Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 04:29
Static task
static1
Behavioral task
behavioral1
Sample
dbd042a07fdf691393178caef723ff92_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbd042a07fdf691393178caef723ff92_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbd042a07fdf691393178caef723ff92_JaffaCakes118.html
-
Size
53KB
-
MD5
dbd042a07fdf691393178caef723ff92
-
SHA1
8f7c4420c9c53c2bfae23601f76a2e6b274af5c9
-
SHA256
1b9f726f646f4ed7a88c0ce8656e212cebe8a9cd31cee8d6a0bbd857de8a80c2
-
SHA512
77446ee313450eaf66e6d669a788587f8b6adfe508f74ac79972b4a484e4dbc9d04d4bceb404e4c0743d63bfc16e6c325ac79a0086a5ed72731e9ef4284c4e41
-
SSDEEP
1536:CkgUiIakTqGivi+PyU7runlY863Nj+q5Vy0R0w2AzTICbbIoh/t9M/dNwIUTDmDt:CkgUiIakTqGivi+PyU7runlY863Nj+q4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432277269" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 905bf782cc04db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000004cc34e27bd60257ea6645c113b01bdfa8be481f173df8ce796cfb5b43b44425f000000000e80000000020000200000004d99b1bf1ee86401a0d7b5b42e7ae3f7ab169692df0e44d5a6f6abf42ce749422000000013dd98d098942c14b84f63300cbda24d4c379d3ec6e41bc0b900862915c334634000000087360dabea9df7d11d597fb55ba77fd4abd7a9c86a17e3d9168ece2a452f2bf75e2d751c8aa96eba7f08cdcf336f6058d7bd29cb2280130093e9c6573ad62434 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ACDA2281-70BF-11EF-9917-D686196AC2C0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2940 2400 iexplore.exe 30 PID 2400 wrote to memory of 2940 2400 iexplore.exe 30 PID 2400 wrote to memory of 2940 2400 iexplore.exe 30 PID 2400 wrote to memory of 2940 2400 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dbd042a07fdf691393178caef723ff92_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59857d7e7916a408c69d980ed1f7373e2
SHA1f09d5266ac26190ca3c6bdd38a68d762b291d770
SHA256b800bc7bd9f2294af0fe4149b14ca6cef32ecff7e58e9724c35d243b09f4541b
SHA512c928a8c11a0e0999a7305014fcb80a57bee3ebc663274e67c898e8b03081da2f4bb604997d78f15becb9cfeddea3c1f214080d350ab7c4513f23b2b1f28f45c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54994db8996302229f07fd0d18b626c75
SHA1701e9e403c41d6bec0540de0d5876baaf6d4d549
SHA2561fa670ef805ec28d8f64b1685ad69e63a92ec976a48ad7bd42f93000d4ae8861
SHA512c1d1a87044bf4c89e940f1228f3f4d3bd2ccc9138314f2bb2a4383eb948c94f4638a336adeacaf0792248a62221dd936cfa6b18d493365d3f28e4a0125faa8de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f79a8467f4769ba47d404ff3665ebdc
SHA103f11a3bc795c5b5a8466c46c2bf29df4261ebc2
SHA256333e20e95b1660d9e0bedb70e7de5298e0d1f3eb6e938ad27a84de29e9075ba7
SHA512a4fcfcf8d8c77bfd85fbfdf8658cbde7d8bb8fdb498a7d505a822418a6f7e2f02470522c4ff337584ea63ca4879823cfcd5067b9d0432ddcbe4f99d4ae60869b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f603dc23820d9978cf683877ccc930a
SHA196a50478640d233fc0cfc40368b4d7c1ae982031
SHA256b82457348827ac1e00572350b0c6bff0e5540ea151e23ab0d003b1b75efec0b7
SHA51285d1cbc32324bb8ce90b2bd34f8a04cd6a89959a607f8b580ff41a360e35c0a4497fd19eb0dae393feff1562944173080a4ada34a3a690c05354d3fddb15ae11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fe5e27d46403cb9e6d762f54b4318b6
SHA1c6c70b3cbab64fdf99dcd5c164d74f0a8688d98d
SHA25669d14b2c81e45a0da1ce54872779fc51795d08832bdfb9f06774bde480ad1247
SHA512c518c54bb6ca13e9bdb4ed07223ceb3bbf4ae5b17c6c6c914157611a636546523ab2939bc696852f90f955acb4e00a899caa304891941ecae294da580c69c24d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568149fbfccd03b897b83997013df167a
SHA14b1b7bd8ab90ddbb35a55e090b6572ad95aee42d
SHA2564c5b214640d1a84546d3fecb6943b44c4de5a05fa00bcd4cd6403b3cd3028c12
SHA512047576c22a6cc37f643b9091e12bb219a544bd34482db6390d97099d7e305b20668f22b5984559a17eebb1da7705937650cd8b2b0917224f5a7a9bd633ca55f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58858c6c854d721d445f8136ea7e6b143
SHA162ce11e5d0385c6cce64c001f1ebf700e4f5c892
SHA2569c1a52c8bdb5ef289c4e6dce9701f9e314c776cbef687e8df3bf353ba08d0d47
SHA51265a66e5ab7e9f1a9ad5306e049e41507283b3095f7817b49302cb04b7d184d2734349a69ac922eab085fd56eafb1a9591d131039b974b0de9ec61bbbf526716d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520665b53ec53ea2cdc5b9759ef66346d
SHA174c8fbb023dd3a72b8f9040ad5317e0ae8d8db8e
SHA2568b17d77cb11a6a65f72591106947fad2903c839d2c09f9b4dcba19da1d0477cc
SHA512dabe71f42886df57ab387b246bc14f0ae071219e2a27697e386ae223c2bec7f2c6a253f4aef3de0ab3bf8bd6942abca8e4d48afe6640f36e0f7b5fb2611b0c71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c667cd5e94502512be2e9ec107581bc
SHA1043e93447ca31a547954e758dbd6e9cea067f44b
SHA2564e700f4ffe32ed54035d0ff091326476c063f7934d1cbdcc645e1d1b2335abc6
SHA5125f4ce6554f0d429c1576cf1fd5ffd1335992b4c34486d721f505e82c141407e3115afbee5a89d2b5bc7b0d018addfa90bddc0ea8663351be0defc15a29f85371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530faa7525ec7d278aa0974b196bab980
SHA1bace75fcc65838467784a52b71611e908888afa8
SHA256a5efb1af87e84b09728fdac9c8e5c298e8d2ad9e434e568d2f11732c6f72120f
SHA5123c6f734ec8cf14a01c13deae6c8638c59ebdf826310e0be56d5578340e52cf56ab8732d6891174dc1cc7f82fb82a5f916eaaf87c9b3f023366c4ab1c12a87aa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522af4410172236ea9441210890eb2c6a
SHA1285475ac05e97954dfbbcfa0f1f75dd841949efd
SHA256cda3a70e3733bed8f8c4b7a8d38e519cbcbb7646ce648288de74ddf346c299b2
SHA512df3f1b14827087c862e2a4f49a369867497f125806a511d08f264cdc0bf95ff3f10a0fce912e6afb342962c1dd09ed76c80bf325f6802cf27976273c9fa64e3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51511593b4d70e94132218ce2c1e848cf
SHA165d8770d023f2fc970e8f72c385b5307c3f9ba0a
SHA256843a16f9e5c0930e8e927748494525b637b7e5777cc27aefd92e83b4c97222d8
SHA51240dc61615de487b8c0703ad33ee5f5a384e7827c3125a0418df10645cd8efcc032f9525157b133a14972ed5a6a37bd213f49ef6f1741f8944e32bca6c05a566a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffde1f88068d194b0db368f789b86158
SHA1a69d81062e3d6c49e304aba3a43008fd82497118
SHA256cc7769473226b5bc8413cf0e5372abea0742724b1294e738dbfd5a0b76a9150a
SHA512c18d9e7cc4a64f4790ca95bb70a438aa3d3c943e5602658f7cc2b1f17387a2717743fb515a8d5094791fc1f211378b6d06a0f4e6b6ef9fb6d50b1cff60345a9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b159f2942eae312589f855bc634f48ef
SHA1bd2a68a03b16dd04b9cde8c0370ced2a3880850b
SHA2563c92a98648c97577f6d8846ab06f636bbd425f8e8796b8e3a3f8805120175a0c
SHA51260470bb2170bd63ad8af08e9d73da5671ebcac53003f4f877927beb8ab1b4dcc81111d270e3289bd33c92c381690cd22e5e31a7fd13afc889d5d352126332cf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc087b3f8b948fadcf9f0f7519dd5566
SHA191a75e3a6f19944981d9459131069e029a64469b
SHA2562e8f40b83058e1b93a3abb4c940c2b2996a39558d377518fba900a6356bc7e2a
SHA512f7f54983d70f0c7bb7db96729f3d641162e5777a6e253bfc76f4c94942ea26acf4ae45a47a65f7d6fb4859e9e00de5bcf76d5623e6c1f655857b604bf93d3e3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df0e05af2652463f658dcc85b9caa206
SHA1926764184ad0802d8029e7158c47f5181b72de7c
SHA25675c2af857c332d90cbb4e8cd0e652fdf7cfa220965ca868c85ab98545900926e
SHA5126c9626f8d2805d3192260cfa8c295acb35118a755aea0aa46289ca871f300ff0f4161bfd9fba7e7cb5d37f7f499bbd3a33addfee92195178e65c466d205fe3ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53231558dc454e095cf0250b510b99da0
SHA19a96002a76e025d4dc483cef8ed674cefe81db6e
SHA25689219c0b5b216fb4ac2a704b4346a92f490bf42ec4561c8251e1b19f12afd6bc
SHA512ccf02d9fc5439744aff5d37764f903296e07c7aad163f5492347ae6f568a77214ee1b932f3c3e28e9ddb741b751dde887df216f955be7a6f5ebfcda59e49cdfa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b