Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
d5ec6e830710a01e5c3f3a5696fc1cc2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5ec6e830710a01e5c3f3a5696fc1cc2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5ec6e830710a01e5c3f3a5696fc1cc2_JaffaCakes118.html
-
Size
2KB
-
MD5
d5ec6e830710a01e5c3f3a5696fc1cc2
-
SHA1
64de5993072cb012a865e4342078d71953e2743c
-
SHA256
374b866e08624e23e33e2a3a99d74cf4fde524d600d4ea2c857d4de047a8f802
-
SHA512
3e06006e7c81d8e47e6c8ab8a05f6e6cab8a36246fb9b22348ebc1cbc094c601117b48e7c403d7bb67c6fb93d347d37f508a9428b90559fe1598eec65dc9d14e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432031079" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000b94a89e0c6c59a1e7e6a8641c03ebca23b4beee32b97f46b3922a7355c54e3fa000000000e80000000020000200000003e7c5adc94d96109eef2cf0e29a37a2ff7b7168a02b60413338d8ca469990b5e2000000014cc47bcfe76dd8e2fb113daf2e891cca5a20a25b3a07a6cc7003d8787c17f8a40000000955ef564abb30c1b011d2f795f007e06021acd29723ae429734f36d82ce1c26ee07ab1f98b32d47b0513f0b39811f216ef3621b1b70648665482d6bd82f3327e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e8094f8f02db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78BF8D31-6E82-11EF-B2BA-D686196AC2C0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1192 iexplore.exe 1192 iexplore.exe 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1192 wrote to memory of 2408 1192 iexplore.exe 30 PID 1192 wrote to memory of 2408 1192 iexplore.exe 30 PID 1192 wrote to memory of 2408 1192 iexplore.exe 30 PID 1192 wrote to memory of 2408 1192 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5ec6e830710a01e5c3f3a5696fc1cc2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1192 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf50174bdf9f2cb867f65a894319eff0
SHA1e29664a38b87138776a0066fa70439c426252234
SHA25699c3b7d8d14acc5057d7f237a296d69f94e31eb070405aef9d021e3ac612d27d
SHA512986091477a6bfdd1c2704d142d458c17c913faf8c66c18f9533ba2659ec57d879ae716db822758710c23113e94fbd14c6c0ebf5504c748f28d930b7993d6564a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1bc6f0085e89326bc678cdf72e8976a
SHA100d424ea548fb419700ccc6725c704e66d6a0fbc
SHA256a718503f514f33624f5d193b869f000d2886742803d27bc4a254891a1af19a69
SHA512f448a2b2fceb56d9ae86e1cc64ecfcbfe2dbc4e6db89d30fdb988230fc5881e9f8e4d311ee1fcd641b3633900af094d8fa3ab03bc55b3bf88811bb772dafd18b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52acfb2f7d5abed772083ad6ea3b0835e
SHA18952d03028b9d5e1d8aed53bb5a06d774cc7aba9
SHA256c1bb7ab77d8ed84f75748a71361e8855048096d2c0e78d90121520b5ca463bc9
SHA512042927c697d9203eb9bf6eb96a5fd1f16dac0816cbf0653d62456b17818dd35fb6283c48fabea31728397516191208d6aad5bc6dd815ef25b937a3fffd3b1d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539f59d572599c3258451094f93133b6c
SHA115b256270b596fcd41d1fc8a72310376518ce6f5
SHA256b34ab3a841dd244636bc6fb34bb16532a7efc9937daec9819475f7cf0614aeaa
SHA51220ef997b0ff89d2bdc42a899ad18aac6651725cfd3d66bc1d1540cd21bc0b7df87e07e1e74bbc600e4f32223db173306f5ad3eef70c0a6335dad510a60c37c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1057c3d4dfa6cb78cda02a95ff0af93
SHA1d81d85a862e0a0e5ef2522d4d14ddeaf945f3003
SHA256698afec69c485d13a5ccf502b3b2f7678e7464e5079a72398ed4b3c61b9a276e
SHA512e0e46cb5cc49003517df4ad3b700f2e09afdcf8d0cf873d0155a9ffe0db55adc0fe75be7b52f52b2cffd2b6c9a9348bf57b1ffc006423f737e2f1defc55daf3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d564cc52ce450515cdb60407033c34b
SHA1434d8be0b8cf689055212944bf06f5876137d2bb
SHA2567fc0fef362db1d37a85f7edaeebb018247686a05f8f6652b0af87e71d31f8f7b
SHA5126b698ceb9119ba9a2e00eeaa7c0ec85262b5d613bf4ae035066b244c00569b9aba72b236a2fe80b2200628f70ea9c59a9e8769023a59dff3432643ed08a23ead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a99bae4c96edee2d3de326adaa5bd91e
SHA15e0028a2e1f72b77205f7f41d2fa291b9c2b0f9e
SHA256415939e00a18510fb4de76f2c2b7d7e4dd0fb6d5b19a54e75c99d133d786017a
SHA512897642907fb80a4b4bff505a0d019633cbc31e750d7d4d521fb1a0b8f1b16d32473496b9ad2c5eb64caee6f9e4c99e82fd00cf253b55d091af0ff16ccb76a18e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dde7ee18a19392e03b280db7c64384e
SHA12c98bba0ccee3cae4e34fd0a9d8aa7716cd50edc
SHA256eb5ee43c1f67d5362c76907e3fe09fe988a44e20d1514b74135189a1805e72d7
SHA512c2481e9d30338ff1499cfbb6f29c04d1b7494cf770c5c95a36f6369f368b5b08c53584ab4a688274913c99dc57ccb0ad0ba6ddd82cc19d81d0cf1dc9b6f67d07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564b2ab3ddb86a8d9f5d8a02f90843ac1
SHA1b1227d37d4c7974d930b914e5d29f4b91065277f
SHA25628fc17ca389f1b4bc3ed4d23743d25521d45ad1fad82df147965fba99bc23879
SHA51220458fc24d7c3f4306418b00b8be923dcd0c42425c85d082c11d0c941a41d3ae0fd367d0730960b18811468920791b808c8fad497d9aa34dc9a6ec0c752cf2dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cac9fc1a17e65baa6b7d396c68e7fd8c
SHA141f367b03967e29d25d35e93b013782f82f52c5a
SHA2560c7b825aa38c45532dc99ab2263aaae87acdf02364b6018a68d1ac09ba6c3112
SHA5125c916837d778d681c6f4b7a76e1e8a634387ad450c434f48259680718d6193cfde324354cb436e45ce23c4d9cd827e0846175d121365761894b0b068ee680f79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6ff7b6d30143540e7892eef63885837
SHA1aef842a56cd876703a949f951f14368d9f3ac1c5
SHA256c331436ca923618457902e83ef7b782bd48196f1606167fba05499d51f9ef43c
SHA51214a72248b065ac0af349cd7e8c777179c2c963747ac63fe5918fb5053886146246a7ef6005738a96221c7b2e818c3a1f9f004023e01a09c5b8af4e53bcd9f875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e77545b18a50d79d5e0760426d16785
SHA190ace55b641bfc7eb39e46fc505f158de9459973
SHA2561aeeeab6fd3e8e34928fce9ffd4c6c10fa63804b51c58d42418814bd46539968
SHA5129ae52c3fdb4f5663570983504b48c245a02a4e3ba72137d2392cb43612a3609481e7d470fa7ce672dfc84f3ed9b106a4f1c62c36d5bc14ef47cfbe5be3778761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3c632fcc4a8464bfadf493c37b69f96
SHA129bf9e246aaa9c538ff4affed05a700eae685cee
SHA256d03e00b3b0e1bc9a7a0f6257c134d05a9e41e562db7000d06db1f683ff1b23fc
SHA5120dd1aa428a5dc1b3b69786a41107eaa2264f3e7726280db6df31b1929d9dbc47475a46ab361da8fc6ecf8914678d7f56c3473cbcd4c3db2a361adecb3c277d7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c00a1a514d39359168ad3b781d18fdbb
SHA12ea82dc1cc49a1b3e10ec195d1d1cc4d0c2b90ac
SHA256b96cd29a474dc006b952cbb014cf4f325756771b48534307cce72e4007075862
SHA5120e4d0f8305325e1e6adae845a4b88a1b572319ca5ed75b110b9ac5c979f02d218183a7354ad44728f94024fcd889d9eefdf697f37e45097a9adb9c0982f2c83e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf504d89b0f667e49974dce178885e6c
SHA1ed76bdb4c7a0a12b58ea97e17d028a4896123eaf
SHA2569e62ba1709e10057c03aa7078d4da554b1fca89f127113db3a0b1f0167c74b3e
SHA512e6bb4d820b7c42f0256da5bf67081a139a6ba823e327f8acfb1117613b3a827d0a04778be09d4c2a1b0347093f25d0b52edb9d6d6c27e05d2f7408609531f190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ca2e69bab61d05286c84592347e7e6f
SHA1b855198104293c5307844d896d72b40f2ffd3b25
SHA25691f1fbec35b629138e15aeecd825db2ada92a370ac9ea39a93620ca827a46439
SHA512dece37e3b6a9f1f766f28146d91c56e846164d45950a77d358cb561fc8fb5c7306b9f9f82e8102f44f2e653e144b2aa2a7d111196111c9f502cead889cfa9e91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab248f6e8a8bc07d8e2f51e83a02e73a
SHA1dd73b70ed8b027372382d750949fa8bde8bc5015
SHA25615eb9fe78c150b5e06dc2025abd4bd3ce6e06f3dae55db59b22ce4f365d94d9c
SHA512cca53d12753405f0298e0dd589fb510b6ca3f1471dcf589e5c53480f2d49f1d140da857c9d51efdc717e096f3ec93cb442a67749d2ab4ce2a520299196fa1930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5501aef619dada1af1ad1c93cdf263a3b
SHA1e18a9bfe003aacc9d3c22ba6a5949c482d0e9f11
SHA2567ac0035efac18d23d7f64c5903b9385532773badd0f66942aa2a59405d0247ae
SHA512caea378e05aeb6a2e2d6d454c19c3fcf008b306db4b9d498a3757be071a7aa46fc86a53ed9a5f8b8aa9f6ec81a21091bee233e2eaf30457cbda9361c5d841393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ef4b2732740d82a0922384902e1412b
SHA176037ab511c014b4926f4dbdf8a2ca8d8dd4f2b8
SHA256dddbdcb1f545b6d2a8bb355a1f4cdc685358d9270a9eb973d22ba4b41cecfe91
SHA512956dc2cd658656498a417e8412ec8bd89daba60546a0044195973d49ca8e88a3894d67fce16e645a0f40d3ee7abb40f97f96df25c828987c4ac34b2965b16c7d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b