Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 07:06
Static task
static1
Behavioral task
behavioral1
Sample
dfb5979f9182110ba58ed6c808b2388c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfb5979f9182110ba58ed6c808b2388c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dfb5979f9182110ba58ed6c808b2388c_JaffaCakes118.html
-
Size
2KB
-
MD5
dfb5979f9182110ba58ed6c808b2388c
-
SHA1
584965900dda8f32fcb30df1ed89b2dbd17b97c4
-
SHA256
7efba325aef397b7966017106fb91cf6ecd6601447dca12597c8c6ca1137b1cb
-
SHA512
fb2744e5c04fbd7faf1285e64d1a0723da5c0c55f6c639d990a7774c6b2edfe6faff9caaecaf1c06ad404512a469905261ab7d1da1cd09554d19075952184fcb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432459479" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000009af0d9f3aa316b90305f4c497ce56f0b7e64e7e7f92ea15f8db0d5181fdc12c5000000000e8000000002000020000000df18205dc01c596174e07a4c6f1b940c773e3ee7460bc85e41d08630aed294f320000000f6183ac3fc5513170b6938b24643c871069ce3d9bbd8839c6157d69f9e41529340000000aa97804df423c8ea4aa91dde908903fe8d43b9f0090d9267f5ed161b5ec93c5e4f7f6b7e6d1eac7214def96312dad6b1016d12257bd2e5e36c63480cc6746e79 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E9B82C71-7267-11EF-BF4D-465533733A50} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03385d97406db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2064 2060 iexplore.exe 30 PID 2060 wrote to memory of 2064 2060 iexplore.exe 30 PID 2060 wrote to memory of 2064 2060 iexplore.exe 30 PID 2060 wrote to memory of 2064 2060 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dfb5979f9182110ba58ed6c808b2388c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504797e2f18c48e1fa869319dd1a07225
SHA1f0eecbc181a49742633b36ac5dff9959a240caf4
SHA25675cc98bacf98cd42221d975fd68d6b15cae3f7f203fe3b41c00ffab1c976761e
SHA5126e8a84ea6ebb45ecd3c27cf3cfbbed0b0b3284c7c0dad769cc9015471b8af862c036409bfcf958673f7564b8f0f382ae380be6ae677d2007d8cd0902ff6af693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fa25cea025c9465c04952f219bf6eb5
SHA1044fa39a2da49a95839f7d1c2f208a820c826f29
SHA2561c9aae0de99a8e6024c0c769840b6e51b40cabe0382ec8fb02b443247188c0e8
SHA512f851505434e20eb74902d4dabf40673fab74311f602a0fb287568048df4cb9863380f2ee4aa7775bcf385d2ce9732229a416eb580d1845414ab7282b216ca616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c23e1277d3d484714df738aabe48e964
SHA1a0d380d92fb93a07f33e301cef81c04be00086ef
SHA256147d56aef480109a653df11214f6d291a80513cb4694ee46c9ff2106a6d9c776
SHA51286bdedc1ea59d5fb4f5230bc0c9f4c376728c2ccb49f3d990504e7cbfe91ed8da51f7993509b3aeecdb10488700c6a9fd20d0d78759481e194e828d575ad023c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b4c8f6671d28851f8cb92ad2846531e
SHA1f6f2e460799852d23c328137cfa7ef75c7018f0b
SHA256442fd6dc640e584a4f93e93ada190f932597ff3e8ef8050c5bd6637bf51a0659
SHA5129e424f8d53b1c69d8c5ee1dbb63129b15e5a12b1e9d523d969d4f293818e645db2e2210b576d14aa2e29d8ffcba7dc8557ecb86a588868f4e6fd92eb83719ef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530906de49baf95894bb65145e65d59a2
SHA14232eb14ace68593a4913834b40f921d67ace647
SHA256e0432ab8cb572fa35c4a06d0739a277712ae5b0f5aa4bf7ad86bf167d87fd455
SHA5127b3be8c257919da1e1cc514c2d02fbfd4f1cdce523a7eac02e1bb4615ad07ab1b546e5162d91ba72d8920de996ca52bb567844ba96c1b0132ec5bba6c6a324e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542d8890f00f5065cdc766ed38851bb75
SHA1b3f8a3e715eeb75beff4e02f1e82e8ecb5acde3c
SHA256e89be304a0189aac3877270556f5c52817055ac7634833660dac25d849f8da7b
SHA512dfe5a7e9bbb6ac69c1b8a7be4c712ad01c62da20b9a6564a3707a935a274f623f9e4d61392aeee10cc294dee717006f8a55ef7ba22eb1c08430ecde56e543769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c502d4fba76174fd9fbb5630b77d51da
SHA18de4781e6de416ab1c6484fecc07f542776aac8a
SHA25648d9e931c7a988ddfd1a96d83b71d2e987dc6ca31dfbdf8b8affff14a4d1e502
SHA5121ab606ebc9a32844640fc39dfd754972d11b40d75ad71ed6fc7be52f4d44bad06bddca96663658670f7e3fd5a95407c8706a576c41b2ebe402e192f56b0623ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524712912491bd030904db323ca7d919e
SHA1ccec40e6e1842ccb122f22caff3cabdf3c402d20
SHA256da3712a86773383f678402b1c21ece28a69986340c7d888f0fda99266372fe38
SHA5126b3535d78adbb24065cda138cae870fb7a1f2f7533a256342ee4356dad011ab9e914f5b2b471ca054613dcd30dd59beb2e773eec0aee6e671e8412435339fa42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5570896b1fc67b13c18b50f541b9bd5c2
SHA19d4160d4585c5cd9603f590d35c3d55984bcde17
SHA256a294aa7047739b866be3ccfce52239786de44536fab7825ac42433aefddfe921
SHA51279f340a270c0d5d39e611d053f79f77b205c203a5860cf7a4488ef64d1e4fd45e97accc3f793ee18fe22e4ebbb2045ab1cee6411abe09eebf8df5bb94500f053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4175f1c2f2778dec54229de6ad9296b
SHA174a0455bda3c18aad5ebc1e46d3cd1fe8237a66a
SHA2566e42253d9a52bc78d14e2e59bc0800bf35e7dfad6493996896fd89b85c924b11
SHA51247135a7d16c19954fe644917c1e1fede865e12d7a81f6850d0e0a1b0852202941a887cc5a5e5995b6bf84b04eeba77b63f0d5b5abd2ab8a751741022dac1ea3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521836e450aed0b3070d336d8b06280c3
SHA1e06d51c6493a214ca7381298b5d35d21af917580
SHA25693d1588b5342cf18afa6a0c66e8af151f65cabe33f456f8e71672e1499ad2884
SHA512394e572a188b4cd98f5874468c2e53c26928f9f3969e4d89eb67c104212c1ce7d29c936f3d0ccf5e8dc814e4e8f077713ba24c873819854453ae1e535fb80885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524e6d459bbe3775ee5847975d375ad3e
SHA1ee3a3882e8f8e564cd3740de240297aa78112d58
SHA25653f2cc365585fe310ef26e5380beeb61196ae4e3773a7eb655aa14a43c0a8006
SHA5122e966f863096ad91e2395957657d9b2281e6d6099f76db769da5f65a6f3985b2f55e9f124817d0a2f9b0c77fda8aa8155ea979b6d147206a967e5f4a0b5fe665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e51721784a93d2ddf31a9e7f08904c83
SHA1cedc2625ac8b884fb6d064f4acb88e6c2e6171e9
SHA256cc362633e55f2956f3aceccdb6b5927e424f32ab51b6f4616be55fdfadf7862c
SHA512137cc4a6de834e2240def3ada9ddf54e5790330235292940beaa951b83734f9a3bd2643856dbaab98f5b9af989cb49e7af3847b2faae29729179239bcdbd5d13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5860d20d05c109f97896441e225aa71e9
SHA119b7059b1d9b821b9d036aa0775e55f5ab6ea584
SHA256f791fe2a07dffc7b560c14ddfa3a76f5a9e47aa3bf3f85e4d6633cfb2e70fcfe
SHA512412399c99f9bd677e9ba9f5a8ba3485ff106c1fec4789ec9ea25ba62da232511810c319f07a54a87697f51edeabfea7c5a766e36b368544953a3470d44ad8deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fca1e30b54e0d492887103745ec8fafc
SHA1f6ce8671cc5d2bb8bbafd0589e69dcce25c74ed3
SHA256df2c863fcb55c9f291ebb0188798e7d5018c1a483db1eb26504bdca488234b22
SHA512d23a5614bef76c78d14c6ae00986eda018c532f6ae5dca511d7c6601c917d84f005f19fb5a82df4fe3cc27dbbfaf3842cc8f4baae0f7252b3f39a19c0e1f6207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565214e2860b0de69471f585cd201a3e3
SHA1542aca90315d3c361fd69bf3f10092a82c5f0512
SHA256975daaf372fbf11b451f939d13646af36517bf99af28ae106dbb907c8a91d6b4
SHA5122e2e5c0034ffd02a95db8ab00315ee4cfc850b4971a08eaea10d2a6a7511dc6d89b10f2c8abbd361d4b8a2571987104321de4abdc5263ebe180dcadf2298c401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57185f61d67360085d287d5b26a4d17f9
SHA10d0cbaf7dd0a1ba1e1337b6abdf705a5a365ba26
SHA256bfaef5abf9772d6a883a18ad5f700e7041b998745c17a8d41838c101b9fffeaf
SHA512297a669f4bf8f0921d284ebb68c7c12f16e0bc3a13ddcc1dcbd0c78e584a4bb322c0ed3d204f4268dde6831e8e3374fd7685a1992250d3fcf85624210786bfd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552ad522cc2972c4af8efcc7ba1a95c2f
SHA1798b241a816d3f0f4e430054b0643dcb908ebafc
SHA256eae8b57ea736bb9526f4a3299ae4867ef4ed47a4c0181a39328d44c923a331eb
SHA51230e8d259627305899a407279e8279027a783564e9a9f991a5353d4eb509ebee0905b7642a561e9bfc3cc131d2a79c51a30f1b6a57593814c3336ce5cd59660fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591c68cf67e28422d295caa618facb9cd
SHA15aedb50e763edd7b739d0ee418e92536007efb39
SHA2565c1e3a288bb31d6995a8da01520e202a1041de9e0767f95691fe500dfecb3edf
SHA5123b3b778ad26538f446d3408567f6055b0bf2751f640c6f7219f8515f15ae3c6b0152ed4cd51c885fd5588fdac317abc2a85d352e3b84514ca21af5743a52f47a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586347035305c18ac8cc75378707fa2c9
SHA1ac129ee73b38db9d4d991b02f841c9f6fe929445
SHA256203c813b2d8f56eb1d6f964fb046be913f463958db2bb9789c09688894daa69c
SHA512171dbca13601cb20bacf2e98ed13cd9f0e7ef7aca75fe0185f410ae38721185907c6f1055bd3523027cd9e42e6fba68955d52e296203132ed2b3194610ffdd0a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b