Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 06:51
Static task
static1
Behavioral task
behavioral1
Sample
dde54c3f691b0261881f0f36e135175b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dde54c3f691b0261881f0f36e135175b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dde54c3f691b0261881f0f36e135175b_JaffaCakes118.html
-
Size
461KB
-
MD5
dde54c3f691b0261881f0f36e135175b
-
SHA1
dc21a4ed1b035a0a8c4d39e2f90b547c32efba3e
-
SHA256
6173d8d60fb4d48b4c8f63c250bcde38a1934160c8369ba2299d3c3a95a022b7
-
SHA512
b3c0ecef17aeb4ba59fa8191f18cc149b91019f4781ddf0d37c9ac1bfb28071d421df19abc58ba40ff46b4d0a5e605876ae38290bfc41d429293f2a1ed323785
-
SSDEEP
6144:SPsMYod+X3oI+Y6sMYod+X3oI+YYsMYod+X3oI+YLsMYod+X3oI+YQ:i5d+X365d+X3c5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A535B521-719C-11EF-A0B2-6AE4CEDF004B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0de477fa905db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432372175" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000cdebf0e1af65b0c075dbf5a779bd3fe96a51ccbbba78747b2d8cfabc7c8cb3dd000000000e800000000200002000000086a57a46fec3daf2935621e378d27525b9843aa62f30f5b137ca68e90f96282220000000f6c76e42f9b81878835ae8651a45ba2d87fc5b73ae19aa6fbb3387e1b3606eb0400000002109045da7df808ae4855c11cd260fd8b75c729207f210392efadee40ede99e87023204eac2db42cd01af046de9d31d4f53578a56648dbe6ea74422ff896bd07 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2244 2420 iexplore.exe 30 PID 2420 wrote to memory of 2244 2420 iexplore.exe 30 PID 2420 wrote to memory of 2244 2420 iexplore.exe 30 PID 2420 wrote to memory of 2244 2420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dde54c3f691b0261881f0f36e135175b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518df3eefc5f9247ad4cc1924ace6255b
SHA112b245d54a00b7966c512b7b294c73182079c24c
SHA2569f95e6d9b8e0b034a54895680915d2a4aedc0d60d78c99eb4acf22143c3b1414
SHA51216daab7e551e23c10ea2d842d51f4356dc2ba1feab028a75d1c86195038b8eb0944eab2072e6ef520a9b68c7bc6e8652cb1d22de8247a8813a385379bb3807d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c08b69802b9ea98c190dd9daab3f15
SHA104f819df4bfd634242a0c0974662414009c22fe6
SHA256d8ab13acf0cbd33e2674c32a912f1b0a617a6592a369c54c4838143238dc0474
SHA51253539d3435ff8d710cbed68e4979b936a1d41633e9c6c93778cb34e5108307516d9e035ab9981cc19ee29f2184809d8ac3ef078cb89e0a2c09c6ac6481722d66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58587eef90a143b55e934d8fb3ce13c39
SHA1699b8c7f7dc0bfc19f9e28dd841cb184bd218221
SHA25616384496c6850b4a73d2ca76808a0923d2ce9892aa4410670629e6ca020ca278
SHA51268d7c8299a5f3eaf192175d916e3a354bbc15351d26c21961d5d2b5570a0a8a0af98d0908daf15b2c3e39797fc2c59deae49bb9de120f869cbf80afd5651d48a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bfcf8e3c73f61616f00dd2f2eb76fb6
SHA1a34a7561aca798ace9ac64804d52e5068c7bd344
SHA256564bb25c046871d3e577b52d6692d17afd6ce446bdfec150e5a44ca33858ac86
SHA512a96866624fe85ee3bc95097406ac245349bc0a9ebb1b57166fd0036d31b888c6fd3400e9f696ff995fb1978e229f0ac0d7c3d7851ca1c470a47f19bcc68bac4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53146b9d48630a953f82aa1e82362907f
SHA1d405eedff235e14382910eadcbe1558a20410881
SHA256c1c169234d788f7cbcd262bf20db888c81ee332b93ff0ecc346c578b5c296acd
SHA5122f3ef033e29782d555b19c0e2ab7c4885856fe19c63be9b419c3f59eaf36805f95ec523925b674a2bc364ca206cc431aec1c763459d24391b065411269f12c3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55626c9b00d5464dd97ab6f3ef935bda9
SHA115209239ff06c048a1e6429744bb3b7cc4a862f7
SHA25679754ff7a8a5b7c4d564a049c736c89b76b61fa8265b9758f0a6fbd9f02c6f57
SHA51221fda011de1879708eb2ea2be8b1386ce6a72929efd28f9d496899443da9a3dcb131a11f8daa623f5b259c49eba4e2a8b5278b2c29c4b46d3f59441aac568ef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa035d81838711e80a6fe9a57b736dee
SHA1e5d59088cb3a9f66b4b58fd41eb06e3ded37bf59
SHA2563cdaee6f8ef15dc7613959ea1644b485c69fb43e6bf8e97093691e36242db125
SHA51253d1d86404eb226776c09c2b4e10673afdd7519e76db42409aba5266fc0dc0d44871840b5ca5c3fa4ad393ae481dbb712f12c328a7ffeaecb1fe732496c3b2c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9ef3013f14da345253047d3b3921527
SHA19ff522ada0230d197e3de9e6b7724948a2987ad7
SHA2569408beda338441e58683b0ae3d7c9b7f929ac249f18ade8847b3c34c419bdd5e
SHA512ea6197cd153b45e8e2b0c8c7e69551e577242c60cac1bed69b449445247b378dce0cde2edc04c0e4bafa1fb15eeb29051396cbbcaa748e24e9e8bba2f67c58c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e0f50363ffd7da2afa48dfa46e660a6
SHA1008ccfd60d5b9b7234921fd9c4cb2baca5d453e3
SHA25637ef798732dcb5b56603779b1008877f02afb4dba091d52a938787c7edb2c7e0
SHA512f09099737888d1ce5a34b3ae27d73ba83e59dff66632c5021fbd9771d91c99924d129211c6ddc97488462a182a75d83708c178067a8a9b4b88052e01abbc4517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c0e12c616d8c1c15d6e5696428a114d
SHA1f8f3a8947ba29cd403851f526a8b4f3f8ee335f5
SHA256780eebe180abcd267bfec30e0f1af0a2390f0c193052f3fc229754aa3fa553b0
SHA512aafaa8748375357c930701fcaf31a37e0543d310f906421882b67a69a9a9bd97ef00b1fb7b92a4fab39e55865b5b7de56713f0eb87451b1bc73abbddb398546b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b71b0b1bde6e09af72de19ec44e9a889
SHA1bdbe58b7a503a2b779c9fe80b99ee3494ea3ab52
SHA2561fec989853e74a619db0ec53cccaba9a670b1e8a4525e324a34d5ef95ffa61cc
SHA512991c6e67a03ece7c1ea33d37d51a9af3b3cd6e57314a5dc9ed8dc708071bd81515b5977e9bfa3512a2af880d3bd06f38f11cce22d76b7bf80e2d8b6e444a111a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b4214e17499c0ab63eb406462105e03
SHA136559433121893cc6d7a5054d2973357d801c74e
SHA25677bd8382065cbf087d596b9a67d1f58d5e3e38bd7ce2c2d0742761a7241d8c35
SHA512d08c079b96076a7f69af41d8ee46215e61739beadfe1def035ff73f88b5a5b04f9fbd0807b02321b3666827ca3c884ad130216c891befdcf4259ef1094e9d26f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565d48b93faafcef918b79d8f7a13d61f
SHA1ef0da43dcaa6665b1e0b38b007c8f29d7a5ca8fa
SHA25621c11160f2fcb966e53b76e504d639e23e2706fca17b28fc1cfa6c8a5afb7046
SHA5123314cbfd86817077124ed33ca6c23b51d65056320fefd852f98bddfcfef018e01240ce86adca23881332838daee818b2ae10f6218bd94d9cb3d48bc80df34290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c2815e28b61b9da84b9cd6cf487e49d
SHA16b1f04aa114afb85fa86945a0e2981c70c31d1af
SHA256a95b78b3bf183a58323febdaa8990eae72c2d4eab7031683f14e7c0048448220
SHA512172d1c6e1b6f8111c71f9ecc94e31a7a6370381269d165601bf744ef7fdb37ff30719e640bf296475d634b8ac8dd5fa9d9c6e409fd360fa25fb406267b6c5ad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea27689101aedbec42e1b8dc51f62fe5
SHA10035926c071df46446bbb355859c6ec108c5c4d5
SHA256e40a7ff8da0d174726e9049d791056a0d0691d8c1a99ccf75fd0cf9e5dc0cc2a
SHA512e9ebc9797141d384e774e2e2b301a3b5a5488e1cc13fd6d5d244dc44c9533c8477206d5267475af5d4c246ce9f25c975de5347dddce07e632b01a91c84b1a041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c31c1ac9211308c1d4751d3374100514
SHA11e0ea72736414f02ad7b0f510900572f8da1eecc
SHA256dd1a27014f9172485227169ea256a4415b7aa3b474598ddac60776e5e9b0f44b
SHA51219186f8b519d8bf2be0306697ff4af2e9da855caa5f6664c9920db96beaccc05c1c89b49534172fdd580d2b8b93738ed4d2fa2fce9435e8ec5493a300d257465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506bf59332acf47d3e32c6919ae5035dc
SHA1cfe5a4081930ee7b9d9043974d3770a0696f7326
SHA25612013a8ac165fa6b8dfa5b93446d55a02b3c5d05235c5d4b77062112d7a202b8
SHA51263efb442d2481d794d04e5cca4700e0d347d1dd04c438cc68dcd240351f8e72651a1468e305b19f0bb8d55d08bc24962f10968a491cc8a16ca180febf8e5a339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e86d785f4a524b8d2452bc05ee65a7eb
SHA1913f5b7989c20679ecebf98716e26db523067dae
SHA256207f9e1f6c820c938e1e99826371eaa10c7e64b6e310b732213182daad34aaa8
SHA5125f19d33aa3abc0668767195de43d58d01b730848e7f485f3f9ef2499e2f30d9a2a97900d9f2f0572e49705ac8be5ca9f45cf12a9b2d5a9852495083c684b046a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5629c860afcdc6f23b15cdc8fdce327b8
SHA178443964c00e90d8a5224a879b622b42641b0c16
SHA25686041535fc04d5ff2dfa10fe97a8bb7caff88f4f3ae249867575640fc196002e
SHA51230a97ac30ccda0477f74bec124cb4c1c7d053792ece5865e25f202f19c288838b7fb0131381fc67fff8085cec49be9947a3b58825d5914e3ad7ed0360961e026
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b