Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 21:49
Static task
static1
Behavioral task
behavioral1
Sample
dd1cb628fc87ad463e415946684f845e_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dd1cb628fc87ad463e415946684f845e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd1cb628fc87ad463e415946684f845e_JaffaCakes118.html
-
Size
34KB
-
MD5
dd1cb628fc87ad463e415946684f845e
-
SHA1
ec5b88d231453b1ff3c9096455a4c4fdcaa74f67
-
SHA256
03fa89ad7c0857e15510e7befd35837332c0eb50ed8c9815672a5729193dc064
-
SHA512
4eac6e420215c1ce7adabcc80e1a38c02150c64ce606f6f222a12cd692219208f20fc9f02987308fd751f88e7835b366e14a5516fc7287e1e2deb2d0a2e848fa
-
SSDEEP
192:RAhojH5yb5nhnQjLntQ/OnQie4n9nQOkrntwvnQTbnAnQUhsqZwVz0wVlvSwVqvT:yho1nQ/+jBmTvKmNZpVft6CCMJ4mK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 303e71a95d05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4C9D471-7150-11EF-8E54-C2CBA339777F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432339613" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000006b48c7c7d43c9edd96b0e8c7d964bd8b072f7ce31e3adaf6f2689ec5a4142e32000000000e80000000020000200000000d8314ba002e6feaa107646a3a7f2cd1b96b4d17bca7007570ec4abae049b689200000002c828ba19ba7e0f59ce939c8448804a35fb3f6f6b767a7dc8eb0c6c39b1709e8400000005d6b1557a78923bc5998d77fcda381038b9debe621c241ff7d1d6189831bf5f250924e0fcdc7499aad44758981c345badad95809027167d347a8b46b708aa5b4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1072 iexplore.exe 1072 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1072 wrote to memory of 2708 1072 iexplore.exe 30 PID 1072 wrote to memory of 2708 1072 iexplore.exe 30 PID 1072 wrote to memory of 2708 1072 iexplore.exe 30 PID 1072 wrote to memory of 2708 1072 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd1cb628fc87ad463e415946684f845e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9b493a3c3ebfdf0576aac5b6b013645
SHA1a6791cef28b9da5ec6164650d7f7b76a04c14677
SHA256297ce4eb8ee895a001bef52f42de705f6fab813f4468008c96b86455a46e5586
SHA5122155b546dfde5e776ae708482e77a5ee123c72dbcd94621e52fbaf4a2fe7b138168bd298f2db3a2deae1ef0656e8a34925b916899be48b665b1464ce88f29fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da6cc06d2b583ba8c3d0df4d50a08e9c
SHA13f28a2a18c87619c944b8a2e20076461392d2f0b
SHA256269237997e03bd3047dbfc6eca92e20474955c336cac149b8f6538b1818bd4c3
SHA512def06f79b95b8ec17874bd4ad805377b7cc774b48ff47e9ba47d16d797555d6e24f4a258ad04e7936434cd4d3438c2322f903e7c4314696f7c49203cd74369b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5824cf455857603c7e377f6be78fe7815
SHA189c283d9225f11b3b464a1ed551823c13f104923
SHA256043bda18e7a3dfb6410d81fa4047cfd0b390f8fa59e589e6b27fbc2ce52ee385
SHA512fe189b7e881ff5d641364cd5c9c6e7f33e576a305bc7e661e75eeb37802b5cd0a8cb24775a030bb799fd4ef6142bfb2579f340ff0bc78b42ffc603985d64600d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d31e6433eec766415770c889602a9318
SHA10e373224a1a39a738056e2c34e48f5cb86cb22f1
SHA2567a666333cfa1655d2bc6f5091c0a2b68f6bcc267217aaf40240f6e9f62ab9b19
SHA51226e768bdd296d575c2e24f55822c1f817761913568d6860f23fa50da5f95335a3823d40a375249bc54ee7824f31dc4fb99e6e1510f50e13e108d3dc5f8f5d37d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503089a7b2799988ae0a4a98ddc09fef9
SHA1f94187670ca05b82852a6850081a343e5d8628c0
SHA2560e10ebfc23fe5fc470330c49fe4a10b91c64c892224bd0558fc9fa3060aeb524
SHA512fdb8adb1a6406011102b56bfd13e4da3d5a2fabd9fb4db355cd669149881a4de283510b89685981abeb182479d0a47f9fea235d417fc046537f7e1a9ba83f526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cea26b4d44832642204685ca166d96b
SHA111eb70bbff9e4d95f7975350abfc90b5f1cec2ec
SHA25631c841c02acdf61057afadd078422bfb37f3ea2299552b3b78c8d3dcd28fffe6
SHA5123ebefcd1b3c2c86b404ce4ef41e0c40076b94338a5ab125f6764ae694649bf34a1d8871c15dc3c992a5b370b283bdc361037b4b6c9d384e1da25012a04cfdc0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6a2d5f62854fd1b33bd8814efb52722
SHA1259d453ed8c6ffb1f754e6e09328ecf4cf674d51
SHA2565bf96717d424cfd5cd92fcaf69b30721fc2038c679ca94339ade5dfebe46d918
SHA512c20df0d5ba729f3549637cd871a460157a094e9fcfbe979c555c9126635babcee189ee9dd503153b0b2a84e40342807d660e838223d8e88f35a1ba95b0690393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c49cd61ed9f3c4818baa2de082d61d23
SHA1895d338934f5d6dcdcbe0cb8f8cad52e04d4cd33
SHA256400ddb1d5ea88b68e912278521855607b129dee6a67c954ce624e2b5ce890156
SHA512de594a24b5cfcbfcc05b0e1971b854158a92a6d1946ea50ab673bd292c651ab5bd6372f2458753101c07f137af4661bf7fddd503ae56b3fba5a1a50e1cdbcead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7b96f789330df2cdeecc8f9014f2e97
SHA1d2902c70c5683e1c73487c53dc6a18758eaf3013
SHA2561e9cba712bb90c717e3bd3ae3b9f358138846c86a000f52a405d44e4c3be5591
SHA512d342e093b8ff5fae9e95b1cf73f65477e0f138c7c96491e2c7d0673313099d2dff4828285e872c062c65854c5f569160a416a9b1f2821427c82884e8e61f67b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fef476bc4cc244d2b68ed4f8c53f7e53
SHA131562154407c75b4705ea49783244e951d99d787
SHA25657ee02b74d65b5a5ae8c3976797c979e003462acd96a4e67b3c0a5f01e858397
SHA512e726c64fea5a33b062bdeccf7ec5dbfc495f1fe8c37150a7732dc0bfe6ee165c6ccef1aba306260cf5f96bff1fc7aed75eec525054fd5c3ffd49d822c147619e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d376289cee610bdf08004395c464ab18
SHA145ca1f9af1595b4844094ad8030396b0441080c3
SHA25621e19eac609eb078dbeb93df000de8e9cb2b7c5385778176bad35cd74ddaf0f9
SHA512d4c2117d5b9c5931d6fdc817ba26d0aa3e1bc19fbc8b0780b57f2f318f142842bdfa7a23ec7d8a5157c7cb380ebd128ba53008e9f3291bfba36e0d466873605d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5353b588f0a9b54b263595dc75ce43c1e
SHA15da2a6c8e6de2c9af03093b5d8ca048307f2482f
SHA256c6f9cd64668fd278a67e6a95e6e42c57bb66b5c674e567e66fe872eff52f1f4e
SHA51205524642a1dfc6f47d1060264dbafa63a8cc69399b134fb628555c1dca36bf66ad5e9656da4644d60b8569a46882ebfcb0cd11d67f44d8b0c3d5d0467aa8d887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553e4337cab0d8d3272b07f20e59194ca
SHA19372c378f4b95fdaef3824aa2b72280cff82be5b
SHA25679b8a57e263b917c94ae6841ee5fa4a841b72602b47640fbd0f330a1adac2cf2
SHA5123407187d49ebd480f1f14c6f1d0485409c08ed0162f880a282eb2dba1ef09c905e72051433a8a7c671ce267c1731cc9529407a151ee7ba8603db5e86c3eb8533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b27dab52c5084ab674d3829b79fd2b5
SHA1d1fcbc46bba4f63342bbc3254c3352d09fcda65c
SHA256fd542b40dbeab2036a11fe2324759a5e7b6f798fe01f356900c5472dce4ebac1
SHA512bbef4052b0187b95231fc17caf32d22bd67025cb8f01ea1229fffc2b7692fcf2f959aa100a440562ec38cb8edc294e9c6f8f2c6820b5525d1f206e499d342a8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faec3a063bd3a52cf3dbb15196448bb5
SHA1fd78b79ebb18cb3f1804c88990948e1637bad1e4
SHA256f03638eac4eb2c6bfd0b3dd7bb7bb8ce653a9a6f38eca059d668fa9c86ecf143
SHA512b0e5c2a700875d621dd7a9296d6b5040d14c4b8fa767982eab80462030ad40785691525d52fa1434235311ee88f21b9e4d9fa0d11b9853eac5684632345a292d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ade7ea2adedc5c086ffc3ed5bef26fd6
SHA1ccf988fb466bf00d42a694ea88d5b7f6717f2887
SHA256d3a449e0ac50ec8b4e93d1cc86a6b003d78c19b1e6fe7fb2551701a46328c9b1
SHA5123f375bfc8f37f49806f284056532da4af58c89adffbbaf0ccada0289ad090692eebcb786089ea075db870930c0ec0e8feeabb67143f2a26b335c278671e6ef0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ec7e1c3c022283ec976bfb0423052b3
SHA126f2658e2f999808c7e66c3d5818a9310843495c
SHA2563559bdc38be38f05602077136f9c17de1699632832a14ff6304db1cf495a9956
SHA5123511e58e1af91697603fb91d434f4a0a8d82ddf2151a8587358916ca5edd27dc30ff8045ed95f4d084ac32128dce0d7639ac594bee12ec42d2c33e5baf5d0436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5841b5fda6d2105e6958451af0f9a3290
SHA10913d4271b07e19913229f5207b74fccf84aca61
SHA256a7d64a06a9219d6028706c7c1ddfdc967c6647696234888e36a0ea4de4a8e836
SHA5126c0387e4f5868aade8f31ce5c81a83ef99d3cba36c4b79add184021b87c9f5d80be88991b0b8d97bba1e5be45cd501d2ba59dc8e17dbb57cf9f3de02202e6f2c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b