Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 02:57
Static task
static1
Behavioral task
behavioral1
Sample
041ed9a2890d8c0134f3712492b50b5a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
041ed9a2890d8c0134f3712492b50b5a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
041ed9a2890d8c0134f3712492b50b5a_JaffaCakes118.html
-
Size
12KB
-
MD5
041ed9a2890d8c0134f3712492b50b5a
-
SHA1
08fface7ecef3a696161480c2d4cf381fe1851e3
-
SHA256
6851468caf1820255471922e2d282469262aef94ec0ea60c4ac7c21f59d5a981
-
SHA512
c58b017a2f9003822fb9c624fbb79c3e234eda0381bf924888248dd179df4930d422dcbbbb0a0123f1e611d6683454c8a4a6937e60089ff687d60acc94c3a096
-
SSDEEP
384:s1lIcZVljxa/guZBSZKnODBqB0Psw8guLZ:Hg90UkxLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90d16fdbad13db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433913324" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000b09245b53bfb6fe37beacf1607208e0c759f59859be524f696ace92b7abda6e8000000000e8000000002000020000000ece322c13639be18991115c5c4110a2034e3c2ea5800db8b219517facef3d8ed2000000030366876a02fc1695af656ecd63a91d8fd8a914bfb5521ca1ca8388ab51ce98940000000dc772df8ed06fd488e608fb37a72c2e76f999b75f5cbca14550fe6b894665fff8439e3bb241625537ed5eb3b64691ddbe1f6e58f1c11cb8539d638d9127e28a8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E99E4F81-7FA0-11EF-80CF-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2148 2316 iexplore.exe 31 PID 2316 wrote to memory of 2148 2316 iexplore.exe 31 PID 2316 wrote to memory of 2148 2316 iexplore.exe 31 PID 2316 wrote to memory of 2148 2316 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\041ed9a2890d8c0134f3712492b50b5a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cfdce6d12fc8f0c3eac8f52d5b7ce1c
SHA1cb948d2f6dedd130fdf409d475812b23abb2a4e6
SHA2564b44379f04f6ac9c23130250ba5ceecabed24e94ed07f08e729a95ce5e579a78
SHA512b783e04f87049b163b7c23524364f157ad1eaf96a1945bd9eb0f1340dbe3d7e4de0dcb49d63abb7d3f02fd967e670dc88bdfe02b685b4b12f5c0b85296ff5d4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5728967196759f8158a0999e812b708bb
SHA10da34503762a4ac0b54b663c55f5a2da40b6113c
SHA256d7e485cfb755e90a73e30f4d55d05a170e31cb3cf21f5a96697746f4909a51b9
SHA5124c441d4e554f13eb7540fed27df4ab64a0271fe5aed450902e36c22cc4e9aed9450035547853a0b9ca2af17119166cf2486ac6fdf6260ec872545356b4faa86f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc8350bc134fea671a0c0d0244821062
SHA18635388daf0a393abd2a26b2b840ae497a1344f0
SHA256fc8a5ce393500aebc6dd5d4096e00e5a72532c378c25298a393024b663980650
SHA512eddf9be3b4200523a478ddb8df357606c312aa82eb05c654fa8dfe3a93707773ab21de4ae4cc88a63906f3b32670d7cb3d56a165cc29fe90bf77aad65a1cf179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5373215b073434fa98cbab44708d4bdc9
SHA16d3f945a6279c847b8afc0ffcb59ae90f07335f8
SHA256fb4ef3f72d90de85947fbee16c00b2ea00fc77fc7dcff97465e659af70c8a772
SHA51214a538e68e700b26331c9fb5740600f673037d9cfe5d4434c14ada0794e231c9c16d9151347ef9ccf7ff6e63e9f31ec184c1db88c88f467b5f0793aa98a64474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af1e1f05f4ffdadd494dbd4eefcf9f67
SHA10496cf49680a7f20ca4b43cdd66a3d966708afaf
SHA256589d4832c593d905f185c9c089d967734b5a582217ab271b4ba8cfdd387519ab
SHA5123ee675c13acc1b08748e5c09e18833552e4dcc8a15e8a77cebd0082d78d257d49871628fd2904f634a0eb84ee8d2d954c854648863626a7d9180048e0500a37a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f19bb560c0e8c92de73f399f592dfa5
SHA10f0cd723eaff9d48fc3ba57832fa01a0527aebc0
SHA256cfe4bc411881619535ffec849c95a1002b59c5502d5f793ddd64e8690d0c6ce2
SHA51262c9ff2e578ee2a906a398f5a38212393b960d30859ccdd7561cc12315ffe35fe5a2de6727770fe0a0859c7a0b9d670467c5e38cd78279e0a0483e857eab7ae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c8b146fe9eeed23d92191ca6b87cd3b
SHA186c030565084cbf7199ca19ad4a4297e7cf32a1e
SHA256a18d12639035d1388488c1840426aea910e4c163e1cbe0376daf16424e3e7e8d
SHA512821db4ba5b750f12b3fa343f851397661e2e1b99a0cd69bc725d2f1dd10b38927b3a66b3e9e9ed92b391e2314551c230f1e6b1efd01dd914eaa9ed19ddd2a7e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5356afe000e7859471c9117708b425ea1
SHA1283b9ca845e35d1716cf9447b67a9688e44a6b9b
SHA256900ffc0121b7b2057c58d875b94e30d50f2d6102eeea92ecef5de173e0bd04ce
SHA512164026388632d492fda2af999dbf02ee9a2220f75d19509915c521cbd8c76b0032ce89f17b33f8de289bc62491a6fb129f90e4987bf99202715230f42f6f0530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540e15c17015a2a27feb395fdc02a20fd
SHA1306565c1a1bfc114e1e82b16b3cf75cafe3d3f4a
SHA256967db9ec34810310a3d9d11451ff37b5146a344e1cee995cbd56326ce1b13ecd
SHA512af7bccda0d304ff91d27348fdc0f6a42c0281594a46d115c037a81395a39c2bdaf64437c110067b906e0c23e8fcdc98c8e9ba4cc2e44e94af535f604cacefb97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5331a047cc8c7382fbaa0ec21fc38b66f
SHA1f5dfa32fd39bb5fd684f08631457fb83d64dd053
SHA25680a6a38290d09c6d26e7fcda98cd0d85a9450f891af1d611510526d08273568d
SHA512bc363ae07c4cb83f65d4b176519417224009d095cf7c33523c4a27f2126c2bb4a67c6aee6bd6ff3f2ac3077d32261582c4a67c48c770054fd55e439b3fedaec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c38daef8cac716997a5c74e5e5751cb3
SHA1c60b03c61a65d8296ff0fe815c5838b77910731b
SHA256d625c7a49de51f69b9000ce7b95e965a07c72210a97b172e34c6a9b94fce22b1
SHA5120f599571e7164a74a7365aad1f9d8e3835d64dd8381b9682ed585cb3d519e2670e18cd091e6acfab71b26a4524e80b8e1c92c96407dc99db32825ab5257be36d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544ded57dc3210eb7a5127d134f2c701e
SHA1ab3ae5cd722e4f1258b7f3efc2b66295747488e0
SHA256f0054409cc746fedddd149f99a186a5d199c98b27e09fce2ceac6db857a1d658
SHA5126c19c5ed25649ea9321e52a4b58240fcf9bc87580532d6efc1a7c7826a457b82caaaa0f073a8bdb3e2ec93d3dee9255f93d0b7d13d7ff3d10664dc76d9fd79e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0d82c68697bf6c662f36540a745b35e
SHA1206e988b272efb58ce6f4cf85fa9be56f8c63dc0
SHA256d7e7b097d8741cfa2d1237a9680d0ea2150c3080a09aca6672ba580af645cf4e
SHA512c1b05da2c059bb10999468e28834c316a37dcf90101295c1a9487730ee9a8f3128fe243e7783b28e29c440a7f34e1b8655beda552e718c55cb5b8d99564985b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f382452f93bb205eefc252e08ad9c23
SHA137d352a0a1847252da5a8acffd191fadcbb700d4
SHA256dac8662831ae2c5ad2693cfcccbd844e9b7c68c35527ad6fd226468d535ea04b
SHA51242a1a1a8c806cdb3822111e9a6acc70d7e292f843ef9bab6216c07a92b09cb288d17132e56fe9c5306c7d96e3d9fc8f1bd44f1a2d998c9c6fe48004696b876bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567a0fd7f0579fcaf79ea0aa9f649a86b
SHA14752153b25e53b7ca8340ec87b6e5b754ae05340
SHA256ad288e4a81abb2a20c574138d309f71f78de9a03d5dc284f0ff2050c2df2f155
SHA5128929818fcfa7ad4f0acd66014b06c30707bddd8e6fdbe26a09f40f75de5cfbba1de6f9cc9690fbbea1f3c7706be5eddbecdad36e0766fba3d48c00aa021b68cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fa4641c0c9fe101178e0eb1e7d9ce94
SHA1cbde3ef6e3a65aa391914e565e372fb619dc36e8
SHA25621461496f98e682150ca4f89105e8afab6e0e355bb2f0f5e474448dfaf95e776
SHA512786034846c6da8435fe5263308f4107074a5d742d2022bf1972e30fce863bf0b3a444be31013f12010f0ee05fff91fd13b452c1247da1b574ef546759407d25c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594ed94663d9b744701a8bc6751ecf668
SHA1827e83e56cd2368e92ba95c6d51a0f9a329300f3
SHA256db942dd272e469b11732d8fee6e9c670b0e080e55f2a5be53308108eaa9fa107
SHA512c233c47ef6fc93972c87eabd3be450cf151140526e3b666f5a74bdc1cb97412aa7c03e46d14c0c2ac3943416c02db6cd5b5549945b40e73375e4fad6d09a3a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b05bcdb9e2782e3cd4907951f2bdd7b5
SHA14b76ac72926014e65e352967672d5c9a621f9bb5
SHA256532a22568d3f5db174f7d5cee62fd0629c78a29f77796a4728983039f1ca6c94
SHA51247b10ecd46cde839e2ebbb168ea56bb04ec39cc6835118e358923f7424866c0ec6738c292d64bba030672d860714f2db91bf8115502f2c429e025826472a45b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e5123b235a2b052fd2a68fdbf71423e
SHA11fa043b7f8c652e9038230e63605f28088343c23
SHA256c79149e069621dc9a770c63243418628d0075266e868c7e034f9e6a70ab40a18
SHA512c89860b2f0da08c6adb417b5ac000a87464d2a122c235b8f53abb76ab9a79b939285fa64d91e8c0f11069bfccf16b331ab24ebf0a45da9687902d6e3ffaeb884
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b