Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
105s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 22:44
Static task
static1
Behavioral task
behavioral1
Sample
d736ca57c4ee9b02d4749caceddd2e77_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d736ca57c4ee9b02d4749caceddd2e77_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d736ca57c4ee9b02d4749caceddd2e77_JaffaCakes118.html
-
Size
4KB
-
MD5
d736ca57c4ee9b02d4749caceddd2e77
-
SHA1
38091dff7680d83f7def318d3999e8fd0fec5199
-
SHA256
8870051dd989357b7afc06e96b826de28cfcde3b5f2316f6a921b596999452bf
-
SHA512
cc81b9218ce349780bb49d64cd3744c7e0b4f1fba41d7bcbb300cc0a390d731fc95d63f024585bcfd041fbdcb3e6a07a3efb21538fc5dcadcdac2eef8421c63b
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oWf0zqd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0CFB5D61-6EFD-11EF-9704-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432083729" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000e6a810f6b2a1e6ec3b1645cae1163bc517823d333dbabacea1f3a3c5933a578c000000000e8000000002000020000000996c64230210fd568ac97bba2ca7751ec87fdc27fb9f89f4249759dd973420132000000075cfa190e18278bf0d291982dd14d5614ec68d58587e514ea50d5af5d3d98e1040000000f7286d9a9baabcb35d2c637db7a810fbed421e2eecba4707b6286dc77d7002ec9368dbab88c1abc0314e2c0bee5a8bf1209d312f04b1db8eef35f24cb7b16e4a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b08611e20903db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1848 iexplore.exe 1848 iexplore.exe 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2188 1848 iexplore.exe 30 PID 1848 wrote to memory of 2188 1848 iexplore.exe 30 PID 1848 wrote to memory of 2188 1848 iexplore.exe 30 PID 1848 wrote to memory of 2188 1848 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d736ca57c4ee9b02d4749caceddd2e77_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1848 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f82562e0b39b6f6b8c4b35e70f7b32f1
SHA157186ec2471f90fda752845f130a25e8956e4dd7
SHA25681ca0fad58f029b42a10a764a8c6ab86f3c5b132b09e80b17b3e64f50caf8c1f
SHA512d179eeab77c58227cb407352a4738c821b967d8cab2cf0ab976be68a0718fef687c34c13abbad012dcf4eb8a1dbc377d3a36dd6cc4bf63935fab1ff35d7ca512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3ffa51fde95a818b8e32d7f07be67b2
SHA1a225b28acf7fdffdd6ad44b98e5e015143fef799
SHA256c9f729c4e9597cd31e4f520ae2e0790740b122df3bbdecf0b701d73b999bc213
SHA5125667842b8f5e44c574e7158f9b29951862b288fe2b911b6579bde250f0aaec2286e28774353af51eb94de9c79b27080c3855c8f2b1458242328616d96c126610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba9fe5288f63fb7c5a5a138188b9d176
SHA1ef140cc6fb986bc021f55df803bdb8cf21b4c024
SHA256d79626a7017c6e65cf0005877bacde100b8a1de989a418b128a0a2987cf118a6
SHA51237ab2206bf9a0c547f1bc37b439ad144a7fe38924a405112b46fc04cc4f99467e6c3875c19d46e1a2cadc4fd48e3c751e30c671e01d89b932223c4e0c18c503e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d6296d0cf79d48808fc71aa1337d56d
SHA174125d6055cadee70bf106a3a19bf3b4a751d7bd
SHA25663633f85bc9d7ba1f503da31ddb20af00a3a436bfa9ffd6976004fd681a0f244
SHA512cd4f81895fee8ae13886695205cdc3af781beb0e564757d94a5dffa705c30c45427dd21c625752ab0f330ce815edea031c6f7b421489710326d5f27645a9f957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b3ffa18886843f171843502a3dabdf4
SHA15642ae645210667c5e792850a0c655beefdb46f2
SHA256d5909faf47c26225418e7fa344ae7d664f67b41e35c4316bbe06f85442e2d999
SHA5126c46aa78c64cbf01b6b993b48efa9e0eca8a0f3e3b81e3a44e3cefe63db14e3633ff7e4afc5e88297c1612ef98da74a2511695d645696bc2d88d1091e1f07a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5707fe1ca1d4b0a5e21ba5bbaab3a03c7
SHA141cd88e5a055e562c4612509bb63a2668c450baa
SHA2567a536458e9bf3a191b6f12c452165b0cacd62237be6ee1ab730901f16952c5ec
SHA5127f63f7364ac436481a22e4d40d8a2f4fe7ef0df26bb82dc1f37d6f6164abf0900981a6dddcfeec51f73a4710a41ba1bdf0619ac9bb499a3a35e9ff9404d1bf7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6cdcc7e3fdcc53efd961ce4fd21259c
SHA14b3606c856edac6491d7a2e1e8e3a9fb8a463941
SHA256c904c55c79ca317f4207a7438dbce94bd36dfe15a2f224b3de13a0fe103a20ac
SHA512a54ef276c9201038f84539782acd3d22173bad746e025932ccf6e3e4a89896cce90f33d98140d066c57c5c0d0b9f2d6acc336f260ca97b9aad1739b0ab9fec89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa5336ba3334ca44e71f6f405071a2b0
SHA1eaa6d30286bb60139df1b548660a628a1dbf424d
SHA256fc9c0528ba00f748f7d13a1d940c2977bfff0660f77ab154051b26b48788d919
SHA512ad730f7ea43c947e9dad47c52a0fd252eb3b6b00909c43912be4f8a2ef0c5249fe636eb3527113c86a0f72e3476ce016b703aef7c2459e4866616ef9637bb97c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0db59cd8d270b47753519fc2aa99aef
SHA122ac6e900b64ddc74f472d2f17770ff75fa77224
SHA25646aed7239a931f334dab4f94b22af1039c6852b3d8d260d659e2dff9580c0916
SHA5127048e7b32464ad1dfec5748d11702e148b04390f5bd42256e2be5845f1a330daedd2c0ede76e2baefd9b731a18ce5bb9955c72b67eaa76013991a343ab05d0f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c36b87c18fc722da8962fdb3c3287aad
SHA1c8a71aad379937471ab28a2c0a2be2d0dd885d85
SHA2568a4da9f1644be751595b4e7c0c3b0eab01db8de9cd7fc89bfb541e6474112dea
SHA512860128e8b3d92ef1c8e5bb529f3cf1b40d4578cbf94d996bef05e506f4622975c7c81f9076ee9a9ab104fc7db4308ae3d237d1ba11675648630100ae3b2df14a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0ebd3d25be44b967198f46337a12bde
SHA14a4295bc99e81f746d7eb822b8d7560d9e30816a
SHA256d5d006aab5b7ff28932effe9bb49b672fa6eea643c3460d281c871c260c5497c
SHA51208a14342d18d4f2ba2a87f5e41f02e90fe3cebf93b107919fad8bb8b589c1991f64f64f8a578f8a7d0ccf87cfaeb4c5c522826c9d59f4bf4a3f96791626a7889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1931c316f026ef22ccf59214f5c53df
SHA184bdf6fa7c59bba6b91737c5a31a50f58b66c704
SHA256352f3d3cd9db388507968951c3b38e5bca6736cab139fd9802be8c757e2bee2d
SHA51207b792822dff50f90a83aa000ba75fcca5f78b6b998ec7a5dab9a7e884a4ace2d9c74800e2df7147c9701f6bb996d300dbd3a1b6f87f14946717179abeffda5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bae985e70223ff07332d656642ba13ac
SHA196496465e48487d3530b86406dc291c423926834
SHA256ba0de06452482e41fba1a0662a048f326e46a385c32fad25e0ac842572fa80a9
SHA512519d08c159752c1af1febb468441ef1cfb959e5b060d0e9310be56db3475767fb8e4c59fcf49a09940f4a136ef5d0b4ed266e19156d62ecfda8dbb8de6977b11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5537fb491e45eddc283aca051c612a4fd
SHA157b218934726766d1aa115b3adc01da758923b60
SHA25622bbd12bb7e04bb9dbf930e695feba90c5ea150e2e8187e9d8211484e52ca34e
SHA5120330b6dc4d595f3cc67c5f0e09039519774b6d32a3ad3f3d0b30f9622f1ec0fcb1b450e46b19989a7cc4c7a3d83c2348450e0bb8f027edb27968c99cf1bd496d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e03ca5b2553cab8f14d0b58b32db0194
SHA1287cf1cd3cd64f65050aa8e6a6f8331757bdd955
SHA2566af4f3fae4eee41e230bc6661ca42f12ac468b0f490db77660f924d1d19ef6eb
SHA512f7f7dc149f01367f656e5f30d627a276045b991f02acc4ce4dba3e9670b5f00238e64749c332528a5403d825f9983dfef6e7f552392cc8e1129b76f270051d4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5588371e93df05d9f74c348402e52b418
SHA12bebb536fa6acac03b4a8f5ca29a1a309d687ec4
SHA256ca118b72a25b4450cbc2373a0bdcdcaa706ab1a4bcb241b4c5b07e1e5af001b5
SHA512ab5028320f4408935f9542993092b25eb7d3afe866ddbc94dacea3c549651f4cd0b83709632dbfad759ccd653d1f5d363e54371fd1ef460a19837226f5fddaf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7836247a4196b8c866e1d86d89d5100
SHA1475692b886362082c1a2c4ca169954244b4de2fa
SHA2560c2b1c79847e28fae4dd51264b5f9d227b113ea4d6f76b047aabd2bd4c2671a7
SHA512196f7001b89a8defef24d88a9a7ec547f4da897a8fc2d7e60faa0e783c738d336537d1b9f51473e8ec8f627b4963b435ba45e6ca4d0661c3db7529b501cc1cf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585068c2551ebef61cff5c7a8e5165965
SHA1283ca7e05fda4a581952a277899e1641aada0e02
SHA25686e48b9c554f21bf26b94377973f6f153e2941ee9853f8860dcf1d3646227180
SHA51284b0993e81d0447072e68b31a84a3938c0a83c08bc701fe4fcc025f35a032712ce2512a0663049670f12b2edf7591dfaad51acae63095bd81c38fa1babec5bbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef7842a80be9df05831d730c71fe5076
SHA14bfdc228d66e582d79b02e8b0bcfec34eac681c4
SHA256790afa30ba6adb1bebac21eef4107117393a4f758edaa5e1aed18d0a7f9c5492
SHA512bfde736963f9136dc0daa8e73cae005ed7bb92c403220670fd9bd4e7b7d042969670f5b238e7f7a9183620faf96a45f42d4120b90324d3c9b20a7c4b1c3400a6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b