Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 14:03
Static task
static1
Behavioral task
behavioral1
Sample
d6770614cb37ef6ddd41f67febc60d10_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6770614cb37ef6ddd41f67febc60d10_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6770614cb37ef6ddd41f67febc60d10_JaffaCakes118.html
-
Size
29KB
-
MD5
d6770614cb37ef6ddd41f67febc60d10
-
SHA1
f284a90c04e4052175b84bf5fad0af7fb03dcc94
-
SHA256
3256a6ed4b20ac25cfe44a803ab8c51951fdfc9e801b8028b80cf84476197042
-
SHA512
313f4c417641416487c8a31196a841fd90400725145db53cd752ca847f1f0b5050ee1af55ed524f0baaf462a11ddd0a1f40181bcd2fc3ed9c9c713ece85a0cda
-
SSDEEP
192:uWrSb5n1cgnQjxn5Q/InQiezNn2F+nQOkEntkGnQTbnZnQOe7YEMC1GRAiGKTYvu:VQ/gFeJQrFQFvO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4047F141-6EB4-11EF-A51B-E61828AB23DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70435f15c102db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000047422fce626e42fd15f7836d28d14a9be869c899e55b4174d18ca71bc790d015000000000e800000000200002000000029c598474ef490e3a9777c9a54ed7257e8ee2d73d554824d84af220120929b7320000000b8622228701db1968704fd12455adc5e0bd0427e444d4519611dc461dfd72099400000005dd7a86c079f85fae249cde4c4ab5a6307fc3a4f9d26cf14bac4ac6043daf5bdee3a8d63121b021d0adafe07bee79e1d04f4f174317974f12bf29c71ba1b4884 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432052460" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 988 IEXPLORE.EXE 988 IEXPLORE.EXE 988 IEXPLORE.EXE 988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 988 2688 iexplore.exe 31 PID 2688 wrote to memory of 988 2688 iexplore.exe 31 PID 2688 wrote to memory of 988 2688 iexplore.exe 31 PID 2688 wrote to memory of 988 2688 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6770614cb37ef6ddd41f67febc60d10_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cbf0427a08700fb41a35fb7c564114d
SHA17233f99b8b5f93b652da8389637f5261d8259205
SHA25653cfa73412f776067cd4bbc75bbf873fa1581bcce185a5f55a120907fec366ff
SHA5124655400256395cab55b6a5fe8df42a9804b0e4b82ae6b995eea0f7a6059b105d679e64383a5b12ae688ca6044996fe938230fdb43e538386994dd7c7b1c04813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50db2bd9254ecbd707fdeeb0aa16d47c2
SHA1adb87e159f1a7ea2e33faf536a0b62942fb819a2
SHA25604745e69f3587fa8a752e3f55e3f332baf0dcd969bab4ce87f57072b7eedcee4
SHA512fe0f1a7728a5b588411e574a60b07492ba9d83bf95853e79b47e9335c88d716e1b1c07e10bc082d942eee6ab9883457de2d060504e1af1ffcffe2ee36c8c37dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c65924e9c72485d6aecec46d08ddd71d
SHA1dbb27c5ca5f3604930a39f7ae4a45fb35f67de78
SHA2563c34f790e37e19125401c48d9d424e6558d9c6257c7df496912afda79278a23b
SHA512dccbac065663afb30ba75440056b2430eab65ab977a7fd3e42f675f026b2cc546cd8b6319dd0fd86224e359de5e4691d2729c77e1fd124ae9310bc19584682b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0baa1ecc91c07c64508f21d96fa908c
SHA102303858aca1fc9a355e2910c994d562cbf9c639
SHA2565f30c2dbfcb533562dfeb015ed68e41f31078da7b0c6de14f2715aa71ee08b8a
SHA5128be115cac49fef5ed279fe17abca93eed095bbc8371dc4f81cd08fbc55c73ef0d8dd7cc1a396fd0762fe5b3499d15cf7460484e1d672fb43c8c512511e82a68f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d25776d7e5c16dcb31df586190878dc
SHA131622e7b6c03e34696ac91fc223cb2b910e2c7bc
SHA256efbcc8046437a968aac0241862e0d7c98833807e6641bc6ebcffa48dfd7371d4
SHA512263c6337b597b5aa6c73122ccc4d37d74ff39636c01aa2a5adbdc380a9397f0552b9c4552d3e2c272cadc2fa64b35346426883b3c2e6f387eea4cbebd6e73adc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c4e3f8a99b73e14bbf82d144eba49af
SHA1455ab7f8f1ccf7f1ca3dfe1d7f191c28af4fc9d9
SHA256cf8fc11a97ebdb6fd0aad189225787d024ad8e3a575888fc8917717c131c6bc2
SHA51266726d7c434da6811efecb9b1ec360d43e9b73b0ca2f1e60e71d0240ac1b08c377c8c065b219265425b38e90826b399e6d388867f7295144056d42900e0a57c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dca4efc6aa20ed2562f2354ef55ca3d6
SHA1e4f739fec5ac009fe89f67f9a1a6d94c818454f0
SHA256d16ef1de0f763cc9f2e422ebfe566bd70d68de735b012a0899327f1c13708fbb
SHA512157576493d92b068d86485dd75097e85ddf6d7c03c2d1a1625c88111de6c7e0ca1d6780f081596e9d104d2b769e97dd6b2d036f48f0ea430400dc33f44f18d5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5326884da7db14e375c9363042729f2ae
SHA18be500f681439111530fe216ed3a4a98d9adfa66
SHA2565a26d1ed9937510f421c0fbc37290ee4dec5eda6723b15071633be770c2a1ebf
SHA5128e1275d04bddd25b5aeec8e14b6c1fd2365f97b0684f1b96b0d63fda595c27f99fa94688721519377aaf6165d4b241fd9a22c19e4a5aec3736516961a45d2767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5d74d52b3fe306247d8990e0a2e6ba7
SHA172c591c68fda2fb9aa579f4192fbec2de5abfb32
SHA256478705b0ff86c729bc25c38c486e1d1f135bb9f947f54f464188bf011d8ae7cc
SHA512bd5eb5ba0e956717f879eb081085d74c36fe4a49bb7c5dbf7c175003bee0cc9e42f3b77d59ab54fa495ec73a421406ca101502abf4cee63a8110995b4bfc9982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588983d641ccc02bd0ea918d52c5f823d
SHA1033900d48bf6e4e6919e9bf96994ae9cdf47a02d
SHA256746d9ef5acae8ac53bbae537a3a6ab274c42123fe2a101fded38b5814d949e36
SHA51221c3a2da0b2408c3db2a82a5ffc32d323294a723ee0bf65b45744f44213a57230cedc1eea3b59c563e25e39301558ef56e4c7c73e5608a56226495e48c11e757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f15ae3c30d7b2a769fa620a3a7083891
SHA1cf61856f7832f9f9de5358caae1dc3e14c55caa9
SHA2563199f2620f0a3a59e9afbab30affc82f107ccfcfe97c1ca9e2f054c45ea4d70a
SHA512f8c0568566715743792d4c6f050f4fda75a14cd8a2ef48904de973c2740386a613cb43f3069fcc80cab20efbe551b09f3a453148e97e336df204cf9500d3f034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0f11b6fa2fd3a4ebd7e64b576608731
SHA186d85e0b444cb982940210b0725d6a6774821262
SHA256ce6b93ca87e006478a2650246d5a497c578742427b38fd67a002703831e0a45a
SHA5128ebf95a0bf6f4584c2df48ad3da7d62fba8ad7a38742cb802556fbc90ae99f952567e737bb2dbbb365b790a3eaa0412cad20c9fe49ac802dcb93510852e9162d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58be0503561da6a707112cd59a5b8e9c1
SHA1e825ef1207c0f8c6ed27b7dd86bd19d722cf59fa
SHA256b10e4a67b08a627dbb91cc713c3e050482c9d434cae2a3d5959daa6c64c3255d
SHA5128d4ab28afddd92ba5372634b2608b351203d76d7b02c528748c8008a4426032279b7dd95a0228d889437f3535e70af1d000435c18d8fde0a4cee41c1d1efdb21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c3668d88ff7690ec5e9bfc2570d01c6
SHA11d6f2ac7efebb375198f10aa94c789b4976f24c7
SHA25639348d5ed968aecb1b76d2e198d4df64c4f9b685109343ed9ef51564c97439fa
SHA512a9dd8836a66d9c4969aae47f1eaf22669c13643cb783602f4b814f1430aef68e8cde607f5c966abf4ab7a9ae3fee5da66039841570b9410b94ab092ea3aeaba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db6f586f1765430c887c7086ea1b0d7f
SHA1da3068ba28ae058b56da511167f6dac4c2999455
SHA25642f70aa5a28ba946d43e23cff755d8c8208ac52a809aeff576a676b4652fcb79
SHA512d9cc97d58bb488656fd6f531ed0f6c8ea814d131a57915c8b629b1b723588189cfa5712f0e3467eb11335077f4666615b1981a942c72a6c76da8b7705cfe306a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f82b1be7b6c34a33dfcf03a6dd7891c
SHA135c6e2e73d8fe31d12709712175fd3df3e3a9d5a
SHA25628837329a71a413bfac57d2f4391f5fa2ecfb1e3a181af7ccb507d854d990fec
SHA512f2b10a38228c7e727d1882dbcdeee3bd9c31671bab84d41ed7a91f2b3ec4dcb3da3a2d484fb309e055605b07579f62d0cf04e496e855eff626307ab4dab4c52b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d3b53137186c8cb703d1546b207e7e8
SHA1cf223eb9098a26abc8768ce8c6f0e259d0c765e0
SHA256b6dade38eb3c21bc0bf13b28801f3076ca3f6de2c3e9d7a0f39b4ad44fda70ba
SHA5123a9bc4ed2c1407095d4a4973c6111e4eb40471026ea4c8956f52b92503300ad736e13be26e1ff408ea8d2434e240aa8cbfb940c2ae83483c640262a82f24ca13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544073b37c4d33b4e058ad57a6122fa3b
SHA17c543d8f2f0b5820e174c3efb7d3328a91c81817
SHA256554ac0dce7866592f9927a24fe44369204aaad0b6147ad3c0148bdc384156839
SHA512bc764eb4da324cddccface99855dd5e1b7b267f2865caf66db0e6a59b326ab901e87b623f2e68a89bea362fcf4890f87300d212168621a049c8ecfb422dac5f8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b