Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 17:20
Static task
static1
Behavioral task
behavioral1
Sample
dad8dd029ff26a3862dae08bc3e40d0a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dad8dd029ff26a3862dae08bc3e40d0a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dad8dd029ff26a3862dae08bc3e40d0a_JaffaCakes118.html
-
Size
23KB
-
MD5
dad8dd029ff26a3862dae08bc3e40d0a
-
SHA1
4ae5e6b0ea3e4c6060efd3290628c4958cb20360
-
SHA256
0b12dd13669a95287f81656d2009f5b6185160caa8ca8d9cb74fae842bf5575e
-
SHA512
008cfb1ab6ef282d1b61c209f0fcdd922d41f1847c114a2fa90e19bd116ee3bb1ad4fd21a4439be111f76113992c7a5587ccd0c2040c7b3c6a1307c8cb892e8f
-
SSDEEP
192:uwDLb5nZanQjxn5Q/InQieDNn4nQOkEntoanQTbnlnQtBXTvMBjqnYnQ7tn4YanZ:nQ/EsR/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2048E201-7062-11EF-B6DB-72E825B5BD5B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000034ab9f5504105ff0a06fecd32f9afa100118e79d9529dead2031df5d334c33f3000000000e8000000002000020000000286e845e64734f6efcd98af753205e26f40af6ce746497eb85ae41ece147fec9200000004a03927c3f60e5e73cc1a2bf81653c8f17ad7d9c0c46a34c3eef8ad865168c4440000000df1246b9796740353247fbfbc56fd22dec1bb262e75d68019bda1227136136ad53bdc468416361c2883a95355eafa18848cca7264f718bc375bb8499201774ad iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40d9c2f66e04db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432237093" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2132 2052 iexplore.exe 28 PID 2052 wrote to memory of 2132 2052 iexplore.exe 28 PID 2052 wrote to memory of 2132 2052 iexplore.exe 28 PID 2052 wrote to memory of 2132 2052 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dad8dd029ff26a3862dae08bc3e40d0a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504996ecf4f0dfca634d8ef5849832dff
SHA11d42fcf4ca3caf6d70083dfe466f4a02bdc416e3
SHA256aac93060a0d3709effb90ec79e6bd22fccc59f9e7d876346e7e1cbf913ceb3f1
SHA512e6729f27d7685194a20bc4c306c0ea08da542a88be25a8d98f9199e83c564707c6e200a7c33b4d931831b265c006eaf3a7931abdbb65061cc78246d2e9ca4050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58669e13d8e949777d0047e5ce4364e25
SHA1ecc2be4396cfeb0c44ed897c936713066249257f
SHA2560fcb45b5dc5abaf7369582e47952feeae1f1de7e12815d38878146e512c55707
SHA512a14adfb7e64188099e770d47e9f224bfa034007e3bb8c7c30e4f445d7792b15bd893838d2dd468accc16311b7b3b6669e19ec85944c82eb784fb911f4b6e6a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5988a01fd9f42b6af0cb9211534d16da3
SHA1279d05aaaba5ce0793b6c953e1aab6b96b0a632f
SHA25610f01ae17033d82f970f60bd95088072f12e874442ceb7c1240081db9e9b014a
SHA512d7b2857fccfd065cc093845a28488270f63286991cd7cd176d8cda687bd568925ab6cd7422c555769feea42def98ca62944fe7353c064fb164d32326411406ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ae2fa9cf16579c695fe5e1431dfbde1
SHA1de947ccf751c65f2b563f1d3cd3192f70e8fc1a8
SHA25691f6fbd43dda67f293cb1504d03a6555cf758d9000a36560fb919ede48573524
SHA512cf08428663cb92b59b6fd0743bee7bbd8e016887da2e1fedca4c706efd511dc38d3f9459253569d52ddc236de8fcc5d475c5717011e7075913b96650899be352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c60d71c525566c46593032891266522
SHA16fdfa1fd4d0bad7184d16b9a352dca9491d6f97a
SHA256c57cccd2bbf1367244051e07fee470da3ae370258beee988bc405c10efe2f7ec
SHA5124ceb4f75f79a75886b43e4d03f6d84ae7de586d899d84b44fd8fe46997a366cff44dce0a764cd8e08f0afc7a6c5ca7c047eb8297eb59826e06a4925d514ce9be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514e3f70555a786af0f73e5572e2fd165
SHA1f4b1f41f72d2c03c990007f284077a0b418c0b36
SHA256d9a5a5332dab37ebd047f2c0a411f39740cf69f4d219f36cae5fbb1ffd4bbe69
SHA512b719e1a25130d5091d6231e745347f16412715cc741da2c7f6316e680c77d6603fe65408567107cca76ce88e93076d2fd24c1cfd20e5eb1c8a7602167d0ca489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d6367133a4300b637e6bac4e1fc0a4d
SHA1e87ad24e25bf901b8864990694712de16a709d4c
SHA2566bc1eb7de0ade4c50be46fcd79a6b85490f40294397b6512e6ee4f8904535dcc
SHA512aa73ffd32ad7b9eaca0294a9ce0fdffe965f06e2ae36e746cc1b914e09b299fe7aebeb0346caa32993b9e36db456f0623fa8da8d8181dd0e051f4202c4446c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d61f8a4a03c627bbb710e239c7ababb7
SHA10524821a85030dbece7dd0289d39211493261a8e
SHA256c10d6ddb8c170a99e658df48de2f27785ae4c84a88bcdb960c9540ff0d031276
SHA51210844bb02f29cbe2ddbdbc601280d56184e2cea307914f7fe63146241ac929df446445c1e7a622aa5e6a3f5cc29c15fa69aebe4480c54f400c86fd231a571b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5532799c08e7ceae3a284e414da2183
SHA1e8ec97861cd1c07ac7b4e5147d60b19a31bcce18
SHA256669dadd11753534bf318385eb32f4fb7737ffb75cd67cf03fcd77802c8ef2050
SHA512ec2f9eaf6c59b80f5dd34eb7bc555fc4700248308deaa4d4929dd0ed7197df776cc05a5409237feb7bff4e103784e5a3bf47128df8c61fa32e791ad69165aa91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512f1d60e3ab708addd3e8bb472205a84
SHA196efee73a24821a414b5bf27d85cb402e089978e
SHA2560732d401753aa84c00258a974fa5d52f2d6f661e20b67e7385fb7f8d34377ad8
SHA5125c19cbc4502c61cabed0fe680da91ab10eab67680c88a2a4a2c6ed87851e0c811eda9c0e59fab7db0e5fc7d04e7ba22d5f633ecd0a0a1aab09fe33f92e7d8115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8d43b12014613987698887bbb32ff84
SHA19ee151cf6f492c72d7f415042a75dc3706a0dbc2
SHA2561fc9b9f0325179ad53bc30fb0d47beda60795ea3e87de410e613bc8522b36d0a
SHA512fc8ef28999904900179f48365b42ce9f6dcc1f968f0c432908480a10da85cc850787115dc1c72ca2b86f2ce9d0af27159dd07693478ee56092a4e672eac580b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590d2777e52f11cba93ae9ea3dc65e198
SHA1971c434bc2574975a984a95459f7d27ea7695275
SHA2562a94c360d23cd63a8db3fe9ef56cbb9bf6ba0b3e8b96b183980ea03a05686f6e
SHA51235b826cd562a8d62a00e2d97f1ad2270c54d226ab32b676d620540732786259600ced9ed70d6e7808420f94471a719d277daec08c6f93654bceeb5a1620dde85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7ccdbc4576b09a1e80eae7893c362bd
SHA18c0cdaf24defa65928d8ebf09a36de6eb61eb59a
SHA256b53c835d0a72b7e639ec6f1c9100d430c85489f94180b16dfb6a16ddc89b66c6
SHA512e6abc02ed69e48060d7534303c7fd7be9215b5115b81f798058930a0293274197dfd802b1b9ec99df09e4c28b8a0e77b1950b65bb5bcf749d5a04a1eada0fd46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee5f306000b6edb8eacb29b82ab23364
SHA15f4df9740b4c7cb2f30d008cac4e6fd7c16e276e
SHA25684234ede79e07ee02bb803fd7ee96d7c131d770e16b1b327cd3dabbc57e623aa
SHA51247bf88a0f2700362c2f152dd27beca9395566168f1cf2eabd6debbebcaf042a7394d1b1d1371f4134387243043f86a95216b244a10668e3d8e8d91c5fd481c4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecc70fb183f66cf086f7e8546057a3ed
SHA1324ddfa03dc9e4225929d39713f1e656313a9381
SHA2568a887c126cfd851559f52703595b4b1787ad5d464f3bb136a25dd890dea44664
SHA51271d2b8be0c860e6ccf4443361ae6db7dc20487d03af23ab3cc86ae4efcbab7e5b0384a4d193e35ae61ee9ad9c99574f6d8bd4707925c4f76282ae0c7638e4b4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a536130581ff57333b2c5f1b05598ec
SHA19d3834023ff6d718120b72bb8aea9f8902d81fbb
SHA256822f1904956ed0c516122ea63c4d8623a4aa658edf9274e53fc8d15f11e1f6d0
SHA512d84a692c370727c2d2d7443542228daf8b9652bda489b3814e1509e1c8395f2cdadb1f13b7c347b1bdf3d9564ddb6b1e705553b9ac0dd800b73e6cb3acb6006d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5652a3b5f2cde4e17cface5836826ebda
SHA1521a77ba3fc84ecf87eec7ba306c29004cd96118
SHA2569f8b2cb994daf65dfd2c23d36d24ad2ae9b108ba7f05590574be26696b874bf5
SHA512366f3cbd390d09087238c2d59ea9a2fdb967a84189b8b1d4720002576bc0fb6215b1a9f187794bb2df2b8a2d3c5ca1817418ebc37cf5560f4854669d1ad6a2f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5892b6d42669ad9a37881c82ebe7e4be7
SHA1e32a61bb446337ca0305e6339070d59d0a3e8422
SHA256652f712d0905f8d2bc93c787735023fc37869d97aee40d1fc47357cd4f375133
SHA512b90da15fa1e9dde1f40215534aead5c574241835be965f747c491e2cae13d379b7474da037a449b59430b051c961f3915b28b42dc660be81e41d71088f5ac7e1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b