Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 17:32
Static task
static1
Behavioral task
behavioral1
Sample
dcb6f99de076c32600598f30373d3596_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcb6f99de076c32600598f30373d3596_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dcb6f99de076c32600598f30373d3596_JaffaCakes118.html
-
Size
30KB
-
MD5
dcb6f99de076c32600598f30373d3596
-
SHA1
76ea3ffc4bf3be542af9aa6b49a79335ce33780d
-
SHA256
f9595ba03703c57cae0bae46abadab51b057c583b49af54869e56b9be94054dc
-
SHA512
4c724c166becc8e0a264ea7989f1c5e1d900671ed73234d3693353e1aca023a6e135ded8c4b23f260b51a12c6b25ad077e37ff1744a124241eda8112551dcb3c
-
SSDEEP
192:uwrpLb5nznQjxn5Q/wnQiejNnynQOkEntYSnQTbnlnQmSQxt0u88877XL+9aq5nn:sQ/ZDxF87uKB4D
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a063a6df3905db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{092C6C61-712D-11EF-A0E9-C60424AAF5E1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432324239" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000059484f1840a9010a8edc671347b933fc6b1aed061d74830bc4b51dbbdb336a02000000000e8000000002000020000000736e8a5d43c9c6d241e3def17b563d9de0d4fefef5a3228c9ceb1e370922cc0420000000a39da402994ba46cad588704f2823d03572b8ef115723d45495c5d5fce0cc508400000004242b4692181ad0adcc12e8d1a0b9bf3321b4df2a1ad2a9f737ef341178ff6c67ff76be803385b3789e26771f80cad38475166c604dac2294727cbb574e55a26 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2100 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2100 iexplore.exe 2100 iexplore.exe 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2244 2100 iexplore.exe 31 PID 2100 wrote to memory of 2244 2100 iexplore.exe 31 PID 2100 wrote to memory of 2244 2100 iexplore.exe 31 PID 2100 wrote to memory of 2244 2100 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dcb6f99de076c32600598f30373d3596_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d980fc4e28c6ddbb3433762ec87c3eec
SHA16ddaf7f61bdaf087c3f8089c1f2cf2fc32d0e0f0
SHA25607091990b1579f33c03dd2e36ceb201b73ae2177e8286bdd0107b07b1d5e0f1b
SHA5125a77c0593e44b7094abcb8934eb3f7e247fcdad279175d3e33f287770becdc23b77b1f7f1d4649629276f8d4bfbce02e5c9a16a256b4ad03bf00da817aa5408d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffd0824c4275ce88622d1c9cf4aece02
SHA1759e41c9214ad24023d8f179f143ec21fe28026a
SHA256f556bb28435a8463d82c8c8bd78e25f82add9e819c715237e855e294c1f9eba7
SHA512fdd880d52195d5c414323a34e668c018a8515253322a7fbf347f6f534398d08ec898520b147cff975542d1d6403893c1b2b956301b8a2073afc0da48046624b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563151bb9218e86d2ac208923f367ffa0
SHA175b4aba9a6e4b5b3ecf7ff455d8a4734407a47d8
SHA256352c11a06e02c779b2efdc42ee11654dcc105b40e16b352dbaf0109ca68a55b7
SHA512952f87f659e16f72f6565db43990861cb4af9c5ee4bec241bd86339e258226098553710572fe10681ccc788e9845f02acb9249c5827d6aa9a760d6f49c6a57f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54286b09e64af2259331023980ee6da20
SHA19cbddfcd7db7908c0d6b630ab40a72dafc464598
SHA2561a9f05861b69ec6dfcbdf160706045c9fae394804a157e9b734a3ceba373d4f3
SHA512611dbd7665dd3269c10c0bfbe6f56934ea386fd19bffea84d8c11b6d922274c78414159b4d7e12568149434514e7f79383cd5191906ed1834c9c802b786e053a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc0108b3f0fef6045decc566f09d6e73
SHA14d64981dabe61016e072b699059ab805f5680146
SHA2561eb99a1725a02b848335b78549f92cd73e830c54a6e9eed1bce9825a29686175
SHA5126a647853ee72073fff86042cc4e53195efe50be19973b5a1b07c85020cf765264c661871d5073b5e106544113721a4f3168fd2c2ade2d34fb5f28c655fca8bc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b032ba59cd696df3a4020c5eafb86d49
SHA13c0a45c3a7e79ee5320670e057ba1988502760fa
SHA256ce18d449ccf3244d4c4cefd5f05022478ed901cacb95a2c1f1b66cf86facaf19
SHA512290232ad15a1ad98786ed4528b6bb4695da135362013809f794041cd09e74665cc770014228bfe8241ad2e0463e737c6873b757cf0954d6d3f229948b5b7b9ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8491fa8d9dc51668ea9eba773cf9190
SHA1f002c20d38aa8c8e60bdcf1ff03b5c98fbcb0a25
SHA256240ced2cda84d93a176d98f2862772dc78ddc2dad52e3ca32d7c434a904ce8e6
SHA5123f78ac1e778a1d99e97a16a15c597def1242e5db2d1598b4a52b224136ce13a1512e4b0798237cc7ffb3a166d5cffdbe01a1a99e1eb31c1659f1758dc20ef2ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccab343aed3d153fc1b0957a3372cbc2
SHA12fdd04e97c745eec5bb67ea6fb505e687e6dee1f
SHA256fa8b2be34accb4833a5f08cd8caf731ba7eb9014be4894ed8542374fcb920419
SHA5123ecbb8143a4c3ea73c49de167730d977f686375784da6917daaf82e71562ff91819c44fcdaf2c4723d35f1f8630c22e8d34193f4609cf2309b8f6b5256cd0650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53296c19f0bfd8d38126b887838669138
SHA12226b2f7b5701cd3b59d2818b8d1d638d1cf4160
SHA2562288400e5ec708180416dae57c1632a6a138f465dad293009351810c41096134
SHA5122f6a2cd726897bb48db87a3a4eeb462167bed3eeabdf1203bc93bb9710621b6dfe8e9cbcc9cd47facf35fac1280ee5a1da7b7842fdf0e036870e1045d5470f35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc355ab9632f3b2162e0e94e2a9d61be
SHA1a7120aa878c78adce6909d6b4e9645f959a09371
SHA256e33fcc40b318ba2bce778336f6b5c938c1bd735d75dccba755dbecfd12076336
SHA512c0be4cceac41a8da3bd28c6e7a6bd368bd22b64c230cccfe6d95e2b54bcd240274354955d64b776035544efdaf0f04ec16673548c3e106f29c08a556cad6a8b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee72f83a828c542fee240c96a4e85dbf
SHA1b27a436b81e401f4528038d7b408a49b89814aa2
SHA256d7edc2f32a66a9a0a65d5c74988855f3aa8fa9dd2e9bae0a640072315f83dc73
SHA51241a9a58f2b10d53c55ff8307015ea8ea3f1703869446b5220911b3d5abb45a37f8574822366f5a250b0aecf2dd6aec0bf92638a0fa282af3ee497077e79a0f05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552a099a4c2b716531a10da82ef4d1c54
SHA1d95662b6b8b8f9a33f3a87b43bb5e6d0ac1c3212
SHA25633abc4e16a7f9df7377412164256199b633420c2aae695a258f3aa2cef3dcb9e
SHA512afb641cfe3eada337a1475f9628522a7bef212c3f543ad5136e8b7173fc10e127beb38076bf79892fb63291b6cdd5f332c9230ec81a0d644dd447631d7921db6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5099f0cf409c0bd7a2895d29e8d428783
SHA1b2c5577d131f2637ac242370a96cdfa5ed964cfb
SHA256ec1c2e77b14a2ab6a251ebe82675d57a1e7c26277d97ad0f76bcb64be8d575b4
SHA512023575f47015b072fe41201b9b34250ed8ca71463db04a4ae6dae33a9d64082c059f848fd7760f926f48d6b2b7f1eb26351c6e5ee99de536edf07ec9c10f113b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa64a0a508c1f4afe50cbcb234399b16
SHA18c207232fb3f4ad5836e1a9ae900d364f7ce4eb2
SHA256c24ded9fd26d787ee2ed7fbbefa39b762387f658f4aebad6ba7c1894bb79beba
SHA512dcb7d66c37941d637861cf8592c6012c8dcc4b6ac4502e785c09bfce40a7c25172c8a55ee590d8fdf137e47bca633a8daaf4d95b9bf1a5454f98713d0fbfbe95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4ef9d7ff9f346b02b4a0987318236af
SHA14fd11fb16c5158c7b80734f3da6c7080f9ae7fa1
SHA256843f088dd66a6def179103efbeac8da666ce8ab660ef1d8675245f79d4d0c877
SHA512d778b37bdbefb9eb352cf85faa2c8ff8b381aa7819f93119444ad2772fb1742351bdb91ef8489a301ef649a5f7e49ba0fb235a92060c211c0c0769b4fc1ad359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c0beba5d2c044d1d442badf913b5daf
SHA1b7f108262891ecf873536d10fc846fa74b1da321
SHA2569afc0ecbfac5d65259b4504f872884de8714d61a69ff49b986fc3f83586b84ae
SHA5128cc35c815a53c3d212661e16000c3a662adade0a7b5bd91607437b80637cdd55e6ef5c5f28fc7879002f3b6cae8672a9e6498e78e6ee5aad9fb467a6d85c0c7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee2b9f8db75dcbdb92b24ac450c052b8
SHA19fc7d51f5f0686b22b66b2f9e97d1eb5c755f371
SHA2567c855e06015391eded791cc8a44760b38d80957d785499c94de3f82b2118f338
SHA5122a429032430a4b1d0b53c9dbda71865d7c85b51893413ed57602a2f3567518e4770f3e6c3e27f9e5d923e9bf92a223d0d835d7dcdbc1b966f386ffa99ae3787d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b4b038e338fef9faea0ab5a4d2b7ae3
SHA12064f7d8c7a2ad74637c3fa877aa7ac7a7d1ea67
SHA256e7f9716a5c52c535aad4c976574481c817b012a7124d29856b0bb994027188a4
SHA512955bc7af2991a363caff3c4bec8749ab242c019e27e641bf180dd4a230c4f0b2a44386031f19de055808af7523327204b5136c591300ddbc3941f5dff1327959
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b