Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 14:07
Static task
static1
Behavioral task
behavioral1
Sample
d678ac7ee3cb1767ae5fc7365dad216c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d678ac7ee3cb1767ae5fc7365dad216c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d678ac7ee3cb1767ae5fc7365dad216c_JaffaCakes118.html
-
Size
24KB
-
MD5
d678ac7ee3cb1767ae5fc7365dad216c
-
SHA1
2d63bf5900bdf2226cc3ae14251451294aa14bd7
-
SHA256
b0abfbb56bfe18f6e4f4636b720f74824b839ecf5183f01423a98f2c687561ee
-
SHA512
473ede85496c2087b9b625629ce30bc62102a3ace07cc32f36abdb31d5844d3a6e6e051cf2ba9fa54ef617f38f2574aecd77a861058b93fb36ccfade10b8a1e7
-
SSDEEP
768:Sg3t3UYUZknhDkVZQc9q0BOnPbC6R96C6J6o6SsB0KtOx7el2:Sg3t3UYUZknhDkVZQc9q0BOnPbC6R9JA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432052730" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 101d04f6c102db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E0926D61-6EB4-11EF-97EC-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000ce400c07e5a38b43c5cd077997b90ba158b4e135dd684c009022183a8909dfc4000000000e8000000002000020000000c25bbb8874ef7b7ff309335d5d12ebabcbc58adc75609d645f6b69e7f7bd5d4e20000000e1e9a28b06333716ed84a50fec0c183af12c256cb903e433fa055a011175e4d9400000008d41ed6d72c3e73777331e678ea3268d80dc43c4e54947bedd5f00ef4597a36d7e191f5598f8f92819d36a1a2859abd14bc9aba9e37b0698a5178235edf9e8c2 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1816 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1816 iexplore.exe 1816 iexplore.exe 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1816 wrote to memory of 2248 1816 iexplore.exe 30 PID 1816 wrote to memory of 2248 1816 iexplore.exe 30 PID 1816 wrote to memory of 2248 1816 iexplore.exe 30 PID 1816 wrote to memory of 2248 1816 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d678ac7ee3cb1767ae5fc7365dad216c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1816 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f1cf9930237d9a9af64218d6385f392
SHA15f911be59a3ea5e6cff598c834abe7aa4b98f4a9
SHA256b7779286865891105e1900b65c4e1d85b985054ab413bf2ea792d603eadc772c
SHA5123b636f2d702f6631652a8f6ba798e2feca1e9601c20c4d300c28011c3ac868ff3a6f5d689f3e6f4b7da9a66671473230fa7fd81ee4a22cab9e06962624ca53af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5203cc0b748211d1816635c00bc351d14
SHA116979c71ee8ac24ec0bbc9552703c99f8542e786
SHA25685121b5299e3f3041567d5978bc4fe4ecbb32970dd77911050630011e242d9c1
SHA512569395850f2deddaa09b1d15d5f4bf257415d165bd7706c5190a180bea2dc4e52bd09b166ed910d15d1709b8f54cf85af43569597bd38d007df5b0096688128d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfadb39cc81ed1a2ca122c19372effac
SHA17ebbb9179ef98b4ba325c658efb422351eea4641
SHA256b0e676fcde27ef60c70f7f1f279a213015d9f55a13551aa258ac843dda974057
SHA5120de7b0b770717ee35fd7991041f7f34aa60b3975ee813044a3e1b41341d585087356576f0e568a39f497b814a5e279f58c4795de24f0793bde6419e86c86a652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556614d6581c23c1655a1f45eb910b130
SHA12fb85fea0c7fe34579388b46f90db38ef5987504
SHA256d6962627089a2ec5b9a305692cfa3a7065fcec7beb3cd8cc76d8953d5c163c58
SHA512ef4edba5c787e1ea0576e24dd48799f398110d518524f4bc8d7062a15cba0c0e7ed7cefef4d32f17ce793a4f959a317661872e3d23bbded80f12449a851b5f10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdc415f25721ed37bba20c98ae74f2c1
SHA1731ced44974a7f7b4733db47290474efb2fe1af7
SHA256faec38ff671060e485f8df663b019d7bc4802fae01ae0066697a5ba4c63102de
SHA512a39a9dc5ae9dd4f8db0b9d9e8df5cfaaf5426934d48f969eb8a2fe5fd9700fd7b34eac3d57db568b67d86a4fa6fdda1f8e285cc72ac9bb15b26aa3c96e06e406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8dae057f0d44a1c2a8b21445882167b
SHA1b29ca2c6b84d2f44842a65830ea9edfb3ef5ec51
SHA256cd8d66d7adea28de3ab36ff28bd99e1442067199ccd6f2c29e34834d0cfd69c7
SHA5127d685f736bbc9d1b36f34de9aeb67aed010caf82608aa4cd03c2eb980b3b97bc8e8ebd63d21d3f2cdf498dec0e012f38027889f4f5945feea9caacfe2e7e0efe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533fc4b2dea33b88e9a02a8b69d8f5f6c
SHA18f68d1d542cf68bfe1efd91e96ab36e8c7ef01e4
SHA256a1d9dc752c96ec3b82c7bc5bea03db532c2c7a9717ee5bcd1d95030cc3fc526f
SHA512c346d65bb197366ac69b72b75a9829e783b028f21ef16d6b686345e62311752830dcd5299897f1eb4e223a31ffd278ef381c5953c79544ac1c31563456f2edba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525ba41071f2bd6891bb96be221805c75
SHA1296012947be0df213638020eac15a464d80f9827
SHA25666c963759065049ebfa55e8b9d166dd9611a4e9219a54f6e4dbd7b2d5e7c6f66
SHA5128dae98f453014e2226e9a316b714816a873afb9fff14aca6997c0fb6e106a3abe72d948b28523b3d83d43cee5887981315b09cc790ab1f6d4b09e4c4e839c95d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eb63d3330c437f5b4b5049940df8c50
SHA1d1e31c9ed29b32dedac1a7e196eb445fa7ead490
SHA256b7c6830a78b01a9ac80289935d88f8242cf206b563042263b481825611b6a997
SHA51240e3932f5ca3d8783a042cb4b1cdd9229cfbdfb80ba508d90349b6cd2d22736234f43fe27b4058cab35b4e4f895853343390849334c409f461150ab39d90f125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8848fd2f368dbe1e7a91273f6b9f196
SHA1ce51bae6dadb58fc92a8e77530b975dc52fb5acd
SHA25633b85f1d7b4acc918091811a16406d90b66e2b6383d348b3ee094ca05d09cc51
SHA512529f6118e90a617fc0ebcd9b1ad5962db5b46701217f0dd20dc1d0961d399c61a33c60362b40dbed25f4d9e406e1dce42dd7c7e54641df2958c1531168ba5a47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58749ba15033471f67c96412899fe31ad
SHA1878ce28088cc2e98cb181dbd6450ea81da852aab
SHA2567f2613b565dff98f0fd5baee7439149eb40b05e147b410d603f944da6b6a2708
SHA5122d902025b206e06dce1f8580d7f4cfc007285532ca18234d81024c5883dee181fa7d8ffefc2c237dd77901e731de38e54c286849ace58508cbacb4eed9eb23a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f70bd7e19d04b8567487f70245026f0b
SHA1ab86110d17a67af2065a7e9cefdcde3c55adf093
SHA2569f92dd6a055f976bdf1322d97cda876e04612d7e06d9246bb0d507053ea0283d
SHA5129277da124e450543f3f8bfbf93ed9c6587ecd8b26ad9192830472c2d03ef1a7ef957e06605dd3df3294c546933ffab1588c8cb99d659ccc1502fa6d37c226ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5963e5ecffaf44a2cd836dbc9d668a233
SHA126d1fce57b4283fceebdd9d350aadd952fa2d1b7
SHA256658dccb6b8188db2bea15b68c09f33f843a9939e11c39ad88cf7cac16fffc03d
SHA512f85ff74937aaeb3a33ef9640768e67e24d4c5dba97b30dddd02c0620a97b71c11efd08da9e0d9dff0a0b2e764993ad4750e23c8295158ad02044586d7f7c3a5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56565bc1092291f0cb6ad0a5fe7ed8498
SHA193e5366cda144ce5cb3e24f5cd6ace3ca0822ca0
SHA2562d35718cf587db9308c38000fe01ff27236b514ccb2e117af7480f6b24fde0aa
SHA51282222b7d962be8fc0e1292aa52eba613233b6f9e5436b1bea89915d61fb63db3b2da3faf2a4962d5e02e44ccfeaec9b0b688c5c260b466df7d5cad6fc5c02e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59797720530249a9fad98d741302d9b13
SHA18dde5c712b824085640e22f585d956c98197006d
SHA25635f3830338d1e814980fea7dad2cf7c04a159c312196385954ae7ef8788e04e1
SHA512703afba2108c73d3fb054f2c5aa3b64846041419db23e2a11899e88580b456066cdf871368cc3c1153e6bd861c8a02c6f86a0c3f54ca721d20b3409ae5082d99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537103502b92e8d1225905259c9068642
SHA18091c62fa154b344c20834a9a8fc17e3baebfe5b
SHA25681fa069cb93e80e41110bface9fc7306a42849e5cf0392ec545480f4ae92f6df
SHA51209373cc53b639ebf6a0cbe7853ae3eab1d210fa7ac8008a54986c9dd37caa5a9c0ae9def33d7a28c77629af669b94d6447ab42a2f6827128e7fc5c30238f73a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534697e6025339f3851600fa3301aa4b3
SHA1cbcc304651848b19009bfae3e15c203e656f6098
SHA25694e1d0905885ae2456aa88de9fdaeb2b5e2f9b06cd2deed8d5b0cbd62b300c3a
SHA5122fd8443deb7e13d25475201420e0e092b674129927318d25b4a6333e45e2cca22e3ec8eb26a7381a6a4b221300fb3818a3f9f3ae3a157dbfdcd9543dfb74efc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cef2ebf5c452ec9b8c163485fadd697
SHA1375f5901130719eb683db161b48d4f4fde85c7e2
SHA256fb171a9b92d6c87fc28225a273e35cf19c40cfae6cf370800b9295951035178e
SHA5125d7cc1c67e88b02dac0f284b65dd09f5c0cb70ecb2548ab6f8a3df6c0c287c4b939ff56e26f188142db1d33d8be46f26445e7fe104badd96d13129f93fde2170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a4ad6f8f3c9ee542fe15acdacdbc431
SHA10df8add09dd729675d4e4b6e17def448c5654a33
SHA256198d17522f0ce66b378ff3d260a16657c884bb43ec220528037f9ae9fa9ae50a
SHA5120c7df4c49990ce1799a6f6b9b3b718c5258f98d9118ca2683de8c2a7b574c3b40eac193b6f3b54a3740b83227a262c16e59732b5d194fe2e979844b724bea2dd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b