Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 13:27
Static task
static1
Behavioral task
behavioral1
Sample
da715ddffb69660c48f65e75dfc45779_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
da715ddffb69660c48f65e75dfc45779_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da715ddffb69660c48f65e75dfc45779_JaffaCakes118.html
-
Size
19KB
-
MD5
da715ddffb69660c48f65e75dfc45779
-
SHA1
3b3467dcf06d99ed266bc37c37403f015833fa4a
-
SHA256
ce6a6b1870dbefb08f06431068be76141eb33489bb4fd3fc574927cd14fb13c1
-
SHA512
2c5c06c410f8f132a03e51bea899ba83d42ba9b3848556a0feca7e42a06c06b410b60053fff5df98c807a9af0f0065f17cdd97ee16d4a0a3f609a499076b13e2
-
SSDEEP
384:zi9KhgESVVBD8c+Q3RsXwjGjovz6YzemLEXucfIk9xhes6IzVc9Gr:ziOSVgcR3aXwa8vz6ZmFOIk9es62qGr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432223115" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{956C0BF1-7041-11EF-8BF0-428107983482} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000d59197c8534da8e40d060ba5597406f9e91bda979c7e3181cc0280d29d76b5de000000000e800000000200002000000051a1fc05d3f5923dba228a8f2f72b8e196e4af186abbe542615377ef7897336620000000ad945163d432074ab2dcc2e277cb06df9cf5472790654245b844035d385060be40000000f6bd31cf78a8c55e3bf29425e026e3c3f57f6f52761021c180b2cadeef8c695e9e009d358d4afd30e86d871f68edecbb149eecdc7f71fe667cb538d750773e4b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80c8b66c4e04db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2940 2052 iexplore.exe 30 PID 2052 wrote to memory of 2940 2052 iexplore.exe 30 PID 2052 wrote to memory of 2940 2052 iexplore.exe 30 PID 2052 wrote to memory of 2940 2052 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\da715ddffb69660c48f65e75dfc45779_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a7421b6a0363a74151a65c1fcd3d314
SHA1e549b1b68e75b575264eb3ab98a6f198fd3707e4
SHA2561ac76ba562b141ed59adf5e9ab4a93a09fc11cae448b317f2f3c064e01f3c592
SHA512ed7150d8a5076d0557dd96ec58de103c37c2b702e5b7dd696c44ae56d6a90747ee88d9eac1be33c01caf4f5adcf8a156b21903a7f0ed115930b85931a8c49dfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5def90e2debd4b9dc24c1857a87e0b4f0
SHA1d394099d05187c9d95bad90e2ee56f29ca5c03fc
SHA2567a6f0e3906d189bc430d995f3eb53e3219f23e9dd0a9140354b1559825c6c526
SHA51207f16392d951e4c3a3a7fb40e938d0acb008cd7e96e14c937d815656f84433798d16c43acc34d13edebe666aef201b50a277c64eab43d1e48377ba336abf44e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e86629ba5d1890acb5ca7bfee3398e6a
SHA113c777de7d04c3c77b3fb88503ea485e4f4f108f
SHA2563758920917b98748505eb2ed73c6042ee5f2c0a7e0eb8966b014379bb5e2c0fc
SHA512118b9247f8b5dfa8e6b18434bb4360e94cf1e367249f450e6011c0225ba228deaf4cd160192ad4aff2f496f59a84c571b9f64baf486a3634002e13f999752b57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e18792c919bd4b65d18ca40aa8ae635d
SHA17a287640a2ec82f9d4864ee1bc634b00a738c0b2
SHA256ffe0222dec9d682f33942515751dd8c4c6a9b771e5e6d413cda3c3cb824c475c
SHA512ccad0c15045fef49b21e5ecdd45c95e5b01a0c3dddfc98c9f573ff3e5d9dfbcb56c52aface741f987c6df954957857a256584e0dd1e123b9574002dda543898b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c6d004e46ed281a3a407f7b814bd6c0
SHA18d140b2f1239805c7d2b5f82e313991f68981ea4
SHA2566383635b986a4aa847262ee9cdec03f784b61f59402a275fda72c04007ed8d76
SHA512d638f49d86c5ef2142cc50caf88d4ffece79865325607dc40330a3988fac412fde574486fcb54c7a32b6716b11cf9242df3a464013a8cef013a21a85d74f6ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5644210f9ef9d1973489663dc376857dc
SHA17ad3e7c756edd1db2285f20b4ddd9ec15accd282
SHA2565d5dcdefb7228af95b124bfe9ed289d1b121d1ac5c59c02ee3e62e79fa91b489
SHA5127f073ba595ddcc22626d8675267e3de745d4662b3a206ee19c28c9282b8253fe4f16fd9c517508e5443d403bd0ad5668bea6697c2fc9e51908ad0b3864a487aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d87d5640f598a0d5591b6d3279f53f30
SHA1895330509485ff5cb848f7822c307d1f7f36f4b1
SHA2564ba037e09c46f7e48597837c131a7a200031b550a87f0a90f4806bbdf78142ab
SHA51253846508da6f97bde35e705e6fb9659f224a449d3f12c8ddecb0680c6579e840a2e3fe1275469d717e118ff40c3556c4616581a91ca3ac66e54b32a9e6641a4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ede00df5638ab655ca67435f73951c0e
SHA1505d14ace66eaa796ab530207a6ace036a94507f
SHA256cd689b6104514f0b6f5664effe74933cff87dece346f7030b391c8b1468da169
SHA5121f79faed30479e60376399506d4efc94fa5f820260974fed269502382b827b88890f8ee4e3a52f7941b262b89cf87d3a169959a20dc0401bcd635825406e7b04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aebe7e634bafa9d003e2080033a1b491
SHA159a7e50a6195ab2fb35bcccdc604e99bb9d14550
SHA2561b03cadac5aa7f756d1fa8c50204231f2414ca80b26e039714b5a1ae8f77ca9a
SHA512fef378a90297a44915de9a11854a80ad6e80f682c408f1daf4f8340b3ec1ec4825f5bd167b43b6e7620ca6fbfebd3c54f282eced321c07fcac6bc41be25262a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512b7a291f59236e1966cce9794bf11a6
SHA1dfe32201ab1ba23fa4550b3f676efd4e01cd0b99
SHA256c3cf49ab3402114ba3b182fb47a7357cccd8bb89aaf329bcbf0a5b1cf2d04b5b
SHA5122bb8853a091466e8f77438367af2da788ec0717b06f29dd455908fac347ce5e42d2fdaeb4604c15cb51ab9795c435c98970785132bbd8b3736b9399d92bd0fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5870576a5fac2d9ecda237e4f4a0a8fd6
SHA1095e5e6e0b8b6ff02b8fbc83c76ad3627f89787b
SHA256a55ddf7766d5a0a34afca9cffd9dab8ebdf194904dfb37269ffa6f1ed76763ef
SHA5126db162edc0422c5f0566a161fcac3c555b343c64e656b45f35703f289b972d77fdb5a54489d31d9db4bb580452ab09d5f33c804f7a23cfda94b673c5bbe3562d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55808386edb297e829561e25fad674e28
SHA19573d8826f335dbb78057d16fdfbf29c8b0b0a94
SHA256a69b2b502776820dbd7e6e6cf42d745d590c73b8747c7e66e8c0b7eede34310c
SHA51250e5378678c4d54e4eacb145f320d4e1d1b0c1dd4a338706d561f13a559c83a3c52b36c96904efd6b6bda9b5a3fb74688cd090dc04b075db8176b56365281430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521220cfce1ad0ac037d87a3384f20475
SHA1fdc7af13ae070c7691076b326a3ef2ca0f5ddd1c
SHA25610d78ef899e3f0083a16630ec39fd0b2df5f1ab038341267f91e2117b95633ad
SHA512a260a4cd9739b1d4601a4d78658dc64919ae1a3d3a2cba318d37df406ade6e73095d030d5f50a41e7d7ab060e1994ecd05963e9b64dc22e76e2d2e59f9c0c5aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5799410182766a727afb3cd2c5f4a53cb
SHA13dab160ae6b36c497d6bc2973a98c1d310bde0cf
SHA256e8ff50a0d030a240b3be5c0f845d4722b4dea50788217972c2a1ed3b490754e3
SHA512d5e1677ccff3ceeb7437c9551601f7a419dfc0c8475a045b8d5d30d94e1fff2f369614c213b1641dfeb49bf79be9f773c1cc39d98ce211b0e44a9f60a9e433a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5201a5239b55fb5446ef93b75e4dd57a3
SHA196fd928749b31e0f7d7fb26cf1222c670b505740
SHA2563d660c1c14e16bac23cf9b7583b52612062199d9dd6f8706367586b088cdd7aa
SHA5125240900d2d59bfc6fb0815e603bb96b6f6f09bfa2212511ce221d246ed79390cd398ac0feabfd64d9aa1e8bec41d0db4ccbf24b7149f3e5f2c3b2462cbcdeda8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5684a0e43f28a144190de67c0f6257ecb
SHA1e79bae023573b87f493d0d8fc7fe7aa0b238d04d
SHA25673e0f083b5d9f70743ec1f04105ed27de106e65e77410386083e36fe7d29e185
SHA51215a81f79a52820c342536e0a7778eb87d2203958484b8ca36e1b1b127c52a96f05be4286b9094939b434a76da18928c18f4bb3cdc230fdfa53ec68de3addd714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5672089b8a56c77ee792983a467b4b895
SHA10c1e068e21367d60fea31d54d89a853cff5887ca
SHA2566ada494b6500f2b4ce9c3daaf74632cf721391e0f623ec3b626e4423eeb4cb89
SHA512f3f2cf4aec4b1cccdeb008e9a93c559597fecebc2586217c389a51ac8dc6d078f27b43ff041288ffc0beec1675c5e27f22c834d536460d0b30ab4f4882bc97b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b204f3e728b3e603a064865ab00ce941
SHA1f1a9970750d3dd935f0299495248f580a27e08d1
SHA2561d11e3a6f972f7ca5af3e1905fc8d991eb175295ff5814caaf482bd11214a110
SHA5122807dfc55fed48014ae14d37fe2b9a86f2d676a3710eebb33593c1db1f23778d821bfd239ebc95bb9d8e5c9fc0a124ff780a6cd7a5b29389f74ee80764ef2665
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b