Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 11:31
Static task
static1
Behavioral task
behavioral1
Sample
dc3d692c574a8ad2e38b0bb6f942a914_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dc3d692c574a8ad2e38b0bb6f942a914_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc3d692c574a8ad2e38b0bb6f942a914_JaffaCakes118.html
-
Size
31KB
-
MD5
dc3d692c574a8ad2e38b0bb6f942a914
-
SHA1
3d911cc01caa6d7867062b3396cbd5c90958dba9
-
SHA256
34818eb239ae52dd7ee1a4d7b4e783c825add1b8e7245539171cf20d3c91aa47
-
SHA512
c7ba4312c4e3410d50d471a1f4e9b6bf909d19ed04c3c3cf4d1d7a18c9d0d3738018960e10d1eb479a7b5af270c0defc09177f35089db5cab9fe9b3a7c836977
-
SSDEEP
192:uwn+IjtxiePJxb5nYjwoFCg+7ATffY4cRnQjxn5Q/Nw1nQie6UNnV6AnQOkEntT4:0Q/oNxkc9aEm7lA4K
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 801e6f540705db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000c4474136ac8e124ab851f8053542ced13f7f802b665a59b55acfb480fe7aae45000000000e8000000002000020000000601ededec50df3afc8c118f4b20f9cc64c263cb40b68448152332350e7b0ed17200000006a8495960609614535b6bcf02f861cf38fadfaf44a7fea3068091d7a318faa634000000039bd03ba2b86d340e8bddb641d05a7ace8dcb8af7b0d316309a092c2439781a86c6e3683e23f1b8a362b286ccc4735f2267dc768867fba1af0719f84664b198a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E2BEEB1-70FA-11EF-8EE4-42572FC766F9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432302530" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 328 IEXPLORE.EXE 328 IEXPLORE.EXE 328 IEXPLORE.EXE 328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 328 2372 iexplore.exe 31 PID 2372 wrote to memory of 328 2372 iexplore.exe 31 PID 2372 wrote to memory of 328 2372 iexplore.exe 31 PID 2372 wrote to memory of 328 2372 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc3d692c574a8ad2e38b0bb6f942a914_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f237d42186a752a8cdbe133a76a0ee11
SHA177b3e2c56652271f3b0751f869b45488d7fdfeab
SHA256c598c224e080c9bbe5e29d2ee971329ae57fa6576e4b3e6cd44b11a5fec81fc5
SHA512bafc053fe7a1300bea62748117ee296f59198deb365eadbc9225670355e4bfc7ae37562b54d2b4f911f794b685eaeac3d83af164172efe45dbfc74ebba519945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c866fe434bf1be42fc048a123c60d2cf
SHA1cc045c357d4f219191c7704297231bc6dcaba45d
SHA256707f3b483ebbe434f15dbdca4ae91578efec551ce72fdb6950c27ebb7e361762
SHA512df5957fc115be70e8588d06d4c657f6e89b3c4ff1ea14e9a5f7ba44996e29f5f723db43050b45eb84126bc24abab5fa947e5af8d5ad4860b661a5e07882c4ab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e416c2786a431be590ae86003b530ec7
SHA1445602459b28db1578459b8b7a5b0f35317a4ebf
SHA256e47c56f9a967c83fa99b3f79dbdcdc36dd9ff58585a5727b88a94f6574240b36
SHA51266a30005ffc33b77fce2a2f1c8995267d9beae74e5b082ad0e0353024220b3eb26e014e170183201147d254b52a801b98da70e3cf24fab5c6247e9e779a81f03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fb74be228a259130de6445112dce1b0
SHA1e9027fac3b75248821b99acb34eed1ad9147d752
SHA2564c09a1d42227b1db7049fac88558fa5ef1594fb3ab92f7a9f05d1e4252f02268
SHA512824b28a133e711f97f83f900a7e54176fdf516f89cdf386889ef4cb5efe7a9ad2e0cc89e455861fb837d7dd513e5f0335fad0601d274ed83bfccf1f131094985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592a5dc15d2f146a15a5f95e21dcae0c9
SHA152c208f1b4afaba2e545e02f1adc4c5ea7787671
SHA2561172e457349c5f6e403090c6c54e25fc93522bab7e373ce1dfa366e7eff8a7f0
SHA512ef59615d5b495010f57adcb95ea712779b7360b75b67d55cacbfc9c74fcb5ff44668cea2500be99f2abacc44b3a561283e5619a30d09653119877fb4fc7fe532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53678b4d8c7ea0fb5856ff85bc9956182
SHA1e59627f0cb317c684ceb6e1bf50e5ba2e89f5a40
SHA256592002591a27e3e165d08131faacdc8508a4a6ee2152d0b5dc6d88339f2ec996
SHA512e279f69c40bb1b6ef4c9a60db344add8a8d90a28462fe62fb8fff2da92c4b96bb537876268fca0d5c842edab86e26e02fb8630c123180349429802f8d10ae7f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6fe1d15859824e2381dfabd58a54ce1
SHA126778c98fe5fc8e20c0d481df1cee4b622f9e169
SHA256a8cafc546cabf8e0c41b4bd89e68b19690b2ad51cd92c9903f263d7629fbd8f6
SHA5128d5d47a76d56ac5222d4d22521bed0dea0867760f451fa46ddc8a448fdfa1e9041a30412873cbfee9ecdb9643cc1b80baf01e477ba39203c8cdf8f10904fba34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfbca63d3b4e50fdd564e203c465b334
SHA1bc59a43c761a6d285eff843ac57bd7464ecacf8b
SHA256ebc269b701c5845622be1952a961e66fd0fbec4299d010d9b7a59e295b556540
SHA5128b493b2b473c756a1d717c80ced6ee34dd216a3edd5c09433763861cd68e71d2af125f1754957a986eed62ac284e03b5839f7dd3ba041ecc310c7c363eaff81c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5750fd5a3d85299ae20ef4c9a2d939bea
SHA1d9d6a5cfcd9a7b39c7e10190abe80ef8cfa33842
SHA25622921b01d053458a0f838259120eb1bfb8fc3a717d48906df9260b19b7ad3f1d
SHA512329a7bf3b237544d66a0c28f5535cac5bc4f9cc4ecfb7632b3acbd05f120486b9051db4325933f6c9047fead9fef3a0dc12b790e97e371a5134b869fc031673b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a33529d06029bc2f5d9c78f76d0efda
SHA1bbf0eb620dff49c0b817891386a168eb36a0313e
SHA2561e1b2f29319bf1aa61b7beff6954824ce7203afc34d38c4318db5ff6a5f87149
SHA512422cf3e53d3d01e5e531d7dfed99b8b7f61efe47d74436a1c339540654b6e6abbdb6048b087d0970b0e152391680e83665e87af07379f3a8f7fa9310a62c2fa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553bf3a881cba576e2a199cabdd583d94
SHA1567c3ed30f49d5be36fde58b650ebf786b8288c0
SHA25658d41750a5df374eb06b5e7daddbfb7443454b0eb7e745c1f92f0e99f23d8223
SHA5122848c23ecec6a4b9440777846ab14661b41a3de34b378dfbd9eb6c7bfc8d53376e91a7ba72d7ab1e339ca82075a973a6fa9dc9db7fd423c9e3f0ac18eb163661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d79f14c6938ed4c364b1acdfbd69d825
SHA141620f17f4f1d198e45bfa624093929729876e59
SHA2568a70fafe9183ee436b344467c4bc2df9eeaf36028ca987d2d229d99ef60f81b1
SHA5128309d1ab501602d341f21b43522599d710c25382b47d699e3ffdcb4be319e232039d0c32404f502e08b9013a5cc60106c99aad9f3ce6348caff7c3f10f108be1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5856e0804ed141ef9be9cdd2726634e89
SHA197b47d47195e9cf4e01f4839e82dbd756e272095
SHA25691465201739f8f031bc3cfa3b956b4f82b1ad71881005117c7c728abc4124e01
SHA512e5fb5dcf2b5d25933d797c42130dfc06c2a3f06de8ca3ed31b578fdf3ad1bf32613e55e7d4030e13f6dc9e4d7083f11fdb403f2ef127bbfa2c370819e5f914d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e551ad56aaa1588d1ecba8c37742c3b3
SHA12174cfe9550eb1a844d26ce895a1a07ad32916a5
SHA25638764a5680b2b5e1cefa54fb081d9ef89992b104320f03ef23882c8dc99aaf1e
SHA5120353e89c295a5e5476e582ae0de85eb72ae2d484187163f83c338e773070352908e2ece73e3e57d9fe3b46b2e836bfae6f5a625cad9465d33481134834ff6a4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2aa5ca3fee6d1415fba89e3c88093a8
SHA1e5714a0ad931fcc200359c399dfef30c8d7f93a6
SHA2561d81a56ebb9614ed79de379d9824e81aec098893de5e2a6b70c778fd7ef2156a
SHA512d019853351abd71f97917317d0e0b88269246e41bb5c5f7343b34a23a67a381395e3a5c106a66b5cc0e9b71da117800a6f8be910ecaf6b0ecc6e14eb2f269f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5660a256e614d90517a3838b831498a5b
SHA13f2b6b2e23a27f8cf84b98d640b4350bce925bea
SHA256909be686fb3223e3cd4677bf6c9865436a5c7810aa263e1fe07ec9aa2a14f67e
SHA51215cf37178a7e9e0996059ce13a55d3adbe3c69891f4f90b77e471d24a673ff0b67583f8ce862d127c1e97a5be733a1cb2ad613afec122c4f1e230dd312b4e7ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f337e9982bfc051e5bd23bc0322561e3
SHA197941cda6ac0df960040696cafe7aa8d506deb0e
SHA256336f022137c31affd69f1ed7c843c3d2139ba08f7d9c9cf81b6804b566944eca
SHA5125d22c9db42b0fbf04959cdafb604b89e1114d41858d921356d94a695a5ec63e7a3e0a10688f43f813f2fc1ebb04dc2ac3c6025b353878f76b9d2d5796fbe28c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5926239a1dbbfa140f7da5aabf3b1a34f
SHA179cc1048131ef28ea1edf4d551b2ed9721c119d9
SHA256b5b5531e415c5aaf7ba9511aa77fd2743745cfd0e959ff840263764f9efffed3
SHA51214bebfba6f0dd45b0a1355b43b195cfd97da06d78e067c4a059a68240ecdb83084d1c2da563c509f8bf3e9130fb0d26986eed1f9edeb1512e4502a190b8ce3ee
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b