Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 23:20
Static task
static1
Behavioral task
behavioral1
Sample
db67f2dbfc2fe426dc4621a4401ea12e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db67f2dbfc2fe426dc4621a4401ea12e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db67f2dbfc2fe426dc4621a4401ea12e_JaffaCakes118.html
-
Size
4KB
-
MD5
db67f2dbfc2fe426dc4621a4401ea12e
-
SHA1
e2951942384233ef846b1403c5ca9e2924bb89c4
-
SHA256
8ef0bfa1bde42d0649c6e63e404f9a3f7d53e620ff25ed8ad9308b8eb7155f5c
-
SHA512
005cac2ce7e019d7936fde694531c7f399fc5b6f6cc3252eb73a3637db53d728ef8e4b0f3c084607898224acbc994726b21aaeef6c5a8186483d64a95700c81d
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oo8M9pd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432258729" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{80678F61-7094-11EF-969B-D60C98DC526F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000003e8313a047e988cf82ce8142b1340080f00ff991ed3bda21f6e92152bf012405000000000e8000000002000020000000fe35e7a713d951c90c66d8f4b20e5fc72b94195c289cc054e70d70fca51c3ab720000000cbf607aa6977eb315e65a3a8cdcb3abbdac09b036f99e691abf177b09513351840000000a90ea963aeaffdd19f08e8baf406e1c517e3bd8b75999096b61a8d44e701e95ef3d30b932057fd4df8b9fb0e3f5a10568515e09b01e8ea44523e64a0e8814868 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7011ed54a104db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1812 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1812 iexplore.exe 1812 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1812 wrote to memory of 2800 1812 iexplore.exe 30 PID 1812 wrote to memory of 2800 1812 iexplore.exe 30 PID 1812 wrote to memory of 2800 1812 iexplore.exe 30 PID 1812 wrote to memory of 2800 1812 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db67f2dbfc2fe426dc4621a4401ea12e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526b9c153f408921d371a27b89a094708
SHA1220a7de2957a90be5e36d099da6ad85d05a5598f
SHA2564d55b6e4065a759d50ef803882de4efc0262f90969640e9a036d48d7a05e9f05
SHA5122d280928c9bd38da8840fa04968a8a70fc51fcc5ab5e7fe5cbeda5214cb6511ff989e390dfc9dfd3576c302e8cc83fe00493aadd2d71db4b5de44a119c49f1b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4172f1c969fdcd7b1c22f0a33d851c2
SHA1be3232889c58cacd6a12ef3ff32155c5cb1e0d82
SHA25688fb97caba33ae1968586ba73183bd816428bcd6ea2f721bbea2876fd2cfb6e9
SHA512f15883288522caf27b73349c023ef2e7136c32d91ad31d9dc97f2128ae729bbba4d5e11ba496250f5a2fc5037e50ea4a6f642378713e3a8738709c95f274b26b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53113f7c6e9248a840c3e4756271410ad
SHA16ab0ae5f919757869370ccaebd09765f12b3204e
SHA2562ed92611fea103b37d0f77c814bccfa959701e19af12d3e6ddf6091c4e3c6d14
SHA5120804877c44c4613ba0696c926cd7d275f7305d4a01e2fbdec77d0c7c8cd110cc77a7cca289107249d1fbe1bcedcdcb19274d41eddc68f7ea26c48003561e1ec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0ed4b9d171f5c2d17865c148aa160d6
SHA1a6df06c70c2aa5ca2603e57692ef7a3583a75b6d
SHA2562653967bfbd57de845b725eeb433a38389e42bf41c4f9abca828dddc8b266c37
SHA512d8ddfd4dc1548d627e360412728d50be413d36b07258611e2bd1f0f2363218bebfdd37d1eb48bc073bc0cd0321d10a3e1485d3793d629811ebf141cd4d293f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b56cacbd3b79799332f03ffcfa5ad63f
SHA14c36d34a25e0aa477f5ceddc63012dcc719cfc1e
SHA2567e10d827157b2046d1224199e8a934c404712728ebbb44608c45b17dd78302e0
SHA51268cdfbbcd7c981e93b8883283086d4ab6f3d280bfc6042138378e1f5700d82864cae920e5f8b65db5e1049dc7767984e488513c6ce718a9ed14f883a1be9307c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9814cd3e04e7a183a7f444efb31dbc6
SHA101bacb69414d18e72e09778a7ca9f0d4de70b2cb
SHA2566e1469c8da4e0bc2eeccfee30b1a4523af13489189f8e719fc6a45d23e1348c8
SHA5125b1e98ae7d39c3dda1751de7a21aa2544bafb93c39949115c4c49d22d2b7ea375ab2e84c54ac6e6f07644290aca42874926da2400531f81c063714f22b7730c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d95f7dd9cf106170fad81e3d6858955
SHA1976320aa035d95aa83da2fae12fddfa4f4c77962
SHA256ce28b3b6b8017e5a60cc6c1ef1dd6a243b796fe490e43faf8aa5df565c29168e
SHA5124faf83030ebb890cb2f31d6f7a994b8b2dd7a2e9df0d8bce6863cf6c7d86ff78b00766cf49d3a876a125d4882cadfc3f6efc400bf5bfa0c7568148244da75cfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf50d6841f52c83869ce6da7cd026b49
SHA1ed42586d61aeb2a5f40c8e72851769d046c3f1ae
SHA256b073993e14496cc344d6029ddbb8752c88b8b1473e05e09c7c880af5ed0704e3
SHA512c5b12045ab91f7cd5540e11f356cc8b937694ad5d1794264d00316ecbbb43fa2ca3e1a01ca8787becaec7b9c5b4e98a24fa82fb59db99d8012bcb364165140b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c02adc67d5d5f374572f874aa2b893c
SHA11629e7c2a13cd03346b2c7977d0c7bef92cf6dc7
SHA256c45424e43edf81505ceca8bc08d44f2cc3c4bd7df84fa10250d07f4064f174e3
SHA5120fe60c406ad5f0f35234ae5af64446701dcdf26de0ec3b58dcb000765be8894356817066f068414d7d042a8d2d29b22a324362e099488dd51a52913699f6b3f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0da447a6e878b1770d00fd06568019e
SHA15faf3f3cb588365e65ccf2f63adb030ebc2e179f
SHA25643d5351c5a8d5ead6dd7222aa3c2fdf649e9f2edc8ffcd2e8f30840780d734d1
SHA5123b0e808ed47e4bd14069ba1fe4273cebf6644384a83e06c3d63aa9ffbdbb8e6d32f5a80d6e385e3cd83b23d6e851ad8c64a7af80afbddf0ad1d6a2a7b63db2ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5576d4c2d0f426825c970de9cd3ac0531
SHA1cc903b2de7eb29eff8c7c75e787726426b2e5984
SHA256a834d11aa7d265d59b388ead70b399aaf6d321cb3d5b756ce680c18ad706a3d5
SHA512a1feaed178c0d8b544e7162cb9e79787e61ad4cd5ddfcefe2f3dc78702f40a47257d635a03e58deb2f3da96c36d26a117f2dc03a29f34aeee601dc52c3d7caa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e970929663031a3fbe957403ba2bb65c
SHA12f736ae77303f53a22064f6bdfe791b8e2e9b17a
SHA256db53fffb7405c151cce5b7820c803dbff53984a4ac33ae7379212183bfb65c49
SHA512d648bb9d4f7215c1c0fb7c46feafc0148e838918a91b3abe2c7aa8694812b391e8bc9b6214a98efb93b3aeb421d70ce776e8631fba20ac2caadfc5237dc931f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0a5f96947b123abdfcad8bae173dac5
SHA1dfe3987ec51f5474719e33b75d7b8877fdd02367
SHA2569d46a5efee43fce1c52c6c23355acb6906a692115dc2cb59b9db12c8a340aa4d
SHA512209c4008f3acc27b0e8c4daf3281018e913b77231c1588052be4a91787bfeacaeb59757548b99892f2e769759b65942eca41927309e2f2d2caa4561084b6ee96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599b4b0f88f9eb2feeda477ac404c6874
SHA1df288b8ce1cf182e0952c50222ca4bcb68cf291a
SHA25611974237f536c0a7234f11a01680303bd1d7ccadd7cb6aaec322633096aeb9ce
SHA5126b42791133b6ced48f43489bef1901711d0473a7b59d86aeb5775daa3d8f9cfdbffe82a78d9d3bc5aa0bceeefb4fe01b24341a6d5b72cb522723325236e5e3d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c288540fae1e3b85328367e5104e5dc
SHA11b75dc5e2032fc3859ebacd0d17a15d7118e4c70
SHA2566ebb960136c0347caf464b6b6e7f783777f329ac462b221768d3715e289430de
SHA5126a0cb26f9d8354749f9b07c1a540286ac5bcd768ad073c8ab087c9a628310bae2b510bedae6b5dd146ac74dadd666f3ee24875804f7d0ae4a650b646619205da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf2a44d3d95dc36cac877c4c5a0a26ba
SHA127caebb452483b961df621de7d9e2e6f3f1e8a37
SHA25639a6be3d6e6ccee759a431228489bc6715fc5aab2b31c3383fdf7d3426c458b0
SHA5122ca7179a2b968fc40c0a41016f125489a7002a2e6e0fec02bf86dd25d9ad506f77f7a187939a9d75a1e5219f2a852fe3ff48c04dea06fbf519efdf47eb5b99a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d07f257b9911e8a4032d183e657a9cb
SHA1467cda3e6df529e44446b56bd01a9ebf1745ed16
SHA2569b8f809a5f833f9d146014ae1623fcb4cdda4f244def021b8ee13cb23dab6b14
SHA51213873d84d103d4c6bbedc9e4ffb9c99c663f4a98a526dfc5cf8205ba52573c4885cb9b6c17aaca4bd363a4a488c8ff3c3c672c22960d37033de38bad3bfda8e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5266f935269e609cfd04e736bcf2d455b
SHA175a8dfc1324c747ed92dc6e2c1e1d81d017596ba
SHA25639aa6b230ff375fc4b97bd56614e61adf7954a321856dd87a5e360107380abd2
SHA512cf4eac0b63ce2dc19647e346f797f48290ed32813411721b744df8ecc8c553b188ea1609441a4a3349d0e6dc9c41e599fa9063654e197294df2b7dc85096962f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5397fc49db76859b8ba490beeeaf0703d
SHA1779be675f38c567346047a8af40990dcae26067c
SHA2562a2cfbec1236738b40a4a59c7ceeb371b163874ff9923d5491da11c2cd6aff78
SHA512aab32304baf85a1074c6695115dac28ec19f37dd04b85fc8b8020d91e5cc1d51fdc9cfddae18fe0e3af1dbdbe67cfa9f0a1878806fa67a5ac376a1d113051a12
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b