Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 17:39
Static task
static1
Behavioral task
behavioral1
Sample
1451ad5f8306c121e981edb4afe6a3b9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1451ad5f8306c121e981edb4afe6a3b9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1451ad5f8306c121e981edb4afe6a3b9_JaffaCakes118.html
-
Size
53KB
-
MD5
1451ad5f8306c121e981edb4afe6a3b9
-
SHA1
6aeb36769a077cbc0940f62ea7be5fd69d7ce279
-
SHA256
9f337d96f76a15ca18d3cb90b76576193f0201fa3b38c1f93437b805637fb0fa
-
SHA512
2262d9dbdf4fa3f58590d4a6539af224419ea1d1dc620260e43e0bf13c7ec82248e0031be29df8ca7d677220a08a2f81072491a250b1f176737ac3f02e659f55
-
SSDEEP
1536:CkgUiIakTqGivi+PyUgrunlY463Nj+q5VyvR0w2AzTICbbaol/t9M/dNwIUTDmD3:CkgUiIakTqGivi+PyUgrunlY463Nj+q1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{97EB5461-8277-11EF-B686-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6087476d8416db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000053e7b067a746365af5d428131d9a62126d8f5c973999bd8fe04f7d99ab793986000000000e80000000020000200000003aafe0c1428ea9475ea74156680b36c2714dd283d5fef735c373f417e8513e4b200000000fd1ed43d5b7ba05a8bd1cc13b7e3ef5b3b7dec3fbcb310b45af03ce66a77eeb40000000abad6a4dde09875e7c097ff650cb08968b8dcaaa0a2a2ae72b495d883b912042f0c3ea947413b9cd5cdeb5ddf9620c87a43c184eed385512ea6b1e79e9fce0be iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434225430" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2808 2644 iexplore.exe 30 PID 2644 wrote to memory of 2808 2644 iexplore.exe 30 PID 2644 wrote to memory of 2808 2644 iexplore.exe 30 PID 2644 wrote to memory of 2808 2644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1451ad5f8306c121e981edb4afe6a3b9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596ae97c6c60559d2cb3977d4fa768db4
SHA10284fe4e0c52f7757bf7df546155174d5013f32e
SHA25609d76b1a30acac9c1a8f9249e48587353c0b5e7b83130e7a1d8ae375fe36f707
SHA512cb5ed74572b5c6925be34bfc5d588cb4d623b8e22806600a5e21ee4445f64a29a1d6aa915080bc32e755827521878b11c066a10382fd78eddd58739a35959552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5207eee2a2ba248cef6a7b9b1124d8d5e
SHA16a2dde59979776d4586b490cd58bbaf802d0223b
SHA25611946f2cb7fdc02c0105b0e99b190a0728f19679bc835ffc419844725aff8698
SHA512c38e095bb2e4633a26d4229e59cbbf5b2f7abfc2ac7ebebdabf1ebc639f386ac148abff36bd9e0a36dcbede66980ed94a6c9068decebf71b44fcd43e8019d59c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57224bca56f64cfb1b09aa717dd2e6762
SHA1c98a4d29c28a11d9159a03b5164cdaaea716b257
SHA25690e90d8d31463ac441b3b7219c21a5695e925d317848949496c90cdd19b7d44e
SHA512bf5d5714d53500ffae4ee91acf422ad4ea4e1ecc627ff6621a37b807d196bc420d444bc15b9dfa8adc8b5995d6ea0ce3401cae9bc48f4d8d9a027347fd780192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f05ee437e609b8b89a9975ed61fb5343
SHA13de2cf4eb5fdb3099c823a81523bfbdf7729fca3
SHA256af975d7f283ed844fbfa0757c27da4c023a85abae440778e486866392676f8b9
SHA5128d47dabfb636b44fb46a3e11e7c08f0549643e30c80d20f9235e3991eb19d899c34b835da8212b539a0127ff3b1217319babbb0e5674696ae91687817c1403ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51605fb8e4fb1eb3f7e791ed898841d27
SHA178e9afc4520060a9585a96eca64e6effbee09b04
SHA2561622d2024f9f51a992044998acf04e8d3d763247fd0c882fd7bafabeb7edc2ca
SHA512eb0d7f40311082cf45dba18b1794b5f602ae3303b28a4d5385357538c9d7fced6597aa9d98b713870ab6685e44474fff90cfa33960aa95e155bce67188cac28e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da8f197cee8f028b08421843a5996040
SHA1415df32231f75c071f801f573f907e7fb60016d0
SHA256701ed503f13fc039ddf1b15fd44a43ad8fde7759459dbc3daa28d4f21b9083ad
SHA512a50269a4e094191cbf72a2f7dbf28c41543f9ed3d0580785543c5e6a3c03b4e8883155a7801c4932807f03ccb3c275cfee4e3735c50fa6e0d5089fbc4d208c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53077ddfe63f2834c2a712096a9e02204
SHA1c7d3f3dd83bea9b91cad35e38204c20349b28e1f
SHA25672b3e774dd198e3b5b46bb5ad603f47bda87f7ce239d647db408c8f3358bcc08
SHA5124b26d1375ab2b8956691de01c6185854feb91e2d27ff500648dcdb5a5fa9c5a768324a8591ba52ed8ee781632816356f3a03e0e0982b1e8bc85d0cb6db10eb65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50732c21902e002582dd6f74004765dc6
SHA1c45f4558ebf2ef452c1fb12c4834f344170b4963
SHA256da9c2a23a88b905bde677abb0d2ab0fa379b0c3b167cba122b51bb6d788b7d7f
SHA5129c36c3101cff1ee8ac305dfdfd9ab723e7a40582f633ed5079c9e6b76d4c67dcb392a60684cf9e73354fef4cf609beb2005835e86a5fdc61228ae404306066d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54259f5574954075c882a674e2965033e
SHA105120f8f134ac519b2f1bc7003fe02d760642555
SHA256c14232d320fb53a3368c83c8ef3af5e16618307ff7fe59fec57e0502740503f2
SHA512b6f1020ec538f76b8791fe553a8960792d1f95fc6c5229c433625160e718e94c2eef3c06a3a5cbbdd8579ae32f548f4c75588684ad83816ae3ee02d46d666446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7805295750882eac8c2e27f555d5fbb
SHA103aea42728a089eb062dd42606fb730180aa4c04
SHA256bc6a57c198297b1c49154fad3d202fe2500985b3e31ab0a9d1c7b750334b8e2d
SHA512872e79fa9cb933ba1de431ac90206b4824fcac9231484ff6e5c812f2d44dd209217a56e4a7c4d79e85c757cfb0e390f3650bbce64b3f40ab070be9e3a47adf13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b19e25e11ee272994a9bc0b1521fdca3
SHA1281bc6dd7282839399b2b0cbfb0b7070f304505e
SHA25605195638360a09564c200da278789e39e0a3f0e7f47799edd4fdf1357591d1ce
SHA5129dca1cdcd56b518e0ee32d2e337813a28088c945382f1aaeb73790b6fbffabd722ae76e0a73a30b639644129876b60c3d2b1a8c2c94226975bff19c997f13aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bd5a1add0b82f27eef2f1e1a77ce552
SHA132aeb5cd4fc1fd2dfce0da2c0c2497cf1a98f375
SHA256ad40c00403d2cc99b4e3382b0e4cf46e0d830c48ea8847e907465699abeb6e0f
SHA512a8a17286cc823d4d8af9f5f32ca6de77f04f61bb1a69585980888c50b020407f5ac8b7d55b92157785d89218d07c3923aa4814846c929faca9c18f05c14f1a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5042d533d53de5a34c31412077cd95492
SHA1c15942ad4ac621b7bcc409d75585a8a57cf00ad2
SHA2564b18c1e386ff157ec99894e7a0f25e8945d01aa9b6156842c9fac66bb60b8234
SHA51272bac013e13cff9311e1d660a54600908df69d5d862679f84074329870b5a7291059c7e9b1485e88180d3c13f39b614cfa8d4370664cca8dbe661285dba4fe94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eb341b91336c1ac215c89adb75bd60f
SHA1bddff4969a51182b975effd31364b0b280e60285
SHA2563ba7bea5e17e9b1940d26250f06b2d5400261c726d449d6a2cbd68b8043e3977
SHA5129fc835b9b9f47c34845d97fe952578fb3e1ff9d25519f4eab006b1981319cfa7bb8f6ea748bc26b0821124159d5a0196f14cd2585cb3f55c71048f42f2fd28fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eb319cc7dd74fc4891da3b799bc0abb
SHA1f37b5af4ba900b7584e02c0a34c3d2c53f623c8b
SHA256c8ff33a92d9b5094f103d3768a81be9fd6cd4b3824e9f7eba69dfeb0a54feb28
SHA512432667d5bedfbc6bb273b41bcd46b31e2b0b49a975a01271df8454e573c6d95b97182fd12be69b658ce20b98cbd1a02ca24d4d12f616a7215fb616f687beb199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f6c49383becd7c4f90558f01d7b3ae3
SHA116a701db4680ae202cc4e39d39b73e72310c1c70
SHA256f59d9e44ce986be7f51082d15a292141d1685fe6a62da0c48ac4d17f002c2eba
SHA5125e2b1b8271c8b848ed785e7e8f79659a1b9d9f84977f5ad3814152da5a2546c55761564d232cf6294a8da319fc04f7b27df649685df019e739fc66113290577f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ab56fe090c0acc5cb215230584ed9d1
SHA19a9982bd5a5947a6c7430f49a5ea75ea8870bb99
SHA2565e33ca0c4b6464638d541a2b98806c7bbfc4d0eb848b5b806a92b02489f62a34
SHA512731dfbe2d4b14f1893c44c57aee1c44e4d285bee0e25fd435ce90363ee39a13a59bc83a55177d05c53b45157e533cb1e68eb5c42fb73481c3bcf5a822191679f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b