Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
040331e3889355f07c5f401791434735_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
040331e3889355f07c5f401791434735_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
040331e3889355f07c5f401791434735_JaffaCakes118.html
-
Size
139KB
-
MD5
040331e3889355f07c5f401791434735
-
SHA1
081ee9e76883df08022c041102e29ac3764a3f35
-
SHA256
a0d6331f0ca07712ded450d1c70a858e056b978ba9802da2e17610d456b060f5
-
SHA512
3a9f61ec5a7adbf5d71016992fa8f2d4d96f8de2d8eadf68244f4011cace342ac8619fdbc74afffa59360ad55f311a9277872f05995f2058591357182bc7370a
-
SSDEEP
1536:SwNpFRbtfsde26yrl5yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXAZ:SwKyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3F814E81-7F9B-11EF-A045-62CAC36041A9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70741757a813db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433910891" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000003e4b3561ac8b39aa71a3a57afe978b20e21dcd38c4cadd2fdfd199f3587100f4000000000e8000000002000020000000c84a560eafeeeb69280f7ea83ca6b283099a83ef3cda27f3215b553b4945a5d7200000001715ab88d33dc6571dd1befd9b0bb90cc29ef79b2b1008c82acbea55dc4cf47f400000002b2e357a48966dd51591a05333ced2b5727fb5c368653b2beaa4d192367ad3da51d11c01fcf800946385e9bfcd4bf01223e180c63a682adf5c6f75397ec58482 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 540 iexplore.exe 540 iexplore.exe 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 540 wrote to memory of 2020 540 iexplore.exe 31 PID 540 wrote to memory of 2020 540 iexplore.exe 31 PID 540 wrote to memory of 2020 540 iexplore.exe 31 PID 540 wrote to memory of 2020 540 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\040331e3889355f07c5f401791434735_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:540 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4a5cd54af86caf914909a90e3e0ea17
SHA124085c8ae45fb6535a04e64bf26209fad0e8d9a0
SHA25653512ef098efbc39414ad38befbfab8a129cc2ec89172b0580225081b25b46b0
SHA51277cca7561e715afe3aa4313ed71315c79943c66b467fbb9c26a9ec995b547c09bfbfeb2a7ba67d54d44678afb5cf1d9d38521f7bb8e78556b9acaeec15e017e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbed54aea5a2af00fa6722c3314bb716
SHA188377072271c88bf067dc40a46792b5c4e075b7e
SHA256599e93bd45a0b7f90b4f29febf202a9d72461d5d126ac9b35684f9c96dce5221
SHA5123a1fa858541011750594239ec06d8073d491d9ccf07ae7a59bf4cdb0465c2fc56b322204f27d411d645cd091a5b587947e15c7c44410566ba07dcf775d195571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540f7a7e960fb5c0af501e3436df6f1c1
SHA1329bde921d589997adc3ddddfc6ddc3d5b71e7a1
SHA25677da4094ae4e9605e534ed13fb0427979d95d2fe8e2b0bbfc84b16aebfe6467c
SHA512293fa5570db86d46c6d7822f262e3340eb3b1280821881f6afcfbfc73fc491ee29eb7e6944df41991ef05b0f1225e47c876d1e98463cf0c44393b4938f7cb924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577157377a824482e6551eac7e57b1a72
SHA168f62dbf8fd19d407aa8bee29057b41125cb965c
SHA256712621eaee3dc719368586d224c3dfbbad591c94d0de22b192784ae7fb9e9d5a
SHA51269d657a64204682e801a499b7e992362368d0d0d787654dab7c2b83a4f57ba87a5fb24814bd97a92fb5b8172af4810820dbb37014e2a6b0c7e67f82c8ee8b879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5889bcae51c9af6ae53b48bd55c6b6d7c
SHA144a20a38ebc5de15ad3edce515881107114dd1a4
SHA256259ea598bc76583393a768e0fc958f81ce331054815485c22ef92cbcd1e1230e
SHA512cc29d4578fe1356bb10d5d53c2b75eb699583ff08ad102f88f9013d4ec7943805e1334f5a8369f05fa601cb0c486ddb128db60773a17455ed2c702e0ea898ed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596d2914cfbcb23101e2fda7f652d8c06
SHA18c3805bf3c7874cf0c4ebfd07240b34fa3278c61
SHA256617707bf0b4628ab9f0da15694f2c35e0c9ec7524af7e701fc282654bc2c535d
SHA512df8bb68c404aa74ca77d7a0b30b3f4a7ff2c212a07799529942b702d752948ab9559c47a8b6ba8af3a3f80d294fd21aac56bdcc323d625bbff72ee5d6dc0b2f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584ca337ac7b97ea8b9d61465fb588026
SHA13ec2e58a82f7c03a732f344a3218c2a86d6816f9
SHA2560d2084926a68278674d1c3b3d52c9197bbee1489b27616faa30d168e63d24fe0
SHA512cb183779b802321ac11bdaeed55df11d6dae7540dce29f9a440d5870cc8346455b1cdabcb5ee9b66514014d23d5a7d016cce03cb14ae17caf4a6dc306e3b7be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec3707be56fa4c31551082b67093770d
SHA1aff2542a2475ef38a760ff0bc4d01b480f22902b
SHA256891682227c739017caeb877bf8491a2e80931f555950c95549650decc43225c3
SHA5126595e5a7904f9a15a5bd0d26f2c8364c013c505ddeaaf240d86f39a4bfddcdddb7566a7317ca29344dc6bcf2544c560978fe07ebe9d914115b9666237a8c16bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559374111d0e8ca5b38be39b5f604885d
SHA186f116d3317a57b2d6d10cd7294c11347a514817
SHA256caa610a76c6a8d13e52d14b95e57d8bc7e49a7d742837a2e52551e287ee8d31e
SHA512b5944fa00349dc0513bd55b5cacc48ff006fcc4359d8b4fec0f9f7a2ea5a4b255e42becd4afdc920d101e0e974a03a2efa2b33c8253cc211cfbd793cddb8485a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2e87b34f19d00150e350102bd57da37
SHA1079ac77c851a041e5f18fb226764297eac5441cd
SHA256be8b35b1c3aa8f8c619f050b5eeee933b44b492ec423479b8f6238046afe7a76
SHA51289b78d35631aa8c7c2c028a7ad6a46cdba76f4c7abe893e80aa635e25d69e20c3f5747b751420095d389d664cc2cbe3cd2ac90a9dcccdd27b39e9e18cd4f537a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f563e7636c1c45318afcfc006dbfb811
SHA19ad2b11e0b21c93414ff19d0fcbbce31fb82d195
SHA25657a052cd2e2b66f66540c12bb4d7f7ec2bc005bce51f21ceb55624c0c53e33b5
SHA5122a3730b7a5e74f14f84f2579a06e04ce3bbc6d27d42a5a3eb8e3420f12aee907aac0f596a3e06322061906754e776977335c77afc27d85ac3ac5c1602f098ce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aeacd59858ff58092c2f7f3c152f2ae
SHA11c253e5853e94c2a9b2f42c876dbf616ef0adcab
SHA25633e97411af2b28b63543a08e6a270dcc0ae317ba93532fb0a01dfda4c928548f
SHA512ce6e32fd202b2056000cbb0c3a58748b9fa921887d80ca29ae40a365f5d3d510adbc9a2730f76296056ff7b192aeb247b6a56d48a8d4fb3b91f823fc6836e09f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc5f4c145914edc9c09a82410e900d62
SHA16ef37fab878a0a2bf923d5096ae2088a8b47afe8
SHA25637f8b87c1938d192663f0ac15a1353b6fa6365a2a4256a637885b0c6c6a0dd1c
SHA5126e33665c33c7b4693b4671c2bc749c5583c627ef6c9dbb96af6bfd1dbeda1424ead547a7522f44916c05b9d3b691b84790b6781f8e8c5dafa254e3008cb61581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4e5c60e5d1397ac64ab556b3fc88c7d
SHA15a63d62f4666bb171bbd21865b49d3f47cbd4b68
SHA2566d9a487ea64a9b7e8d61248f2debf11a1a3123ea7fb3a6591485ef014c1a6dc2
SHA512097b0d5138c6da3ee50ed7665de2beca25e9d8d04d127b78160f88674a80a771ddb4f8b09dc78a8722c6a8f0595612b1f7eef1cd91d4a7b10b7a026da82f0436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5001a70898fc8294e4d57beccc102392f
SHA1173948867d05b57b227661df98f383d8bb21e96d
SHA2569d71a6eaf399beee1c92c613934478508bcea9be7883e52fbdc297bece775b3d
SHA5128b3b0a13a1db1282cc85c2c2d2cade8fcd9905c5509c05cdc38d0227e41c7cc0ea4dd454abdd312cd2e11c9fab5ad4cbcea527611861d6ae7e8857f0caaa5de4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b7dbdde52f38ceecca87e13ccf6d2bc
SHA19f30f61cd4337eb4b074fafe3d893e75211c75ff
SHA25614c5b3594ed2c3ce41d0914f8b71fed76bd3593fe1bffd48c323475bd4181937
SHA51293dfc0accf385085374fe35a978cebb3dc8a8fd0359c6f864206ac57a514422b320f2bea7fd01120d774affd418e267505984f5f333c401bcafd4610c2fcde7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5377cd79d229715a8a4ff36a6b9b4abf2
SHA1866b226b3fe342a0faf00763e974ba373e4af70e
SHA256ef43e7161a7c404e3a649097ee048f5be1298247d04d2c615b9b28b95f4f1a14
SHA51227dd19840bfab99db09e85d8b241580c6d85b0ff4c87852a1bc4c9c38d36e72a9c2c241e6e71a93dac290a496a6009c470c7459f5bcd84acefabaac2888c415a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b