Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 16:07
Static task
static1
Behavioral task
behavioral1
Sample
dab986c84edf7f547fc8675b66471614_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dab986c84edf7f547fc8675b66471614_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dab986c84edf7f547fc8675b66471614_JaffaCakes118.html
-
Size
24KB
-
MD5
dab986c84edf7f547fc8675b66471614
-
SHA1
15be364d5fbb0377f6dcd39c339ad314013ce3e3
-
SHA256
4409e41c3c8215794a8d4383c5c2a291125c8ad6b82398a31386ac90bdfc58e1
-
SHA512
9cc6ca4335256eb70d804bb8e63b6abcf8eb568e1cffc1671b2e9c0fc67a22d1152bdffbab1af44130bbf7fc2267d667269677017154603c29999cb34c205b24
-
SSDEEP
384:OfEuzvVY9TBMnBM9BMVBMGBMLbfEF0OVDKBKoKeK/KNPdSG5UxKtaiKOF:mEuztMCnC9CVCGCLbCVqb5uU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000773709c8073bb4f2c84f5423557990a7529edb39ca6e79d047c6eb30f72e681a000000000e8000000002000020000000e06bd800c8b45f82b087da11c43ab2b75d6de51c3d10e8a9921000bdd11e618a200000003a43222f97edee42d64c9e591678efabb1b3df3f8f249b4c3c5327d6b280659d40000000901f99e9943baa7aa0d76b04b99b89bfa6a9dadeedb03ec76af342c1058996a29a892b685115d8f191463c82c36021a5532b11735c2d975919f4882fa3bdcf44 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{04565371-7058-11EF-8B76-DA2B18D38280} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432232749" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e08eecef6404db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1232 iexplore.exe 1232 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1232 wrote to memory of 2180 1232 iexplore.exe 30 PID 1232 wrote to memory of 2180 1232 iexplore.exe 30 PID 1232 wrote to memory of 2180 1232 iexplore.exe 30 PID 1232 wrote to memory of 2180 1232 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dab986c84edf7f547fc8675b66471614_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1232 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5821340df15c4e654ca985621228eb88f
SHA1de345f03cc8ac91928c521944a55ceec8ee33a54
SHA2560383fecac67d61d4447ab64bb64ee6e7a903e89f4df744d2bafd63c0acb299c8
SHA512803048bcc76e9a19eaab6fc90b4d3faf4200db6446b75ee46e8d5b913df4b1d423750101a83e95c0634b0d68bfe332fc41151f947f6a164fb4fe088dca7a6dd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dfa1b007631019628f9380454ef7fe0
SHA15e2463ad8803e4911a6e82fb3153e408ee499ce4
SHA2564d3f082ee610408a51987e1ae5bc44eb0c4371952b71b169c0fce8883429609f
SHA51296fffeb9174b8de1ad6abe450b5f24015d28301c0077a20b3f69ab307226caf8b13e9df42562f83f81358bbb782f83b62cf77f3b15a9e072f9f3dd8302a8ce89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a25e1bfd45878b2389dc80a561a357b1
SHA1c72baa255489f897cc290b7cf6a218fe4accba5f
SHA25671f856b769e32403cc2218d6fd2acfe61745ed514fb9a2736f78531077d0f506
SHA512c64d1fbdcd96c577874f797f1415a04d503f849c579ee3b5af241a8ace39258e438c112f0338d73d43c306e037b8ffd98de4e1909762926b720c6ceddb83585e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5e6f2b07d114b5ec2a3d2465462b6c2
SHA1bab5a51d34cc36b487870860f840e5a0fff41f62
SHA256352ba548fac2d189d06bb474b9d79c693d46663af605f1e0e1dd155b3ae9a5ee
SHA512f9bf48af495f306b7d9147868efe3c1d2e2492b1ba9285179958242b496be2739b6a350d47b78156ca9d2f463caeba694713de1d071be373c43aa248f85063ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5423f48a4d5ff7400add71fe9ee1ad3ea
SHA1a25d849ebe35e4126872da1f4b94ccff8d830df8
SHA256231e990147f1451054b9079523d4eade9be0a8f39fe167b59f0e9d3f580adf5e
SHA512f2a04090894fad934fdbafc32a053512ed23a22c631f3d86d07e1ce2c27805341b11a7b177c3c2bfd273d3b48651e562a43cdfdd8c71dff4420aa7601b35e2c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa9a87677c44ca85096caae66db625c5
SHA11f56fab72665616813636fd5821e2cfa04f60614
SHA256b6c1bf82152975207ccfe85f74e5efc2df60d18e6b397ebdd310f93220d34044
SHA512ac53a5aad762b338c57c73dafec304d3826b52dffea47920273e38a236bbdd08c9417dffec1716415128ff7ed6438ea8b48a52dc065d52bfda45b7ed36be0d55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cac6edcb64c947e4e6469b2b3ca03b9
SHA126f70a8ac2f6bba87561de5b22b285569343afa0
SHA25663c1acbaa221a9ce0bbc74e7655bd32e780f49dbaccd0146467597d48883c738
SHA5122147bd621d86661599d3824f599c8850394b420b98f6d757d7e50e890330953a9aa1938ab2e48445835a8ed17da375aeb1586b966975bf3cf9e926a1fab79256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d5bd934294a3329c40ddded7cd2c859
SHA15d268fcd499b155aefc995c67d4ad814f2c01712
SHA256e269139df4be106095054d84e8eb095b02af5e562377f330ea7f55dead16fbb8
SHA5128716091964a00ea0fc08ff0f91f2326ec63c7aab20e95636479b5bd760287e8a322981fbb644d4b1f483798169a35033d477a22a0f12b21b59defab873cde637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523f0b3993f8eb2f8f56eddf9779a5bdd
SHA1539fa86d6effe672631726fe63a60e4fff29654d
SHA2565c82e57c8f2184d218f134de35a585f04612b1fb77de6eb192a3e14767613719
SHA512426b47262ad3d4673d85448c43dc304aea4eebfd4c0662abc90a9f9367520aba2e1769b811b144d95fc2ab3054b577fa602f71654c3796eddf2ce9f841a54178
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55050635a3366aae6c5e671f58b9a169d
SHA1b1364ed71f586743fa00de9e08f5f52abc245759
SHA256f0a49f1b2ba0c0bf0d2728d2090bc1c6d61ebc02fc3974181034a06bc0aa9b6c
SHA512fe103f41dcff7ca9b3787083016fa4353a20d0b2f4cc253196840277cbf6837df9ea6453d46f31d56ea6724f24ac695554c8638dafabe53baee45530a050562f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bfcc2fb55d2ada5e6011b7912f13882
SHA1a6753bc47ecddb69f80c07e02775dcfbc0caf40e
SHA256549e3727e7445482152242d23f97f5aab50436006dd3f40f638fe8432d00d803
SHA512d79c2467eed884205a3b0d3079c74df7e0740d32bd836819b35435fc45503f5940942027f17972396bbc2c606295cb3b5b5f387cb8764cca2e6fd5aec9284ab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568b4083eecfd01d7780c085009c6033b
SHA161fd8c4d2981dff2fe037f51345b2d87e390e74a
SHA2568669f40359283f1e3a3d98796f7ab161c5c3faa2fb1d8a74bd0824796ba94529
SHA512d9b800ccde0d8d35ece8e950776d1d5ef56d8595d7a11478af0227871298902a9d2e2644e60014a43e902a3d01f5f2c88967ac8898629a60a70c88fdc8ccaca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58202f456e8139f8548f572f00f07f56a
SHA10ced3f56aace2eda53db430105ef0364887a9208
SHA256b0504372250267d5804131c837bbd0dce91234da28c7c69d563cb54497cd3e5e
SHA5128822c9cbe429b867a3a72f113311ad102758929f8ab34698e282cca5353317d207e0a166c15b90ba106c8e9f540b2b22aec59c26be151c1fcabb7b1be9d84366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdb007e529aa3613966c98256f443de5
SHA1fd6f827f2fb2fa7768da339e28bb7da665ed66fb
SHA25632aa2c2b1ae4c6d2dcf4d26d99bcc1a38ddd620bce521b6fa3ea36e8712e87fd
SHA5124457774c91a2cddbfcca88d5bc1ab37848bd6478b3f4fe9f24b25297714582eb26b74200641dd67893d34ec53817633d840d50357d85a03aed3872aaac48d8a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594a3e820fbbc6683e1a94e110e152b63
SHA100009596be7af74f4a89ddf262df5920b65e2dce
SHA2562e975054b37068be0a167d6212b8c300a5c737dab056bb9bbdf657d0edcda07f
SHA51251178950435d7b27462ef957a437421ee9d5b49e6e79624a68f980d7f2aca1f62934b731ca06278c3b03629f1726744714de161c01e280a2d4a3e936f9e9acb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551038942ab8e5dd1fbeb1988c5969bf1
SHA1ff255f5a6581787b797ccd78d621f1d80a114e11
SHA2563ebf39dd33976d049784e7c7df1de1a4fd753bfa6d59e9a718d0bd751568d0b3
SHA512d26cf003ed48b32e278b40b362b85c737fd3ba154983d34945148e8364308d9cfed41946885f4a5a54cd04fbaddbbd6d8045c4ebed3dae1ced023ff0053dc031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d55cc395811e9b2f88650031c5e8c55d
SHA1c5cb6ca11a109fca8daa6f47c846e2668638f400
SHA256cb0b41b04fae26f2a19c2290708ec47d37114b008f67870a5ade8304be3f6475
SHA512d0888a399e95b8a1984ad49a1218f41f7ba7e9dfc04e104f198fc1d8d816399f1ffddc38fbfa52076b2b2f2044bef74982a26535025ea2284fb10b509adde675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf6494aeca0c3cb57b78505ee98ce939
SHA1aee7d389c753db7ad3fb6ffccc7b171095f79380
SHA256154add262d3b700c5e71fb14ce6515731c097c0a9019d23075d375b6f98d27dd
SHA5122c7a9e33b64f992f03c429bce7fd75ec33705607aff795437847da4ecf616fc74334b3d21eedd058343dc56a7944e02e18fa446a489b731b4bb2de593ddfa0c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50713244be0d90a18f1f5c72a681c6ff0
SHA16070179421e5d3645e7be24310370787a5bca511
SHA2565259826a8702679b71a4e7e0e0fb0b5f9a65101d6d0c5f47558c579cf34a85b1
SHA512592dad5275174f384b0664b6b0bd911c244588ae71bdecb7788d0369011cb62684830d096aaed7855247f81486e10de483acc958698b2236a1d3a536fc0e0e9c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b