Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
d6e74794aec21e256dad40ed99075233_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d6e74794aec21e256dad40ed99075233_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6e74794aec21e256dad40ed99075233_JaffaCakes118.html
-
Size
460KB
-
MD5
d6e74794aec21e256dad40ed99075233
-
SHA1
e5f321c2987839fa0d5cabc9d46d36d512e60c93
-
SHA256
6526e9d5086071110ab210f54d0f8deebc841f62a35ecfd8de55151c5ed505c4
-
SHA512
a5493436a912271d6d5dd6fdba1c21b3e13d6c696ac996e37b7ace9184b8e42d5131884b9a0a69d0f3c6502c67b6792a583b2084182ca566fff51b14f50a7abf
-
SSDEEP
6144:SosMYod+X3oI+YRsMYod+X3oI+YmsMYod+X3oI+YLsMYod+X3oI+YQ:/5d+X3D5d+X3G5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F834AD1-6EDC-11EF-9452-E2BC28E7E786} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000a6516b8f81bd823d8660b573c1e3d885d46b5fc827d138561a786ec480457fd4000000000e80000000020000200000001cd0bbbe689152872de79b65e1373b46f38c1572429bf8abce362fdf92b1110b20000000f0316b8bd95e5ce12bf9a7132c1f581de03a490318e50978d8af49e2a6478c6440000000f405261dc819719ca77c1d67dd74a2e42de0cda53c7a8afd67ef74e1b9721b6a2bc92d68d597d47fb79e9d32a4ec958e3c2ad4031227a666dd36cfa5ee1dac95 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ddc259e902db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432069748" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2484 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2484 iexplore.exe 2484 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2052 2484 iexplore.exe 30 PID 2484 wrote to memory of 2052 2484 iexplore.exe 30 PID 2484 wrote to memory of 2052 2484 iexplore.exe 30 PID 2484 wrote to memory of 2052 2484 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6e74794aec21e256dad40ed99075233_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bce74fabd28d417a4acdd4d43b4b5f9
SHA1c1f02473eaf66a22a0a7702c754323d9a351aa8d
SHA256034a840cfe1c4c4760502d92ebc6a271512829685016580b2447f75687bbcd22
SHA512146695de1171bbd3ccdf3fd137c15d4fb5ae71b8b1d432ee1752c135114489e7ed7085f477a7da654f5b10a21b5517ea840909b460a9c884d1e94d1b58a03361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c8ca7d80deadcb5b03e1c63b147dc6b
SHA18a0b393610ad167f73fe2eb3b5d02a3d0b58919a
SHA256d5760e0196b16b4a0354cfa95675f73c9b191e6b7fb493426331610078c97de4
SHA51202fdd3cafa5c5b77c25a4deba831d3eb1603834fa1929c3006997c75e392861a2bc1594e84cffc84bdc0d05a172b768aa9eed23f3b9d8e3a3155f18b5376ace3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51935e9b108905008e0ed2b2b3dad5b30
SHA11d7a2419e25e6e943ddb497137918e2753f43261
SHA2560c4177a59fea4ad05021106f97fb00d1c43bfb76d27e6d8458a2a4304753c25c
SHA512dc4b2e28fa8dc4c902405bc8f68145cd9945b2aa2bcc344bac011e98f15c6ebca3471079b78a8dc54e34efad3d75f29db02dc2129b430efc189331a0e7f1e27b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f3e9cb615eae9883ed87e3fc6e60bd9
SHA179551bad1030f9adbfc81255c7c58a65cbe067a8
SHA256e96d64d631b92ef8a9b7bc88f22e15306b136b87dfabb072d434b4683104ef22
SHA512691c20e8648d0cde5cd1a9ead55c27b4b30c836920f5a84d3c1524078a0883a9e0348c97d1c7436d0cf6dde532fbe896eed31a60c5118c0b8a7acb989739bde7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5518a1a51bccea89b14de2a6e351f8610
SHA19406c7836664747a3a283c3ffdb639b173f656af
SHA2566f5e7ba755de25d4db8943c6849ef0f5961f61038e50cdbbc772e8afc7aefbca
SHA5126adff3c0721fb227b7eb274ccb1e7bb33a5ceddc12b8da0ab56b422480ef9226a5020a931aa3c1522f1082588b3da7bb8c40620150e5a2864dc3905a30a89085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57782df969ea182709451d26744111a20
SHA174f97f366a7836058ef6bcb097cef826089c5ea3
SHA2561e79ee4315d9ca4729606d8181f5e99aa5ffe919357b1d9716144735e51f9493
SHA512a03408527c0fe79a232736346f835bdbd53397c36ab9b6616ea55645c073de04825e1b4edc124dbe273a3fc5ef9444bedfca3a08d522d1cc05d41a44fe923510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c48ec9380322f3fe360972edf6048609
SHA18a4d85475dc3b455c97657cb3f5dcbe9e9b1a5fe
SHA25697deb89749a8f3a059bc313d6919d837b974a1482327388743b948ebdf9d39ea
SHA512e7f13ea076ab46f2e27e582c0066137a2ded8ee958ebbf31f3c8531fe8a1a9f6b2522dfa05513eefa47acc84d53ab46bc95d3ded793c3e8e8b36465a0477eb93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fee24d60543b2257f127463ce6674052
SHA10028446c4f1b06b13d5f950e1322198d5575121b
SHA256fc5b784b39df58b5942cb0de4c4f9c566663a9a8593424bf87160235eacb554e
SHA51289092b049268960d8af0d5b2f39bb729145b11ad85130df093e2e4720ac15987b7c3c408140e9b93653fb77a54434d8e9f775f43ca647cd2369dd72013053214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a0deb28a7bdf49dc80d23159d188d50
SHA157196e9fcbc3cd172ba753bbabe5460cb18ec4c5
SHA256e01041e11cdc432809eb20b34fe9f2c4129b5f07171279b5e57470a1e92f3c54
SHA5126874dad47f0e92456d89689a63f3be184dbf55b34ec2bcc94b1c9138f539c0576a48e5cfcd5feee7b9f27f03f9ea024588a712b40c05efe86adb4a7cd871b21a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574b14ec93dd789d16da8a97e25a26708
SHA19825016597dea63d3cf6ad18f031e8317f916d6f
SHA256de7194f61e2dc135846f035f871b7238b6c4ec6b63a5eba72c2672839d5fcd63
SHA5121ed2386811f5d887c6d841219dca6b4e481226dc9503bc07df5309484fe371ab3e37e1fb3c246698042f059376baeb07c1fc73482480d28d519299a29e52c170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e34faa95139d447b69f3761be69a3be3
SHA16f59373bfecdacd19d4f3645a74014b74ebdffad
SHA256906e75b8377d0d86deb6b7030d13ba0185a7a4bbb1abc775f83945204106e635
SHA5125b441b01a7c2729807fdab5a2c4c45c02e9e7336e054e95d2a683c1033ff57953fc0cef4c7129aa5807f81820f4a9ecd4686f94f4486b07738a06f71c165d983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a969b0fd60d1ea89b7fb36cfab5f09a
SHA1059f43cce88d19b628e5c20871dc89903bae858b
SHA2563a7da8841af7f10475b45482acd31fd91bfe5ee3ed2cc248f0852673a277896a
SHA512b42cf35e5bb9dd6896c9abbfc4cda3d03e0b5dbc7629b53e3c0a7c0baf0997add3f3cce1f650f5dd5ddb9887cae65f11bca11b81c1aa40fa4c2908287b7df71d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f9438c23ad59785169a3ec890248c0a
SHA1a6f8b63b6db98250ca1b686b5908a04d08a07e67
SHA256607b93a23bd02f201116b2517cf81a6dddc8ee9fed00ce6e7730deabb2bfc6c3
SHA51247937f43003401b4e7a44d996abaaa7caca19bfac737a49259e2989d3f7db5596bf13d4ff6b41a674b46edd5a7da65e62f1bb15b3d58f78202290e29789d084c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aa3a96161adc2013c2bdb52f5474046
SHA1114c199cfe60d2d537c487e39c88e72dca355a32
SHA2564c4eb941265875345e90310d0a0dadc44d907c6174a212c1972fc8c42f87146b
SHA51214eb394b3ca28b6d946dd720ef9248a62d0c3d166cf413d92d965cb9cdec42c2d7ace52c2f12cce2c90d97e85ba164f4605b3159a4d8648a6bc5bae80bf1a560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56806aeeaf81df64f3b631dd97edba2ec
SHA120dd94ed6e61f7f5baa0c80f589675cbbfc637d3
SHA256970eaaa4fe62eae9ff220333b5a797f91d24a4b0dcf9c8da68d130fcc9edc970
SHA512ba8b4f3ba16487ce4645b6e7a2d7465cc92ce1f6c1e5efbce088141491f1c467263f3ba89e8ef638f7e98d55af03e57ec899bf19604f020fa872a8e44b6d75da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503939ce1a0abf33225b18a06c8869a92
SHA1762454e3f285e95fe849992e2025e260cf1f215b
SHA256d067850048362b4a8c61f589148b70d42543b96e063c16c7aa4160cafce28c91
SHA512cac5fed9b6ebfc87a3a52685c51aac5d1da6febe4f1033720363af53911b5d579017fa3bd741f8a1bcc4dec288e3108da500823b6722eca8bc0c38e888d52a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507d372ae9d2def6e16abd77617b2eb69
SHA1f733662ca18dbb59cefe97e4f0d9e27b4d1f362f
SHA256cdcb9206f512a85cfea4fdf7515105909d9ec6dc64fd0b7769d57f7b7d231e5e
SHA5123fdd294a444d76a76edd0bad90a18f5a15d77274a988ff71ad527dfa4930fda1a5827a21f51dfb929b735c37ba2808e121b91906c4bbab5b848eaa48339bea47
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b