Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
67s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
d63028a8112441597e864539499c1306_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d63028a8112441597e864539499c1306_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d63028a8112441597e864539499c1306_JaffaCakes118.html
-
Size
777B
-
MD5
d63028a8112441597e864539499c1306
-
SHA1
ea1dd10ef6cb4f8d017119c38870ab7bdd27e83e
-
SHA256
729c7892998d38a070619dd4f166f7ddaaee6d2fff1f3704ebb38e09a55d92b9
-
SHA512
f64b11ac85f65440816bba90513cd4da9900f4b0940c211f90fdde84ffb276773e3131c010f492014b42ae5fbd99991b03ee4800a360f541d7227ef76844f22a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{95218961-6E9B-11EF-902B-EAA2AC88CDB5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1072c058a802db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000c6e68fa3f214c9ef4846d4cb83e4611f4a3ff920f3e4c8f9b0da9dd2e32171f6000000000e8000000002000020000000e4a0b112348043b0c6883993e1b841c9f4deb7c9fccffa57ba0becf4d2d90fc720000000e3886858feb1efdd95503531f8e04f324a9421d40f72da5cae9b12b524fc0cec40000000f1fc8e8c258e456a94392c3e579161c36fb58083cd97cba71745eef220b12a306cb9f56081ae5ebfc445b60c584139238b316edda29bbadfefad536255888045 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432041865" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2128 iexplore.exe 2128 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2148 2128 iexplore.exe 29 PID 2128 wrote to memory of 2148 2128 iexplore.exe 29 PID 2128 wrote to memory of 2148 2128 iexplore.exe 29 PID 2128 wrote to memory of 2148 2128 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d63028a8112441597e864539499c1306_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5427a445bdd7d34cc6bdce79b004191f6
SHA1700cc07cda958f18eebb517eb8ee4c6e1341a3f4
SHA2567e77619a21177a33afbeb13f901091d599660732f906a6693016c39347d6273c
SHA512dc74b57e9f4ace4885356129ab1f6269c26824b0a1588db4841729d8e652535ecaebad6494993bc10939d0a720b88448d9aba9f6330a077ed9af29d41d0ee990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53261684d06ea399af04183ddcdc38a58
SHA19f01c94d16c37d5a2fa174d001bc1b4dd672430f
SHA256c119e097633b367a82c198f9d0a4b890176fc023b91ecbb03c3a4716028db707
SHA512e868580717f16ea4c51aa314c788983a7baf3fd9d1c22643a6d884a2cb2c7762e8198d27f2c8c4f51fde6a3f6dae1794bf0b4ab1bd48567de3429e647b07d81e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e40c14a641188236bb8d8ff86df2806d
SHA1476da73c86d9a1fa37837d900e033a01f062fd3b
SHA2567eac2585d1b7ae314e007711ce2abc468572609aab4e93202d76fe236bcff746
SHA5121a5d5bbb32ce7b18f4320c04aee9eb47440517b773bcd83b6eb5a128e5908095171d66bac5c00739ab7672f57f2af89366535a01908745014018ef6c50c4bc60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a266d432daa7e7401e97fc2e678832bb
SHA1bb2ba7d05303a5c7561f443cd4de33b375825b45
SHA256f4ebe7ccdd96703f782342ec9bc536d476518e9e9c82e46a53e94a4b1cc58e08
SHA5121bdf7257ede6262c146b9cb1172ac957ab6a3254a853c317efc7bab83533f6651ec9ca8113765892826197a807ee0a9088e0c2acad5e31a89bcb66a9196a3869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c985dfff9727974af6674162af13fa78
SHA1e87dcf7c0d04b035f5113b9aad4e703eb71b0b5e
SHA25602a313af4fd3f85b5c50411a6453b23c125d1317e223e2cae6e84f61873548c4
SHA5124754c7dd957254b4f007cdbc5a616d17b560ad7250b7d51a81d654f900c743c22dc02b7f3db52bf051362b99a328d6856a52e7dfe882552467c2f61ef8634b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a4620590f39cd1fcbeb153d44087a34
SHA14064b16fd54c1acab65a2e114892253337da90de
SHA25624f431853146bdca28ba4a4e4f9c977dce632c3d5801b52d99c7c90e88c3bcce
SHA5129cef0150d08ce8b1494982d3dbdf8b1d06adb20c56e39e7695f7be720be259ace474bd5288ee2a2aa60c3f2c68f7ea1447ad97a9711d4f349d500f8ff8aacf86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5463cf40632e8ef7ad118e53ce148598b
SHA15d44ff616c83ff2e43898f929ab15a44e2b6b373
SHA256061be27f289bf96b77ac91b98f32ad3dd77ce43d890f99093f96b058d39a4dca
SHA51204312de2cb93b4ae74ea9a31841b1d2bc97f799878e87b960dde81dbbe2026364c401c80b627838312ed989ccc7229fdd26f1344705c5b435da4f651fd5c73a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5273f7b80bb1cfebeef0f29298b1939d3
SHA1fbcbc3a4117a27e8a5f9511ed8674aae5f1c4d07
SHA256d4cc93732b54cc43661b4379bc1a1597abef369eab42e400e41d04ac0a68ef82
SHA51214725d7f8bf9232ae5c48e055b556763db27538be21273a0721e31c07ab2eeb9dc11a5d5aa9d69736bd109d28c56ff06164a6eb90e4d60f5ceacd003bc8a5082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b463f1816eb843677dc0b32d14ee39c
SHA130095bdb7705115ff384ae485efab9e24a9ad341
SHA2560a3eed4d7494897212b322f960a3e201661a51c5e9dd32212514e038de98b79f
SHA512859aedeed5013719c7e4067c9fd5bf51a68fb7df0bb2af31b9a9b838c59a0deecf4134ea3c526ae9012931b816fbcd28d2fccc8a48b23048079a9108e9c15907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce6925e9b1ab7cf0c4fa1e278f6b235c
SHA1695a79e6d27012eab09c6bb3871686fca1ee5780
SHA25682baeae1496a43c41bbef0cbc7bb2396dd5ee7aa8fbc7ca6f32fade9ec58b552
SHA51278cbf2060272182bb921a1e5bfd788905c419541b42821f1ccb5e12648c9b9710be862fe6edace097ab6d58b4f6b6e076138a8b051e444b0596918d56a5f7d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adf9ca5774c274877f909a7f2a889eb7
SHA1a6486fbc8c3bfbf8ab3b581b9e92f856712c2d74
SHA256b900da9c5634b92e680d13049e07bb862fec7b2d9dbe92b459887a4a88469f9f
SHA512c9309047719eda1c9d2e0077a4f505b15d8625cc82ba09d47cde44460b70555e21224bc6edf1c3829eb142442b406e4bd702a3f864353c5ae601bd8a268b7345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ed68784a9ac99acf82f115ae54b128e
SHA1ff4d5c6f63da5816d0891052236768596f66b662
SHA25603134a2a5a770814d2dc353871f0f37debb07bbcc226cbff5cbdb60d510caa59
SHA5129d28f272a775e1825884df6c28eaee70f3214b418f6c16b627a8ebf5af99091e0019a6658ddf93e01663f15e928c58ecdae280e895bc228e8326ea34fe0ee758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bb6e5db5dc0499e20c78028f87569a9
SHA1042753c8abb57be843e317dce2cb4ab0af22ea2a
SHA256bb3dcb569f5355fb66fe06125763e11c7c8028212ab3f4f5494aa52aa7b1bb2b
SHA5120446808d89c43bb51e40c8a453d4508856ce2c5d66ceb561d9e5188347eb017149062d03fb006176a9086d68fe8869040e300ade60d5a5c0839f61b0f2e58959
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1252d14c1ab414df263da62d71468bf
SHA10dcbfd5fd62404772959fbd033f6b57f4e06ca4c
SHA256693c01849338bc18562bd438277ca5661eb2e94109885834fa01c21d9d91e66b
SHA512ce22615d86980c3796f60e7c6d2d7b804054c4432800dbc0a27d248312c358f8f2a329defcb01a81b516745038b2b93371746227bafe291d0b66f3b30f547221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f4668f058b5e41d36b2e94d685656a4
SHA12345be02615869e6b8d0219969475eb54bf61cb0
SHA2565170e216419e00120adf205863b871bb99d3d3e10be697d05525d52819f5b716
SHA51244b12a5f6bfb68646b3089ccdf077dfb7bec8e08dee962e571006f72d558e1bb2211258dbc0c27a9b441f32d3f93ff3a19dcfaba68063cbaba1689c56fb99eff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6dfd25e961bc14c838bb205914c2416
SHA142729e2494cc7a917ca30d30f65f3bf0fc666422
SHA256c162ba16d59231d727697b20e9099dcd47291479e3fcbfedebdf3f7f42dfc7ff
SHA512961077cb2dd76bc73b2f91362dc3b4edafa84db023052ac8fd5cb9a42a2d019dc640b150e91b9aa8f5215613dacb66ab5e9c15cc116ccc3f116aa326b353386f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5995ea9d41fdbd1641f15c08c70114642
SHA1ab7e2c72450f4a6fd0ff7edcbd3df9f5cf788f98
SHA256b58df492dd10ab03c198f68245bfcecc7da9223c018c6cb4c5e991c928461a81
SHA512c932bbd2170db2cda6f9d92df4448bcbe1734935db820ced2339c88f4c34b08d9d6c5030c89383fcb6b3b4e81032a305ef078c9617be58f24707f99f7b340d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8b8d3f5b68a300a7426c14f4ddd66cf
SHA1ae89b5e60e1470caae5d9503ec8965f1a7657867
SHA256c754284242ac0963dd9ec2dc8e3a46f8dec3b954746a6f0674739afe2adf0869
SHA512410191006cabb070d1924c1a1f684e83730f785f1b604cc698f5525f3164c8654c707794be5b240afe1f73f09ec360977141aaa10b2622a45f967f2bebaf4577
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b