Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 03:34
Static task
static1
Behavioral task
behavioral1
Sample
11aad2849a35581d47cb670ff5d0c533_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11aad2849a35581d47cb670ff5d0c533_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
11aad2849a35581d47cb670ff5d0c533_JaffaCakes118.html
-
Size
1KB
-
MD5
11aad2849a35581d47cb670ff5d0c533
-
SHA1
923c8dd9bb2a81ecba6506b0f70a1d23f9898bb1
-
SHA256
9042f1cfb1405ffb69618a58f57b4ddedfd6f1849d65c9f062a6d878df14a4e1
-
SHA512
0596c703b70de940c0a2e22e315ef19f04f12db3c765947138c894ad500606efa2faa412ee63ce2673934caf5260e5fe070a1890dca684bf9fcfc0675ee2372f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434174728" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0da3e780e16db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8A8F5491-8201-11EF-B954-F2DF7204BD4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000a23c666dd84dfddb75667acb2461ab9d7201cc8565e3648b1d7c29d626b04b1a000000000e8000000002000020000000229aea89aa9fdfd20fea3e2faa84f49a0193772bcba646a3ca1c35af5ad47642200000003352acc463b72cabcaf3c36a97780909baf3d0c19f945d79fd393463ac9e87e9400000007cd1baded5feab35f3e838ea71e982e3451b6c52bc7d6080c134b6f8f35556e504cbf9b148d4613959473fd8e8641574a1e8ab531b0f12779c10be3b31ddcc66 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2864 2688 iexplore.exe 31 PID 2688 wrote to memory of 2864 2688 iexplore.exe 31 PID 2688 wrote to memory of 2864 2688 iexplore.exe 31 PID 2688 wrote to memory of 2864 2688 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\11aad2849a35581d47cb670ff5d0c533_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7560079976475d4ab76c4bba894c435
SHA1bad56f89e743a93fac408ba8ba3fbba02c045181
SHA2563e94832746db524419c639081c02b3c77b5e758dd8be33aed0768d143b99e225
SHA51292803474bf143016b3f8cd22b15d6fcdafecd9da37879f08676b67b812d8484efa5dd647c63727b3d6cd7a7737c5a7f345f5c08707119a635970d511388f1eaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af9b48c70ec3ce34ab221f895e634d61
SHA12e5c0fd08899ad13e9933f16de35800f419ed588
SHA256dae4befdd217b86f2228ec615fa4d658d8305f8c46130418b2ca3471204707f1
SHA51296a5e6f8cae03f90b2f98d12d7d8c475f523c49036d8cabbd2dbdd027f1c73ee7070dead71e6e0fcd45ce9a711a3065b7044ffd4710dfdb05ad518a9ffc7c942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51115b733c881e3514242863580e523f9
SHA108229a625545de5d3d2f6e51c190f7cd4d6d2b86
SHA256bb223dec619317bb682be85155387699fcfee7e03b3434bc4aae37678612cbe5
SHA5126a22d25b7ad4574ddcb4f53ac5c406842fa6a5ba19e4b7be18b9f7707350e98deaa6ba5194abeb931ff1b12215853ca2f1937daabde31b7d2cf189e0a79a56d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c365cbf5791d3af9082f4eaa05d8abdf
SHA1cdeabcd79627e529c94ee1ade57c0767c2daaab6
SHA25664dbfee69b32a666d3e876ca34a568627cbc62e1e280c31e711ebd21e448205c
SHA512bd351bd1bef2f5c97d993a543f6363add35cc9544c41ee7ec39ce909d0c63b779b1af0dfd7492a9ebfd9eb1c5050332fbebced7c0614c6568d06d50dd162bdab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c69eaf8a95b3977e42e5f76d67d34a8d
SHA19b322750841ff1c548ee1ab933fdb3d7d82935f8
SHA2564c8ec2b83d63ab3ff370949c77bd566b5d5a4b47969c48309bf19838250a63b2
SHA5123c233d12c28c68b123110eacc2e9d8204ff0a43f357027595fab9b29bbeb63afd635eba4b84877fc5955c309d280b6e2944f477c98e7f6df61e61cabfd2853dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e44f7d4e16bee808db0409f0bf82722
SHA17d4586f739d26c5ba353b42469b4b123864ee3da
SHA256bcdd4d0d10062672ac8fd769236fc7c79bbb84c681138f45a931b9794bdeebc3
SHA5129c72d50a7bddd08967b7b55d104337da1e24d025f2cb085416555c58a3d77bc0a0a3d10e12645d110c78495a901a8331d8f1d02399dae95dd0245de6e706c36f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d1686c8e576e57524c373d5ce4942f1
SHA1c28b527c3e635ea6b34a19dcca4a740503894193
SHA25662be356a8797b917ba0807adcccdd68880443461765a8e38583daa7ba3f58bd9
SHA51252b518dd56520e3d91549e09f0bc0cfcd1555bad161641e15aa36e177a39c1f3e1dd499cdd966e82a74efbd65e531a66f12b925ce1803d5a6b129ce90303ef86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cd6d3db1ebca98711d5e391eff0efb8
SHA18c7dc5fdb959f2cb57833dca8ebc1010f02f612c
SHA256f2c4f0117efabe239d82088069799f7c9011498b253fa1b685a472e81c0c78db
SHA512552ab50c4db0029d6b59a1b9a0b52edbf595c8b7d34ee7bd08f136333b176fee9d8a22d14a3a7ce4b84a1a0de2268d7175c3c4a1a1c09671ca776606cd56349d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5722961d51e260eb08a408ed70f33f4b5
SHA134a28da4b8cd9a5197f655f7ea5c4d4281a5fbe2
SHA25610dfcc59f6e9a90c1b03ee3a07557f346d7216fdf470119bea5c518719a01743
SHA512355d8a56a2ef18e19116c33fedfad9e3ee623e6285892752ac53c01ed0bd041e127fcfecbd65f540f35457aab03eedade2dd1ec09ecdc8ee56aedfadcfa1471d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abb1e1bb84d0ec4e96da81f6f4638d10
SHA1697577660a0ca958b76834d0d1f90358de81be91
SHA2568c445f7a69cf1cccdd5bcc63123e0b990360811565c88a5e5bd8716e18671d12
SHA5124a7db98a7eaa3163b9e6de5edfbc7c51bb7f1733a4cee156313a7aab30f067ecee16cecf68a3e8e0daae2ce068e859ca58b0d77fc9a052020b4fcee41817c218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54392dc9e76fd2ff61a82d2e86f6e413b
SHA1d694d42d8b3bdbbd980de337ff049d976bdcb0c2
SHA2562589a5ab9eeb7191a43b49067b80780b810995bf458429c9df194b7e32ccbc2d
SHA51289424561101de49088cfe7b9350b9363429795a9dc145e417308bab931e66fb631331012aa6a78be183092fa3f819b6f1b56ca3b152138191548afc371193ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a49d1746d02c08c223e2f2376891250
SHA1ac7afbe9bebdfc72b59565b7179058f44b2b34c3
SHA256c5ce62f746166c997151c2c5587a410f4c64c1198feac08901d0fc2bbaff2b33
SHA51275d01aefd284d80b8830a50395a2615a2ab00b9f08170c949352c94f5860522f914cdc4736d9cb836ab240b400d2c9840eb2a7b73b5d14d08f396f59272da134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af16c210be32b1938411d9eaedf9215f
SHA1d3e3bee476f0473e128fa0698053c47abfa96516
SHA2569de133f483fddc846466011d892ea955ef339ad695bcdcbf6e3d3a2012eec6ea
SHA512fe1a4724d2f0cad5e7cf155d70ad758550b0f2c74d372c9a922a4aa27a459eb4099b20edcfcda45106589b40852ada81070d64ce9e602229afb71c84cddbd6dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528d769294d29b2408cc7a2d6d5690ea3
SHA139d375ae25fa4528bf8775cdec003e6ad079d77c
SHA256157b7de664539aae4ef2e5cb2640512cb8cec40dd9a5982fdf686fe9e6927dcc
SHA5129ecb692532c3901ffe7fba175674666261db56fc03092de27457e0e7f890e35ad0dfb78e173b2f658a4a54fc2a8fe5722b1a92ca49efec00d57ba1e230bccd2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507f14995346698cae7b2907760a1de66
SHA1646d70601fa29ebe30e3c14962338e5407ae0fa8
SHA25639f8983708bcaf32c12f52bb47fed1e124351018ec1f05bbb104a52af8811a74
SHA5124eadd586d8b7d26e50e7d361a0f82776a9045bb3cc81a5ef89754b64a5e6dda1018a12e3c543a63664d4f3f14df208ce5775098b627e31f638eef1c3d4f917a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57603897243836e7d6b799ec59d9ae705
SHA1394ab43cc9494871267a2b517bee86f144419bd0
SHA256a26677a68c640acc7650430322944712670522a00aa9c7562322c49a297b8b09
SHA5122e21d9e636689c0871ce168252f9bab00167cd4c950f0296fa153a7231879c27de29ae76c6730ce77cb660e8d289a012ce08332880341602149ca7e381b5ca39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2eac93e73b47a6b09d136083b038eaf
SHA1017a873cae23134b9d4d3da7cf2402ab4a2272b6
SHA256d12e7a9e23dd48b2bf326d0d74f39f8d804a870fc40b50312d2ef64a69b7654f
SHA512586479bb77ea82b88e194f21b41ad9cce2c3d2fab74f8e91ad25ae9763bd1bf994ab024c65b491e46bd6f9d9d9d59405297c2ad9d892a90904efda257fc0f349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7e112417eaba1bf98688d3bb23a64ff
SHA163a0498327705c975752e4e48629d9e86d621629
SHA256813b111780eb3198a93aaff4a977f82704daaffabc4869a8b1d162cc4293cc06
SHA512b902eb77ba4af86e79489bd807c355dcbc77c1520fc93af9f6292b1cdc7744f62743c1f7ec43f9bb966fc2e5f5a6ec40a4d2a6a40e9c87cc56540cc4bdb77a63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5697ad79a44107394a054603791e4f2ed
SHA18b6be81c9bcf366505307ab4a2aa7d07d4ae62ce
SHA2562d3aa91d83e1e86f40d9fee2a8bd41ce70004c87ce0d0bf45c216d7e9195030f
SHA5120c1a17ad69d6cc06cdb005f76abd41c8f606ba3f95f5375d7ea8a453ec8b88245fa5490485bb4dabd9d2b32a57372de21762ebd69e8dc0683cfa391fad4a2034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba9673a6ad4242bc2e004973ce43bb27
SHA1412f2b3bed6a252db99722af0b8ab8b6f84d9428
SHA256c891cda00026657ce3ea516cb63283c9567a76161e1a601634ba6a8180b14376
SHA51208a8f5215f578aa60e087e1ce3423831d74805eed00c3d4bc2e971ecca16c4e2ef4ec2aa5b8c319824e6182a872cba141856209f8754d3dcfd72f3ad14c81c68
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b