Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 07:19
Static task
static1
Behavioral task
behavioral1
Sample
dc0ea153c5f570617993378b4ba19dcb_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dc0ea153c5f570617993378b4ba19dcb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc0ea153c5f570617993378b4ba19dcb_JaffaCakes118.html
-
Size
888B
-
MD5
dc0ea153c5f570617993378b4ba19dcb
-
SHA1
e6db4af5aa1008160ca4679c4ea171ba8706fff3
-
SHA256
1df3c951b402593cac5f819e2e2416dccc0950da496ac6c14b7b3fe2f50c055f
-
SHA512
5344c43ce3b057c68610e8cd7362d3fd079c6966744397b1f3fa9f56cfe0bea7ce401af556599d15eb4df3e8d84a1443af7a83f500da3b2c776b2d8da34012dc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6073f737e404db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000018823c0cce8872a3e7617a75e020d8dacfc8c31d322406b79f7502e2c2e73f69000000000e8000000002000020000000fca374b186d6131797e8479312c8142e7bdd3a2a839cd67229389d529fb53f1d200000009a09567cc82d06e92ead6e2f93c0c7d0deeab4e43c701fb1401d20645fec9102400000007de9ea2f8be4bb6a9778abe290260ad92820fbb3ae20e48586d9786fe1470f7f553bec8435f539e9dbf4929412155368d391db624ef37467a71a5904d3417d9f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432287453" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{63918F11-70D7-11EF-8BEB-4E219E925542} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2084 2252 iexplore.exe 30 PID 2252 wrote to memory of 2084 2252 iexplore.exe 30 PID 2252 wrote to memory of 2084 2252 iexplore.exe 30 PID 2252 wrote to memory of 2084 2252 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc0ea153c5f570617993378b4ba19dcb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539183c39d083f85d320a25496f8556e9
SHA15d33f89303d9850aeb4054694a02056ac5840bd1
SHA256d279df4ef2bba42bef4c0bc2bb9222166ed72ddd6bab00dbf9bb3b0c36d18046
SHA51239873659f78afc7f7e7fe8eb43ef3bfb05ddd4b836425ee4424795ab7c3008b9bdc7de729d59a7471d1a59aa165e2a5067717e7c220a5814f55094d6433b1ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56780f4690631835f8d1859db192a2e6d
SHA1e0dd8156ea08534aa2ab6beaa761a01c3bbbda58
SHA2565b01ec775b6694189ac647cfb5be7685ca9a0449fbe874f3288643c06de72db7
SHA512d040b7824a8d0d077d147dbe7c4bfff6ca278d48cb28247fb4a67723ad3a09e106c10663914e9976795296741b79d4c880e699098d3a0ed97fbc792aea6f0580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3aa5741f55856786cc4bfd381c4e2a8
SHA19ce4200d5c6fad170faf34ed1e34ef2cc539fc89
SHA256b2d09dc9be37179bb942d70fd3eaecc09990f0d0984cef8fcb4cbf5665665f2a
SHA51272f560438522b6eb7787b33f893bb0224539b0b22fa0efd22f31bc434bfe6b96f64f3b4836dbff8799ab700db531e3b16fbfb9ba58eafdbdf169ce3b5fc86556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2b78425f2783086695553413e9add06
SHA131ae814a4f6466408d9ca87009778a5f6880f1e4
SHA25605581061fca61b79976f74649632e6a86c315ea77cb3e4b890f7fe39f3ac659b
SHA5124d755e9bced9ebb1e1be6ff977e18614725a79b469ddec8d9373bffd9631855ad1e78c8368a10073c322e45fd9a6765acfa65cf092408786b56a5e26bdb7c0d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507a11b6a5d3c995b7a5d4d7898c2864b
SHA1ed4b80e75697972750b48c2fd27de3f4feef9230
SHA256509ad19db0b57ec7d21a01e206b1d1210fb7c309b044e7414aa3c52f99f7641c
SHA51229b9b4359935d47980e947b6051154a0388fb2592d2c6c55abbc9997068d68ac84ee2075c0943fb76f1456c0d85ca2f5f2745616debc9e4b767e9ef86a775f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53438897ca6228d9919ac089d193a4c2b
SHA1ce4adc585f163a1760b26eefde8ad02afe032da0
SHA2560cdc572d7d640d04beef2c30d7bfd4403a2eb9a3bacc7857c64221af372d76eb
SHA512b0b3e1b34916b14f3eb087ba395bdbc022f6c2ed34362d8009a1196a820155b0c29a7b2a34a28280e557ecf5764baf1acc6a1f6fd8161d4cba119073fc5de48c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3afa25d6455a1fa6ab8f8f1e8ea3a0b
SHA124bb24229db7fe7360931fc690b192e0cfaba06d
SHA25613208dee5401adfd4d7db32450387280cb349a3e76e57a578a51a32cd6d8befb
SHA5122cb5d64925de560fd7b73ef847c8d0d6adf220043858524102d7ca5156e62efbc548f6a6bf25d42b27bbd8397ea798810ab11b6e6dfa9d9b9bbcd026d5028647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2a678be2e61860d6a3aeaa13e54aa04
SHA1d9f28014cd99aa99c7933f1524c096a80b328e89
SHA25626de56a6272cc19f849fa6d7e56863237fb53e4fe589485d3c02266945d3b583
SHA51296de81275c5b1798946fe62f9573914b33cba64d91c3d97d255acced196da1230e3760b2b4eff98861ab093819d78f8ef58156e6f08b12b42ecb88bff0007cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca69c8189deb174dfc42644047935a21
SHA1a2f815c9bcad69b390534ef44e38ec8ba3a18f59
SHA256e09d8dc401c4609f1517ba438e4797726d01ed658ab3c94a45d04eac34b7fa61
SHA51214ec97ad9ad7ea9c5fe40cb3b7e57ade0706dfd02917b1e0e67ac0c43cd2d65fc71154d182c33e347a1d571ee304c747d0272677803aed5858be1090be48a302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520e825db4e7300da4e3283c2e9139dee
SHA117860e15fbf1004c770ffca0442bfc719aaeee32
SHA256eefe57a13c70312347d8016b5b43c1c6f2e156acef5403e78bf7dd42d3ed4203
SHA512f304a30066442acbc035da417bc2941f0975e837d7e1158f81529eca0119b8e371bc6854708acf9272387f9a01aff9fec05c3262e6f9916b427d590d87d34fe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac95139fc532bbd1c95040b45d6c8132
SHA150a979d313cf22987d7762bc5b55f2e7da29ce13
SHA256323ea70a416dfc779ba514a6040dc615eda668be07f429feb6a794ef3a0a46d1
SHA5128992c2150dfbfc061f1a6196e6d827f9461e8be27e95cc237a653a658d480a90a3c1ced460347ed0328a34ec2cae2f0ee71647973ffbbaf7e57697b35ced2422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd63dbad29899ceb642f22c5c75d264a
SHA15c00ae000a4e64d2224fea75487bda6baed46c9f
SHA256f4be55166c58f175c0e51327c20c626a15615eac589ccc24dd1a03f5754eb788
SHA51265c61740745d889f10bf71cf6550cd6fb577a3c34ee74dc48fcd1b5acf005214c417012cb046356dc0f7df314124a712c5aaa2fcc24f68cc179647b1e913ffc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cc5d7a8ad211ea8684fc7aa21285209
SHA1f3881e75c30e8570a9049b9e0f1511cd1441e8a2
SHA25608c8e17b8c1ac326cd108277a1df4b28a1d9cfc41556220a6d8880af05719c58
SHA512849c6533cbc6f30c0c9aef60e18289783bc22b59d2c553ec0b4edd20a86e6482f36176558c101d4bf1e4eb3e82b86e06f8418245082add133f6765b0ed9bdc07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a12a64971bae196b1c36447c80415319
SHA1a500e0e2f157c419b1e666e5e9eee26cea1121f3
SHA25665c75fe2080463fd9c146fbe59fbbeb9b530f13ad41db649af0fad7b8d166ab0
SHA51218950db46a997b49738df4c65814549eca3e7f1af4f07ce48ef227d4946ff892e9d539d19142eda78f389951984d62502b5cb5600b5f2440e1619cf2431461fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c38598dbf88debfffa26c9e21456bbd
SHA1b5499e275a7e16dd4b0ccf8fbfe98752e80840e2
SHA256121fae72cbe8d44e16f31920720af7c9b8d951c777eb989de9a4e552617257e7
SHA51250a3d3ef45982b1b1293ac381384ae78bd596d075acda92cfc3b5c9be70fd8b6b675c8db32a3ede71d15ffea457ecf3512bcce1c7dca3c76b72a4226db775fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be4bab08bf6ebf3eb235b0e86e91f08a
SHA1afe28b7d836fdc4e358b7603ea42cda03292990e
SHA25696ac619e3bb7e347ae8a41928fc4bc4710bc481ce7fe0449c6800a538f5eb2b3
SHA512643b28320c21d0c557efe3e1716f75734b9efede1067bcf3bf5e5678ed7a523487eed48ff71dda486b2b64545a2fdb8e1288883a39ea92b97b49a340bcc69762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc34a864eda147a915188f0dd63850c6
SHA1c85a922d18e2de065424b76f77ea4e137ac5f631
SHA2564076d7408d6b805e3c6190ec143a1dae92e07015622c1722e94a0a61faf6b386
SHA5124c042f576cbabffa9f5a4c95b7c7ca149a4fbce20b5c5877559b3cb092dc62e56747a4324e77b97920b7ff8213ab31e9793b8c47c9de6e4df90f515bb071aa95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd657a35aab7bc3344a1672660a8644d
SHA1c82dd1e9994c48e3ea1bf5af56a79692d4816151
SHA25653db52b871cbaed7eda9c248a2e2698234f5134bc92d5d83c1a3ef22297f0366
SHA512ab5df54752ba69a004621fa611e3e80b52d7fd2275256cf0a6bc466d6eb464c38a44f6483a3939e98614b278a8cb0f7e2e26d6939abc05a5c0ffa358b0586aee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8d11841716767267aef35a0d1db5411
SHA16d1c4ae26d29721b697df692e54bff0176fccbd5
SHA256d45ecabd6baf533bd7858cc75a2b0e1b6d029a717e899d77e670097769491ca2
SHA5123987a33559c81a56cd7e3d358a43dc518651091d62c3b38614527eb69ba814533b9d5ea0529e0aa132a77e18e625dc3076083998ce2a50e21ce6e67f625a00b1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b