Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 00:17
Static task
static1
Behavioral task
behavioral1
Sample
db7aa0b06b7ab47e859faef68c46d385_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db7aa0b06b7ab47e859faef68c46d385_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db7aa0b06b7ab47e859faef68c46d385_JaffaCakes118.html
-
Size
480KB
-
MD5
db7aa0b06b7ab47e859faef68c46d385
-
SHA1
f5d3391c5830b23977e067779b61771be2031d25
-
SHA256
f8ce0c3cafde7df5b0e423279ddd705034a9383027018c82fcb079b22395a338
-
SHA512
13be0f933958cb4e8705fdb6e0460076c85f13d8cc1e3e9c1ed7aeca8821e10f859cb4e6331ef0785450823f16b1160e6cf4f20e1d4699cb37706854dea7fb09
-
SSDEEP
3072:+0eMITHdyJ9aVhYFcaxruM5m5+0535fLLigsnH5Jm6Sn6b:MAWhYFPp5m5n535DLige
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432262112" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000e126fa2e51dfba908c6dcf2e3382e39a0bb78058609d54dc3a86d13863c7cf62000000000e8000000002000020000000c50827270efb6e83742321e3ba56bdb0867d3e953ecaec111c17cce17acc0d0120000000cc63a187743826707045f8ebfc2f63d3eb12e78e3cba8b8f8990f6b6ffaf22474000000024c5d90caf955bde9314d041610cdd7c76afd49ee111c985f5025e24973952d9b2207fcdfbf8b95d2517508c4a358f852a7ddbe8afa24711ac4e51667ba57895 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{632AC091-709C-11EF-B439-523A95B0E536} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0c35039a904db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1076 iexplore.exe 1076 iexplore.exe 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1076 wrote to memory of 1624 1076 iexplore.exe 30 PID 1076 wrote to memory of 1624 1076 iexplore.exe 30 PID 1076 wrote to memory of 1624 1076 iexplore.exe 30 PID 1076 wrote to memory of 1624 1076 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db7aa0b06b7ab47e859faef68c46d385_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1076 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568f4bdcbe3a3c3c1a848321c63b2dfeb
SHA16c6b0a0c3d054f964a4ad1aab53dea0c0962a6c2
SHA25694ac999255fd76c2ded9c3d4cf888a4574bdef9d461322db815baf9c7289b0e4
SHA5123c110e44521d254ba06ec531d818e06f2465a1abb62db0c7ea86e9840daaebc976ff75dd8186971dae7a68f1d24c9dff2c91d72a2a4277a9a0ca40b56d0d5f4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8d533e877624a7fe2b18c2efb3b5e9d
SHA1440d34f21d66caa4a1b7b5c9ecb228fa93040035
SHA256f7f8fb202ca1898173807205a64dad334f999edb8374f5da55b1de3bb575c7e7
SHA512ae360a267ab8843e7f26e30cfbcc7afd643338a94e1726e7e40058717afb2d059985ade2e93c46b0f125d9d56a5a854588462120e938ee801fb0ab966d626d42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5626cf7aed6d0201225c1f0401ab1cb42
SHA1e586fd5b21ab4fe05dd291195a2ec1e658e3f58e
SHA256abcefac5f6d290330264d067a138f7992c6813a42d5cd61903260a2574f1b207
SHA5122eb9e7c3f31f1e77978400c0d44361b740aefd9f6a566cbc5faf4ecfcbc776e4b90b39cb0f6a31605b1d1f4f44c44f75a0ddbc1d0b6042dad8fb2d62ad631aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ecbc8259a8a4ee058fd98214adf04b5
SHA1a9e79862fd94c0c98540b7943d6a4112042303f8
SHA2560b87e971cd093f1843ecc13b2421a4eda1ca51ddfa5ce36c11b8d06ea4f7ff65
SHA512d2a7c9fd1410e9f1a075b0a80681a76fccd08b49772de303f8a797b8103a3864e1905a29883c5dba47e158777fa9d8433faff32d27a930b4d1736b73fbaba85c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56de42fd163e97e88e8b064a023d3af40
SHA121ee3ca484a32b7d37c8d6e0285264acf8a48e94
SHA2568dbcb820139dac301165a16e978bc5003ef90836995fdca4442432ebc008bc01
SHA512c0cbe8618e3e26468a7164bc177f885c5c22a7be2e4e9bf1e855dffe1c2cb34a3942d8d388fb3e3a5cf06550baf192023a684faaf255e1c1f280f27ca5ab65fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531c80ed359703fb0d95bf1f5630586c1
SHA1dbbd0185327de89f79cbd6e8e51829aacec5719c
SHA2568eb670f4f24219032adc5fdbbeed22e1199bc392751d57807af4da35623a510e
SHA5121d7e5d8728fad8f0fd39ad84529c2120e57ed504f1986fde650cc92dc4cb980dd4ccc409ade56c45579976d29ea0c8279555474ea560e1f67a157b8577eabb59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527f3a5323b9b2306902ccc144740c3bb
SHA1b543fa67dee74d6714d531c79f685d89b357bfea
SHA256e0caa936af24c6e0eca7384e5bdd165e2bdcc31dc82a42773b26cc404a77e9e0
SHA512f89f2976687bf618d774af2fecaff78ee825193bdbc7304490eb24524119c9c9235d4b4bd75a0847d8312aae60a1d3f151339bde3854188bbe120a6ae8bbc4f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd46a59f5a9cb32fcdc4699d3c8921f3
SHA1017f1c02b93bbb0161234e99b8bd667c640e872a
SHA2568763c9a866c315b6d2a2b71671f2936f708030ee4b0a9a40cec211aa805057bd
SHA5127cd36303af6765c377d9cc939b042e6078869e2e320de5412a5757bc2a27eb26b1422cd04ee1297ba6c2011aaaff0094508f0a40b6f82974e62fae763d396f57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0c8124c52c4d56581a9bdfa088bf33e
SHA171749a81c868628fb5766b5384693c4c458ae4ad
SHA256e26298e94debf20336ea12df1f7ace1525bda9539eb8a40c7c5985cdb63cd726
SHA512ec60160df3b7a844414e286416158ccc99519c2e4a23f5dbcfcc0a457d6c113283aa1ffa662828103233f2d8601f398d878d52c8e3f4695b0b16833454eba82e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bdc982df4865ad93d6d38a0199a8404
SHA1688ca0266b5061d0a9f629a55ec542b054fbb9dd
SHA2565644ecc80c9103f90018ab0be079c5dbc9fefccc700243127a6bf034b00eb176
SHA512a8e15f35e602536511f2d850ee588d628de7c17fc52cbeb28dd406f42ef8f4ede549451386a10d8c8c7fea0a2825bd5bb0381cd32c184dbec6fec10453c40108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562fb3ebffc1799103a95981ed4e5489d
SHA17986f7f1fc52c250c867f76bab6b8f07a57d9489
SHA256f7c43ee2ffffc670624fa6877bd509b5f2ffba5264429f57cfa091771f0c8666
SHA512396b133cea91ccfb67e75e84f102a555e1fca06a78770f9bf18908088f745dbb6cdc7ef36f86d0857a916ad64da9a6fa50a06f3ef1523196fdcf9479673b9c99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd367cde6e8d78b476cd79c81c0c662b
SHA1de42e83583d7f60046a68e5797ed73a5ed32c309
SHA256bef732420ee9cd5f50b6b0417753908aec3e1947ea606ae4a00d8a1a030517a9
SHA512d317cd05795b20189ff5b5010604055880963eec94e5c4909f5a9d7b5e66586e5f574101886db22b11e9516182eb58e6d47959ef6473184336c82b065880b9a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eecfbdb8b718d11a7a74abe458568472
SHA18d0ad6c2c698d94d9c8f1a98f519da6216d70951
SHA2569e02714ba072e723c406f7ac56ef7c3d751474818be339cf43efd1c64fdd9c04
SHA512a401cbbc24244ef05bee3cd4dab06d9165c13add17a71053f0bd9cd2c9941fc3c99160a81dda7d7eb353201c024abcccd0c68d5410853eede9d50344a774d927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5780bc652ba0aeaa1952d8f263d6193df
SHA1285b4bf09306f5717318fc95dc678302c92c2812
SHA256957fd01216beb6399c3bad668df4386da953e9534217476c941f07db74916698
SHA512a5e8fd550ba2eaf0ad4b378e7fa0f1ca6e2776e6aa244fdc4a6b3e7f6c100ebc0b499edeb311ee1b3096adc059874def6ba0d09e670fa7ba5658a957de03856d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cec1e91ca5a3087242ffb93669ac55e1
SHA1fc21768131f2d35167a769a595ca2ee51a362bce
SHA256fd268e911e3a27eed842431247bad8cd73758b7c1391b98cd821e166ab0d9343
SHA51275618d9a62026b79205fc40592494a6b2e3a9938b639f05fe0c7f5fe34539147faba730c332dd97d3daee64431e243cac7cb0824881d8a828caa648760dc7b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d007fa26fe691c4d43f8c54efcb2d399
SHA13bf58a63b0518612561328caeb1a448fe714611e
SHA256e6cd7a5a6fdaf541920e85f2badd8b94118657a5e519d2e8d23ad54e0053dbb4
SHA512e7f9030021c456b502c51bf31358954f7ab7c67185305bad671e91e6240f19a2618ddf3b283a17146094525d60808c2db9c94e7e6da3bb11109df5b5e56eaddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57512924fe858d871c2cf554edab85fde
SHA15851706aae32d9989e925e8373357001b5c94e06
SHA2569d88885303089df2c174ea59a8504d3814f1ce8d3aef0951d56a216b897da88d
SHA512ddf89b0c96d8181c2c27ce538b310d3aa1c593ae58a570cce6e3ee1cdd5066a91e38e6a0090e0213e1aa9aa6a8d3c8008c77e5da2d356d1e1827db5cc7a8dfe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595116eb7aa230a9eaa737f473e587a8f
SHA168874d32fa5447dec6d5d9ff2e89d695764f932b
SHA256bb272567ad5df89e238a6c9272682a1baa7c0f563068b9fa4d42bee9b8c9c4f8
SHA5126b43b436baf18fb864adec2f94c47752cc44f0a0e35cc11719c64758f94b156f999aab6e84fe32e54e836ed4621d64d6ea18137ab220b2deb1a132ffcb741a26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55882deb55ee1927bd38b9afbde0c3765
SHA185d79f933981e0456d8f483162d88d3cc1ba4049
SHA2565686d48a67f961eff595b3fd820203c48b07ef8cdba889354fc4fe93035ee071
SHA512abcbb348fbbfc0ad9c4346ed5f1f327a93af27d7106df86acbfc86ce2083966268d39111f7df90f8af6897f11699b8db229b61ec1b0c972502740add4b34311e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b