Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 18:18
Static task
static1
Behavioral task
behavioral1
Sample
dcca3b083092a5d3c717aaad969af05e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dcca3b083092a5d3c717aaad969af05e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dcca3b083092a5d3c717aaad969af05e_JaffaCakes118.html
-
Size
2KB
-
MD5
dcca3b083092a5d3c717aaad969af05e
-
SHA1
c7cca919429cb47f36ce3ed782f15503807bd33b
-
SHA256
fde521717f120a2cfd85447cc897e1c72776bb55c6b4d9190e2a27b49bba0b92
-
SHA512
f6c88f74973cc30f71dbc20eda43a0d64f2c14588a31cb1d690c4de27ced9c7fa9d23d9e0abeb6901fb4b4b68e6e2a9f6c490525a1af94dd5b9a185b30095b02
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000007b0721b3335ddb46c5d73619f1e07bea169d1dd9ec9fe91e35e04d48b09ad94e000000000e8000000002000020000000cf1fa243247913b57e0ae9f0780542a329b65717b34010bc7f9da8e2d844cada20000000f44d5b61c383fccfe07e00c7ea253f851d4403c33bc17934a916d4cbc2327a484000000082325c8d35c7bb6943cf0d1cfae63b61273fce938005e6531c595efa551b4aa059c74f4c455f3dfb568d3f6f8603458856f016efcc30476070c15e2e669e5f53 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "25" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "25" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 109e4a354005db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432326959" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5D3FCDA1-7133-11EF-9D58-7EBFE1D0DDB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "25" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1244 iexplore.exe 1244 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2148 1244 iexplore.exe 30 PID 1244 wrote to memory of 2148 1244 iexplore.exe 30 PID 1244 wrote to memory of 2148 1244 iexplore.exe 30 PID 1244 wrote to memory of 2148 1244 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dcca3b083092a5d3c717aaad969af05e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1244 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD58b477d77fc1040c7d75160b5469b6d8e
SHA140c3ed3a91f5d91d8daae7bb10d6601d49c128ae
SHA2561b5876e354971a47ca7824e5fa95a03679ed6059b85ff319342940118b68a16c
SHA512dee0049eaaffaa44a7f16481d3c4e56a5c7c939e254ba3bc9240d77c619cda8121314c068f14980cb8d461e6cfe3cf90c309b6b31b3aaaf871d8bd2307fb3a35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD56bd86ce572aad60c4435d824eb1b838f
SHA1a32f8bfbd64bc6692f02011a08d859155b9067b7
SHA256d312323b2bd0efa9a53a4b9ddcd721d497eb743f3b4d2ce89f8a7e1cc700871d
SHA512f0487e04f620729b209f28c617b3f496db16e86e92436254896cfe1d950ed37609592c44cdcc624fcbc513ae6c97195d19c963153139b4b05b9ca592dc52bc3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515fb49af97b60f63ab9d9356eb1d997f
SHA1cebab76f18eb8db6770f7cbd584fba3c260bb055
SHA2562dd0813216692deb4d93e1ff7204018d1f46feb1160cfe6a51ec5df867573d47
SHA512f6856fb956cf98e7de15097552bc08060839a5fd98c673c4644883a434d26240ec928c8b8daf5e5f8188b192846cd731769e288e7ffa3772e625f0ffa665fb5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa12f33f8d0450663e1997d1a202513
SHA1fa72fa9461924ef0f507cc1168b775774066e096
SHA2562961b7d802c4157bb6e998c263213ffd8cfa71d1f9eb95f026ace99d2ec61c3d
SHA51299ec141cb34c95fc5d5914e8f28fcfdc0e4329bae64da32650d1568a9b5c63dfd5a747181df6053e1fb7e701281b4acb3624bfbfe76a531c4cafa285ad06959e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5388b659e0fa0e97cfea29ddcfa9ba905
SHA1da075fa91491a2be9dc0b0bb933fbe450f0ce40e
SHA2561a5e955089406ed1f499a865646494ea111105778909fe7ca238500b695ef499
SHA51204d26d270bfa399652df63d87e7b7f0c924f727a7f7522466d125a333bd127f867499d18e5aec1f9ad7f373ac7c88d816072d0626026798786ead34aab52eb3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596ce942ece75297a2e293d23e0153861
SHA159f18da64eca673704c6d4c509e3b89e78318aca
SHA2568a3c46936b894a5147694bd913572a708bd7b1d65ca92997c6766e1e451bc08b
SHA5122bdd800ec58726350e81f37851cbfc74eaf57bf47697f1c94816e2a3e4be9bff25b690ed9a4a4c9f923deeb2df84c7d054efb228eae4973ffa6ead380158ee85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59debd98a7f92fd9548d979a3e34008ed
SHA11a7bea04c61326686c293b392e46bc33cb2451a2
SHA256c6315684f7c4171d673be93ed7a7258899b8b0d5421063ea489ea319d12caabf
SHA5125c247540c1da83eff5bd71cd55836e7e5df26ef1128b962d9cdb53ce61cc7c91f7978e778e543f147ea9a38f25a3bcc689cb3188a834a2c205e7ae04a90e5753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54545595abd2d7311c4a894662b16ab31
SHA1ef287c9813c42d9010637ba4a86668906adbad7f
SHA256c2d9ec66f73a270e279ce89ea946da105138132ad3102707a736fc940b0ce0d9
SHA512fff9fae405bddeb276787e7e431a133f182d8b72cd880d1403b6b1494388ef386b4d7f48749929ca39650652c62d7fe345e4248041b80e291e9b0718c16b44da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566bc8be9c82fb8ce6302bd0474438875
SHA15de7ece1ac36599f0982036ec968a76c2975b6fc
SHA25645e9550099e83f75f20b40586163f69329e8ccd2d706a9d99b50e4c0231e091d
SHA512e907252ec53ad4cf17a34d3b1c60e7c9bcb90995202ae187ff4eaf71d0183aab51033e056b42638e90a20f451696301f1a8c883494aeed23a77b18747b0bfb44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551a3baf7f2bffe49376ff3cebca06483
SHA1f4b36ceb3e2bc9abd8767ef2512f19986622b69b
SHA256e18c7bfbb58940f7c385fe30417786236398dae0403d590b71858fb8d93b36cf
SHA512a16680bdb320a24955a0821b5fa2a1024909836e70b87b1bed9745c40ca39382105ba6c107f99d3d3f62f31c961e0148c91adad713752d2c5294f94682809b18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ec9d75c9c654862e4f501363432604f1
SHA1ba195acc8a8944d51c21eefbcbfac604da4808e4
SHA256b68ec2c4518fe1a35e332eccb5269053110c5b8bf9d9a56837e868772493fc8c
SHA512c785ab23906f2e9374cc31411fcd35e6d3d8b01ae78440b5037583484570d3e3f17e1d03186a98739cd57430fe07cf0fc44c7050e671dd17143471907be09e2d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\39GEHZPO\styles__ltr[1].css
Filesize55KB
MD54adccf70587477c74e2fcd636e4ec895
SHA1af63034901c98e2d93faa7737f9c8f52e302d88b
SHA2560e04cd9eec042868e190cbdabf2f8f0c7172dcc54ab87eb616eca14258307b4d
SHA512d3f071c0a0aa7f2d3b8e584c67d4a1adf1a9a99595cffc204bf43b99f5b19c4b98cec8b31e65a46c01509fc7af8787bd7839299a683d028e388fdc4ded678cb3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LPQ313RR\recaptcha__en[1].js
Filesize537KB
MD5c7be68088b0a823f1a4c1f77c702d1b4
SHA105d42d754afd21681c0e815799b88fbe1fbabf4e
SHA2564943e91f7f53318d481ca07297395abbc52541c2be55d7276ecda152cd7ad9c3
SHA512cb76505845e7fc0988ade0598e6ea80636713e20209e1260ee4413423b45235f57cb0a33fca7baf223e829835cb76a52244c3197e4c0c166dad9b946b9285222
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b