Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
80s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 13:46
Static task
static1
Behavioral task
behavioral1
Sample
d66fe7789bb7afa1f98b8f971ef5ce1e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d66fe7789bb7afa1f98b8f971ef5ce1e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d66fe7789bb7afa1f98b8f971ef5ce1e_JaffaCakes118.html
-
Size
130KB
-
MD5
d66fe7789bb7afa1f98b8f971ef5ce1e
-
SHA1
429c5a5889735024e84e82030360cb187e89b84f
-
SHA256
e2e801fefe1b840ca97c6fee8cdbc98ce32dd6b7be9f0147955ea8c5eb9c7731
-
SHA512
5bca86c73d042b5f35c19e22cfc2a7eeffe5634555ebd7f94ff758b8c288328a334ae39d1666ec8fd61f316d6534db31a7dfc60ba4c8c164c243cf2c6dc24577
-
SSDEEP
3072:SAekhBkOwczHFU4N3xo1eXzrEyfkMY+BES09JXAnyrZalI+YQ:SArJsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FBBD7921-6EB1-11EF-A839-E6BAD4272658} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 304814eebe02db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000006112fff9a3efb51d82fff3e4d2a8983ce6478532fad5e6ac94f8c47481053b45000000000e8000000002000020000000ed2c3c4a183c76ab1791b4d579cbfa0e63fe7b1e85f4f689a33211366d9a7e61200000000f3ee81ba3779fd9fb5cdf92daf170ec534c9d32dbb4b3c5d21f6e876c770c8540000000f13e04c67542e5922616a4348d8be80c23f283627724a103780cbbf37f76f5a9e1627d04c7d274b759f89c3a225e16309e692af20e45a8e71e7743086bb05679 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432051492" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2560 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2560 iexplore.exe 2560 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2440 2560 iexplore.exe 30 PID 2560 wrote to memory of 2440 2560 iexplore.exe 30 PID 2560 wrote to memory of 2440 2560 iexplore.exe 30 PID 2560 wrote to memory of 2440 2560 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d66fe7789bb7afa1f98b8f971ef5ce1e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2560 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554a015752784c20eb5cdccb787843578
SHA1e26f299b13a01d3d7e3c7446511591ecf642423f
SHA256e83d5122932c7597b32189e8fc5dd28ab228ade21b4bfe7419f25406505a1a2a
SHA51284ba05a637ad1e197c580130477ea8a2cc516835e30262f065360237ca067de7433fa6e0baf782dfc43a3d4132b05e577d1da3dccdd72e00d42f74caa540c04b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591a61303a86caf48830b496588bfbdeb
SHA1c036460406722fb770331108288588ab89c4e9d6
SHA256f26265fd47e74b9f16674df8356c8472105a8bdd15af89451eeb7fb3c8a42012
SHA5122b0e95aeeea69181d3a6f55e6ff3932fb55bd5b955bea3f45a14d730b13c0710f32d75f6bfc9e926d4661f39461e4dc9206631c41577e2a9c89f85eb4c69562b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ced09b9dc76e3c0fc37a843ca5197b0b
SHA1ef6631734db6799bfcbc4dae84c3289774a74a02
SHA256009a35b8172c5468741cc32692bcb4e9aa653418c178c704dc215e75ff159ca0
SHA5123ac2ac79a245f5ac8b9ce420f5f01505cd6d7e1b22c32a48e7c6c791650452e63dcf7b97708e38e17c8857dd7b2e1e687a0f5301b639ea9565fc1e2b96fd4aa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500ae81769de65c9a26c0fb196658de45
SHA1404344176e27c36d1c5f23176641de8ecb08e456
SHA256b2acf27c583e3be20ee053ba3b6343537e5eb2a9ef5d5943df12d2e0632a168e
SHA5128d81b323b31a78f6b70ae7cb04d24562f0834aba7571fe1bb688addf1ea76f8ece1052ddd6db425910fd833a98f954b376d8149b678afcef755fc1cf67edf1e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56aaa642d25fb221a94953849986730d1
SHA1ddc7a7a9a6c1bed7ceac6c76fdfee7eeee73f108
SHA2561718216a8165dce25443fdc482d6d9c8a043ba86b3dc24ccfe13e77cca3aafad
SHA512bd87ecf032d616ae1fab854d4e8f339eb56c5510df9a6894d36f02ef17f0959fe97d01fcf87e03683731632ed5bfbb10aa479be585c256dad8b46dcda9af0e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb02afb2e05003474c9b97b58b531c2c
SHA1c87cf301c2004ecbc4811bfe68fa1f3a1ec756d6
SHA2560105792f99057617abde2c02503b84cd8b98026a8049c6d5b62ca97aaebb098b
SHA512a4a028fffe3e673017630f2a11c31201e8b3ce393d2c4dc0658bd20f710e1344732428f4bdf168a5e1c425be22084d58f03582de3615c6ec717a10918153be6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b372aabe977344221bfbf8ef172673d
SHA137ecf0ad946205e7825e6ba48a6646f25a0e9d1f
SHA2560c8ee9bea8f814640b35eac92ecae933ff9009e1b21b7fe62e6fbcc63e646d8e
SHA512b9b60d13bd764309e66db0a95b4bea7a8c417937833cb6680981d7262ae9849fe5158c5ec69406ce6cc373b346f1d0bbe28a56f0a551e9bba5cf6ebcbc2d8d20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5589c4e00e7df3d92680764625a9fb448
SHA13b962e55c89732805377829ac4d7f1ee096c6ec5
SHA2563267e54cbe597cec4e9b96d618f849d2dd4774bb21446bf807f84e047465d63e
SHA5124c3c6bf4299f4587b8a5b6fd45a061248ea8731800dcf237e7c25fb4b09c6d3ca1a2aa998013c38528dd18c52ec67675f576d2d9f1db39650d1768253cc84605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5774c059f15e4fb1c7f8881f1a0f813e5
SHA14657ecb5b4dde540ed8222962e25d18864e8c4b3
SHA256fc6157f68be0ff05ae39e69abedb5e4b9faf2836c2be1a24a2fc6d03e8880701
SHA51211bd7eb97af19672c69aa6ee27b046b16154efcb4284950defa4c74edf0029ab5b84b6d71e64d89bc09cc1bab3c89ec8261093d35604f926206b481bf25ba545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1c6ca830c2412babeddca22ac31d4e0
SHA102a606f9536bad983bb15aff42b41e2bf02947fe
SHA2569cfc37abec2eb04da37b97ccdfe4d36a213768444eecea3ee1e8531b255193c3
SHA512ac16886fff0503abf27e7acde2acf9685558ce9ff38b2ba2d9fb302b304cf19bda54a75827191e5c07a6a78acfa84e55153d0de0fe04eedb5770b6d74c1cd9b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e3375ed2bccc774f618d831fa77b3d7
SHA1d5b524b1d1e46ba50053f893f5f43e58df7e7edd
SHA2560543d1c026743a9c883c5271e0356723a3ba5f33c6af710a03928ad9ed87191d
SHA512c535ec34b1723e5541271c6467015f7366799d95c14fcd3eae929dc4d0d6c328ccb95f64a19b708d7e489f88a54a090a7bf6a75f8ba661bb0f918662b60d7e20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e16df931a0c0f11827058e174976f71
SHA1c1e11a20e1d8aef0905b9fff18d1e59a48d699a2
SHA2565de508a370086cbcb7f2ce541e773e41303ff021ddbc7112ac34b586eae77370
SHA512070cf2f9cf58f8549aa63e393afa931884463b67f9fed7d9787d19ed964db0d226eb447e10b30b39e0019b76987db40e7de7bcf5dcbb073b989784853ed54b19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ef4a02158bcac8eab451709f553c642
SHA1e661fc9645a5e59f73e405a83d1eb5b0a94ef074
SHA2566142033b10bfc59cdca2925efb85301ccfd8d561adb7c3280bc9fa493c5ccaa7
SHA512156b4aeddbe8c47ce912f3b22a36102409841b776ddf7870481d61744a1d245dcbfafa92790261eaf219eef03e126104bdbcfb16fcbc316be6cf09bab2e1d0bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ab139262dafcdafd3c6bb9dc8850da5
SHA1d392faca1cef376d456c9d04f893e6f76d47e16e
SHA256f6ea7225105edfc4556b2dcae06150187835433da44d0dcbb0d597633c83e6b5
SHA512eca4aaca1100fc4e1ff97281d81eecb822bde5d04d9ff84addf5bc391195e10639bc8298cb326a78a3a206b29742e52b76e7f170c2770f924e41df16e4b81ad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528b77e13c2ce06ec108019ca674059ba
SHA1cc429885a806cd4d19b63f5cbcbebe66c9b1cc89
SHA256d75b1bfbd7d1c987d3a3958ca9125abf72ee8ee8e55d825a79ad5302fbd1ac0d
SHA512224036f6671ac6ffab724214ca5bc14b40fe572beea0113953fb0ea4292daae7e8249c25e671648fb0f014f3d368bb048ef4f6dcc2d127995abc7e3025ca5a96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509138e1bae8a6f2db76319f4db01e4a7
SHA18c4850491edd4a10516671860c7d52ff9005204c
SHA2562fe298dc5bcd7065f64bdda3da295b30f52609ef2a09a23e137239edf13ae88c
SHA51277bb9baad5eb7e65856d99f6224c4968eb4c979e88f8947fb13385920040c13ab451bf440ecd80f7a834ca63a2c4d08ee4c104baab8cce08b43cae858384c3f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529a7d62faa2878f85bca038e14aaa641
SHA1494f3235a3ca71dc66974f0027111cb6478ee039
SHA2569ac477c31121a8fc9fd1f2a59f18e90c0cffb217347b11207d7d111760141928
SHA512b232f8e01c64be1b6e49f8eae7ed1d60ec9346d9c9c4b1457b234d0c9a64fe7e7096a8c5ffa78837e9ecad63ba0e95b27a2792cda31e9a66c7f655d040c4da2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bf6fc43ca9380b4cd791871a1c27343
SHA10477f0542edfad581bcab0bad4cb1def2493d200
SHA256981b5a64d890a3c5d59151089435b2b1def5f544b29fda7919524f3d776589af
SHA5124fedd58340c125b86d20a55cc8ab0dd5e2ef7f99958e377284cfa8991614024d04849cdbe005c04be257b0c9665234275371f8c4de25822f2564b6f72c670a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5592c0a1b67be53a8e245a0e3317f6f08
SHA1028791c72710822d46124172579b58abaaf32b61
SHA256f4687ee205d84bd2d570455f267ac4d6a23a6e57efb07b69289b997c00a213cf
SHA512f1210003f32037843c407a4266ecace9602a4b9b358a2343d7edc0960c0c4b1bd1588448cad7343ce0bd26a7c822dc9a97ab3ea1c13b40a4094b0ae1543b349b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b