Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 21:17
Static task
static1
Behavioral task
behavioral1
Sample
d519bcebe25b30357a4cd339253cdfda_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d519bcebe25b30357a4cd339253cdfda_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d519bcebe25b30357a4cd339253cdfda_JaffaCakes118.html
-
Size
2KB
-
MD5
d519bcebe25b30357a4cd339253cdfda
-
SHA1
41b10733efdebcb9efcc8b28d2d06ea2a3a25a7d
-
SHA256
d9478748de306037bebbfdcb229c7f5a7fc022c6a04a3eaff13f97e074fe2695
-
SHA512
b5f8fce739a01d445c188e13ee1eb1c65f108ad0c7439ce8b7fbded2bed7d92c014c603b7d8b82ef40ea4d15b3923ed84f2acee02602f6da09b225397500e601
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431992142" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000fe1df141453e2c0f6b1411bc9e44f6d44c32a21111e6c9cf04be2d1e95c0b257000000000e80000000020000200000000cd64537e3532167e57158488fef2bc61c7c5302c0e1839976678d3bda67de76200000007b0e0236b4e502d99a30df5bbd1d88b1e735b905386a84fb7064d79f62161acc40000000f0fc383a3a2c4c2b01d2f1b77a528df009fcbd0861d27bd64dce2a3bcce2e8e4e171214ef7095ad42fbdcb1df5613dcc8641019affa7252c8d14350f10de512f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CFF34FC1-6E27-11EF-B945-527E38F5B48B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40855fa43402db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2820 2212 iexplore.exe 30 PID 2212 wrote to memory of 2820 2212 iexplore.exe 30 PID 2212 wrote to memory of 2820 2212 iexplore.exe 30 PID 2212 wrote to memory of 2820 2212 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d519bcebe25b30357a4cd339253cdfda_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54594a96f10aabbbc4cf2c744a642f077
SHA10bc248387fd5fe529a14ba4ae36d81153a8cae0a
SHA2568ee45b64c432377f5ac469466a73ee27f7bbd0103eae1ee9cec3e714e6a4a86a
SHA5122cd573cdc8683a0ed456ac69d1dbf2c969f31d6ba2279431cbaad607f9e60f5933812d73ae566377c01fe783ac7e179acc7bcf831daeed69a66e68632420a21c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa40246e372e218a1fd46f3978a53d74
SHA1edcf8b6c2e067567f723ea7870507d28aecbca82
SHA2565b9455869c7de0b2775bed215a04e7c5f2e12161f61416f374b9d3504747266b
SHA5127844a452dcdac81db12cdecd58c93901b92927b68c47c8c406abc6060f379ad77b15545a9ab50f31f93315e09d08573f0e37cda5ebe91b2863e8c71fbecefebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ad88f482a25e719a143dba5afd962ee
SHA1b0a2b1601a59aacae2ba6431591e36a8d93f4363
SHA2561d3431c3e4aa41c08d4db62109c148dd81b2a2694d4667a3877c82dc687283a2
SHA51215149b406b1ceaf3fca9272d14fa5be11efdc408f3d76fdf70df6241084f9de70c82f8f1cdf0320e024de199c22eb4938e8b46500df5da5eec07acc7b394f2ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5158cf62958379f1ab3a727c9a8d51da7
SHA1527691551f32775550e1855f8ac9eb87250d17d1
SHA2561907d1febfec9a11c9b05116d63e30248c6d97fca2f26ccd3e48034905f7a525
SHA512145f512a4e87047899c3ae282b982861ba54dc5cd86e1592e5508c326202a1e547900d13311b5f6885739fd88403c0d94b1bcb5c2e0d10bf978df6febae1c459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f88e4909aa0fc994640740cae8d6c2b6
SHA1b650eedce81dc034fad5bc80dd267cc814cadf1c
SHA2560e6d97fc9de1a70e8ff204ed320865191ce30810943c04378acf37108ee0c85c
SHA512ecb4e0befc13f1783664d96b7391c78b7d0886798189a3e7e653857d05dede8c039e6414f1a41b820ffef167ee8647c189c74245e245f98da134825cc3cb2559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f36db8f50b9793de90a55be1b3b3f70e
SHA1df71d6a78726eda4bbf0afa49dc0984d99f63292
SHA256f86146291fab28038ab433d10abc66a4e2fbdef7896e422370c1a325c28abb31
SHA51274ecb2e5ccf0e07718686a0a3c77e816c63299cb4e735782f3a1f1f9c6037f5105f1d6c32e3a1ae0631b3abd07108689840003ed9e96461fcd1cf592b8c02f8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bffc08ad64074f2ab5c5a466db2c9eed
SHA170f36f60a342a19aaa47fdc71f8b81547caa3836
SHA256ff8c53c56c2f3baae546a615360b050791e7c98fcd475c97e6fb2ec305d7f3d9
SHA512740a218fd9df578d4419611bc74cfa7d4eec3bf18ad3bb9d2756174e11efcf8dedfd0bd1fc5d603b6d4b6d18cc91ebc56aa6c6fc708dde12e3bbf7ad26e80bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50480dc5f01e41de135de9fbe5b074bff
SHA143d51529573294f1e63242b1791481dc2367ce38
SHA2567067b1b4c0d8e72db44aed611affcd5a2edb77835cafcf667511c74475a6750a
SHA5120aaf48f027cfb8352d5373d5c9b6bc308023735c75ad9aee71787de25fcfabc88051228525fbc05aa101fcbb4167e82e10c2f9b3449142a9656edda9aff93c95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567a96e3228b7d3d1b0630864546abbd6
SHA1fa987238dcc7820268eaadd3f668b4f16695f0cc
SHA2565a75c1e2e500b68dc7f941f1a4313e1c28a57f43c5167a0cdaaf0f9c975be78f
SHA51242803c3e4d652d3882787b2291a461cbb8e893b1bbb463e75a19e8b344a34b8fa77ac5ba4b4f808fffb2428d153c5cf565661394e9153f1937e6a09727a8598f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f2c7568453fa6f9d8a9dfcebdb45f23
SHA119f5b778f78578669d474dc41941c9a50c2b5ded
SHA25626f62b4196d07b293174357cf69e5e3577286c225456bee53c8914dabba72c61
SHA51227b52accf0bc522e99bc15f3c71651f848b6b207fa6c923c159c26ab2c7bed9fd9f1812b1ff65df0f55beb88524b2405df36a1ad0953eacb918d14b6652af44d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb00e79972e83c0ef848d7fa12986741
SHA10ac2825fef0255fbdc72a256d6fe03e1cc948715
SHA2568a7f744cf6f0b4de7caa05314d4bce2fc99111967e3860f0168d83450496261e
SHA5128d749ed957d578e9dd2e340bed731b635456c8a843fc8de19917d93bb42b06c18d30106021c8406feca52e6579a0d29b6ab4e17f86e3026404c07336366e58b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a13d394d9709bf2f52f09391004b7a5
SHA1038053056ec9c6d29b178d9895ef4a8b8d4faf46
SHA25694ea89be0ae8af29fc1ffddf178b67c2e73a4002c09b1969582f0312247da4d4
SHA512b23de73081fa32bb0766ff12a113c4f805c5efd6072ea817793b0bff3cc0df93f69facec5d925aa23ffa4a71737d1bf087bd0d4314ef546c35268f5ae3ea95e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53039eca03193c88ba6212dfdc054d98f
SHA19aad3a484940e3c2109464c74c1de463458f5da3
SHA256689e2c0db7d44f084812ababc7222093b93e170710ddd6d964fe64c89fef84c0
SHA5125492bd17008279650245451da1f54b1eabcd03372b5099548a8b7e91c1a617f0cc0281585543bda0de2c12b5bd36b32a1cda28d429d2eae5617c5e833316c353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548f795c18310c9b869d560790fe2d9d8
SHA10c2e765a71c5d6389975e31f70f91c849c66d8a6
SHA256a5821bac54193962423b43b90d7cfcb9341a771d9bc67834edf9db4405197eec
SHA512749d511e61647865cdb5f8cbc5be7a1712ce115e10698973034ab7f1bdd455b6ea9fb4a3619c1280247bd10052569257ebe8ce302d1adc8343277b28731f4466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5429c8a7bd0ada47b390ce315debd07a2
SHA16c48020145434b7741f8ea0c78ca38b7d19b3368
SHA256921691bfa79036bf1f11cb1e339a3cea211fcd7a99781d1cfa6129b656ca83c0
SHA512163873de2a83c5fa8b7ed58a7c74f47ad3a2646f3211270384b5dbac9f53797cc4b36057098326d3e5f6e9d1c311071d1a1012c07ebe642d7f213b7f15637449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551aae3141e829db2e856880b51e64114
SHA1b133a9e5b5d06589f3cdfc6204e182b04ccda76b
SHA256e9679fef56520c20a5113e3ea85d1b456dc7507f8e39cf43a1af431f1fa50344
SHA512615608243a1ec09319fa169718907110b2e27d918ff16e52e1195ea0d52311a9560ed554b3956afac1a04289aa48b551bd1094712e72bb60f0636e7588fe464c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58db83ca13eb787e15a1617f9da5216e5
SHA17c2b5a5bfe4028d70d256490d1a6f99adebc8c74
SHA2568784a9962860cbc69d93ba0f58ac516d4d4aa9c3bb424a40efcb641f051c3715
SHA512ba4dc2db1fd665cee2e833f724ddd4261c0f1aad20efeb499d4177fe5537f6ac6e7b5694dc854e2fb614fbca660d6e1f3d9c07c54c66033269b9919c014bf414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a0b400eeb68c1a07a08dcfdbf2a9b65
SHA10b40271120961392129958a739e5031e5c5a1423
SHA2564f4a628a4ae2ff68ae5e8ad648459f3c2057b27824e840c526fa4a9fe00c16e3
SHA512578729392d3e93efbf2a43609e521a058d6648f7f7bc6b5f53302dba12c083d8d924024f8fe76fe2b8642c4177ec2b199168557a671424c2e217d290b28db548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6d923cd82d39eeba1fa85fe3baf78c2
SHA12d128d9f18817d86e1f73d8da257caa580f75c38
SHA25681f76c7ff43958ce2f4576dcf48294ac15959fb9d1a74eff9b7b16cf4bf4311e
SHA512f9801cd2849645b3d95666509b311e8c4fd14d710cc9105c58f6664ecfc669fde6478d6f6cd504d89daf3d309d348d163db27606ce17e4097a6d4481e45ddf7c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b