Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 21:05
Static task
static1
Behavioral task
behavioral1
Sample
d7174a247f2b062bf10247059ba37adb_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d7174a247f2b062bf10247059ba37adb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d7174a247f2b062bf10247059ba37adb_JaffaCakes118.html
-
Size
67KB
-
MD5
d7174a247f2b062bf10247059ba37adb
-
SHA1
a6cacaf0ac23406af192d5b0992b60ec669fc4f9
-
SHA256
6cd9622c398c1b229ff5bd02105903c90fb4df8ac5025f2fa2db621d0c51f132
-
SHA512
50c2d17a8f2878dfab6541497047a0e4dcb20fc04d829f1e1a88b65ba8a37b07a72530a89db9362d256e81640b25f758516da673479982b111a7eb56e09ffe57
-
SSDEEP
768:JikgcMiR3sI2PDDnX0g6Z26IdXVAoTyXqwCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JQzZVdT04en0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c19d10fc02db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3BE5FCB1-6EEF-11EF-8CC8-424588269AE0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432077794" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000037d81f2c1093633da325271069ce9852391b93e564359e712d885d354ecc9ab1000000000e800000000200002000000004ca2eb869f901f98d27e7d68a7e87fef2e789b0f7141712221788344513bf9b200000004b245c37e0570eeef29d70738e88f42800826bcb8766b50e6be590cbda759bec4000000070da2765df512abbc3d0c5ca36ced0a41ded1e853ba6085f3a403134e5526570a1668fd4385d0f7cadc70bd736747f54d3db20b7b28909358488996623535f76 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2748 2236 iexplore.exe 30 PID 2236 wrote to memory of 2748 2236 iexplore.exe 30 PID 2236 wrote to memory of 2748 2236 iexplore.exe 30 PID 2236 wrote to memory of 2748 2236 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d7174a247f2b062bf10247059ba37adb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551afa0077071047326e84bf4beedcbb2
SHA1818ffd4a4b177c460399b29ce08087222dedf43c
SHA256574af1a6029fe96f7c00ddce2f9b1838241b4327e00301f15fc48e0804d33871
SHA5123a6732d9cb3f65802bf1822709712137963661ff964080f6f68efa5f3d14c96aa0c9067b01ddf7edfb50c1ba433f1e178d3928ecf7256659473e4cf8d757e4e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516ae2cc5cc9108c09b87ad77b3e6ab5c
SHA19bb1ef31aa7069912ed05d716ee81fe2459eaf11
SHA256faf66334c984e76d5048a7ff287b5743d0c736bc1a7d34447d3741e8c4118211
SHA51258297a4047a3b19ac665a37b8a244cc1ec9152ece45e455dc995bb725bd28f3bbe7482758e597cda8e71ea24ad45fe0a1d76fd3396ba11c5956684adac960117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc67ad197088d665ac8713a32957ecaa
SHA16c4812c760656c0f8857b5486d96b876d4263593
SHA25678dcd4622307fe2784a2c9639b4a3520f04d3c49bd5b2fad20c905aac4000c80
SHA5120fde7a7f690ce634018b0f495fe23377644e5cd598279d702ce0030e13c6ae33286ab74e484a2838ae4fab8126ace7aa22966e2ffdd9ab82fa5a5da5388ad507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f79e3887cb6706cf8d276625f964214
SHA1736db97b4900f6d3ed64b7187b90bcdc33727688
SHA256967a95a629ef65eb0d62a131179b94088acab35055659d3b2f47f855c48e95ee
SHA512b5d1a3e707516a2cf868075ae9c163b76bae0c07d90d5ae46c1621a3dd512f300a16fe67d0a236595ca673e36aaeeba1b4f71f23b65b7ba6c2ffa6092737a4bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6368f9e6a987b7e7fbaa5f0f8510056
SHA1b05c63be86630689bebab8da487f025632a27c0e
SHA256472919da309cee206a7e56ff2184f1a740d0618922fe0368aa80e1b14625e49c
SHA512cc8e3ffad0752c194946f90f2f7d5aac42c0a73a4d2c2293f48d811ff91d3115e8844f8f233d5f8c33f3014b618a8991bec8025fb5ce1a4752ed860a12d55f58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575531cd7e3010c10888c8b3e2435cbfc
SHA1677164508cadade9d591b9647496debb2603c33d
SHA256b6637a2ab64b791de62c26d5b53022cbf367af6fdc32ab1f8352cbb1ceeed46e
SHA512b5b235466513bd728de6f78df9478ab029ab98a05d9cd284dd4fbee9eea92cd412cdda94bd53e32706d067c932ad5556efdd70f1086150a4b1424ad946427221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5558071371a5b6857480e9d29c08e8dd3
SHA1d263362309b3da5a98f75c7ee4eb0948d166fed7
SHA256c6b82cc353949e672504b5ce9a11508470f33c908fa94f5a9127cf1f5fc3870c
SHA5128cd2897ddd9c5674b52a71d986f94fbf4f7f026f7fa137f27c779667638660945c6e268b1d774b3de1bf8525e5fed23a6eed5e9cc97bfd91fbc27adb41cd89be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556a1ba962cbb4e7b5412aca884c1cf05
SHA17dfce6ca203727758f19065e571f94e359a7085d
SHA256b63020fb52c8d2b8dc8a9becf7c15a8829cbe501c102179474ac314c62efe002
SHA512565371bf1eda542edce54c021450416d30a9494f65348809587ae7212ce1eb4a0c146ec8ea464cefd687b1540cd518285e854f8a59e2643a0910b9a8879e2341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de10f617de3330a9fa65ea50270aabb7
SHA176298420d2d51468444e2018546c4e1a6c45dd64
SHA256e74ea11588d1f4baaeb8a5cd0090afdaa18b6ae0996dd959f63a3460a43e1851
SHA5126211207644ef020144b5cec55d07cd228dc979ea488deda5fc97092f17b6b051d072fae4b8b2796d1206d6745c1e870154d1ff0a3aaaac53758e242750344d7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de411121e50503711259dcb617a5c4e4
SHA11a8a810a9b23d7545ddb62cddb301fc279aae643
SHA256a07eaa6f74e83c88cfcc8cd6a96e38084ff1ad0f8b0389a248e1b6940ae06c78
SHA512209cfd1b944ecd7855c2d45b085b74e281f598ca245e6122738cdafc912d4f3fc09729f0d83036919c6c3dc301bd9f391c7fc1bb3e6a0687da623e4d6b03e2a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567f7c6b80ee71ad7bc5e66fa44b7809a
SHA13072504bffadde193b34e4cb3c8836820ab598d7
SHA256929eba2c3e210fd3aa8d0f5a561274fe7b2fd681266170b76e7d4cfc79337d7f
SHA512dcbf1908974c6d01d483b30ad9b7a2047eb727acd5ba5e00d9a4092593909568a295f1a2a7da3636def1a2caafb79d228706511a1b1654e1d3d508765fbe9331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc16b4e8e71d8b1d5de5f616821f8823
SHA12d5c2a7ef52f89623ec9388240d94c9a627b6e0b
SHA256a3b13d8aae2f06d0a11c9c098beb86d002f94a7dc6d8b10862a2bf2ea63ecb01
SHA512193afdadb6ac94154a99cba74dde4b7519dd3975fd71ebb3a8d3c0c3e1d5572ccf5dc4f52c9d811c872d8509d52e43a348da8dd2e46dffbef448196b8d4ff674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f6b10f9caf6c2b4eefbdf5a155e1464
SHA102c3dab42d528ef54590c7e3a527978e1bc93aaa
SHA256e47c7e327c01ca28b20f826ee8c9d1670bff44d7972f883a5a6533084a377715
SHA5126849f40e5e3d1436e5d89d5601507e9531eea36f1c69e86d1c74ae4c8deba7efe6d361c9b15817b15b0eedcd53fba716591aaf941edf8ed64854670254e868ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588f35e30b7a0cc2fb845c85a66341b35
SHA1ade8f8fdac9d2603314b46aed87d5774eb4d2942
SHA2569bce03dbdb6515322e743dc994c865314962f48aa2015b6655e37e9929a37fcf
SHA512b07cf54952de2b80251d22886e28f4d775a6aeb9b5c78f21bafd2d4043cd5093e4cb675c46fc14c28cd459cb63d6f30a8d22e9a433ac6cf83139d8cc5d7d2ecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58694f965ab6e2a929e725a07f056775e
SHA1463cf43c2754966b4255e8e0042c5c54acf7d31d
SHA2563428fbfe68c70f84eeddb48e77965b1729ba9ad93a8b63a9f982011664e69f84
SHA51299d752adf4044f62dd5eda2d441b51c84a177e9fd5870e4f004ae3aa4e9dc5204692a1288dc9ff791766d6bdfd293a8239dbe270d30fbc4bedd1ec8071b110fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c5e6dba2ecb8a17de338fd93c9a02e1
SHA1006cd2e5509a28dc65630506419a3a1193629ecb
SHA256339b9525bc05ac35d1e223feac62d3f58967a20754e3a3264d2bffa4f90d3867
SHA512c9495c8ab105e8ec6005eb4234f86064fa0e7032388c64da331aaad1208dff795e58f2eb2a91c8908b6b9e18cc68759d06cbe5d8cfb47cd365ab869511ac6043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aabfdf12fde36dd75edc34b6117610d6
SHA1bf6085ef2cde9dbb278743fd4dee58b4524f8411
SHA25678518909d2575968b8efbc57697b3564b60e820c123d5fc661403c9c53f40268
SHA51232ab1b80c07df674b814fc17aade77216320180c0293e09a82087188980fae76df6037e7e7ec2db3619b013869405c35ec34ea2d9cf7df8027d8690168effbb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5548738cfdf2df7662698c300f9f15b5d
SHA17f90470fad546c50eb9c526a0c6fd11e05419323
SHA2563adcc151d86fd6eb627fa79b1d3e41ba8b4d4353d025c4041807353c286f70d9
SHA512c07f5632ba4d9c65dd96bd8b0ac0a06bde2f88f81350990bb3a9990bb56e13585fe79600b6bcc7719fe138fe939260377659d83de0b1fde293697f080fc50ee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dd1d9700b6456058ab36c7c09e5556d
SHA1cf61b6fd0dfea4f3fbcf58e60c2cd3117209c6cb
SHA25615dd6ed191991a4956da51e2ce97fca31eba0f5476343f23fcb40199f530bc43
SHA5126fc99a14cff8b66dbbcab73a15103a31e9031c99745a67bb6c52af53f2a4c53ef07335671b131b8e903ea9697c5265dcfd6f1b8cdcfbe61ceae02373a3b504c3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b