Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
d576e7d93ed55d214c3d71d8fcb90fa9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d576e7d93ed55d214c3d71d8fcb90fa9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d576e7d93ed55d214c3d71d8fcb90fa9_JaffaCakes118.html
-
Size
7KB
-
MD5
d576e7d93ed55d214c3d71d8fcb90fa9
-
SHA1
b901c00c287456f3a3f2a6e3f3ff4f7975836e49
-
SHA256
d7b8565c14b3b3ec44538cdab7166fdfa1809692fe39e43552879b2cd3c96392
-
SHA512
f75b0370de1f065788b29359e328e335802d56dd5fee91d163880df0aae0786dca3856e5400f2340902beefeac888a4ab4a426f3f3e75bf552ad44b01ff0160d
-
SSDEEP
96:uzVs+ux7a1LLY1k9o84d12ef7CSTUHzfNhFBqIYP+YcCcEZ7ru7f:csz7a1AYS/Awr9zb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432008242" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a2d5225a02db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000e3db9f7d21871b40a31f31e29e01027c05e7242e8bd99411d337717c4ffc34c5000000000e8000000002000020000000202ec7be43820bca74a694478ee0ea1dda4143e2c4ae65c492f95459e4d8419720000000a09382b0dd26af2042ca681debe31d1a45ce6e35b6b9d5feb289b78b68378ac940000000f73832ff67dcf354b49f9b704e7aacb0e15cbd38b454d884055a8120d75f5da0affbef79e63d9ad64a6d5a199dbd933e26101dd7d21ec4732fbef695d5fa535a iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000095c7e4432f5d63705b99f9784c868110cbb5181f92ab8d6f244143ec345ed767000000000e8000000002000020000000304005639ff971bd893c61e37e130c6db685619d5d2248d41367629144f3ef1190000000fe171d9baba491a6daad5373b440cd4a9c0cb274e7f8fcdf0e6229af9adf554a9258f82b3777d26947069a54ce8b5f510a785a3ba65ff36432691bc71914c33cb4626717a9c9de8266044a48ae208dd73ceaafffb59be3e21b411e346e69f3d4884aec219943849eceef164742c8b85ec283dc0b50d99230248693466ae4a85da5d9c6af9caad4f8134b330a7d65355a40000000b3e92da05cea4dc9104777d91559bafb365448a07b5df3cc77a45dc2e119ea6379827194f655b688b36562a3a5d676eabf5a7ce01502fddfe3313db3336033d5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4C3C0611-6E4D-11EF-AD2E-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2424 iexplore.exe 2424 iexplore.exe 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2412 2424 iexplore.exe 30 PID 2424 wrote to memory of 2412 2424 iexplore.exe 30 PID 2424 wrote to memory of 2412 2424 iexplore.exe 30 PID 2424 wrote to memory of 2412 2424 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d576e7d93ed55d214c3d71d8fcb90fa9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cdc27b21962d264b36fffb0314d2719
SHA16f187599b9031e1926df0dc8425e5b1fb7b0756d
SHA256db09ab1b5f3407ee54e22256fc442d8e28859fdb986d921a3943d8b9bab44389
SHA51215718cf365e39528cbfb92275118e04796eb3f35d32026a291c50ad705da47b290cb3f6dd0bb81ac35ee1a676215fcfe3e25aa622abdca80723380a48bbd32f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53904b4509478a31ba601cb41526ee2c3
SHA15ccf420ab7f3bd8455afbe22b02bf69bc5a61960
SHA256d4b1afef82db4c51dbd8830c7681ecdf6b457cbf69c7155a801dc41150c4fb93
SHA5126dd164c6ead763152f21796b6454a618d4e57994c7dd0a717c03c54cf34d4626a047b243488a405520142e769ea90d6d45a965408da41b63aa71a471ed7d3b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdf289f42b4e3793f185628cd731abf6
SHA136299776d0c34a37e493b7b84bdb4b5e6ffb43f8
SHA2561f06a92423d60f12a2ffdab2965e02ca3b54930680c2f683a2234d18f47746d4
SHA5122c158428b009c93ba11b65f6f9c5c65c69857f81011d79ac7eed5440f03e1396846df140f0f29b1cb4b8050ecfb576b7e95c13bf8539c8c41571b042a29640bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdb0efa8b88c46c1a5122ff646dbd4f1
SHA103206e3f3a7246a5af49e9b4ef473782e349c27f
SHA25601a465169089a8d464a7efd3c1fbee5ee54e70d620d0cbd944512feedcbca187
SHA51278152522a3baae423a928a0fbdac7bd2a3d90086f5ad22003944f4171d9c7b316cdda697eb2223f0760f6bd3132578457cade095417aea0a4cae7f871f758986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563d49c9e1cb164693a44efe14f367b13
SHA17d7ee725ed18c8ce4efa005081b51edb22f938f5
SHA2567fa40be1dce5f3bc3eba5c893c4bca909a8744db169b6f0192f1d7f3075efa96
SHA5121a0de5fbda245320a3dbe6a0097ec5633775ada3ec72c80879e421881376115b8533424b8c36dd66ef3b8efc137309a1b30189d04d30cf745b30204d6786e4d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ed7e575a92ea1b5ed5dc5e78bbd1fb5
SHA1402624a9bf3b3a3b6047c6390ab32cc65bfa40e0
SHA256d9ccf132f6892c56d5dae088c980c376174207eaf42b0791236e9cae2a591edf
SHA512975a41f2f31b8ad4c0d53d812051cca55708aa68b86e772635afa090aa1feff58cdde9fb11f1fb0ee66cead7004a24478344358f1a5fe5e0fcfc7a9972afe2bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd13347ae5e37d2740027520304785d1
SHA18a7e0b6a3e935d4a0ecd2c97630e604b5a5b2847
SHA256909eb962188f0ba430eb28add3c1620a6640537b57ec3a5bb3c1f9fd1910f178
SHA512337f9b62e697dea25f353f64cbc8abdf193e86f16ac03e383fe2a7b5d8a2839287bf12b7fbc677bdfcf7858fd00dbd1163a8adacb551e5df236fbd3197fae6e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d73ee4610264f4fdf7e0afd37e3f017
SHA1e3b9ce0b46963ff8da205f00c30e65eeb0aa49a9
SHA256e580fc2b05257050808a13cd55cdb8db12a28fa902304df7b4d95400b5b9af20
SHA51223311660fa363d7500e1abc4e3386bb46731af4d22d401ba9203cfa50bf1dbd4fe61a7a43ccb371ad22ddfbfe81c9a02cff61f82875763888854c10bf311c6e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d14967fe664909d571accd5accbb2fff
SHA11a5f2ec507c2d5eee6b067b3215de57d8f9732ca
SHA2564755d74b6e9b8d6fe1de0f8fef8d3c02eb133129049a2d9bb55e1e2b0fea58b1
SHA5123feac0ed5511f3c371586394dec689ac9d5f1e4ae3bc7e61c5c4fc8a6e9c8af1d73c0d582b3a18e756fde980effb1b05ae52b28840f28bbf7b5def0a64b2f5ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b8652b04073feee56dd5f9d4e985834
SHA1c109a3eec49caac43cc99b7b623ee4bfb9a80881
SHA256c9b3a63d50785bce4ac867991b92d458e983a63c549a4d699f2f560c34ebff99
SHA51215a62979aa153c5e133c0ac3423ed6bcb31441b780491c6c1f3be482a7b837d40b9f6aa9b2e5fdc6122b6e3f8ed6bb1f1522fd6919f52770c7859797e20cc719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce80b80671e5aee920b1a7257cf66e61
SHA1b42a82e21a752d4e876b723ab9a4d6a4415cbbea
SHA256eb34ddf43703d9e85bc3844bd728552e23c31cc39d5c796a44c1778274466918
SHA51202314e8ee4cf3ce480dc2afc9b9ab219ded059131e5e17d3249add4fc82af6fa5e0352860bb28f1426084f8add59004587d61f15ad90e13bda575e4b879cf22e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5361a6c9d02f3539f9b21f477586038a0
SHA10aef8a374cf2ec328b68aaef3d37622ff287d4ed
SHA2569d110833f9fb77d659424e49bc061ae060d1699a750e0dbb2ec919878c1b1323
SHA51269b6d03ecb48e99b8d8ba0ef3f4024404fb0ebf73124d0cb1313d6384f9fa7e5a8e2f8864bd1071706701e21c5a77703590ad569acf6fb43d6a24a158448045b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f62dcc02308bd9c02d3070fb6634ffc1
SHA109fcb378d6abb9e0633f47077ea49646c12d8384
SHA2564b6a251776a9bf4afb453930314fea7df500b284c9cc405eb2c2b3e0534f9c79
SHA512acdaf96bcd50d0f127a7b132b1edf9d4eebf4d38ac671c0f8fcbaa2be406d4592e2ae6e4c20c310d397fcb4c7054a58a64c6662e4505d3cb934268b084e13ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bbeebcfa8c501c5282a67061727ab06
SHA1051cbe400b48b7978dc0dfe8ff4db8cbd4a0bfed
SHA2566dbcd85012711cee1d1bca2069a636bd1b3c2ad1e91759b91db17727da0edcb3
SHA5126dfe047090f1b565be4daeac9825b8eb06e40addcf783f3534f01ea5c6ad00eba03753750b83393a971a18b51b55b1fdf4942d9baf86dee5117f5b9a98c17a12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54195a6a0205d9c5e2f2f1ef6f00b7c53
SHA15cbe9c1332ac445ee898f6fb0f3fa7e694b6711e
SHA256e9f44061f793c4f27079d2eac5d39d80bcfd5df6285caae05d1651bb66510dad
SHA51296ddc55684b82ed57161f06f045c542ca08c43d378006f5c4f4a891b9feaeda7338f1d41ab0316f8cab8e644e309fb2720b8daad35330826fbd2b8261f7c21cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e418ff57e6c75213f217b56fcd20c12
SHA103b9d3ca8569d8d479596eb8dd55cc565740aba0
SHA25664a554591e757446c586a2e1e5b1e648a5fc959a15637b0ba6f85030ed41ca81
SHA512834dd62543dc4ed24aac96727fd1c5be1a0cb999617886c5cf99cf505352aa8958c1efb8eed897a54dd437e764ad3fb46edb7bab02ce91ad4e0852e367830429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55168e4b2d39e611a4092a3924ef22d8d
SHA1f13ed465af55134e06e6ed16153210624d3f7787
SHA256aa2c467b30e28caa67450a61f3d62bf212451d6de7396238d559a8e913d6bdac
SHA5121e7fddd172eecac3d1e712ad1dd83d63608794346f156d1b395abd219befc66234b6e31087e4408885e77bb80158faa33c31ba3a03177333adb9777e0e33f357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8ba0e6415b8709b06bd6e83c3955af4
SHA17b1e55b363d956ee1ceac62e928fb71f38672c4b
SHA256055a6aa0aead2265759514f2734a7e810a4e942503ce9dffed68db75cf2bcc18
SHA512bff4e32b9fa05c7f75c5a69b4db44bb52382aa2a2329d1622f2f3676e791947215179e7ce093abec5550790b9b57a8c5fb9c4e8cf1c3bcd13be43f196daecbe6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b