Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 10:24
Static task
static1
Behavioral task
behavioral1
Sample
dc32f94a2a2d17b7029b3447e6852098_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc32f94a2a2d17b7029b3447e6852098_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc32f94a2a2d17b7029b3447e6852098_JaffaCakes118.html
-
Size
73KB
-
MD5
dc32f94a2a2d17b7029b3447e6852098
-
SHA1
7f0d1ec4fb0d56399480c75324c889e0b770674f
-
SHA256
76154ff9b51aeb908d68b84b51ee5768181f72baae144ccdc40f9cda73f7223f
-
SHA512
6d6b6a218ac6202087518e545405e9d8a1622110c14e62c141ca06f61eab6e74860d46b7fcb1a2ab4f2e43d7e36494c31ded91b29878bd3833ee04a3e59aa89c
-
SSDEEP
768:JiIESgcMiR3sI2PDDnX0g6sq660717HoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpq:J0157ITzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10e3b003fe04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2D655E71-70F1-11EF-91D0-C60424AAF5E1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432298530" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000009ef3ad84fdf54944f0d3e86f6143efe6d6523e4776fd15322f4aadcdec64d4ad000000000e800000000200002000000047d9099f423b22a170ed590c362adb317273865d54d8f6670883e421452fe52a20000000218bf88e38376fc9b3e6f87abf6a5b9791fa85f19274f78e093bc12f407b539040000000ea2d6f33e009008507318745e743482f45ff23ebe226acc3b46e3ca6ed69aacf5e2d8fa2d9783b638c8f65fc345a5527e150d90af8ca8bd93919e07abde1b443 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1636 iexplore.exe 1636 iexplore.exe 1880 IEXPLORE.EXE 1880 IEXPLORE.EXE 1880 IEXPLORE.EXE 1880 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1880 1636 iexplore.exe 28 PID 1636 wrote to memory of 1880 1636 iexplore.exe 28 PID 1636 wrote to memory of 1880 1636 iexplore.exe 28 PID 1636 wrote to memory of 1880 1636 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc32f94a2a2d17b7029b3447e6852098_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1636 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511b9af6d6820cd5d49a79f0f2e4f1f7f
SHA1557f74ed6627e1a733cc3a2ea390dfcef411c056
SHA2564a53b9ce8a2f78fff3d96975c1b4e099da72fc206758e545c92ae5d0d7175f35
SHA512fae1db5b522d4ccd7c5d559be97a149a9c60d6922fac1081f1fa7ca755a844917f7180461db19476a4350548404af7bf655434c6662e2b612fb87ccd559fd24b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5409a44959e53a34404369a4a138c7ac7
SHA107f6b8c6dcc32850ee7356e17c176d0244f7484d
SHA25622c080ba6e5f04f31420ad81775d55dc41153771528f3f5a95a62c021ad4058b
SHA5125cd7ed29734fd60ca14bf8d852743612593d2cf2e45e34b7788f403e523c701d928f18720d7b6a9a5dcf7b8022ddc6ea67d929eee4ad3ebe84c51238adc8ae2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530daa0de24d7f7f02699d6d8eb99e664
SHA10890469c258861d93813e579143d898edf8978b2
SHA2565a6bd01dabe58259be8f45407668007fee11851df28fc2edc597c1feea0b4873
SHA5127d5a52c7f74c0b9a7c8f238f49c54abaa171d48d40112d1277e58fd675d11bb380d0d445c2ffcdbbf5ed12020e6406490896b2b02647038218a69a7a4c6a31ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5467e5b76354479ee236091d5abe1f021
SHA158b6efccf5159d8ed9d588220cc1356ca43130c6
SHA25680ca44a04f2b8190d3fb2f7a696f2a586dbb9c18fbab03866c1e1f10c22d7671
SHA5122fc326860dd388acecdff51b44b4c641e6417a7c43618f1974a5f6dd787b203400ae04d4255e69dff3d2eb17be04eaacf308041af0afd84775d8dc3c7e105a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5647cf109dfeaea4c7d15ecc45c855503
SHA1a3b13f5535209730b2ce081c8ef72cb009bb60be
SHA2560863f07999327196827935a118219c66c3904ee66ec6c71f0ad0e0bc7b2dcc81
SHA512b0005696e99fa9074891cf6af023640ef5128f4b54fbf5a499a59942a6dda5caf459ba8290af1a23e49870f881ce0b0969920f05178e2c7b3f57f79fa340013a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5375e30d9939c5364970b0684d3358958
SHA19c04722e5fe394424f3e8e73f0a81f42464ab89e
SHA256336a53e375a89756f66e7eaf02d54bbd39b0a80c768d55a448efea6207797d66
SHA512426b4ab744fd290a0ba45482023b7a0ff379ae8e1f725c2bb437ce1121a1b9ec377895a92c7b58116a8b4517c9aa047bb44570df41abaab4703cd0c4d5e879d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596d147cd0797a649bec545ef4a6f0393
SHA120b2f9c7d849789f5bcaa869313c375edc4df8c1
SHA2569c17d1f33f2ca27aca41c4c3fcfa8150e0df94617604a4b879b4d2351f28df15
SHA512f8671d8f6ae477ac1219ac830732feb0a27a34bb892fb43a9321ecaa24606e602da20afb0b45a67cbcd659ee9bbd91514612080ae2d6f9202ede42c4fbfdca5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58580e29ceb8404d8c1b34f951283a5a4
SHA127175981b0b8adbcf3d64308a194f63a664e45a9
SHA25613f853711e11b507f12c7b2605f991ce211ca9d238838f0e8f6f3abdfd99d004
SHA512753a82c6e85fd56a9df3dcf18b1012bc9b3d8af2a27f966e04b0419b96d414f64117702467bc983ff7c68b374a7145ed58d3475c53eecd9477e4d8a3e19f1755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e71cf020c882aa5cb0887926e7ba00ed
SHA19baf2f7014fda0f01aade313996f172ba2fc6e09
SHA2566d7cd6b817ee8fd54eb72d6fb06776cb00cb34ab289666807cba0395fdd5d8f2
SHA5128282d2b1043cd5832e8a69c61ef426d08ea1d51f90b1536d0c2f65a36daf3a2213d95c270e7b13ece0165266ed1df296842bc2ea4d7ebed6d8ff3af10873b3f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5127cf8b7582a9e10d7f96c63f533b1d2
SHA1d7d9f7cfdfcaf7ac5bfa282aa64327b101a21023
SHA256868ad905387ec80220bbe492ed67a26dfe9d4c1178467fb40410677028293234
SHA5128be2fca570b8c17412dcfbd50ba27d7f29529c756e9ada5d49a223b3d977843ed3effc543e63daa3c0216686a23a55fd089e87beaaabfa664bc62d51af470f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c3809eedac3ec1a2c47674a9fd7d7b3
SHA1cbd187bc70647bafc7c6145f8f362983dc6735c7
SHA256089ae83290b960d0be0d0ae0efa378017e679c5235deb3af636f9f9a89064b44
SHA5128c758472bc193f09ed4cb7bf9f608aeda4b3db9710a9a176c8fac8a5f93ee3723d6108f94d3396fc61e83f90359e2f5d0ed024831826f6e78d2c91305d48f179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4a65a9e984373335aba04fda1ba30fa
SHA17ea99e135ee66510904e7f7033b5aa4eff7719bc
SHA256446351606b417c2abb9c7eaecd67a1d19e626f560fdaf24c4e4fd7f25748ca10
SHA512ad437a993fd7018c4ab89ac94aafbf3ad8efdbc634a602f3e1fbe1088b2badb3ede98e2288d6694a16839e2470841ec8109786fcaf517517dab947b9054f1080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5112157a62ee100cdf58215b03778835a
SHA1737dfc823969c17e240b3bf0ba86c40155ee6baa
SHA25649bd11569b6c7d7d5e2b61f42cea8e24d40efa86391123950edd2bc77c4a093d
SHA512b8499e5ce46d055384103321a75b95dc1e9555525659c1c1f5bb751c9f9d6f2cb4a1725762ddccd81d31ee2cd869d087123415ed039d937eed0aee98186381f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee38c55a79628ef47a84dd0b80fdae70
SHA186ad8ef55b75a2ddaea955e7af9f28f9c2603542
SHA25675b8838cffbd9ecfaaf8e19e228cc8a8159837e84ef2cf9e48fccfde1c6ab61e
SHA51206f98cb170fa293ebfcce3727457e69bb7c971a0b2954b0ba6b4b43551f169ea147ade8a552d42b680d3d1f7a994f0c82c180786e20e1926303b2229b1ebe127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5615bb86119ddb88bcc68244fe369d2b9
SHA12c7704a2bffc3a6adf4da9ceff5c67c16726c634
SHA256e10765936c30b209b64c6933f7b49729e336620b590c5767697df12afcbff2ab
SHA5120f6e18e62542de17d57484f3ef9f77eb52eeffae67cbc66035a5907fdbdebf0cdb1826d23dc7de36bced8781c70696c6a909647bef48696253ba1fcd42b1d59d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ba5e275f1eb1ea46fcf9198e14e2051
SHA1ca9f6c4451c5f45351e2343dd66fc9eb19431a84
SHA256c1fd427cbeb047da9f663ee640bd1281c82ddfc75a7637ce752159e41bde5dfa
SHA5124cdefe21d6a57199b542ecfc29070b55763861492fe83661ea0f293eb6a47c5f6f7fa73dda88a7d756516c976362efe1b3efcfeb752e466fec4241c80e6caf67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5107a80e379fbebfd1ec6a46c4c423c51
SHA1a09a4a79b20d51086aa0a5ad72a279ea72324624
SHA256e2f36e793f226b1e8a347cc17963d3014e5672b3d16a23b3b03aec7866037c4a
SHA5128729f7bbe78616152acbbb370659648f12a5e2da9dface08b5f824fc6d366ba71a55176e33ba167775127c68af627591af8802ba7138ccc9a4b255fbd3034c6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554aeb79184969142e443e603ec4a6b03
SHA1f3766b3ad8fe03e5392b4aad5e4f269901bee15a
SHA25615d40e09294773ab955e4e52fa3a028ead95527a8c88af0b97b09f35f4742ee7
SHA512a7900213d6a4451242032853b3874338be9de9a680566d2b04b8e51aa519ac065814a263f7447eb1da8920221299ee57114251589aa7e71eb825a2f494ed1adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5843e67ee9d118f6e0c56f060d3a57835
SHA1304c93a11e01402ce8c99fcdffdca75faa36c4de
SHA256ad01e45bab05facf0903e9bf05b26187647c6ff711959caad18120104ab93c59
SHA512f143db21ec65ac3128fb13f4983275303feac987fc445fc77a0d726f528a91a5a38321e90fd5b0df98413209940b09420a7e136d51f257a5e11b0b83a822ca40
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b