Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
83s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 16:00
Static task
static1
Behavioral task
behavioral1
Sample
d6a6d004b711c04b672659fa2d46c4a5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6a6d004b711c04b672659fa2d46c4a5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6a6d004b711c04b672659fa2d46c4a5_JaffaCakes118.html
-
Size
110KB
-
MD5
d6a6d004b711c04b672659fa2d46c4a5
-
SHA1
34f002a032872634ecedd3275bb86eb11fabe1dd
-
SHA256
207c0e4d70152559c690e0f2ba0ca8ac52b80475f1938201286c21c027048171
-
SHA512
2c84e170a72345f29044c58b06ea609e664d9a72a92307fd8111b9a17169a7e8100e6318af1fa4c656091e0fd69d82c5ad902386eca452d474d99cf0796459e5
-
SSDEEP
768:LKnE2WQhEKTlfIfmE7qrMa62z2bZ9WSkEvtNm5brccWBgqaeyFiRkYfye9bStZKq:0IfmMzgodgja9AX5hp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60608676d102db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432059510" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000557f5c6a0974e1fe21154d3d79974a4490f5c482e00032b45d05f150b3c5b3e7000000000e80000000020000200000003c25fec753b5d6345b6cd6e51251a3e30da92e8922960e4c4dd881ec5c04e00320000000bef425be747c1c20d2e7482549024e31dc98e5d1508db83a83be38097af021d54000000095978d6441187e1a98b9d6eef978f1275ac670f9ae5992c49f13597940f58e7b39f7fa73ef46326907e8f0944fbbbbe107d56b441e1de24c2792c2830bf098d9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1388D11-6EC4-11EF-A6BB-F2DF7204BD4F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2276 iexplore.exe 2276 iexplore.exe 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2240 2276 iexplore.exe 29 PID 2276 wrote to memory of 2240 2276 iexplore.exe 29 PID 2276 wrote to memory of 2240 2276 iexplore.exe 29 PID 2276 wrote to memory of 2240 2276 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6a6d004b711c04b672659fa2d46c4a5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526018c1ccf31f3617b95365153015856
SHA1d995f1b7de510a500da768bce1975874de521bc7
SHA256253230e8a25c43fc82b71f43469ded5cec2fbd8898db8b48a96d3663f1a8cc34
SHA51209141a8f49d761251fb185f2c7e74301da9723bae49b443a08ea292ff4b869fcfb877a5a95931fa8f08aff461936bf73b9742a3a2827c5250662021432fc105d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58235ae2f83304e0a2e08b79792604cb2
SHA1181448215a83e635a9e5fdc89c7356a18c182e06
SHA256a7de354dc69fa60cf41ecae75cb6db951886a0e9397ec759344d152170bc441b
SHA51280bc30f70607d95d944f9f80da16c29cd6f6930ebd206f5e1b96e6c9def639dd4be05c9b3bd1028999f8b51f58620aa2b974a7f6ab480a11b0bc058476a513cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5157c863c58003a4c790fa33efad1fe59
SHA1a04bcd8cd460c766d0f9ceeb68d3149703a49a4f
SHA2562619a2babf69451a47767b14820d21098df025ac3d2a85614508ab5d1805105f
SHA5129a2ce4fc65e80b38a7a60a5f59f254e3331b87b24a8c715e9cd2b1be35cdd2a65104840337c4b058cf91626c9445503629dd040ed086fbb5bcc59fcedee497bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513a7a501485861f9ccc87f9bc2f59d2f
SHA1b980f1416de9bbf88fa2390cfda5594496ce5fd1
SHA256d56b18b2fa42b0d1e33e27da46e5ec41ce50798d308fb743429b49e565f6199a
SHA5121b7a7d5d133486092e2064f1994ebc476358be650b00cd17cf86108fb840d8d95b5045255cba60b82de996071d19ac6fabb93380193132c390f6e04f0a8c94e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a971bb8f9336eb8a8603238d979c86b9
SHA1b5d923cae506179cb63a4aafe011f2a6d817d3a8
SHA256fb6ecd35ec73262bf14bdfc767a7918df66c6841ac4b26d6c2bd511ab208c355
SHA51261aa046084f70ac5d2852b2d827d7a1af706489f29c39ca4d09f97be132dfa7faaedb5ca642d82826ca026beee9a7406ac35084288825e6e2962dd82c4d0c0fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c57367d9c01cdd351d701c1060d3c2b
SHA10a3655bab63749441897db4676491f3d643be513
SHA2565792297b55c72f2feb2bd6aeff6734cae7301372c4f63187836f7a03c2d93228
SHA512516ab9c39de613a588252c8b6d40ce7d149f733082286bd2f5e4f540c23f4026c55c990e18b67bf86279c58eb35db476072d9aff44ea13bffdb5c69a09e7df09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539a95201c94cd1e334db27e50d2be681
SHA11f32ca78fc895395bc82f415d68668e7baacd268
SHA256348c7f11646e328690d16b61e77dd2c77ebb3102957d73829990bca173a46d53
SHA5123753edcf198dfbc78aa88ff00c00506237d668285fa37bdf4e4ddd19d111a272c6ebd334b6d70fc8c64285733c01ef9d113d27e1c8f20361f99bfd603abc0fa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc304463b8fbcdead75e08e4db49c84f
SHA1dc8545e5e846dea9b2fc6b265d89fa7bdfbdd5ed
SHA2563b756c945934e67ac3cd15a1168a2540e14079ccb10f47eb0254ef702c460adb
SHA5120ba2cc0927d5c651185fb6173c24fc2b01444ae3111caeb09fd0178a4e2330beee63e612916db398f977fe4a88453d737b1e4d3b521982fd994d82d55109a961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5253e78c0dd885094f5e0de1d35ad1b79
SHA1e1de9973e43f3b97e3f4b377621a804e475df08b
SHA256048701296adbf70c332c3f2134097e79b1d634f7e3008286d79baa36bf2b5cde
SHA512edebfcb9cb41dbcb950587545604aa400f88f9a8ebe8a557e9e3ddffb62c5a7a6d86b3083fec5aa9d7ee718a6408fa6c1cd1d2df8e4a65f339324018294e98f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9614201807229b9f2e1cfaae424527b
SHA1d3721cfcc7cae9f8ed70370a5aa98786eb4773af
SHA2566367456973ea80cd8630c0c6c6918f5aaf180ebc279e0f02c406ed176528c0d2
SHA512350903edbfad416994ec131713df51ba630a2ff1211ca0381b742fb721af40ca4d2a519469169dd5cfce3248f529ecc2d89fc4e054f1ffd1d36cd689cadc1363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e2a85e9917a65bb3a139d012b2a4bb8
SHA1d7e51c59f27a90ad328ebf972105231ecf0cce98
SHA256e288218c5c04b637fc5060ac0a8b0442a30a4498a860316e13c4bebe44f24c01
SHA5127ca7e2760048eac9fbef1dc340ad843750f30383dff085f46acbdfe9a4e2a287187fc8f55a89479f3478cadce72899f05cce5d3896dc45daccb1e84f49cfaa57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e582149ac7cb3d791287a80cbfa60f57
SHA17559823bde45a57dabcbc6144e00687eac09ee40
SHA256e633b1f78180c01efb68a7490db92e2a2177110431cfabac39110f9b7c03f4f9
SHA512a0de7fd72bd5a6d98261d54741df79dfd35227f30c1ad2d088875e4b3f3c44a0e72e08595f839382a6f38fdc0f8f73f0d17725865a2ca7c327f0f1f1f6b7bbbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5876695ebb003362a82c160b3697b06f8
SHA1a92104f8cc994aa10f09af8ca07470b9da015d44
SHA256f79fa8cadcab076aa9b20b9a6dcb51be3ced41d233541611b3835ee52354f6b6
SHA512a9b997ce22ac54589efb08505e4eeef8ebc7e99f605ed86254900b6662ee8d92473d344d6358e1710c86ade376605463a863fbcbf56d77d39fcf6188b332bab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583e530ce57986f64bb16bc1cc03360e1
SHA1e31c7deef90dd0a00d0be644e4d6d60cf15e4401
SHA256448ed050f9f0419f19ccc9de274cbeb44df9ea8e1ad15a62b861d80a0d0b2a66
SHA512e47d406529a744d93e134c7484d4ca160730594052f133c8c5f202b21b363d5732640e26909f4ef4a5957646c01bacbbb1520445f8669504ff911e28a3113fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2743deabf0dd483295091ebb862d8c9
SHA1bf37d7d7498117ab1eb143138252e2ae7ca01e02
SHA256330119525386544e130f91d2102b22b16ec7aa4391b3fa77f505927b0662a69d
SHA512f479f61431ce183adab379b5d90f5773fddb7034ef158169363180241f22e6bcc225900e23b62ecb747b07dd9f7cd7df5f966976be0189d2dbeb1c36a2112103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e8390958831254f82c0d6929c341fc3
SHA1777663cdb2f6a8ae8486fd282524f66e1ae4c00e
SHA25602ead2cffec2cb4ac90958d2c6c87de5fb17bbfbb0ce70beae22f83cfbd77aea
SHA5122148f0e0d5fa3f9a14611064d12cced3142a1cf2d74f53879cfd9eb725df09b1cf928d3e344c5da71bf0a0b50a9e53ad8c7bcb8a685bb7ffb4e871cb54937448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d306acaa1f0518db2005d94c3fecbd2
SHA18acb554bf9c0debeccf72e0a5cb7ee72c6bdc64a
SHA2561a4a5c362f9773ab8d87e84be0bc2e6855df4a4adfb14df9f9ddc65315ee018e
SHA512f3cecece592b88e7d1c3cc59a88feb27af7bf67e476f90a31a142af5ebaadc28d94926b32b193962a94999d2c20c10238e330143a68032e52d27f052b8b0b93c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ece49f4f8afbe5e9ea0b93e1843f693
SHA14f885852544309367ba0ead2e635ebd9b73c594b
SHA256d2ebcd9f465d77923970baede9c57ecdeba21fc684d7f9a55e37d9c916f3062e
SHA512bac2edd769b619af2947526b9d6f3ee44e3ca65f51e517cf433dba2886dcfb7d4fd0106e58dba0f35e8a23c4113b0e86bb347ef65854051ac256e43d4603914c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ef5c77e6f11ea72482bbdc2ab045fe8
SHA11d0ea4dd736a423c9d16a9ca578b8417372862de
SHA256774370f7723b1c100608ad10414b4e89dec387cb947ef4a7bcfee88c3f23bf36
SHA51274b1b2d57804a9d30349040ddef2c261b9137235f9d4bfa48a7d75bb2f38554e6183a7ef1b31419992c26bbe35625bb1b745377acf7ae47b05a81d34008b0d19
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b