Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 14:15
Static task
static1
Behavioral task
behavioral1
Sample
da8699784392460a9e417197608cae07_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da8699784392460a9e417197608cae07_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da8699784392460a9e417197608cae07_JaffaCakes118.html
-
Size
87KB
-
MD5
da8699784392460a9e417197608cae07
-
SHA1
211d0ffe561771fad4cc565abc26560625909b36
-
SHA256
496eb4184c7c8552bfb5353a191a8487600e81cf590c0a9b7b9326e8d6e641be
-
SHA512
d0e8c2ba75c594af7d4211754984b31ec51c110ad41787e61050f7cdc2c635155ee57882800fd596de911833ee69426d443993417e1d954a12882fc47c1b5cc1
-
SSDEEP
1536:gQZBCCOdS0IxCvHKLoZNdjRKlq0WMumqcS0/QR8E0L5DXtxRuZQWWpWLnmdKlBR7:gk200Ix5LopRKlq0WMumqcS0/QR8E0LY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000005f39da9584ffaf5a5879cc738858ce7afc8b1d7cde52c6ac61e692ff66918210000000000e8000000002000020000000b060a6168651e97c53265537076cabd19cab8c5734a509675e64d1aa575d25c520000000c4ca89fe8f59e7be9c4d9cdd3026f93fa0a766f7c9cf861cb53f5777e84dc0a040000000e839633ed3be6acf3b62f157600d9188a9c6e0de0bdea7e04966c6deedb6450a981af142f86f6ab342e73caf44e3e1d210082581c854c800fd636d58ea433049 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432226014" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0bab9465504db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5718C4E1-7048-11EF-8587-EAF82BEC9AF0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2024 iexplore.exe 2024 iexplore.exe 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1704 2024 iexplore.exe 31 PID 2024 wrote to memory of 1704 2024 iexplore.exe 31 PID 2024 wrote to memory of 1704 2024 iexplore.exe 31 PID 2024 wrote to memory of 1704 2024 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\da8699784392460a9e417197608cae07_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5babca05e919e25c49aad6979f9255e6e
SHA15b1900d8c8a16dbd4b5bad1c7609e0b33c3f07cb
SHA256f7dcdad39d3855bf1660945f82681a1f38d2b635799eb9d15c47ea4fd04afa2c
SHA512a92c38f9b4d00f59d56ba84088bf5749f7673704b386cd2f7f0548aedd4f982a308ad8fd5b7b56577596b6c312f3e86fc74e3b84024118825b07dd27fd014d2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3ded31e3a3e03c6b015a6c7429d0ae9
SHA1a963f8eff9126247711cec8ebe85e905b1bde7ad
SHA25640a0f3f985ae9df641bd6a3a2306818472cf5280e28e36351b2bce6dabf2c84f
SHA512fd02b2766dd8216186925c203c6cf0e723ae9a9e9228fd7ae4ee7f2b4c47ceac3e0a97d2ecf88ea9baae8b2b7728ded050997f8054d74b3e3988e39d1a637dd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a681e2f3c2514369ba745c6a93eed1bf
SHA1998d312bb6fe0dcb5c260d10ac9b913cc4220260
SHA256225b9b1dd8478728297297c2be4e7ad3706fe920e1019c7a4723a6d7db1c07c2
SHA5123ed158c8a71f28b4d3865e3af88caca5ea924b92721e1798f69a3ec44f161f22c5138fcd312dfdc405190f71d8cf10e40596eb783c00d2775d083e9e9495f709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589c43a7bfd99d5233c9b5e30340be604
SHA11f499b379209320faac76cd918a09a3d84d415e9
SHA256da6ea601b1303a1dba55fcfbfefb3856bdeaf0ef35b242f6b4117748ead62048
SHA512c8263424bb5061d990e0c6e0da4c412fccad1e4a3d6b15a9b238fc7907c45e0211d1b54f01d10c431d7c51b37c8964c8e839249c2eb5e3cd6e14be228f8edc44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588e970d1ef2433bbaa725cc6d0365f14
SHA1697a0e4d8b000d15de662e56221d18f8144615a8
SHA256b8c47a9f398390881ddcfb98c1d2d9368556fd383337ed70355234b80637daa9
SHA5124edc03dd12a5632d05936f0c4a4c5ea0ad787f310d91447251331744aaf72d4b39b8b8ea3c3c29bc38495ec94e7f3bb8125c4be559e6145bacbf33381f29cbd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570fc40de4104968cedbd7baf83e411c8
SHA14836c0439027773a734e4f62c0e5d6e6bff4070e
SHA2568116f62c243ddc31f1915565de2162e2c5c705a667a178624de0c6df2d84c503
SHA51270bc6869c78cde3bd1715ac46a6ed6680f5edaca428b6cc4fd1d32e266496fac6693dd6cbc137e7b8968d4a054c3ea7c892dd71a6589feb90e0079373071997a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd854daf2f8707a35ef2fa029027765f
SHA124b58cad30b5646320a3999fd9881f1fa1676d5d
SHA25660bf7842716d8c96ae2fb16d457089e9407109814bc0a3d7b7aeadbcb12b19c4
SHA512e2eb0ebf5131a03dc2d484dc7acb6b166b2e719b4c2ae55cbb61a1bf2f72254d19d84490fcefcf0db15f9028921312216185e6cf7584720fa6fe5419b9a7152e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e96a20d02ef70b456a35c6b2767cf7de
SHA1486d9bddd167230ad17f32248381f1f5befff0dd
SHA256e0b73778f908a91057d53d9f6d4f2bb84e25567ce24bc29d38865b2e772c43cb
SHA51246095889ca806f7477683eab32bf35c18683ef0e0d954af3d032b292f467ba9ff4c407ead5a56bcb11c803be741774256f5d9c5b676ef865f1a7cae0b6b1c99a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f20da3f6309de5bbd07d04fb00b90a3
SHA1f7aa96c077af85f692904d67eb7c8326cde6f85d
SHA256b8082c36601088c47fdb0622b0b1869eae13f88f36f63d5778abbe541673ac30
SHA512380c035f0fddfe5c4e81872b558cea9b42932343830f0bf0bd6f78328f851252797b7b2ff315bbd8970302c91d76a35094df87a5fade1aedd8759eb7b99abfc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aef7c237d25e4f2432cc728a217161a
SHA168fa06fd374591266f8048ed361d42d379785576
SHA256ae4d2a25748dc41d3f88cca2c2edd21d6e21672299cf48e8011f7eb8d7b3a593
SHA512d5aebe519c419fb2a04473558bb7fa85164cbc96b3c05847f2c8e4643237087674b1816fea7e20c0c2b74138d90071bcfcb0116fd47e59247986dbb9d7d59194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7a0210d8647971abee4c9b5677dd076
SHA196473ecfbd0ef65d68304d770c8d325022b8228b
SHA256c4397be6e53079fc04a93f63d92a8c445ecde699eb064da23ec137c0667e1285
SHA5122f1fceee227a9305bc6e272b3bb746cf701126080ec58795872c974af079b2eac76bed5026cb7fbb5f3e25fe639af569f1d7ec1ffe209e4a5828f49d0ae0d22c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e9e4fd287cb0d934b4661253e22ec79
SHA12becb715b92f64b55961d84e622e474c5710c235
SHA2566c20e91a41f3791a1a000797f26ffdbdb5f00020abdcfd69a5baeea7b979b921
SHA512fc38a81e15751a22d878e86b2ea557fc83a7a9ee25a764ed87e998cb5aa95d3753a05e374f40b748eb251adb5ded184132c65b1e5aa059711ede14d9c9d7cf50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d8bed8864585a99428742179545145c
SHA18ec529c6032459be851953e4a77e8ece15165a57
SHA2563f0b29cb3b1741047d06f53d2680e42059a16be8a8cad933ce1a693768220868
SHA512e4b9a13ffdb8e7325a59d8d5fc60105df13931350395ff9c66b758839ef59ce997e47de5795f37a18d08ca70a4a31c1e3853e03d16322f99513466d0abb5540e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5064770df89dfcb9643fd29b306ad0071
SHA123c66ce62a179f35fa4f3865958f6b4efca7b563
SHA256decdb9fb08d38ce348e7bf35596e286a155ef59fc34e98fee9bbd775895a309e
SHA512ece973b12ba92036c6dfc683daef54e838709cf029fc9e473408300f99bed69004c0ec2e88cb478da594a7ed81e3c4ba308e78dc2ac792cf053a8084dbf948b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c35f7e001bdb46acbc926abeb57b864f
SHA1cfbbd8aedc60df6ed1b7ac544024bb626960c589
SHA256c471c1b88671395860d5202fd8c5a5b09b158137c35b303ca0b8dc9e6ec5cece
SHA5121dcb7f86cbb6cdefe3207392a658c6c1a800ada22dd55077a8fa043c968bd5d8d6e63dc6ff4b9ac7b6580e6ff34ea2007801beeb89bb9e875b97d18918fcf82f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb84f61c6ea5fc8ac79fab79363f3cde
SHA1c2399bc67eb95f6700ee4471404964a43ebe22fe
SHA2564b6751e839090e81d299b388292dba45df4991c42fb730d4ca717a304749a656
SHA512c339bbac7f12baa01b2b41fa8ead4faa490faedef32a5e37d91bad72e06c0839f066eaa382ce82f1662bd40dc0e7a9716238a13e4316062e0e8ca938b97abca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5853e3b0e76db1f352ca1047ea229d441
SHA196661ae49419cd24085d298aaf599adf2854a18a
SHA256b46b642e5132016e1de81df3f05b05a1cdb2b54d48657536df6303128d6eadb3
SHA51284a4a41be4b58927d51a74848c6eb0c703aa1a45ef70a1359234d861eec5ab253188a0efc6b7ad895b4a75b77a83d2f598cba5cfc8edf5fea3268013bf5c437c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56400768b99c0d2d4c9b3e2c8befc3b1f
SHA1c7fd8c2df4e7a31f4e26daa7f6cdbb8928679a00
SHA256c355896a02affbde4973c65b6fe17fa12493cd9dc6d6c36c665cf29d55b1b441
SHA51234ec34c40c04f3749e038a0f5b5cc9b19879fb343b64cd1f45f69c58da1085d8b7d99f608966c63b26719e57f577497fc8c65c394bd643b83ddec3a8631f2dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505984f329a17ee0041f67d02ff08963d
SHA15fe6b04cf8fca96288730c4f9558e7352395cdab
SHA256f66c4bae8d58cdd6f82543c5cda4636fe9f142a4c5bceba9669fd6d000452529
SHA51250333e7ea6717a5c951219461edaf393576efda69548852de83c583b13104de3990057054bb208162eb344d2ca7b279d7b141d9627822b1ef92bcdc109942e5b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b