Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
d46d03bc806851d4164564738d5c4240_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d46d03bc806851d4164564738d5c4240_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d46d03bc806851d4164564738d5c4240_JaffaCakes118.html
-
Size
21KB
-
MD5
d46d03bc806851d4164564738d5c4240
-
SHA1
fa39e6faea893b96ad4c12b643907501287174ed
-
SHA256
1d4c20af72e79263c00fd57d70e5482e7de3ec29786251124d2fc9266a275012
-
SHA512
25ce3a6de09221c180eece0d5f260712601d77acc30541a033d7118b410ff74ee676bc7ff645468af2c554cb49b7c2265a5154d84753a49a9b72fbb0fc9fb336
-
SSDEEP
384:ZfsrQPpbjU8TuLIAW7v4lo2PS1M43XaS0:BsrQh50Y4lo2au4HaS0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F214DA01-6DE2-11EF-8C8A-62CAC36041A9} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000b3a5fab1b480f8a0d07a893b80c8effa0823bda40bb5adf0c52ca70e247c51a9000000000e80000000020000200000004258c98a2feba3cc4cc9cd1d43befb74300a6668ccace70d70ab5a377810cf4f20000000909c6f96ee9ac352d14ecd77239494cb2a520236f9d5a6697b80c2b3bba21ca940000000417c15a6e8ea1a90537bb527bca89fb88a06fa6f46f0442785fa3489918ca1c2341deee34aff6dfc2f7f78e3f24c7722be15d0d1af49216e070639e9bb364d51 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431962564" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0cb97c6ef01db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3064 iexplore.exe 3064 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2668 3064 iexplore.exe 30 PID 3064 wrote to memory of 2668 3064 iexplore.exe 30 PID 3064 wrote to memory of 2668 3064 iexplore.exe 30 PID 3064 wrote to memory of 2668 3064 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d46d03bc806851d4164564738d5c4240_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c8bf85f5d681460a6ff7dfc4336104d
SHA1737f7d6cfc9f42b9ec82e0d4403295410e15f548
SHA256e5050897b2612d2d898104223b40bbc5796d4f1389ce2fb14e369ad3bfc4ba07
SHA512490ec5265389638ae1e6ebc552e7eb4c289d1553b1572b551ab3ed675c9bf9d8f0d3daa4003c361d069e404e20287fde4f8f7b309fd120219fc34206ee1c9fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1c7a05d041f08316da53c7a48087367
SHA11349fcbe58657e3ceeeb8a4750feb8a38e285d1e
SHA256913a41517167d781284cdca57bdde201970124c754cb0b2b384f9a59f803683e
SHA512c09785d0171153f633fb92f75611bc1f8b58b9ebe481dfd22bf48528c4b0eee4bf248f249f5428774395ca21d446d5a4b5a456311a22bb1b2c7ee717ef20c962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaa1ddfe0e86100efed9985e307152e6
SHA1df4ae89d629ee1acc7c3a2a38d44725538f2fbb5
SHA2567725073a187ebc26eab9b2996757c9db470fc7697d36dc8d1b756c47203c7103
SHA512974ad0b664e9be2c47cf147398b8670837183b2cd97723b625230da9e8fd838f702c26523217c25429c0e34559c3bff53137be05ef037550cad2812308ff19d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d1e8bfc1506f3cbd482b07e3ba15729
SHA16c5570f1dc852e50e7e676617fd8c6faf31eb117
SHA256fd4180cfec8a2443b90ffe1f01689f978e2ca98ee2dd03d1413d4f17f4ac83cc
SHA512664f8c5f76c76c1d0c67d1792ceb75e2ee92ebbe762ee93eae6031aeb17e47f7d5c4c5f779e93db0413cb23833f154b90c5e43721d6a455f7920345e72a169c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5515725d7caf1e552e54486436e56b0c8
SHA112981cd455b3076ab51d5bf6e49fce28d78c0c1b
SHA256634496d8e109aa195554c483c9b7f58da8ff45f325a6467483af1183d55d2b76
SHA512f701a91ad298df110c59e36941d8d2384b5ffc0d7dd80396385d47540654bda0dbec147d577f347d807296c5b79574f2792d778ed24f4daca5b90b868e6fe2ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2f9f19869adfbb9fea2ca5b5aa7b7cf
SHA1148382fdc580afdffedcb5754f810ba40f1e1910
SHA256ec65ae1918a5e77695f9e9331d91545af61508d1538dfb41d0b746aad794799c
SHA5123a55a083f55002b340823074f32945851b9231d1b017db56ddff9c7178b2000654ec1c2fefd35fba80acf5d33586b41983d166c42876b872972196b7398c7ea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c97fd320403bec3e5726c64f1ad95dde
SHA12a8483e3b95c7167391b5a4c905bf4f9ba75cc3d
SHA256d69f1f0ae6615b2232c6c843ca7b88e18278844c6dc4e04c1a15910e10639012
SHA51216a778b5241a967bb7f8e11b8b90bf49dad2f23613d1daf9356b718883a82be358d591bc7c706e333b4cc3f45ae166165c04997765a425cc221582945789c726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57302ec72cebab717cecdcc48ef87e338
SHA175b3d0a5bdb52fd8420e3a2777e61dd169195262
SHA2565304dd55f0f8a24926f6ddf14a39de7dcea76ca7d0031984a9176a9d16bccc5f
SHA512759b6d76d86778363030e389b1bc8defb30605fb24c544117c4dfb0e652aa01830190e596a257d876c39ae1711e7b1c2bf59e7642e7dafcfb62104f620aab2d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5190f8d1d0868db85315c633cf7d98723
SHA1458adcd564388470e04fdb09b9c7bb885c7b791c
SHA2568b8dffb32cdd13a59c07723b722ee6a12b7a9796483896da083a0d1c0db5d382
SHA512002e69dcb47c599852ed52ba8168dcce124a2e3312fa88b7f312443b751e9ed2c847cb9d850d16ff4d260744cfaa3115eabd4a747a0ff7133a6768e9dd002248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f36c9365b4c15e8bb4244d7f1958a9e
SHA15b908e443a69e839f5792b7a1b2293407a4c6cc0
SHA25650ca7288a0f7e478b1e4ae7cb1ab0dec52854ddab26790f617439857ca842855
SHA5123d8affa2962aa25b53e8fa7cfc92545376400218df8861e8cadb9a02a47122c684e697f89c5252e88d03062b1292c88377e2457363b307be08c04338c6374a65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d059fac0e1c5b70fd91628867fea9968
SHA11a0ec4565cbfdf0c3bed0f8218b968c955115748
SHA2565ce9df1352c76182a3339f9e7b5bf854bedd4cebd6ffc312f7597845763e91c9
SHA512e8a6fdfb68c61605f514463020cfb7dbcd13602367c1f72399b9605bcd48dd51f364b3c1c83cfd43a19961a29cf5872ce5ce6a8977eab2ba010b24902ecc2015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573af7fe24f5f05e470b6d85d8dd16ba5
SHA153cfeb807e93a5d36f70497f60bc7767c80a82ff
SHA256adcb7cac3b1ee9cf2049a0a28cd74f2d0d5367ae87e869b9c7c2091df8427fb0
SHA512b8253dba526501ca6fb54582ff96e367231cfba195ebc2d1261f4c5a820fca323a5186ea590c7e5f9b247f19725671ab56627d0b3cce97351f48cf2f9eec81eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf2ef352a870ef036ab93fbd655842b1
SHA1f26bf029c28081589548d5b5695490f967fca8bc
SHA25608bf589fb2ba5adc63e0b44b18a026c253745a4132f7208825b51fce4490a3d2
SHA51284f9f774b0553df6bdfd9aeded9ebf97d8899d9f1c6fb94689c69c87a93ce796c6fd15ea39e83d516b881b1f18a362d1e4229e0b24993cf2a5e94969f564be3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5132f0c0aace8109e8e1665829a8cc498
SHA1cf90dda7acd92927d7c4b1476caf73e4b9275d16
SHA256ac848d6ca65d103a5ebc14ce0ec068de31828609197a6ca338e63e6b37e53d30
SHA5121fe31d5097859c804bdb874762d7392729f0e5cfc3fcb483a401952aabadfd40bb6ed51ef51151d56363be468500b8dd7bbe658c2ef4119421ee90f5e6b19753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef4696c266aaf91d23e6b2bae762447b
SHA11cc6824ac8eac310a82d8a14ae71a711bd85fb5a
SHA2564799d7cd9ef48e05dcdce789dc6be1a79921934c12a860af86029e643e27fe62
SHA51249ae94e45958aed1d0d516f6b148a016db36ad7fd0d9dd9dea4644410c2c3d2f793138c473e2a5816692b3a0af58ab290ee491b29faaf5d55f2f8e03ac12b088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c82284aa1e3e9889135cd3f4dacaf8c0
SHA1ee580afcad8d47d6e644171c2e68ac179808f40d
SHA25618b1b7fa9022b062ee0a68a5acf720f60dcaa7940266cab81f7520797664b666
SHA5122ed6ade6e31b7681c142ec2bcbbbd3093b7c7da4204a98708daa3efdd13047ef7ed60c05e8f44dc973422e2026f9dec51cbc5dfa7ff43271e9d562258c67be46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf2bde75d7183583abe1e870aefb94a8
SHA1ddc8ea283528894f9f8500ea2e2e1ee69d76a00c
SHA2566893a12c17e9dacae2b514b558d8aa5ac50f86546bd5903658bf3ddbbbb7f967
SHA5120285e6b7b3f2d69f2a1ccbd0b04eb9a3b51b364b0ec4f67bbff676526f851c13896c81874acf5a11727d77f0e69e726c557b14a33d15f351da942f0bd4016e35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d0e1ae180adefac623a36a2eccb27fc
SHA154434ce372cf799c584b0b1486c7f350e44bc93f
SHA25664d7bc2850bb957d470cbe7b9e406dfb9f6966e82eee0871b0862056719c56aa
SHA5126d7448826a0186b7a734e60e2014c647e256f8551e834af1a7f8c64d3541a4b939989604184ed55c3cb09659a4e7a5c7b9db0e6f7d9461754093943f71b85546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516fde56045ccb5e07358d3e70f86cfd3
SHA1d86861c5c859a5843f7282f341b87165bf35ca78
SHA256112ed87463e2c84914e3907790e43ecc29c57975745e444bf6eca12aebb23663
SHA5125cb19bcc332375dce5a6450c3e6e16dad8bb4e63d747028fbf07516d0900a6e079cafd055de64450b9fbce6d6db237b88e3b6c8d28a96b4ed8b1de29d4a836e6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b