Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 23:20
Static task
static1
Behavioral task
behavioral1
Sample
15490798c35333609c7a027260246953_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
15490798c35333609c7a027260246953_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
15490798c35333609c7a027260246953_JaffaCakes118.html
-
Size
12KB
-
MD5
15490798c35333609c7a027260246953
-
SHA1
2c160edbc8583592a4a187e6ebcab45740e1235a
-
SHA256
0dbf783ea095f55de841b64f2380431b8729bded8ad9d56062b88d951775aca7
-
SHA512
d21e26412b59eaeb5977f2ac3e16af0fbaa61be6496339faa2071fc80dfcb5bea3956bfd26ccd0ce3e2f5ad085ba3242a00dc9d28e1cbab72c2141b3f10bb090
-
SSDEEP
384:CyiLtwzoa/OkxOijAigb/0lMz2TcobAOR4R/xw:CyidBnijAigbslMCbPR4s
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434245918" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a00ee523b416db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000b93beb39a12dba54dc4d1ef27fc4a11e95283e7548119710e233bb1f547d9bdd000000000e8000000002000020000000009a69ebab877f7e69d9448d7f0ff23fdf39fd537a8e211f2bd9aae1f78994b220000000b7e6ac8621bfc934bf8a2001f45aa8d0ff73d93c937b17e773018d5e7e23afd940000000e61a82cc2ffab0169c6239800336930c6b193de3f588ef744570bcdba406e5fa60c65a9d579519b0b18b374ea49eb6c1d26d9e1e1fa435d724ae7a16e7170320 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B11D581-82A7-11EF-97EC-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000004e6fcf8cb799db8a5575e91858e0154c3d3308e23a8e18ed92d505bfbce759f8000000000e8000000002000020000000ce09d61867adf5c8456f24d2abfa0982995955044dc8c105f3536c379f03018d90000000553e3c02814ffc1fe510a644902bbcb6dd469d3f2d769a9b861033b075261eb979a2b69d122f89e7880ac088fe8dc4965e096fdd75b23f10bde171958ce8e2f715b17ccd6550f3897950610c0ac5e5c6e23495094fc41857b5586633575df92792fba69429347219427a07f0a7014f6b5461ebe1db9fd64c8d1ebf630fefc22f164c4b819e0421e5909161b6114dc1c540000000aa700b1df83883dbb999c718622f13b79c0a802d108eeac3773c2c70f221318081b7681defd587a33f9fe09c511777536e3327707cbdd48911c358934a27c01e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2008 iexplore.exe 2008 iexplore.exe 1320 IEXPLORE.EXE 1320 IEXPLORE.EXE 1320 IEXPLORE.EXE 1320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1320 2008 iexplore.exe 30 PID 2008 wrote to memory of 1320 2008 iexplore.exe 30 PID 2008 wrote to memory of 1320 2008 iexplore.exe 30 PID 2008 wrote to memory of 1320 2008 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\15490798c35333609c7a027260246953_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58309e73cbc663e96cfeb6b6a1173f464
SHA151b2afb064979999c71345a66b18ec0432adb422
SHA2563501226d6c74c4f25428eda08cc4ac3ac725a85bc2bbb1cdf636fb92da5d9bda
SHA51243a937e828da30c759b3ba37afd461a4849eead5955675ff82204c54d01a485987086280cc68380db2d10f924c2f79ef306b8dc2d715f8b954b34e28e400184f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f2800b86ace9ba3c3a970ae40bf59e1
SHA12119375d4f8de3a2c9ef8fb1965fec2f9dd1cf48
SHA256e299531d837238ec0a7bed28294fbd754b35a856c5216fe0b2de70f7b006a205
SHA512e6a8be4c46f2d8bf3223f8a07d37b770231da43ff2d6d75b9317a9950e420d71116384c172c615c9c69da15446f8f7486deed119819b7e8ccd2c179cfb842f3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5025272381625154e7d96d9edb4022be5
SHA1d259f156fe000540b4f3bcbbd95ba3d1d6e39ca8
SHA25687a1cc7cb697438aaac24bce1c157534d8cffff8a00f2161eae90c2c98018c6f
SHA512a1c9fb9a4d2444c7e9ccd9ee65b2c7d46919753bbcb3e7ff1025a9296777b781a884d734e90cd2030982a452ec3d06fd434a5921a7866fdb5775b61cfd2b7375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52323b779456d900ab9de4c01729598f7
SHA16d9235669a6450b4f407ab8820de97b6b50f5521
SHA256250cb756a4eef590bb06bf127bf74377028c0add2f5e8d882deabad6c11483bf
SHA512479a189547386a744001529702cac38b779b2f0e6fc0edcb61cfd614b4080c927b3fb1653925a83c56d90e30473f28923bcd7340ffcf4d18c10eab896f1a98a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e461c4d326d6a5fbb686120edc9e621b
SHA11de7e4d5c4bf2251582f6d3d8c2ae4d24e56a4eb
SHA256dd66838cee8573cfab9ba38bf08e54209c62a3c99141884a1b6d2a097786f30e
SHA5120279a2702308ea00d6aa9168d24d12266e0fcb068e891caa909ef3eccf1e3390ea0cc7bdeb2238df291ffeb19b85b501ffd2c61c8f19a93d8e88c32a42cfb78a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc3fd1dbb8be9d24b1e0445c24d817ce
SHA153372fb59efb3d164674679c75360ea9e20fba39
SHA2563fb19d0b0496dfb22c7a421cc10a6995b67494306f9df2ef9da5c864d2eb5898
SHA51278876a81d641ed3193f322e83ebc6af33ca5068856eb472fd117deeac1c3db41d90bbdbcb335990f4611ec8d73a2fab878848fb3645c5e6f1c2aeabd8eb67946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523dd1a7c063a8fb6234866b2ceafc79f
SHA1a3fae7d431e00c13758c69b23897ed5608c54240
SHA256667b8fc51c4b6a711600fcc9842ba226cf1cda99ea6ddf66fd9b08d86822578a
SHA5121d7a54f670d36511dba0ed720a693b8769b0be4376b4787e888fb27d15ffce4b18759f2121a75c9875662413295d57ce3a583a184d86531bd3b5d2573a473cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc851b101d68977e5e288008104eafb8
SHA18d9986b24a643fd33187668081be7b210871ab75
SHA2562510820e46cf4d2c30e23e2b6a68f7c9b37107a8b16cbbb7e35e94025624de18
SHA512c67e1ed7912bef16befadcfcbc7a29a75f0b77ff75acfa3cff32870937111580cf862be5cdf82c2ace72e7265adfcc5081a2bd105712389bcaf28dd5db91d1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c67e1870b4ea2b2efc77cc000546255
SHA1c8bb29c36940193b4cd4718d79e4ed5a23e253fd
SHA256c928c972c4037345dd35dd0d6663bb127d08bc1d1acb72176583b235bc75f8a6
SHA5127eb29126ec49859f27408482de968deb9042bf398816718b13eb9b137e9b347c5905ce5dfa2801ed578a0720f4d6fc836c23e70b0df5d8178f377325b33b460b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592d7d99b676adbff88bcece40c6f3402
SHA14b33f13748d306f680d36da75c713bcef34c153c
SHA256fdc1b99afce6e40eeaf618ebdf0257d12568670e34539df521359fad930be4d0
SHA512e282ec7e15c8b44dc1fb7a6cfe48426659810102d1b3812bf256d34b7a61f53eb24daffad7532e1abf47aff1c3ff60c382aab3a120c91841fab5ffd76a91e0ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e8cb190dfef67407799fefa182486ff
SHA1fd484b4d066ad70045b1a6a29a4d36655a2dc334
SHA256726b8c260e217327da0de7451aa6f30f867ff8873a4f9ee3d3a833ef3b00f855
SHA512c0a133ae05002486c33d075ff354a11c07ddbba652ed7594a93e8fffa06f12b74b34b72fc4b1b0606ff4a081868b2d793ae5a8cbc8fd26199cc57a82b673b7ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8853ce0d686e64351a0cb90fc862989
SHA130c36363f0406ef52b2e95a7e057e07b2ede392b
SHA256881300461554dc131d409008d7212487fef72ab4e94e7a721c862206e80f0c16
SHA5128a5eceee3c5a8faf3e2374f17e35ba4fa0b7816d4dcaf05c19f8d7a51a99f7ac8a412eea9d8c9218ce8e3b706f86f0579c9532bbb230a8cc7f5336570838d873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b1a751fc86b8fdca43724c3b52a3365
SHA11178953dc09fd38de46cea84174872110049e868
SHA25605e2c31ec47a204b859ebb2872276eaf21d3e5efd05facacb283d4f778551472
SHA512fb3709bd8b3753239632f7764d229717b8164abca355e68f2145b6620057cf1847988b5cbd6b1e3d10260013eec072652e17b9751f05b722230c0d709bc3e94b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1cf246ea00cdc70049ba163a04b10b4
SHA13546b4790ca2ab2e4a25dd49298f60139cd6e894
SHA2569a59e895486ca90398144990b259a7fcd55643de6eb9c2232dc283f04a89cf48
SHA51206ed138236a281b8f0fe7c2fd77f3055cf3e90ceee919ecded303265881705cf6a68aa19dbeafcfea8a7c6fde85924fa19af44e51e171257292dcc64ff3ab55c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5903529dcb7663da4f4869e6059ae7104
SHA10e1540f78efa4b75e137d3337a57ada30254504b
SHA25693f3b9b04c666dc79e3e992ff4f2afe6a99c7ee600bd94c18c1f7b0622b4ed83
SHA51204e47a3dd35c3c94eeefbe4a26a50122b08975451dd3045cf2e0f5b9c03d75574daf8aec7aea091adf6787812eabdbdafeab35206e4cbc7812f44f262779f91a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ad67ded035fe5a26d108533c578d527
SHA1be59efcdaed115ff737ceb9e88cbb25cb5d7ecb1
SHA2566ab935f0f668a0356154fbd17aa0f36d32888e68fcd3f834777074a2d82edb82
SHA5129207d0b15a533c2d185fe937fa9a13a496b211a9bc74ce9ec75e8b0bdd9a417336e20375bca74e10cc2318c778c336fe85bf6bff953186fbe7a44da3339c7857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ce6ac2afd3f20b6df269fd8ed692b3c
SHA1d74be1901a3b0b4adfa73746a5b10819e0446b84
SHA256fb8820c0ab80dd101a9e0906cb7e3b2b723f2d8ee9307bf69bd220a09e913018
SHA5129de91b8ec1c091c9ad5c5ac05fd3d61ee7e1edcdf396dff0033719ccb96392db56ac9c1df9a11d6ba8d60038ebbd399db2527f9990354a6a1cdf22e4f0ffe224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e909c08a2aef85d92bd4585c6649341b
SHA147cd5c9351c1c01a3c7eb2d1b4dca359cfa70067
SHA2561eadfb110e3031ccd0ae51cd77bb6705ad41a2b28e151aeea77c3bde94603bba
SHA5120f5262f642ca4df4ce37653070fee730f84d6f6e9a7c79092032d8446b9b387e4c030b5995adfb72593ea8a72cd9759dc029b81de4a413affcabb917f616053c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b