Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 07:54
Static task
static1
Behavioral task
behavioral1
Sample
16d16c7274dce9a8724737fe2ee768e6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
16d16c7274dce9a8724737fe2ee768e6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
16d16c7274dce9a8724737fe2ee768e6_JaffaCakes118.html
-
Size
11KB
-
MD5
16d16c7274dce9a8724737fe2ee768e6
-
SHA1
2f46ae394eaa6ad0a4bb37c296ba6c6d13a32c01
-
SHA256
b1eb66a68be0679fbb9cadd5e8f060aef35fc7462c299f99d43d789b3de39255
-
SHA512
d455c358280a1544c4b1de2726adbb999e63e6fdde4ca78cf0e93c5ce4e25fd144cefd1dad56f7eee7a0650618b5a59c2e55a5288ee34e7ec339b6de1abc9a6b
-
SSDEEP
192:6XTPT7ErxtRL+bUKc7FgkuRCIGZup1fTiPRUZ7ALNpTpSpgNp2RpNEpSp+5pypSN:O6Ec7OkuREAMUaxR0EE8kUE8UEksEUkc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 308ba3e3fb16db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000004ad24b1e723efeef0b4348af831c8b16d909f6ef0d23bd098c0f14e1d51a4f55000000000e8000000002000020000000e1877c7d8ec9df3a5ac96f9c2470ad160f411b143bdce69dfa2220656052ae5d200000009e6282796a31d389cf2f3ec7d2507295dbf40919a9785390a1529c42119f06f9400000006517306926463b325d7780dfc37a34476f4602502502f937d6600fb7688f0bf1e785a2562d651f1b570db5ce826fd8fef422147d6377e20932a55859fa5eb992 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0F0AF651-82EF-11EF-A5CD-E699F793024F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434276741" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2684 2080 iexplore.exe 28 PID 2080 wrote to memory of 2684 2080 iexplore.exe 28 PID 2080 wrote to memory of 2684 2080 iexplore.exe 28 PID 2080 wrote to memory of 2684 2080 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\16d16c7274dce9a8724737fe2ee768e6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5492054c366b454fc79961c8ba6a68411
SHA151e0a5e455c970cffb4a572c32dfa7d187ad31f3
SHA256441a1c1e63b9110a97cf81693ef4b3ace480c41a53dc453704da89a37a6dabf1
SHA512a19b702d104d40ed104286152017c7165f1ae438fbaa50b3b8a0d30e2fc8083b6c2c148e0f6eb807ada289b2d48803b92189bd1dd177ee911a17fef04967125a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb3a5377aab1e3712b6a40a8b6791e0
SHA15561ced81ffbc5eec6ed4b89f63076af54440ebb
SHA2560b9336e6bd659cdaf66d5f28b5291d5135c5fd8de1a409e3acf6d6c496101326
SHA512d7f9dd304209470bd1c8933555af42b51fe760de01b43fb2e9e29eb4f9c7f3f18e6563d5d60f093b68bc389edf699c435c372f32884e30239b3481ab48bdf7be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec2dec10c6431dd5e61ca559904fe1dc
SHA19b52efae08b65dbe706e4064ab39ff5a72c677f4
SHA2565e56255c095010e611a0f54473f7440f2b77f37243ef10deb249f56694122f9d
SHA512d7c34ace113f8212057fc1b4656dbf055b8e92379172f2dee86239ae7cea975b85450996844913673d2b9ecf6ca8f4059f62708c6a0b83e805143084c1a31b50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f9480c91faf663b51bf4d40c6532a08
SHA187ba7a5dc87fe1923a5bf3899f3adbd4363a975b
SHA2561d77f081a05a9379ef66c68deda92f8f3a26fe6535b96bc5513e37a663b05720
SHA5120ab36ad27b73da16877c9b40c2189225bb7d3a003e85d8e85204b91966ad7f27db1538ee6f5b7194e892e2c80efadefc442f23c59c87f7ba7c08914ec9129330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54038739a6dfd92d343be698fc426ba6d
SHA1141717c9c66730cbbac8b294ccadfc766afed5fe
SHA25673d2d450f4d53395d5bcac014cdf619338f856ce85dcdb271b71db98a89f0c89
SHA512df5650038babe81416b4998d3299fd02116302034bbbbf7cfafa90f8d5d53dd94d5af0687ac041578f177e32fa7008c5ca613db30b58842bb20cd1a285072924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5290e77e9d2fa8b323b66829bf3756631
SHA1bf9edf328117cc2eea6f9cf0835578962ec7f0ea
SHA256d709f6d0ff6c9cc113cb132b76b922e805b05cc6d83e4337665f38c12939b850
SHA51204939d46b2ec281f0bb12494e9ffec1f357f07367426d2eb1968f0c7a370b41571235c0409a8c78ebe6022f1a0f8aadca0e813b8082f380b7d6adc3cf8552c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1f865b6458a323e5b81431d9d98d5c4
SHA1e76b61d33ff0240c45c637bb3e7c1054db58c470
SHA256ba3316ec6cd55e8dbe7568158996a4cb7485f651f7b945e292175f32ca85076a
SHA51210977215dabd524703547b0ff6b1a74d199345bcb0726a6b55a4baf8eacce84ca82b5b86fb86bf3d34ad1e44dd794d8a4374f4af8473355d55364fa1d602f666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc17f795492e7229de8f7867a1b66164
SHA14abe6ab9ca7fdc31ff7524e0b427804f6165deb1
SHA25675e258c49b28934822b469791317ea5fc4769283bdbcd3d1b2d350b28c50fe65
SHA512930d8925281805712a30f40f58ee8b6f2872c997e06049343650661b1143ec429acb63eeeb03fd07e4670c370ac2d31239f6ed1356a4b8fc86f2afd26a2f5e34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c00555a0182bcde50d66327ac151789a
SHA1fa486e788e73c39e7560ca432d5e508309d92201
SHA2568f5ff92861b110bb992686699edcc4821178b2518c11c0c96fedf8fe181899ae
SHA51298a8ac7c7c1b8e571ceb7048cd67b868283f7585f61a249b69c8b8152ccb242f693f9134ee207937f5c16fd86b1abc8ad23ba2a217e19aeb2be8de712233c099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b53ded4e2df0621f363e05f4b9184c0
SHA13cb80d300e256830634d73fb63a19e0cd612f167
SHA2567c3bc334b31ed5026301130f8ecd9a71c815d7aa1953e53faf19ee9c4e1fecc7
SHA512ae978d9a93000ad03526e90ce6489887f143abd33398038fd50f6e67533c9fdeda08b03b49569a0f031f371df517798b1ce2af887efe66f6aced4b3089356c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b9c50da702a2010d595a3d68fbc023e
SHA15c175beb8b0c0ba85f0f8aa2316ab725e51f8d4c
SHA256a63a0bcf08f884fb169a1d21d0e7ec44046eeb2b4963d0256addc7848713c587
SHA512e019668029427723fe734a63917060364a01163beed59e0fb01436b4d8562a2c5a4dc3abb4192009af059995fae398a5bdd6addf41f5bf2f2c25d155333764ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d910aa069a65e1f948829d2296419d5e
SHA1d7893a13b034859b800d6cb135c2424d23e121be
SHA25678931544064a6007a0a78bd3c639a8705cff79ebdfff7eec2dc51458908c66e9
SHA512ebdd1925938db773184c28285dcf3aa8baf9e3c017969f9e7cc8df25e5fc194db2850e36312bf796982d3abe308dda6de3b91099f375790c502c1912ac5f4a96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9d3caba3cb72bb4a5c3ebc0b7586a0b
SHA10f5426db42ae8c5ca1bca461c5bb3fc268090492
SHA2569d086eba9cff2673636b8cd2b886a4fc18348049b762f2bec32c81eae8c14058
SHA512cbed2e70ce45d10702f9b1268b7ab7a2aab1c5e5c1fe27601ed062e7e22d30bd3be07eaaf5a15be792d9ab18c3b9041f1d004f62204f02ed85eb6389f46fabaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca9d354e52fb88d41c5b70d7ef2b92be
SHA191a02b1147fab448e2a1d34cd8448fe2ef808743
SHA2568014b48d3a7ad57ee328c432a58c96809b62a035830fe8de9589f032e93c940d
SHA5121786bf8a82df1aae325ee5b6693c6250f9ce2477887b074891d674655bc02169e3885be278f2720173b32f2a573fc6dc4c45e8d405bfa600e8089ba7a08f0d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5841f33477ce20351822ba6fe4515cea2
SHA14912fff243f8c1c29232b6b64927c84e00c9e185
SHA25627989f5aa3bb65fd8bfa7993abe55f08957c881782b50198a74a3d47d74929dd
SHA512b164b34fdef8eeb2e5a4869c5737b2d1072111f0079c52854922cba1f8b0421977378394ec0f58dd00f0f6cdc4cf24acb1c655603c687cf4f3fcb84c416ee5de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5601b56ce6a9c45db71023f32dc1fffbc
SHA1fd932214ca6cec41b5d65bbd5541dacb0a2c2fac
SHA256776ff5e1f68b3d578d94b07216a327d392740c63dded8ae188cec2d029edfda8
SHA512e7c775a7f8c3fe6c4aa435c83eddd1935719cefcaeffc51d9c10a0655a2b94b7359ee6ec47d82d752a468f62d0d23693dbe412bdd2cad00253cbcd52de8f9e9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5552f37525b43b26de7ac248c9ea048ab
SHA1049b2fcb549452ba717edc7c0de316ab5b93cedc
SHA256c913f5bd3af7fa78b918ce797b1b51e6efe81a5f6c289eddaf18c5a06ddee118
SHA512c78497813fe78b7be520668964e21096dee111fca8f28595b804df45bb4a5c84becf2aad898cd922e7aaa0180b02aeee5a36556890317aecce99cb9ae2e9e520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f77497f1a6f4cd307c169b00fc73a01e
SHA1ddd0e0eb2ef05df22a63590e772cbf3bde2e9958
SHA2560cb9b91fdabee1b16e3be8a651600caa368c01b83eb94c936378232c89968c97
SHA51287724b1cc2384dad9541c8d333651b80836c45f8c1cc4e70ab080d86280d46825cc67488a930ef58e881a114b50abc50371d5a4fe3e9216b655383c923b5a978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519e4fb6134eae614f1e8433f8368cee3
SHA1b61ca1465f1e88a1c20386a9fbd74959ac733454
SHA2564afb8efbede41464b89841772a859abc66b2c439a809d5b128fe07db289bcd05
SHA512a4fe6d09b8ede47e71a9cbbabb8d2267ee1c58234be6d8e48694cb9498efdf24ca7d32d817561222679865aee6ad0f3e55cbd679a5111503bb527d8eeb9ceda7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b