85ab573b8efe4488478ff2
SHA1f6c20dc8dcff8182e833499563373e9eae3b0614
SHA256536b06740e7c5a7917a102671f316331cf77c9417f63d31aaf722c33e034a22b
SHA512ffcc586923467a44487189a70f50889f5c0da2baf4b19d4341018519c67f1a50ffaa613e40188b939ca049e59048e7baf27cf6c1678ca14bc92466666c7f8e8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d9222f525634c06a72410055bce3e99
SHA1be43b5eca1bab25da9ac5ee00343aca826a70fe1
SHA256cd4e32ebfabf254229f8660dc9beaf898941d0dee59c49d89a4e1fa97e5cc388
SHA5125782522b5700f6faaf5ee5e421f8cdeba55881a6f74b14d072d94e3561e08dce437375d143c23d96e9e23e9ab5bdd7cec4b1b7650aa7d51f5796b57a509416c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf346aff5bed4cab600d73f59eb09dc0
SHA1f273b3f02331332932c4e6577056ce4cfe92e9d6
SHA2566390c5225c76705848e345e627bd08b75e38ac77ac88d649b79da405b2eefb3d
SHA51277b961258ab0cd2bf4f30242960b76b5ff8a7b6c6edd03e3e84ddbe78cd86f3f4cd8d10ccd126b8fd41065fdef1951ceb902dfad44664d8ea684e86d637d77ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5946dc9b8f6228a0c5279c65669d399fe
SHA1f6e01e58ced30ff67ecb5195f54d5becfdc04792
SHA2564dc6c8c5c177eb3294470c31e368304a37b1b6abd909d6eec8fd94f305b8fff7
SHA5124b43ea08e5fcb1334cd950a620d6f8157c35d44d81a7d4593d147b5750fc9085813134e7aa95b5f7e21104a860faf1ad19eb11a9d4cea567a0c3e86b1238d80b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ff785da0e2bd0e32b7c2d30aa9afa75
SHA15dbd09055ef8a26bb9e267bd54f9b7429a4a9788
SHA2565e777d7ae18d51f8e99292c389c1cd1c0aba687cad4760113b9e387a83532648
SHA5124f6b70a5e79d654733cc833007aee953871ae7cdf58cf1bd77bf61116faf17b4e94afadf921d83da39555870b8c852fff20c8e6c2f0208394542908df3f8b424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5613f6e2dd8ee02b0feda538d253665d6
SHA1ea5752091b0547419b96eb8706157dfefd5bec10
SHA256f8a79545f9149ede1401c1813ccb5cd1ab4db0809b035ab6255c6b48a48cc64b
SHA512595d0a400bc0e9b0a72f06d995bb37e780f507718e253e4357246ec6401d838c7ec9878d53c5011d9353ad89d0a3509ebcc90a2739233d78bc10c15b57b1962c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51abcbc1edc3159de78f1fdac2bc8b4ef
SHA12074b7fd9ded0bd2cc0aa9e9dbcd3b4090e4a883
SHA256bbf1065db7e6461bc706e6efa456f3cad0d8d623ec86001bf40342c35dfcef36
SHA512b79059d81e76526ff4aa69dc7c073c06fbac86557c9587df0678b3f0d0824edbbdc6a4958de5e11892b7babe27093987bb314874ec551349e31e94ebeb82c16e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad4e233dc52716f211425715ee9d9ca5
SHA1b753a7f40c4aa60053743c8252f08aafd29440ad
SHA256ddd11335e707269b3ba3f9a56e221d9970f45408d3ae8f6fd2b5b13b02be2a7b
SHA51241bdb55e50aec4e306ce58b7b9270158938c610f0c5c1aec92dbc247f74981364835d7296689ee17ebe443c9f9de32465b4713e74a18f84daeedb034809db470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50569270b5c3284d624965bdeaa3258d5
SHA17047fc66a56385af5b61cb6675b333c7952ad4a3
SHA25635110305f2b7c67580c47045a78d1544383dd4b1a882a8c0b6f838b67e937a33
SHA512b330cca31be809975e45de44a6cd436a3ad1f819b91c04b594156f83405ded4b7764f310b07f3390e319fd84f80e402e42805844f9d0ed1cae064f97758152d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c62461f117e383a0ab0acb512ff5fae
SHA1ff0fe798386d671222375bba8fc52dea7a62b096
SHA256b6fbb1ed33d9f8950cfa59237a30e4a38dee0c7bbcded76e0eaa50b0f3c14ca4
SHA512d34dbca9414bd4f7267da30146754e9104c0bdd1f052bffe0eea5c56e099fd348bc1632b5c493886713e1cfc69bc8062c492f6a695027ee9d4cd23a45bd5e491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7944377b60325e02a4f47020e401193
SHA1b702d831fe5391515647f526505d3e1c2cb8f999
SHA256b53baef8a1b4021b0c9ba1eea219bd7c445151474f9bb1eab732f2a3bec27339
SHA512daf95462076041319c88fda3528b2f89f2be52ae9eb947279a31fcce9f794a4345db6b6777e1d29e4b7d21e7c5eeb44348d1b642dd8b591c657e11c05a98115e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5755136c06d72d447da67fc56e33970e0
SHA163ae23e4d789acfd09084dcda952e6e96e51c34d
SHA2566244d1cb104bb429cdcbc4d87f34ef744c1d63f3f193ee2e31c41646ef8e8aa6
SHA512cb03c73bac3458cf084c91ad018eb3c098cdcb283638dd7d5487d52f81e72303ec1683b11764c77c6aff52c56086909b846497227f7ce42cea8ad51e30302141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b06360ab934c7a4a578bd8deb35627d7
SHA1f28fa30e542dfdedcbd29d761682a36a8194c035
SHA2565fa511f6cadf0553ed0b8a38f6453239d262a1fbd819a51df15fe332f9e3fcfe
SHA512e826b1c6cb69af2bdc1274216c86fd3e9a816e31e21a83f9c8c1ce5cb89380674eb6ad582150c595cd54f5301837ad8992eb9ef8bb74b0e505c0ee16ddf567fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe2c9e49f66599a39f8f6ff98fa59dfe
SHA13c67db3af8e2ea99ea0366f6262924224944c940
SHA256c60d1073843509b7864442196ac03a4f4373a0732399d5eca6f01d4f875cc7ca
SHA5127c6807fe800e2c994094cc47fc2b60de788cbf72e5f4c80a5ddd2412381fdd354f1ff99f1e1789f03fbbd44ad69537f0559d7949ddc9002b4b0f41f77296ef45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e2f5dde3498300662718839cd1a13fb
SHA1d7f895fd7b4fc0ac199eef66bacad6fcd662fa4d
SHA256715d53b7662633585f34312885499e99f34a3171e68df0476052f325241b1eee
SHA51273868d6bf497ad742cb5fdb543cce25ea37f75ad68f6e34a6b4ca9d78ce16a10caa47c6a8f0d7ccef59fc1b0b51cdc49fd9e9b2013c259a8d3711c335c97f7dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515f2a0af733743f1a0a29365628d33b6
SHA1a74df0a9a3b7bee8ea07310014efd5e9675ee383
SHA25657f70b916cfa6a443c20c13d2fae32e99737913a0f9a92fd31e4afd0894b16cb
SHA5127c185e363196008428a23e4de773df581278392e7c838a617c0e78a60e61afab8edbb37f2e73e348504a7868e19924abcb09aae7355bb935302429654be0422d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fce863028eee214ef5a2ec95c11a4b70
SHA127d91c9b5ab0c0a04758efdf6351ef006eedf7b1
SHA256eff7cabe150d84ee224d0f40cf8cdc940dc42bac5e1b5b59f1b2bcd147e4d344
SHA5121e45df7b62d3f46579b7b50cb66e0380c5ad5b42795b725f3c2d7dc147ea2ffbafd95c3728b61b1a6dd2e67be315453ab7ecedc907b1005690d94660525dfe5c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b