Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
d51028dc4bd6a5cadf2c4fa0fc2dd406_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d51028dc4bd6a5cadf2c4fa0fc2dd406_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d51028dc4bd6a5cadf2c4fa0fc2dd406_JaffaCakes118.html
-
Size
43KB
-
MD5
d51028dc4bd6a5cadf2c4fa0fc2dd406
-
SHA1
3bfd5f9de38afa36b634e5f859e53f071b4d1223
-
SHA256
fbe7dfaa0018d165705738cef8e1751374216f4e6ad24313d5d3ddc9183ba432
-
SHA512
33066e8ada749304eec8fa4e8c6f7e9c62825006048c09a3caba5114512c415426ae6d17fb59ef37331e11a2ec59a03f9d37be41608260410aa0a78787b15fbf
-
SSDEEP
768:7BskcmmmmmmmBI3nOpRXKVSEpMLMx3tohi7ve1hVshfj2XwC3pr8R6CtfkURzngc:7Ck3I3uRXKVSEpMLMx3toIcgRPtfkURp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000000898a1316997efaaee2ad38e12f507ea0d2a2465adcbcc3696ed9d30d88436b0000000000e800000000200002000000040b80a6c50ad5bfbd8964b6e2791d8ac0775b93b04abd916fb109d01d0cffba6200000001648534aefe06254d1bf06a70088c864700b542c65cb00dcaa59e1ccd8c061f1400000007c4aec040d77c459415c78e38a4fee61817d6805c3f3e791e0b4a306c69d9ca77a9454c4bd02fe0e793205a270895c9717fecba1e244b41647b5533067c67216 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0aa408f2f02db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{91A29731-6E22-11EF-9F10-C28ADB222BBA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431989890" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1708 2408 iexplore.exe 28 PID 2408 wrote to memory of 1708 2408 iexplore.exe 28 PID 2408 wrote to memory of 1708 2408 iexplore.exe 28 PID 2408 wrote to memory of 1708 2408 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d51028dc4bd6a5cadf2c4fa0fc2dd406_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56feaa3961630262c533589089eea0185
SHA10a92a23c93b310b10ad8f33fd6ba96fe2ac26a05
SHA256436dbee7377fec51ccbe0bc100357d7e4a24780588f385c74e2c32394c7bd4ce
SHA512aa941f12b5b15e78864523cfd2c0dca10a88cb0419e59b40f6ef9ad71456f69efb25592d3bf3edf8fa28b4b6eca069e4491108768e52cbf5960415a1cf2376c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd51bdcffc7c0c4e73d419ddef2491d4
SHA19dc0cea92462ed7f61e1afa8a11038219192cdc3
SHA25638e08ef72da71a8945353b2867d35440bd5fd03fdc08056dadab309e0e974f9a
SHA5123b64918b28412d4149b534e71b33c8a3063567d0e297469a6ae92fdf3b1b3281b122de7c826499055ff41e2dac4116739926682379e1e718473daf6d5965bf44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573c2f6db51ff64a5f12ab2cbf1a36c9d
SHA1543d70d11187cdb1c0a43703a021a895c1ab9107
SHA2566f84b2fb7cd2cf98251ac5d07e779641cf299b2c259d7156a9ee722776c5fa47
SHA512097d1a02443a17bd26c0af8e6fb744ce84fb3d4e6537d040b4cc51a72c14e0803e8c51ff1d5c8b484710673f2ef00dabe61f97b20d2a2e4969841a1bcf00a9f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cb5e72f8c60a5d56e7ef39f9af8382a
SHA189e3fe2f645ede97dd5cb7e835980ac4659e794f
SHA2560597a0d22320b52ca57318f022eb5588bb25f635940f29a621aeba24c0247843
SHA512add342ede4abaeda96b6bdddabc2695b5ad790bf791ec42ad766cd684ad52f4cc8c8212e3c30192f22ac43a8c087da13a9e118d4328d4acc3d311fcb6e8f403f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e64f05ab47f5792bbc9d3bc1f9b19843
SHA1cce093227179c5276ffeadba307cf0ebe7ab5776
SHA2567523fec18bc0e5b0e275165329be1ddc563b518b59e27b08bc814ee50f20fe87
SHA5120d66ec61f6542f5d415fbd3c67c3c1e3ee471dd0418c932dd96e6deee81e38657f4596459799d9ef8276f464edc533f47d4122b4afb124964414cd884e558f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569b5e3f7a7bd3592b76782c70328c618
SHA193ba39c63bf67ca0eff634e43ff40227efcb7a48
SHA25659bf75d028dcb519936f431cbb594e1ff4fe1e5f197a907e79fba43633f16616
SHA51223aa944fe2b0892b89e7558b877b250006eb824edca219da5349002f251e81073d9f1ca5a349f4341204f85faef6c32dd1a94133750497a1d830429fe5cb910f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a41ba42bbd6fcf3e20215f5f19623a4b
SHA11b34fe3c6716c95901e264316e6f0db3eb3e29ce
SHA2560998575bdc109255e0ba459069113f1e0682d09e1d3b445fcf6355622bde5b54
SHA51206b19ba49311cf7b690a43dbd6df6a8d56dbaa19bc5aaeaac0515a80c459822b7a0caa061ac16fffe773ba0f052e2bce7fce1efb8a375a14f75df1385a325042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c1bdf450d366d2954ea9fd7bdb6b5ea
SHA1291f2c1b53a412bb38fe7c70eed39a4ddda51228
SHA25633e2511212919abeca887e6455f74eb966bf5fd5dbefec03deca7a8036ea11ca
SHA5126c8e3db555cd94fe8cd3bb43f59228fc661982abe33afe8bc6a932d5c38053347c85ab2ae0d51d08cd8409bf6a50d409004f1b05c533083fbd972692b451657e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589fe16eee8141aeb9624ae153264ec41
SHA163fcd76b1e1e44769e8ce52b45eebcedda6f56b0
SHA2562a2d316f647b84a8f46027225c4d39d15f7edb3135004c3c97a999186cf428f1
SHA512910095f004bfcbf8a250de8a945645218689eed774af48d76f8c75927d7b299fb84eaab66b39c46bbebaf830257665d256b3a34285c439bc7ce7ba44f62697eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcd2f4e51e0dc98724efdc3223e6fcd2
SHA14db22741a01c307e657c4d9a04f09bb8cf4542f6
SHA256802185ccae483712d9845207b30ca521ff0936cf340d990bab3585bb4bc54245
SHA512f953bd5d8a4572b442b13587f4c63877e0b4c62dcbe955e2f3d5af6c8a71639d24dfc9958dc8f2c78f411a4a8f98ede096bfa61ed2b5fa21eb66d86c2c28e836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd5faa26137d936731acdcd471355a64
SHA14ca09c6b89b557b8f714281b1fe6c9ba686f3bdc
SHA256c32ec7aefccf7372054b0793cc7cad4eb5d86a5ab72c2724acece8bf7e04bdd9
SHA5120f37f973a8cdeb35da638ddc7f9a55fde7d6593caaaddd18f44add9b1a60ef50e132fb5af5de54195e77d5e5ce5378d50eb6b0d682019caab79bc526e800999e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524dfa94edcc87e0eb799de6676a6d462
SHA1e20bcb8bc19b1043de11b9c16d0ccb2a588eb7f9
SHA256a375c159ebde4e5ee5b7315fce12b6f4ae7c01a4ff156f46335cbfc430adb827
SHA512dc3410799e2c9ef83bcef471c5e86c6723d4498d5279c60c81508f9450629cb5bf0ce7f79ec264c9e1b3f782199bdac1cf48ae250ff996fe9854931fb3d65a85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e0decbe34c74e205cbb6724af632d28
SHA1f3e9a2b185e8f441faf9c56ece58302bed69dd14
SHA2563452ff09071b9b97eb0455e936ccbff39e5219e587e539034d72243fae1bfa30
SHA5124f68144e65c2d587ed4c1e715795cd7e56bc4cba6474d20a1cb224b13b7552c5bd90efcdc9df81686940b99f189ce00af5d250f4431b5a3c79a9a5becdf5e2dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657fb4a11cea9baf5e72b2e626ee34b4
SHA140e0d408cf3004ebd43f8b2a9d3c4ae50741e752
SHA2569b4d55e3ece898000f20a4cbcc1f4418193264f0165a7a0b09a69b216d6dc6f8
SHA512c8b75db771877f6eef26248416bb857f60725285a0ef5b8c72061acf069b99d69712b75b9dcde109f312899ad4b8c7878af65ce79730282d249337428a0374b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a95d019f0966d444a80a986aebd99625
SHA169b9a697ea30749a14e216521743b8e4dd5d0b8e
SHA25611d32b8893fdacaad69fd91d5d95b91486b579bfcbb957db6f43128c5f7db789
SHA51286e8b23f4d1af51883ea8ba4018ed76395d09023fa4fe0a52b9f41b0a3a58472e142c3be7ea6ff122faec1d9e9ce853363e585ef7a99fb973a02d387731dbf75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501db0a42a1322531adbf635f884e201f
SHA104aec07cb018fd09cb529779ebdc3935e8e22bf2
SHA2561715f29d7a2b6f071057ba1c24082e707d575c8a1090d9c13f5d61bf7b1039c7
SHA5129a049fe724dd8588fd5a3e7c1be7467c7f03f1b8f66f656f674ce7607f60921bff62140f0a3d7be170341eda6c8780b4305e2119d3d2876b7fc7ed48c93afe97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596883d2e62da85e5d4bc00384ee167a1
SHA11c9909b6bceae98546a6fb07d61bc114c604ee49
SHA2564d7692ee7e1b32e9231ca24f906f206190aa5388c61884435639bf9fbe88b8d0
SHA5128b72176e4fca52ec371d4aeae695d9bfc3d94adcd25f76a20827046a64c7745041dd7220f79661248aac53498c6e6e659736eafa4a7b8e96e180a08883b9f45e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f9f214480f88e533b1467ac7f14b73c
SHA1eaa929a9f7481f3e448b14ca65e5e9887d8816db
SHA2566348a5fff4005fce8b30d40e77fbdfe7c044530d43fd0576af89fc960094134d
SHA5128c5b3907ac98c2f8612d5c7fa6f3592a9e2ed8dbabd2cff47fe5d8e2c5711f4f5b2362664fb0b6cfd5bbc955a60b9db9be06ca0f97f58f09a5be1cb13fd5b91d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8f47a5a18957cc404041b3d942573f5
SHA1e8ee289a7822320b22114e24e6adf298ebe77622
SHA256201e10c3fd0e185a29138ecee9f103483b528a2a73b38c64357eb3dd024601c4
SHA5121317508faca38b51f6c5e24af89fce5872c5a14a3405f3f3fa1286c6b063910eee62be3426b196bddcc0477b85eb162b9300b87f49481f4b489fc2c5674356d7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b