Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 09:14
Static task
static1
Behavioral task
behavioral1
Sample
d604cdd0fc6224962ceb9213dcc3a2ee_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d604cdd0fc6224962ceb9213dcc3a2ee_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d604cdd0fc6224962ceb9213dcc3a2ee_JaffaCakes118.html
-
Size
79KB
-
MD5
d604cdd0fc6224962ceb9213dcc3a2ee
-
SHA1
c1284a0d62d68162227c17d6d481735170bc63d3
-
SHA256
a23351de930240903ce5d0eaf3695c09d5716fcd13b26d478bd561af17810918
-
SHA512
d346a554ca266a7b9feec11b2c12bf58f8ab53372980c4605762cfced65fc9cc62f395123cddd03afabc53b6e4f2081378d105aaf6e1022a2c569bdee5a9e48b
-
SSDEEP
1536:q1Cb37ZGTrojI/8yKE+5T8XBb2lRThXZIIcJ++4Gwlsd96qQwG9MBywLgewMxwVw:PbarocJ2lRThkWkC15gMrtm6wR1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80758dc89802db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F34B98B1-6E8B-11EF-8D81-C28ADB222BBA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432035150" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000d74728af87709c074673b18a018cf394dd8f29d1f10ed7e55ecdf1630fcadf4b000000000e8000000002000020000000e6335e26db155ef1fd171296f137bbb41d2f5075e729aba23b932f6dee382251200000000623faa86f610c9735efb5385c982224e0ba0c78cb4b744a8c29b0bf033556b54000000074e799715521d7c7989d8dd2779acaa5330de323392fa6f265019ff9432be409142a4747d300cff8b41451a1248062729f43b4351b8443261b711808d43e5f20 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2660 iexplore.exe 2660 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2816 2660 iexplore.exe 30 PID 2660 wrote to memory of 2816 2660 iexplore.exe 30 PID 2660 wrote to memory of 2816 2660 iexplore.exe 30 PID 2660 wrote to memory of 2816 2660 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d604cdd0fc6224962ceb9213dcc3a2ee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5694ea9b2e9b8cb01c8abcf852943687f
SHA1cd5a4712ee5fd9b9fd82d763195819496b7f0050
SHA256b7cc397c86ce7c97d207910fd0190381d84a83a3c68c82548ee66735fc2d58c6
SHA512d5862035637fb4c95be071bff00a73e68861bcbf3378dc7056520a246174ff29afd3cd1580fb78aa31c96a37e50b764c20adb5c5b657ad418d16651f2226ab6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a623840ef81a5266199b1da961b55da
SHA11579012158b3598606fea9ef69d8a49420504cf9
SHA2560326d78d9f557101295a12a16f548efed8f77dfb7dd174d8917fe9b106ab6589
SHA512db6fbee22295d6db46eb263280f3e16d3f153e21b6c82b4feacbf7753a23360b679fc2598cd6ce8ffd642a62fda6587875a549271e1dc89c7e34a9994ef37123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b869f30027428141500f4c991f704a50
SHA1d4bde75dd2c77b24cf799b74479baa67492803bf
SHA256b7ecdd06c5a840a1a93ec7081e4edc2c3e7929f2c8e501c8c8eba0bb9aed77f4
SHA512c047f00f7a2296480e7b8e6ac8c1010778274f34b4e5f2a1daf099bb71e209d50c22a920b75f819d9edefe0b92bd3051786ca238c5929cea4f48bca8bced8386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578018f7b59906e2b5068d437c14758e5
SHA1a7384b385be7227538df3a66c901abaa4d73162c
SHA256293099f0818fdafd1e1fa4e6ffa37eeedc1620f6ad7bebc32c5c29438b1c24f1
SHA5123b4a838bbc6fbbfcacbf23e1be7898af1043ba0afa6bcf2962271a2c8234513e2c808a62e27fc231e20a3561da3f640de2696b3756c6bbfdf6d43a041dca0ffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51db58ef55ccb6be87e291ca71c84f755
SHA17769ef600d1a7448d5e4ba4d3e19a9df9d4b5a6d
SHA25666dc5e5931c76baff77ed5cfe2bc0e6420354abc037965e89e0dba8ea4ad5d93
SHA512fb18403f62e92b62074474ae5d98a9fbbe4e8cdeea40a144495a39f37de8adf3a6017c519a19f20c611e742f657083ff56cff9539ca65ada056280acbd629446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5808addb37b6c6a79ef26c40a43501bdd
SHA1a6a94b238a8d0c46ebb42f8bc5c0e3db7cba6e09
SHA256a13e034b357fe95a46bf898539fb266c698cb363ed9bf6c06a16d0c6f56958df
SHA51242e94f81d4ef81627bb4f0b59b219b5841d02af9b97719541dc993ae362ec61e0c1c338f6ad3af553d813731f18d97585c9714ff6c71ae57bf275b6bdc4ee6b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd53d6564d38375e32c5adb360cd6b72
SHA18ee31ed9cee130300f4f0f15e7ad0bb2dbc66e03
SHA256e18f2301a4149aa536cf21af74393502ed5afc59c10aa5142167e45df6d06005
SHA512384cd7e2a31c9fed1bcc690ae67ca274a14250357472a351a7f9fc65f3161a097042d6b3e30ef3087f9973def489ef4ed595e488b2e2a94981c66a6927f0266f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcc736c82238efa937393ce94c4a153d
SHA112cb632ac14ac8145803575f06b8441779b2b70e
SHA2563aae3ac6824c825cde38d733cf5820e59d7655c8d9d42ea3f3cfcc449eadda0a
SHA512044854b2114c586256dd14004b13c64fbbcb79993a8b30de9c20a3b83c9e8331ca4db50e6e6807fd84a0363f127d09e166980152fb63e273d0888e9ab9905823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a42bcdb2af1336a1f1130de08efb85d
SHA13b71e905b7efbf27b9acdd077cb11bd864fb2e7a
SHA2566cc216deab5501b85d882ff4e3da2515f97154358388fa600e7b6d6c623508ae
SHA51219e119cb86942f7687d0fc7d58b16a3493974b6555148fd1d13c2c3efca0b8ae0019aed4d665ad8d12c65333e7e7f03f53a57b4df69aa6eb0cd33e2e6c912d2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8370ce6c0f4a53bec75328b61346dee
SHA15e7e1bc38b34370b9d6a15382493ddf2f462a97f
SHA2560be0a9f4cbb9fbef3035d2ffea05b525675df8872e52fd449d6718404adebc8f
SHA512c19dd04c906816323d550cd8f3883a5a6e60d1934c3773ddd4dc56fbd4eeaa5214afe1d609841d94be89a5545ab2c4019edfd94acffacddd146571d2578596a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddbdd68f7bc3dd75b3edfc462db38a5e
SHA1c96af076d207d2df0fe00a20342f8f4845e57b2d
SHA256c830e38afef5700bc45502c695e9c3248ff0484c7120646a67e0f47915275f69
SHA512fe2fdf5ac8efb81f45dacad1b26647a6bf0ba937ca2a89cae54cf23a8efb6a7010b485b16d57f1bf07c3ae708946143a80dff679feb6d38ba66343d2de52bf9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dde7b6057023b79832e395a64e3b8c9a
SHA1063f7e7988bc34ff72fb0cee6cd2c1fc21e0b706
SHA256d293bb54b49ccbae0d3afec45ae5b4eba323e1e564c5dac3fdbd1c8d37352e34
SHA512ce24ea9841333c11fdc1f2345d4559d0e3ba7776ad8b594cf4e691e0bd96e6c22ca7c56234b741cb6f4556b465588578690362533a8c6fb0d0c7f893ab0f4be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ada61a4b7926721aa9c9fc46be89a9f0
SHA15982363c1a990ee520143ba682a4b4f6b25b0af5
SHA256310dd2a871755811518e921b58bb23c2c608795ba13e9cc69e0944d2492496a5
SHA5123030283b78c10c402756841f21f690be0d4b3f3773a9bfba4e8a5945fde78fbb1d79ddf8af5b6fcec5c4372409bdc173890fff8f65df8d745f1487b033ddd68f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51111b640bbeb82e68896b8a14373a608
SHA1d473fb34f9f177092e02695f62a6e45eb86ecb80
SHA256a08164b694eaf0e6362e45ad5d14d5540ba06fb496915a856a4d58a58ec3b0f7
SHA512a11b00ce2453d6d817580070cf4761803f784ab65535839aaa9fb3a5878f250d5eb358a3b4c8a99aa8b28839067e481c833a198d639325f6473bc23d31d5e52d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586b300d017260f34544edfb0476f4036
SHA12cc839386f36504a28319d79b453bde3eb5c6b4e
SHA256637d487a7fbfafef33a3c821735bdfcdd48ab45927d857c172d20120807f74a9
SHA5120597685853ba73f303b58fea25c443af1401630b6014efaf93b08df6aa9ae42c40ca4f5763c37305db26d66a42b703d3da619734e38493ef9906c7c9f53d6d69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b13d4c304c3ba9e7dd5857f1a4d20017
SHA109dbc7bf6faa47011d0de81e9f4f852f54cd2e2a
SHA2565fb7d60937d4d8409c2959f96c7a583fa72c3b908f1c5b0ba16a830668625e5a
SHA5126d22d29516b148fd22c51108e82e1366a3eec8604325195806b5ab39b8932838f2c4a987ad22b1390e4dc3c84982c46018155462871a7e0aee8fca088a7060e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b083fc03cf48e6960754ffdebe2419dd
SHA1799b841e9a549a0e163c88e93d23bcfc02f202dd
SHA256c404fa2859d64498ebea9bdd178c0566cd755bd7e9afc412edaffc67c968de86
SHA512bb3eb0df5719973fdd9036f7d50c7564387ed701b266c87fed9a2053399bc22b5d6effccd25777506ee29a0e0ee38b7988aa7684d4b78532cedd0c880fddb0b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5928bb098bfe815c0ef47400c23d79c50
SHA12885bfd4dd92ca608296994643130d60bb556661
SHA25626da4da3dd1dde5a24a942713fd24ee2cf2d15d9b632e842220d465c7f752e68
SHA512aeba7136a81ea3e7bbe453c2f6084e83dddea7dfba2b1c0fabde2129701ec74772a41fbe99533bc9db66363442b24567e78021ddb1c930c0449dd73dbbe68efd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b