Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/09/2024, 00:30
Static task
static1
Behavioral task
behavioral1
Sample
d7568d7688dcdc5b3c26dae123169787_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7568d7688dcdc5b3c26dae123169787_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d7568d7688dcdc5b3c26dae123169787_JaffaCakes118.html
-
Size
653B
-
MD5
d7568d7688dcdc5b3c26dae123169787
-
SHA1
a2c85532436b0f3e60472a2dcb43a31512fe0d41
-
SHA256
ee7cec295f0fe72fafb608bad3bda4fe45d1bafae0fa30798d145f77801df8f6
-
SHA512
9fa8eb8beb9aa04fa41fa97409ea17e303c09f50b46046cf4daa536f625b67de1a350d24ac881b3232580966e1ab1300d10804e59c16e5fcfeb7c27182a7c0d7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DA7FF121-6F0B-11EF-ACDF-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432090084" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c60fb51803db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000c71d76e4a3892aedcb54ee47d47a76842ab5059fd78f682d1b11b4fcb966a797000000000e80000000020000200000007ad6c716e42b8ce3e83c4e158b63c43478ed15e42fc0e31102911d9e4790492d2000000071cd3261479c3a4927bdb2b3e3b2396074ad112cd29625832f9fd3642f30fca7400000006cc959cfb0399026f833cb794243cd6420f33ab29693689b1b6198ce2a3bac18975b6f56bb30eec90ed5da8ebc5f4382d1d208c300e3d861fd7f07b5d7582294 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2636 iexplore.exe 2636 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2776 2636 iexplore.exe 30 PID 2636 wrote to memory of 2776 2636 iexplore.exe 30 PID 2636 wrote to memory of 2776 2636 iexplore.exe 30 PID 2636 wrote to memory of 2776 2636 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d7568d7688dcdc5b3c26dae123169787_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595e382ad61a97fd9d404042d2940a6de
SHA1ad1c6ffad5709514fefa18a863236b03d5e12322
SHA2561db2702d08981158e5cd8ead246abb81615dfe3f228aa84e602e7ade5bb29694
SHA5126b474c2e5b0b951882c28302f0f73240ab99db67b1b689cd53ea86104025cec879c7c5e553f96047222a2dffa1b4f5e665ab85b7593c5a5a969b5b9329ab4401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566065520e4d4a9e1d09fdbb46dd3342c
SHA198ebaffbbafcae356fe849fa45d718018348db2f
SHA2567215df96e7b15373ff3f32030191886cdcdbf72298ba2a76753026a686a69dc1
SHA512a9882c45cd5a33252ea1d33e84ff81a085e98372ef4c1e04a43a7005dc9e8618f182463350783dffbe39b255d0d688f0b9b17158282abe4072bf2bd4603324ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a4f3e69eb1ed90e2d54293310acab6f
SHA1938313bf2a2698090ba56b23f2442fd7ccf658c5
SHA25683814bc048e0f9a5544f8315cf362dae26be0d635adb756d822b6d356a9d0636
SHA5127fbd52db8284f23f9adb7b0553c5b39bba0292b022fb64e0a770369c60ec3487a0eb09df3166966306c6e82df11e33a19fb94440b40ab902ef788b4096c042dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572f9d747e1bdaf8bae587ac9c38c95ad
SHA1f4004799051d30c10d728ccef0302e668d47c416
SHA2567fadaaafbfe829b72a253116e560730a895681cd442d934481de867b55356acd
SHA5129228086188fea89e3a968500e17a306a66df3efe45afdfb66acd78442a1356489ad82105b8b5d2c7c7477308e9f18a201626ea934e93d28b603202ea9a970250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5635e201f9e1178425600da3249d4ad40
SHA1c12444f55302736c895de3aee4de748afe2c2055
SHA256f96de747be1f3cb5e1724798b1011b40d5b4c432ac518fe3b1099b12799d4cfa
SHA51233d3e268413685d09e6f504f57eb42809b21711b86b348161d420cdbbc1dacc522c55d2b8cd0237fa3f76298455cfb9d88cba12fbaf4f37f4b62d35c6fe7b62b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8ffd3a9967aede64c638cf90d11fadf
SHA1bee410c7cf840c26484cdfd4ea4abf24eb156d15
SHA25697b878fb51217df05cefcf0d678423100acc90902494b18d6afafdf0b82defaa
SHA5127077e829a709229577605c4ff9dbbd5bdf106ece1d11e7a6a796f35cf0eaff0a2c72cc03596b26da8e13ccd05d3328b46a38822157ecb0b6211e1307deda750c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae878b62303aca5f10662a053d8a1aad
SHA11dda318e1df4213e3404a57c15468b0e7d68c0f4
SHA256f6bebbd57ff105aedff3d8b035930654b5bdca8d3f7eed72883ea1753dea84af
SHA512e27b3e578ee3e6e26a9a4c6b0b6a5c939aeba6e5006cfd1856f945738c7dfcc5126d2ab99698358fc4a411a20a9983a44b376f2a88adcd887656aca79499f16e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548fa88d363e05e5e4b65f60225e8cc28
SHA1c62f7d6ef2706f7c3076865210f8e02794af1b8b
SHA256bfd5252ff537633076bd9414770108f301eb8234ee1056d0684ba023f4d1909e
SHA512c5a4740583cbc4a6dee2b1fadecde44099e8228da6fbd9f065aabddc9dcaf2c2aa91b5682b7867d22d69beedc502afd518e807c1da2fe82adbc10264fa204d66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3a57f0dba2193ccd83b2571d95ae081
SHA106ac8075fb36fa2e446088c336fe85134eeec372
SHA2569fcf346677757e3261019444a10425a3557a95099d9eb1c23a4ad651fe49420c
SHA51270712d5243580fab1f5cebfdba667eb3bd0ed1412078af1489bd42e2433350ab50e53c920e282401d90a742ddb0a991d73931c61bf9199a28689803c87cfb925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f486ca4bb6b56a21412c7774e37ae2
SHA19c0242a48384a51aa6fab2c9071ec635c2da4e32
SHA25662d0d6aa2df47631cf7c00f4743b06f02b3480ebd8ab3e048859ff8a0474705e
SHA5128bdaa421bf33aef6d1eff162f9c5c55e68350a730c7c22e64f1cb2e7372640158da6e1294a732e1db7ca0c998009c6f2fec823e33b2a31a88dd536a37db84927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfd81f48be213644dc76a0bd8287d65b
SHA1b36cbe0640f9e55aa839e9da4e585dfae741d4bb
SHA256e0ebae093b60b4aa8301782ac31606967de2f9c36f76e39e1de0d896b49e38b9
SHA512f9ab6f6c38ba0c4f5dea632cac8b5913c595f6ce06e2ec37d7803680864b22b9627d7373d5c26892ef1d19e7ef8acf01282a93463052751242f503673a7d26e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4e42fcd567c2d8b20adfe03160f5677
SHA1dd957e216561c453d5be809a28ec2fb72dde8017
SHA256741127bbdb07c2b73fe28cc739ef4b8973d73ee85b634b4eb848eecef5c78242
SHA512703199bf9db5135cce116ac126916e1ef5ef99a2a94172c543cb55d09e09e449e7f620ee247109ee56c60a5f3fab10f21d63439b081a99e13b1aec702bad15e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5992316bf8c45ff0274290117e517c993
SHA1e75ec9be525555a8b7527c36d12cbcfc5ffc4e32
SHA2561098526205fd7d94d626d4c38ca872497953673bfa6d42422489709e30de38d1
SHA51253f81f87a1506e02117ad65033cb5a56b54a5814489b519596066dcccdb1c6b8c9b0ed00f09ea6c8e3400cd9c6163bd0cf8196ac92e36e0e5a5b9c465550dc28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e22588b7733eac65b67fce578f41fbce
SHA1bf4f503e6db2d35d55edcf34a4f8de6afbe6721d
SHA256de52488820055e37a7435099f28c98db57a3bd89305f06bc0d270b6000373181
SHA5128f4706b4016effa51fb28b5170b428c2050e878d4daca8698ba4a4eae562dc737c66f2a9119eb1a62f935bcf8e074fc91cc7d0e875bcaa2c183807f7d91b51c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519a7354c59ab0d3074cd0161d2a6e58e
SHA1b9bba41da7d063864e5ab8ad727084101e20ea7f
SHA2566ed7099c86be917864484de46b85342eb48da8064f6431112562231d3a502b18
SHA51204d72e1cafcf0707b68dd3bb8dd9ec12563ad4c18f7a995ea2f6ce003db9f803a09afd1b0dd4d0963d0a22bf558c3447e29cf4c05ffb46f1c2518d50083d0488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8cfba1e7a96b4be2ac7847082dafe5b
SHA18dd103dfee887f830a71419214ea17f8cecc01c5
SHA2565c00974bea992d4db457dba1e7db2feb04d73e705b212cc6d37d63036abfe362
SHA512a8a6fdd58339837e89df4a77b9ac3ea3e5992730b9f41eaf1130b93f45a844569ee3e7c2e4a96c6d353fa302c67fd37a0febc39acb294de320721b23a897fa3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dc7c71ca1d78bc57d627d6c9ba0ec21
SHA179ff9b1cf5a319e4f6f499c6a7f94341eedd234a
SHA256c9661d7309aa83541c0bc42eadeef8b513fcc5d9b801ba37b45b4db093fe3bfa
SHA512c990d913b6497f59a98ce519dedb975b82da0c047ab74775aef4f88fd1719f8d1abcea16d0c8f5bde78463fa2e15e1b3ab543150e6ecbea4a4a762129051a72c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c1151f69213f76c557809d326d0cdb7
SHA1d79cbd6de03991393ed5105a944ad99292ba4ec0
SHA25600b1c66669ec4de7c09715da23830214c92886ef93c1a8de5fd6f93c7c286030
SHA512bbbe7afe2a21d9f8294b723a224c8a312cdfc556cbe8562da4920e562d9fba56e4cf77b44764828f158ae5a1a90d8dd395c3089bda02f17642d526c0e4d14824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546400db304499b9e2276056b64a61249
SHA1901bb3c2fbee6afd734ede42d24dd19ac25127d2
SHA256bc48a645bf96be66a28cd6cd3b96ba2efa2c482f723666d9a705cee1fb063489
SHA512c1630b12c9dba9f44faec81b41ed4f95421e74865ce49eb37447a4219bada6ff0ef0366e58631c3c4c84d059411ab5593420fe044fe4b891b7272ded4e76cc99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b68f0db88ea1804af71af7844e65ee0c
SHA14c32445afeb6b8fea585117c64a86358c061a0e5
SHA25615dca0f1a25d92ac880451aefb7dfd2a73025f9575403d8fa97638cd678aa191
SHA5123a0eb93ce5a07467359af0920ad3d8ee1467526653497f5e33c224ae8f72601b6edced203a7c2e83a5c6e20b92eccd1dac19dddd0071707b5dd69667b97ccecb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b