Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 22:55
Static task
static1
Behavioral task
behavioral1
Sample
d73a29afab6e482cd3a0daef0f600a82_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d73a29afab6e482cd3a0daef0f600a82_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d73a29afab6e482cd3a0daef0f600a82_JaffaCakes118.html
-
Size
10KB
-
MD5
d73a29afab6e482cd3a0daef0f600a82
-
SHA1
569b32093e244ae9a45233a523c8052fcff5246b
-
SHA256
43e35c6dbc1d0c6550fe52a1382d700ea633b87721257fc2dc17cbef492f1c33
-
SHA512
f9454b1fc0f041491e2f2d6244d6a6b2e08794ac6423d58b50a01b4d8633d0662c0134949f5507b733e4e7539b9da1d4e0c2932abaae9d39da951e2bf9ab8e0d
-
SSDEEP
192:TzGicp1WoY4xXyhdd3ua97sxRk9T/kI00F0Et02AaO:TZcpxYhddT/9T/F0K0EtK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30cb8fac0b03db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432084391" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{98158B41-6EFE-11EF-9704-E62D5E492327} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000051d8b7fd872096a9c10ee19978ba797153265ad47c38854891c959c686cb1a73000000000e8000000002000020000000c190bebdf0912cbadbfd930c3ab49272b394b8087c92c07fe2bc68363b05a57220000000b95e68f6a638f6762d0cba5c8d9a63319d95d897814d54415de0896fb0370261400000002d6c56e203f9a1eab67c357cc64ec8cf9b3d3848042483787166fbf299e4ecbcfe64b61e453493ccb7df4cdd9d4c8953c703efe3f80d545add284613ae45c094 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2372 1640 iexplore.exe 30 PID 1640 wrote to memory of 2372 1640 iexplore.exe 30 PID 1640 wrote to memory of 2372 1640 iexplore.exe 30 PID 1640 wrote to memory of 2372 1640 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d73a29afab6e482cd3a0daef0f600a82_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551fa21918dd59a6663d4d65fce6a61bd
SHA15262f30e5e35ffe8b0aed4971592cf41a43c6ab0
SHA256560229dbb52f1bdbfa1d6c013bd1bb0042d4bd3e34060f26fcf44896705fbc2c
SHA5120bfa6ee2cec812f1f5c281e095808b4da4adb97c9b327a7e217d1909282d913e5167d15913e8be7396a16dd7f5a4020254d2fd0513584767328bab8cd3176db7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca2a58b3f76401dbf47c11ff134688d6
SHA16c0ce40627775fc5a791a33e02ab4ffcdf6aea88
SHA2566e032bdb1d228108b6f043ed67c9ffe4249cec2c3e7609188addfdd822d5eca4
SHA512c61544aad30a4f7e738db77b45eeff9ea4bd3210cff9634c91f72dee6642e7a094eee907fa573087bca142f5c499f2364b7b4ede587edb931df7a3927ab6f698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ca390314e433d472fdb53c0a998e70e
SHA1d6224af7115963e463f9ca2f6411268e39b2e46a
SHA25674fd478b510fc17e1e8ba096dc4ef09cab3c82f15d3ee5aea16a3cb50f6031fc
SHA512cc4ec74b7fc68e808b6d95d3693756976f104a7dc9cdc26ce126969a068b1607521438ed41fab3c5b2dcecd513da2f4021a860038530c06998746ab137068cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e72739b67a4c8317692c4f4f518e2dcd
SHA17cda31c3841f0cfe601c5f103aa67fde037edd20
SHA2567c03337a2806d61a6194c455e86be488e2d46f930ee8dbb9eda30a436626bc5a
SHA5122a6b8e6eaa758be174ca01125e8c86d99c010245c76b18a0691c7e6435e2310dae7f25f6ab75d2000f4ed6963fd772fe5113e248f8e6a31b812a58ce789c95d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59243956b0e58468e4188bc217ef55eae
SHA1666aea815922bd8ecb9459ad610cf3b9a712cbb1
SHA25654afc595f1ded130729a6a100c2c07515f7e5eba7df36a437d711502162dfbd9
SHA5123d2f4346fff615d3aeb48c638e7a4779c15f20a21b2980a020c6c8c1528cbe52212f9effdb39728e5dc7448c5e24f5f1ff7cd2128dc4138038529f2c397ee9df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594d2ff25246d8eaed377bb720f5281b9
SHA1a6952d800515ef6e36d1cc08eb70274df5b1ed08
SHA2566d2507a48e778a6b9126df6ed08c0ea41c6757f789f049261cbfc842548d3a4a
SHA51244378e2a0755e240799bc0411413a85ee741b1a9e3c6b3d842974dc20fb6f23e203aec60aa452a5ce19de8f2942a30ff9f80ad35f0dcbb7a61155d4ceb125161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a293a7f65b69efcb6ca6af0ea53e681
SHA10e4b7460b85d729000bca9563ed70b0704d439c8
SHA256dc53e6b7d1680485dc758430ccc7da61732323d0edfe1fc36c3062fcf5ba7e1c
SHA5127e45b01b17910d5c2b699b1cca481597e862088541b3b0c13695b3a3d182b8e618fdefbc15ea3b9334d32b9a68a862c75ce9dae6db964e451ff6d62616a5b472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cb09acc8855f9041857dc1043641426
SHA1ae8c22a3cc5d55a687aaff007835f205db45c4eb
SHA256b3f211ac39abceb6446bd684fd6a6833c1e8bd55b499e6a619f84580240f68fc
SHA512df5ad0807dbfb7f36a0442d3e2d19b1fc6dda20f39a5b6201ab255113f4042b982aeeec633b22c82508e3aacdf995acbf9b9d097ff77b30b3f6e69ad97f54de4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508ecf5b61d00d572df293e37980002e4
SHA16d4edb67bcf29695612ee395ddb3f74d45d24699
SHA256132360adecd145b3926efac80467bfed9c2f38654665c3ba73bc12f3d258b1c3
SHA512c1142b00b0485ca4476f8f1c5863b14082650a414060fa03b89da3cec7bf2d101f4e2bd52f89a262f5536217e9ef440b7141342c746d1c30ec0b989869af80bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a247fa994e51957dee550f5ae25f5c67
SHA12320ccaa05ab6312abff6f8a9947954171cb1b4f
SHA256996c324bd4152867e9a70f981a86e8c38bb5461707df1121444c8dbedfd77ec0
SHA5122e07c9133040fef822d3106b591d9852b8655d4f5348f7e9bb8f556582de33b086b87d1ce9eac0bebcf1530ee66371999b68c615f5f88fad39f17bedbaa636cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aca47260e6e68f90b622c19230396a0e
SHA1a08218d6523afcb2a62992f39f55785ab2f7254f
SHA2569b3b1d05f997d8d010f986c9517ddcdd1970fab0dd34245b0f6eecead3487d17
SHA5122cdb9bc445d0929246c8b0f64a3f0bd1282a136a99d87b4d40d4778869774f474566fcf5380da3e39e6c7c19c1c5c1f66e0d88b5e05a8f272f6d32bb677d8228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad98c3a4668450bdce4e24d489d6dcaa
SHA14b574d7b18d8dfa8ae030e23fe3e598108bd17a6
SHA25612db228ef27f64aa7a1edfd008095ed054c37811b65ef279e1d08968aebae163
SHA512321079fa14ad65a335fc061017ad8065de1e83811bc14bbfaf8e3e94e47941f92dfdc01466c56bc632179fd0af3d8d595fa4877177732fe8e4ba7eb92092f222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bde0f21c23bbde207712dab2be319288
SHA1c61a4d60aa7ebe7b0f3de016e4429863563e5726
SHA256f8b257c97750a22d1ecefd03ed081eb531d4e151904e10efb716ddd8121ddfd7
SHA5122667410662908f4652f09786238e22e4c97158c9f0ec34db66b9fa587082f4059c13807ea1fadbdd92be3f6fbae1324ca5538a5213c3acef35b1fca8b8612cff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514be0f1a905432c97f4db126f6a425ed
SHA145ac95b98a1d0b800c396e26d5124940c36690e7
SHA25685f0242c79a0e730e492d928736754ac2aa10259a13df9501f98aa7adc6aff4f
SHA512142dc902bf8cc53bc4ac8feaa21d700ab0487d2dc52bf9c55ffe1f4ffabf9d2cb8f8cbb2464ab8f15bb95198c0d0ae6c905bd530f72594763e973f269e48c4d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ffcaef46cf4d0928ba2e315a62ef019
SHA13d05863ccdb5b497b5dd053d05835066d9e23442
SHA256adea369a5db74409677b23cad5954fac2b793e17ff5a5bd576feba54ee8b04b8
SHA51282e3cb29c1bc402b58d2d42b742ce125d2d8f1c9e2aec24e08e09c4053aaefa141d23f2272cfb8da3b8b7f68ed65494f2004a96277f8f5ad3f54b573f12ef591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53019bc84f0c668e99589e84596c5676e
SHA1548bdaf470222447e3a8e2dca9c3bbf459714bd6
SHA256152425329ba23ca2813ba281b6835be321fa593648f96b62b051786dc935a835
SHA512facc8915aa4ab3dba93851bc61aff16fc8f7cf63b24791b532a18b3b72d1558e4d961aa8b67bdb42abe054073311b69e3ea0eca446193b1a78951251e6b764a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573d6036f7984fbee433d7caf276994d2
SHA1e88a235cac59008082c405ce34e21d4c867a73c9
SHA256a4aa80230e03ccea3b987727310df3022688dc77de3e35965c092834eb66caa8
SHA512ad98f08ee19644b9b48d6a5e9745aa45c58b6f952daf3cf36c74aa29241724a382933a30a8edbe1c997ade4308f2f1e05d0564c06ee9449d6d8c88fcec2bc580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533d9ff729f61b33b5aec1c384201c835
SHA15f2b1248f3ff80771d92176f655e4209bb6a5c25
SHA2563477ba951c9b0ff696480edee0428caeef00ee558a7a21c713d93748cff54260
SHA5124f7ab1bb1362aa86a55e375412f6c946e355fc41e1221c6e006e2139c59e9edd840ab6dd4e8ad84affaee2cfa6d879863229e07532cbcfedaf756769aae0d09c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541f4b4d164b0578b0e3c49bab57d307e
SHA1ce407582712f046ebc8cf29785e3e7f5667f0f98
SHA256091cc5ff38684bbd0a1d5b23c4500287996fcd88413a6780799d216cfbe3fb6f
SHA512dad94b4a06b73cc998354aa6adf76a3b6e4e7cc17d2afc39e2b985c8afa91d512f539aeab72654c25b69a01b25523b7ea3a85901ca1429d7c7b719eef0d401ec
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b