Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 04:43
Static task
static1
Behavioral task
behavioral1
Sample
d5ab778f346e150fe76fed669d5310b3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5ab778f346e150fe76fed669d5310b3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5ab778f346e150fe76fed669d5310b3_JaffaCakes118.html
-
Size
37KB
-
MD5
d5ab778f346e150fe76fed669d5310b3
-
SHA1
1c07b3b7d5e6394bf627e1e715f1c2eaf68b7517
-
SHA256
ba0157b5c5929edcfa5b3dc1350a74e5c1456a281c14adffe3b65e128dbc0b1d
-
SHA512
c95f2c971df32e6bd40b3d4e5896810cd2647182e5c2bf17933c4780007832ac5a965938b70fd4d2f0b34cacb76ae4f62c3dc66d9c0f9ed80d17fa4abec074aa
-
SSDEEP
768:D/bVFRFQW81D4RA+vEOjz6rdG2Gil54RZfPGnf3Gu34ani6781DdRA4vEOjq6h8q:zRFQW81D4RA+vEOjz6raA7IaiC81DdRv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432018857" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 906abddc7202db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000000b90d5e0ac76a54092b66fd806715675ec448fd62052034764ef652410cedbc000000000e80000000020000200000003daec2bdb91915dc8cadeb148b3694a3ce9d98fad4b54a66617972c9a00f996820000000b982a4df5906fff60b12ecd0ff0ab55637e9c3971c436bf88f82e2b6f07f575740000000fe8a632dfd3dd326d8eef53df7dfc037c3235a21f007548f04670f1de8124c67f465c10dea329ee5e23640fd926807bc5efe7f15ae8e5cbf31a15115b7037ca1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{03551D61-6E66-11EF-8587-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1720 iexplore.exe 1720 iexplore.exe 1364 IEXPLORE.EXE 1364 IEXPLORE.EXE 1364 IEXPLORE.EXE 1364 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1364 1720 iexplore.exe 31 PID 1720 wrote to memory of 1364 1720 iexplore.exe 31 PID 1720 wrote to memory of 1364 1720 iexplore.exe 31 PID 1720 wrote to memory of 1364 1720 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5ab778f346e150fe76fed669d5310b3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2ace399c8c0712f6ca2e0fa544b72df
SHA1204e43b0dac0ea6905cb9ab260649a9bf4f9c500
SHA256ee66353055866377df2bb01a94fd9499424c9210103abd2bb7979ad1a7a201b8
SHA5123a28eab435879f1ebdf7ca3d40f9ed0aa20d401049c0d911cb67230b5d7ebc41bb5144c981406ea795e3946778b496539c6c71da60bae4b9b3ab80c12a778f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508088312a89db7095042430bd7556105
SHA11f0d57f4805e1143eb7bb3e0243861a2a79be20b
SHA2569f47ddd536f28f06b309db735e2ba291c9b0a8e9fabb956baba59de015916bc1
SHA512470852c31a101f315de40eb5ccc1e281c05dd6ebcad2233de9ca16ec23531c4c42af222eaeeef9fba904721dc654bc7d5dc4b5a38140703ccb9aec329b083673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcc5af759101263034dfc8a946da9965
SHA103cae585a419092a99c991d1b272ca160df00d31
SHA2562a40ca4a8d94f1d2c0d5bc81b7113348a0610535e2adb968cde3fd453b29458b
SHA512b074bc4f2de0eea79147e63d62a184d873e1b2a7720f34b1928f9115556f40971ab4b1b18f9c2220896d94bfcdcfe74bab3104db5ab2901db0b509f5d1151c17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efc2536ce6143bd2aa731896160b25ac
SHA1a92dafa6b331197b7efa2068c7644baaf6fead84
SHA256b698661c3b8c87c6877dfba1827753105d648008d2d8b3870c3c65a0cd610fb9
SHA5124a4dbf1e2d54e06de1e41c1d2e68e1cc6a8dbc5fee630f617cc425b99919a8874708e7ade8a00867fb7df48c7c16b1c0db561d19a0110ea4b7d361ac0f86ce26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558e12844dd08b34f70e278a1b1cdb7ff
SHA11dbac38c516cf3a7ed3be783000a2d763c946989
SHA2565715ee06174ab0b9c52f3e9637840f356dd8a0386cd28dcd253ee321146cc310
SHA51260a1d327101c71e7b537d70c3c907c72aac59e8f2124c9464b491a120ee50d404cdbbfadc074d77166ec56e4d038016772e2412a0dab3c7d089cc0638ee5932f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e7495adcf54eff751a85457ce56ecd6
SHA114c40fdb3570559993f7e6fc8b7f5df23739ab98
SHA256eda6668201c8030d49350b0d7a7942e674b96ba898e183d8e7ee7488f4475d50
SHA51280959b26d2e1cef2242b1cef50b498eaebd8f7b6f5bc774237b9d51a48cd33a0103a06e37a800a444e5d5f7706e13714707b332e6be4a0cdf9f5af7fbad762a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517fdcc5a0636237c95087b268725bb7d
SHA100ea432f2669af24c1a597019e73f87930e60f72
SHA25641eba329d9e712c266ae0f5b2d04d74674c257262f6dcff339ecad3569ab9954
SHA51269b1f29bd4d6ef3e4fb18c7ce468d61a1b98d61036762e9b8b8f3e33c16bfd7e57baec73dd4370f24678e7329f226367d123bbee01f972a0a2b766b5eac674b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e935bbb476252663a89c4491abc54ced
SHA1d117770dbbb84554418f61c9aa3ac9d74c152915
SHA25668fae4c36a373b2237357a1d8573b704cbc6c85f1c8b36d6f4a77188b4bdb966
SHA512858a536ced3dc65fa7c3117787f047eb9e53fd8c093b9b3c284f5f732bb3b9b54717cd1ddcac4e9ccf079a4ec023f22e061a6fd643d12d5537789f553e277f45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ffcaf51a7e17e217ad7379220ffe9aa
SHA18158d3686f24d9db9ffc7b716a33e11187693538
SHA2564bc3090184c9929da81e2cd31b5ca2d350770b643c0d7285f7b07fb964fa6abb
SHA51212292647ae4aff5bd81ca2ac677bbf4f29e2a28a9becb340dcae60e6ed0c155a2b912aff61442a0736c249607fee75c9b2e34c09f25d287ffe637463a07ae9da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d89a8c028fb8107f268a90fc3c3415d2
SHA17902371e76725992bf2d64fc6cfda239b3d54907
SHA256b0033d4680cbf356de76584c4497afe7fdf47dacfab79aaf04939598522a204c
SHA512488faf0b603363aab8d7cdd31774b6e8fc5e3fc08794ca9e6a1be516903a767993bd753910079ed7898d45a6e4379abe95bb941bce37bce9143946c19b1bfae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6bfe495eb07648b7b6f40595af98142
SHA13efbbe424da9b834ded5f38d810a0c130a163f2e
SHA256a5b8c7b753c0440fc063fb2b99810b58daebf9722050737ab6f51f2f963933fc
SHA512f0658893eb9b27add1a712b503e7d39d1edb5b9792c134515101d79ed20c9e8aed4a14af270b366bb8700dbc72d2470379573379af204d8aa500fd2defd93a90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e69ef4f5bcebab27c43c3833549995c0
SHA1608820b1055798d834e55b5a5572af5869a256e3
SHA25697e803198eea0fba1738bc598bbb8114a8e18fb9366484e64dcc68a46e669801
SHA51289424120aaeb95a58a5e4ac090bb19f59f8f0d7b7d56ce5fd4866b97003ec7c5e197b85f5ecdee613d8ab8ec3eb7b9dbe2cbbd0934d253fb379c6e15ab646c53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e1bef652e743440be68016ade97c401
SHA16858283523dd697607bdf84f7d3f3e6921d456a9
SHA25636a5f42767ebd38899f9eba9f59ec9246bdc6b686e27e414d94f38a4fd88d508
SHA5123cebe8083e4d1116ee37946e9f010c6b9c888a1a87cd641f5f4820ca5e2cc195140d63b4b0e8fe4a81654a618fdef17559606f6753174e98836eb0b810474200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520f63fbeb8d501f28abc15011a65851f
SHA1e35a7fbd12bc34e3553147867d0a972484dfe2b3
SHA256f069e02f4f3416132a3caad4dc95996e654989f3caefd934299c07a7c54ed2e7
SHA512093d39a735b39b1d79ad6bd33f90a18f39fad67bcc22903d84a55ff76674701033fc183a3880e73ae0cf165569f17d15bfe12b032d495efb86637783109fea26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548dab6d82f67ca8758afa10adf263284
SHA189e446dced70fdff93b72952639542a3abecccee
SHA256508076c319d196944edc7c318a99652ff488a146ba7a58ea6ae369bd76a2f396
SHA512c1b51d84da9d680e83ccf338d739acbcc0790189e426bb921ccb8e5765f3405527a511acfb92b7d004bd6fb2229a0077c6b1bdc36a53bbdef6d5caa4fa2715cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab582894328b6ca26dd4d4f6e69d6349
SHA120fa990e604bbcc28d906a0e94e38cbc617895ce
SHA25665ccc86ed09891cd2e849b0cd352b3b4a1f7b092f7298ff12135ecf80d21e020
SHA512b1a8955bcb5209d1dc98445ec921da89b670004e8a24a1ca122d40a752d4c44f7330f992d9149d547fde53ad144df8fdbfda5838d749e6dcca8a5e64b5ef1688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1f7dd3c1919b33fd5d94816de03d3ec
SHA1829005c97ece057beaca0b24d8944115de341aa5
SHA2569ef2299b63d4da6bdabb59c64fb5f3880c5b83a65c9f3c3b5bd4e0b73edff1a5
SHA512d86047dcf04ab7bdf07b8f54875ed1be0a6dc163240ae8e48265d4f8a811ea1f2f34c2f49a121540a0e0b4d55d0f826d75c43db23f686f03939a444d1fa42ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2cf7657c6df58e313c0cacc905a9736
SHA1490b8e005056b991b174cacfc02f04dc70903f9d
SHA25696fda031fc19ec797545de829df2dd9983627099bebc3bd33e8942d6afd0303a
SHA51230c914afcc380ac3f6feb764f183fe9a62c49a791e4e31c83af082678ad58faa9c26c9ef7b580a032f3d5b30683be7f64ab9fd0534c8d03acf6c1365204da081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543d154cb620551d335765ef8996edf03
SHA13f432b9e17a6879700d21a6e5b7e62630bdb9ae1
SHA256f6d649d7bba50097849600a38da0e297109bd8b25604b67da91c3b6908abb0d2
SHA51284055ef91ca62a05b694de7eb05f849c65fee3b850c3505e28525b764cc2f3c824402bb9b10653841ce04a7bad69b626f3e13937fbce82a72131d1d00f572d4b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b