Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 08:38
Static task
static1
Behavioral task
behavioral1
Sample
d9f94de996f956c11b01496907b0833e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9f94de996f956c11b01496907b0833e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d9f94de996f956c11b01496907b0833e_JaffaCakes118.html
-
Size
4KB
-
MD5
d9f94de996f956c11b01496907b0833e
-
SHA1
61febe35e07b4a4274aff217740728bf319c0b0a
-
SHA256
fc63a6e6e182860003c19e7ddd503f6812a000b01314d2d64bf5890ad92008c5
-
SHA512
2891ae705a303d1c3e534a057fc9a3de9c9459b6a4df7eec81461c19a4548c2857c6587d698db95fc7af23a32bd9706822e1ed22e0d2826c3109f8ebf468ec06
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ojhsvd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000002a463b3b8d7f38cf498a09bd56b17e331359d3b5789ec5b67ab1b770f52d27b3000000000e8000000002000020000000e4caedf4d73160bbd25db6f6077d7178195c01a5620b778e3c3a958d80617e1e20000000a0945b8cd8e36f9081428a195e22986825196c55b5518666285af5be185b8db54000000027e7feb5455998ad804b45222a5b780fd74a24d87e751dd4db6b17eabd1babc4f18f4a3334520ab7d7ae29e692c98cff0397da1e5a297b4193494d1b269135cc iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432205764" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{308DAFE1-7019-11EF-9B14-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a631052604db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2888 iexplore.exe 2888 iexplore.exe 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 1228 2888 iexplore.exe 31 PID 2888 wrote to memory of 1228 2888 iexplore.exe 31 PID 2888 wrote to memory of 1228 2888 iexplore.exe 31 PID 2888 wrote to memory of 1228 2888 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d9f94de996f956c11b01496907b0833e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572b1ad69a949d6f69c7bdd790263754b
SHA110d917defb916cdbf21373b0f1dd33df039a8404
SHA256dc8c1033a0b348d0acb767c20658373204b17375a93559c039077786b831578a
SHA5126d9202e19297a34536c3058ed67d6c0fe89e4b36dc106a426313a5fc101e9369353fd4a9cdb0dca1fa0eb2ec7a8122fcdb59bfaac7a14d73491c3eac44621bd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5a09c5654c5bec7342eabbaf9c59403
SHA1553f7d2cf695403dbb72d4c54981961726d5c548
SHA256f76821cebf78640b40d864f14e6c9fa2107bade19e29e7bed5f6ab594bad39c5
SHA5126e9db5dbe42207926979899f82b3e414ae9f0172d5a47b5bdce5f9943d82890c1fb762d755d761e3e3105d095c880ef9e6595c280dea79f5ed41d8c6ea4dfb85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cd20a6d5383732cf5f7972e47afe80f
SHA146d36386736cd98a9462abc6a0f842a1932bad82
SHA25650d986b88ceda8e7e79b86054c24ecb30e3305aac5b0456959b1a396f0df3617
SHA51223028e7729aa4d44df23033191a1391c7d431afb1558cf7ed2b742ec7d6defee4673a0541f15e3fd29cc7f6c35c5c899c40958cd2d8c17248803b6273a4424a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a24112e38f95bdaa4fd4e375bd44137
SHA156c32c0a4f67565a53ed003c3cf4f004e2caa98e
SHA256db2e31b9475a93b7c4cffc20c8335a8c5be427590e5666a7c5c5b97943070622
SHA5126a13cba6bf7ba95642d5754e4a4fb9832f8b68f97f7a43e4d5d0db909011115ad800790f620b4477eb009de3ef0c893769547f0431eddd0f59f1405802506558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc78bad01949f47f77410295eb1abf58
SHA1724e5286e767132d87ffaa08763166f443691236
SHA2564857f199e9986a1f4e1741dcd028bf9d7f2d8a92249538798872fc0156689827
SHA51289c73b35f8b54fd454c2d77ba609f63e9d44501073a062d0b5bebd22e443b9e5002846f6907e38edd243505bf78f325cb7d9d59ac2a3c3c343008ff0a07ee566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511371b46d6a11faef65107c1ad96534b
SHA1d4715cdd5493896ed39741b1da763bde8c923593
SHA256fcd64b42e64d01e165e9c1275d3cfc808af73fa1b87fc19831192e1d09701531
SHA51203da623d4e8c1f177fddf438ab7836e981d676cec12b4dd3a19d3249fb75da6b077d90aed4806afef7d8702f51ee93df98f46ba1a8d0bed0d18938116b6c78ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55325be0d55bd4f344ea71fb1e4cd3c33
SHA11b969e3c8ac2fb21a1c880567fca4a2362b61d11
SHA256a9b85530ba24fdeb502e91e98dfb3c1887132ab774fc6591d06843f9f8e359d2
SHA512c076cb420d3fa6549a879c12e2da74e31ef661b6b5e328c8fd17fdb2e0c2e8384f8f8aa91ff50cfcc66b0e10be1d1f399ee8e558539f74fdf4dfb0caf9365098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564e544829952587647411135e2254228
SHA112dcdcc9d4685251e54b2cc4a9b43c921cd1ed60
SHA2565ba2d1d49a78b4b219dd611965a609aa0241b82b0473c74a7e067b0acd713df2
SHA51274bb385cdd1a363d531228963cb5377e39a4c52521e4db9bfb75a2f970413e13b5e7fdb4b60b298f3c832f7cc2818db14835c0c5da8424e332ded07e4463f115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ec1c8817281cb1d2d6391fb0881fc7c
SHA18a747178c0b3fd3ad93c19a36ad2e4e6f1b4e26f
SHA256db3ca4f9bf6b1e22aae09ca84b4ff64bf7a6f8df54952df3ac06eb16e698617a
SHA512af23c965e6b5ff967bea65ff4d13721ead7270c53cd606d87aa7c8504902c94b275ab8ebcf62edf9756bc6a4e37728b87d6f8e083f186ff5b6c2b3c07760ee74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c04d4fe94af992a75c85a24a836c7d56
SHA1172dcf76fc70749293b8ba3ed68a4be8f7f33256
SHA256b706372a523f386e042560d28829ac7237641cee120862f0f26fa0049d5d75a4
SHA512970872581e9eb0b031daaa3e9610494dcc1c4251025aa14257e5e3b0d1901652b3832cf20ced84d330399ba33e11624bbb92b32ad00d77726770a5d0b5517194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d64019b99b9bd3b972cee954ff0fd4ad
SHA1a0e6fe1271180c1d5c96a5f65a28ca14c2205c65
SHA256c3e42e9e5d0a7b5e78aea46578d84b9b4d60f9f9f664f7a6adba4a2015a6d268
SHA512a2ed9563fa77b9d9e91cb90c185aaf133e761ae6bd8a9706489b14a3a751d31506abf09efa239d8cc1530b28b68ee8d957ae6fa3e56665191462ae4b9b64825e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c9444d89c327c53bc7a394690fe0d72
SHA173a86421d598894f826b1f62592fffd86602c6e8
SHA25612ca348dcf41445988fbb3dcbd5b979dab3280485e97020511ba713bec0fa121
SHA512b48cecb59c32ba4a373044648cf1ba06a3ee1acc314b3cfae1d1baab62ccbd1b743d7180d28f43a78d67ecdaf7c08a100abb3a47ab2bf3084441ae3cd50f69b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e342d3286b06a4fb49d0b028fc4d295
SHA1094f45669a841202f916ad308719a9c15eb0cfb4
SHA256aa6553aca1bc082cfc2c7101cb920d4ad5189930db17ce6ac0f51c54b45d170f
SHA512a1fb9dbccb21fff36b16667e19b547c2e21b5f651f7b66475924bd0409a1b4c12cb87219d11ab9b6357c2c3756f39871d9e2f2cca744dd8bb86542ecf2d6b75f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51528cfaf0d8f33e2d253b1ad2d096a9e
SHA17f82ae5c9e25c9dc9dd9c53baa14d490a092a9ee
SHA256533cfb78f5ac26d836748e560797b10934ac0f15f675200571387be883f389d0
SHA51259f862db9b9c8b03c2eefc582b152f15218695a9c728f37013fa4145c6de71d433f72a26aad05eb2e710228d1c83f429a4972772fb91073c6b40815a047afada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5639d0be146efe0aba04be798489cd00b
SHA1e4ff390c1c6807a56b9659e51a17a361ff6fb8fb
SHA2561ee611716051c943027400e9790df4a4b6600a4680f548fd692e27ca33e4ea36
SHA5129229f62020b3f00a64a9f2182e34b93887163cb057da66c7baa9f23367d4c1c53862ed19e98ea43529a20dced2343d9bb3e0379f9c6b5f107834bb7d55237d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a2e9ea2574448833012aede80abd1f2
SHA15897a5929de8323b181c1d365493f9faa903beaf
SHA25648e0f38dd6133fc180f5aac25925a0fbb2c5aa77f5f47cd92f0e358259efc1b5
SHA512ead01ea2f17057ac34cb738d4c18f5bcf7b28bf4a3e0f2920342a170bef791ee5e186a20c6d5c6fb76f4d8de95bc97f0c09ce62dfa66f1b6da54868e3e77e204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fb5a7f6d1c1ef05869d84509705d8c7
SHA104c4c5dd6431598307bd086343f9145f4a5e6d4a
SHA256114d10673f768a6e761b65f450627e82170e32d296224f6d11a641bcccc0214b
SHA512ca4316dd726793b1082248cf34fb7093d5b68e30e3e59f461f99aa1ba88fdae8df53d6eb7669165407f02a783cf5388d7851954e15ba5a62b085b3831877055d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8920dedd2c27b766e9fbc02c3a97c28
SHA1db5ef67629ad4f5c427f9fa352b1190b14ec992c
SHA256dc9644f53d0481953d7705e1cefebfb61cf907c8a684b686ba1f9a9b3c217418
SHA5129eaca54d9fa68f5aeebc1621d3e368312e19c2981e5039356648122fc7288b77b3b90eb7bdff9df88ed43d0256ac446b3dd427e11f5caed8d73b1bd9b31826d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5293474cea179bbe7c0c2d34ffd5d3c5e
SHA129fd926b048a04c3ffe9d9d856aa9b39dab70bf1
SHA256a99fba80d3a3a07f0febdbd11aa6187172aa7a0093bbe5452c8685353ec1b666
SHA512be0f437e516a33b491d894ea6037c3a3136b94551b3848dd8074cc7f86e2ba98d04252c8872ab0f23f0eaad6e5223b4dac1f258b9f8a5c742a280a71f4187f54
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b