Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 21:58
Static task
static1
Behavioral task
behavioral1
Sample
dd1fafc783cd81933d5182ccc5d2d0a1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dd1fafc783cd81933d5182ccc5d2d0a1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd1fafc783cd81933d5182ccc5d2d0a1_JaffaCakes118.html
-
Size
67KB
-
MD5
dd1fafc783cd81933d5182ccc5d2d0a1
-
SHA1
abf773ce067099c0b78a638609da1fd761cf8be1
-
SHA256
683c978333f530af4fc243169ca5cd60a0f36ca2224b2e985ee6412f50543602
-
SHA512
f5faa0fe2f9c30e4e4e7e46471ba4f577cb87db6be475fe9d0cd2519341f949001966835a1287d0bac3e30a765be4587ec1a647b8798ea2f41ad70fc2e227ecb
-
SSDEEP
768:JiPgcMiR3sI2PDDnX0g6smlSoTyS1wCZkofyMdtbBnfBgN8/lboi2hcpQFVG8s/k:JVoTzNeD0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000074371b5db7b53ac581bf4f4101c9cece63afca0c7a290c6bb48b104bfaeff8a6000000000e80000000020000200000009384c6575ce4e60e1f5c41c91d4990a8618eafdccdc39fc7a0d70ed3e9cb570320000000d6c826e6349a3b71eddfa57b62259c0b8c629a48b6700d6751ce60af7dd9c16e400000003d6a018c24b9d78c17121c3e6ff3f0e7327121aefb204026b91ba40d13176ba94005253cef313054bcbd435186c753ffbba36064deb2b097b1fa99b2965836c0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c29ced5e05db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432340155" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{174FC741-7152-11EF-9CED-F296DB73ED53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1580 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1580 iexplore.exe 1580 iexplore.exe 376 IEXPLORE.EXE 376 IEXPLORE.EXE 376 IEXPLORE.EXE 376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1580 wrote to memory of 376 1580 iexplore.exe 30 PID 1580 wrote to memory of 376 1580 iexplore.exe 30 PID 1580 wrote to memory of 376 1580 iexplore.exe 30 PID 1580 wrote to memory of 376 1580 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd1fafc783cd81933d5182ccc5d2d0a1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1580 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59188d446fff9e5d6c70bfcff7b5076b5
SHA156cbf7ab050064cead0b0dda319b219c1c74f646
SHA256f4c0247746c296519acfcea5bb0f974c9c0b6db8260afdaa03d1423a1e398055
SHA512241b180c93a6203e21baff59499675fdabb7f8515ef86c1426b2a884ebfcb46a86dfcc2a7015603fa97c9ec911b4cb933270b9e0e1bf6172a9913ca99535fe82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6ce157df46c1bc02c5c400ee76fbe8c
SHA12473b4f6e24d62134e07217ae03b6e78e694083a
SHA256b67a277d5cd8eacef8d26c5e1563d96943f9d6972b732e2769f21b5c98b1ad51
SHA512daec82e39a8d3d06eeeb02ef2c3edb16d5330a85601c7616942a04adbdf0e88bdfee0225f9cf370c735ba899f67ae92f06c7b55c4b2765834e6372029176c76e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ade27bf3334b87aa6b50f50c9b33203
SHA1decb1d377d77964a08bf3b4faa953ffebbde86f0
SHA25662a3d15363a25e7c5fefbadf63a6787fe344faa66653c1e61b341049856c4687
SHA5129ad4dc682378282a87ef7efbf2f31a502a88d51f49c0e4c8f6857d2453ab877f281c866f1b2446a480295b5c2ab661462a26aa0896687d2a97fe2b2df9707b29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5043217dc5cdd5ee5a1a9612fdc2a428c
SHA19e1f46672261ea669ba7467c4936c31d467b3c5f
SHA2568f3c098c88dcb7feb2703cd27bc7fc39dc8e4ff3c4f292e2297dfce7ec4b3e6f
SHA512b6ab65009fccbe7e4723eadc92811e1d26fe5e665f2070d0f0f351ce1566963149185d5d7af13b675894f3324053cc4c83f4bf4ccb2060b85681b0ab0fdff990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545f663102a956b1ba9e02f128e5a58a1
SHA1f085c7e1f3e6034af349e0ee4d559d84f9b86d8a
SHA25664f73a1ea02be6fc7ee0da216b6af44e31beac46f74f63e34f0ff6adf9d05718
SHA51249d64a2b1e65c1302b698b51f2f60b23ddb7c1cf3816bcaad71a92dddb960bc3353255ef1d69aa25b9da3cc1b3ed525db6f537934363930e221d9e9c0944e278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbc3887e41bbc999224398d71d50c7d2
SHA16a09347125df03ab310acb41b041de3c1d987f65
SHA2568df6e0349c8a481a4477df5c7f63aa3feb10a6c361371ce9b30ff1dee6066dfb
SHA512fd442f22d57dd9514a530be639648af9a3d2d1b93f1dfcd7a7187e895b004cac00192160f9dfc2e63c41bc9a79651249f9e3527330dfbc5170c27d26d5e2671d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57830deafa7f7147016e804dd572add1b
SHA1274564a818d81526549d061254f1515815c34745
SHA256ba71f981e2b76fe1f92502f1c0d44ad5639fa5144a952e46a8f3d1bf83f1de4e
SHA51266b95c2de9139e7c8644dd47a8c4cfa5cacd69bd86209a8cfdb28fa76dc730848b058427b1c44e1ce1395c2b6b6265e3ac2ea9342e5c6b0f62b375dacebe85a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574135acbc665ff6529b694378c65da21
SHA1e74b817c23aec6eb039ec245ce5801cc2851ef65
SHA256ee12cbd2fee469d509fbaa46ba4d054322ca262952011baaa59ea990c583f56f
SHA512cc2e6944d0ee84faf4c52cca20b80bbd247f3c0af7cdde62bbfee1b03b11fb3ee587fa5605145cc9896916293ee2d5d5ccf704b9feb7c3188736dc40eb52b5c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547977f05a144af5c91861948023e17fc
SHA1683b597ea93dd32318c1f5cbc22db83e2a509fdb
SHA2563167cf15586b6fe4baccfb4b40330c541356cd3e57a16e31ff2d24c8d64807c1
SHA512efbc9f3716dc472273c39d22ba00308a5dcf7f291986914199b14eb19ae3e579e8cddf09596763a511974c8aa1b0e70fa79ae75c26ecef9eded3744d72c561df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e847231482829829f5d502725a314fe2
SHA1a10129dddefc39556fb09fae90781d20dfd3d36b
SHA256adbaa641856fa2b186bdd1fba746af33dd99afa6feda21cfc295bf301dede2bf
SHA5126bfb05263e3840b7afaacf17d586cfc89e3f10dcc4a580ee68f1281db16847959c94a00acb45262d24e93dbfc0b84c0adb740706c847fefe8e8bb05ddb973fdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b91f092abf59854cf920d3cb5449a2ab
SHA1cec0c961cf56f60006e2838d76f99f2877d3615f
SHA256317668059dfac5dc4767994fe96b33ead1f0fead4ada8ca6ef44531808fab484
SHA512504a2dd3bc42d29dc159fc24ad25390dcec5318daef2b9c1cddf48601011ee4c69bf5fa686ad6d3a48e206de89c54a13a431fdd0f5d4933997c8c219d1f3ec05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59123ccef4c88a2397a9c947bec161a05
SHA1af369d2da48133684a2437c5bc98cf0190e29ba9
SHA256f0fddd6e722c63ca833c892afd97713551bff6c3a0d599b71d67f9b2d49f3ef2
SHA512ed57365bac90ccb4825b3f2f678b552aaf1bf46ebc22eeb2a89c2f4ed4e71cf990a42c21316f2cf4f7185ffe63d361593d38a811170c0fc6dedb815142e93f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf9017628daced0a002f9d59e3f6a469
SHA139d20516a7560d25b5d96224c95d5a5565b6deff
SHA2567070ddde7f353a2abe95e78616639ee58c9f0748f8f0f171fbbfdc475db1b8e8
SHA5128a7f538fe0801bd3355a4c477e20fc7e08d09c649514d5862f6adaf57e03ddabe3905fe04cb9f190fa6c1723b5b02f259bc83affdfa8b0790ca77a7a29ab57f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb7cf910502ca535743c2deeff6eb12c
SHA1caf4b5fe43b3793ec127ca33490043495bc12fcf
SHA25688cc4e5de0587c702211f300c7ea55496324f5c6bfc31ca9f8338f1e128d590a
SHA512ca519cad6d80e7dd2fcea14360fd54d5d1e6f0d0af5c2cfeb915af548ba450fc3e9fcb7e58ecb0cf73a52b2f1842755d722b099805e72824dbd109468216743e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f69a4bf2bcd6b1a11f26f0453d5639b
SHA105835937805a66bdcd12d1bece0e48767686252b
SHA2563eacd2ea697fae53a3d5387f4fbb5e44e29451c0aae4c6ee7fe6cac4768367a4
SHA5128e3dfa89ed2a9ce41afb9ca994fbeac0f24eaefe8d20f90adb93e45f836624c02d34285068b2ed27fa35b950f872ee38a30d6f999abf58937dc5b233a9d33c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c6e120366a4ca36d32a675610ea1cc4
SHA17c88c6076330f1d23210063ceb3e21e1fa7cab93
SHA256d7c30f459ff1c855f15e33bff69c0f5e8b862629706731699a32710726e649e8
SHA512e9231512e528bebe42a8219cf4b8261aaff5a5f38d40e6d30981fac11fca7b9a20d41a451993a57c0b91ccd588efc4f7b44002e5b3feb41d8b61687966f648f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5497dd8cdcb9732e0fea3906bc76307a4
SHA18d0efe2c5ebc826e93a381363b235f2273ea4a5f
SHA256753e9625db5e7aa2f84131d62deff24db796d5bfebd81db85c67cc47ebd11874
SHA5126eedc8ad003a860879bf9d981dd302f1efa9f17128cce4889623f181971bfc8c152e4aeaa98f0909a30c20edf39f84dc779d2273d6a2cd0f324c79b22107dffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8a74df5d3f9d9d6b1798f6472a46121
SHA1b22215c1e203a1eec89b47bb117f5eb1eb70ba33
SHA256ac1b04b09bfbeecf2c8cf65aa9b7a1382667ae423a4d68c9861182d82c9c7839
SHA512b2a096f6d8d459fff835666add292e760ba0940008ae6b64cfd7f94a1fecbcefbdeb6ee26b2196f7e13cfa1c798f8683c1b88981df1fec7dec73899bd66e8350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1aa4688377759ffba9439acbe26eee6
SHA1e639d37a538daf7db59953f46dc0504c9f1a8b42
SHA256a397d9a2562ab1155a673b1fb243f081f2f466bb0afad0c00028528a5e394274
SHA512706fe35a56c261523b98e36fea7f0bd6610841a73197040e03a5d66ccc32232445eab60f10ebf1ada02f88c34eeb15fcf5141b69300b613fa34ba54b6cf2df63
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b