Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 08:02
Static task
static1
Behavioral task
behavioral1
Sample
16d8794168db6229544b4cc4d4d95fa1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
16d8794168db6229544b4cc4d4d95fa1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
16d8794168db6229544b4cc4d4d95fa1_JaffaCakes118.html
-
Size
53KB
-
MD5
16d8794168db6229544b4cc4d4d95fa1
-
SHA1
c2343157fc4498aea73408b092d853ff03c4f4b4
-
SHA256
afe66306119f92404d433732ae6b12703cd54039b9526d3332a6b8702272730e
-
SHA512
079830555cc310066f2a2d7d9a90ab80ba580c419fa3c7d496ed438c081954e20bbf82087b646d76ab889a3b9e461d308336eed58812291cd6c099c4ff03c803
-
SSDEEP
1536:CkgUiIakTqGivi+PyU2runlYf63Nj+q5VyvR0w2AzTICbbFoA/t9M/dNwIUTDmD+:CkgUiIakTqGivi+PyU2runlYf63Nj+qq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000001b128e4872541dc5ae7aebc94e18471ee6fa6cc06a116d34dd2fb33e2fcb4b1e000000000e8000000002000020000000e254ca6b774ca234fcace753b041eb9ebd73c743fb553efba22bbc23e39366a520000000ecad69626c5031ad33b5a4aebafc295a3b5edba27109aaf33430159c7cfe855a4000000033e9fd496812e76e76ad00ecbe586987cb1bc89c0eb0b5a649d76c416bd144df0da1741da36daae4005bfa639c258d0efcc68648d5c0029de6a6d67b893ef529 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70ab63f9fc16db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434277196" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1ED06331-82F0-11EF-BA16-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2600 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2600 iexplore.exe 2600 iexplore.exe 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2600 wrote to memory of 1796 2600 iexplore.exe 30 PID 2600 wrote to memory of 1796 2600 iexplore.exe 30 PID 2600 wrote to memory of 1796 2600 iexplore.exe 30 PID 2600 wrote to memory of 1796 2600 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\16d8794168db6229544b4cc4d4d95fa1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2600 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524586f70de7775342c6c5721d7a32906
SHA15a05159c449e0543922b513f7c5ef95a63ab844a
SHA25677fd1359a83f9624325177694949a8f9424af58d8e8e3c1ba0a8548f7bd0f8ff
SHA51286a651d0353c6957b0b6f913878810327121ca1a07fd19813c846cfbe0a827e1a702731b7edf65bf0765615f4317a9c3d91e5a99d24c6a9f5c4b47e20b28cb54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550bcdee76268d7f93dfe0a35fd659717
SHA10b2a00efc9ff91ff5049383d98c1ce896784f5f4
SHA256301ffb49e5ed866d9896d1bae6a4e90b95f8287e580658a8bc9fed95aff0f736
SHA512d80c121e68ce79a5c6c2b0d0fdf244c005f2f58f02845a80261bddc08343954f28c3b95352c30df56c0ad828299ad82e9c9462cfe9a3a2b5b9f80a5c7303fd7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ac833d46f70f77dbf360d7f26794026
SHA10905a41e9f6ebfdcdc999bb5601e46478723908b
SHA2565d40a7447eebf65393bfb4db74a695b13139d079d48f1efcac6aa2ba41eb026c
SHA5129acc49461cec1f33ae27a85ad5ae5fae7d10134d090cec468be91b68e25e407b1544651bb12ed39bae31328fefd6324c44656e45783ed346ef61f0616a3c7c47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5611c133cf2a2bbcb5c99db881668b3b0
SHA16329008e7e52d01e3e1840116c8f9873224d6324
SHA25676ff299b43513a78181358ad42bd340f1555eea176b8b14daffa07c28b8b3dad
SHA512353ef737587163f87d79671c1278764df99e54ea28f0c1c422688a0c5992931798ac375e89b12ffbd3b654c5cc287a9249eb11875c3799269aacdd89d9f67a4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57219bd990aecb1678090b3520a94ba2c
SHA11c308806b4bcb328aeec2629e5eb0d84483187f7
SHA2568efe273958dbcb5755ab4908b225f405a5337c980e67513c58dca19fad4f6159
SHA51285800799af5ad109b089b665c534e46f673f216a0c1953c869ae1693631c3eaf9ec3cf92a84d401ff68dccaa7214817c6314d90a3ad6ded8ae5eb0ad8b092d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec9bf8d96f591780196a1a9248843bb4
SHA16b113f252ee7b2d565d19bb0f794750e1a812f1f
SHA256a4c28bea71e256ec9e423104e8a3dbf28572bbc71983e88e510017c86374638d
SHA5126dad7efc8d0f9bd12cea98dcf6df11c40df58111a0270f95364da3e78985adbc9130a96d483fb9fceb70f0370a2336765ab2dd813fa0c1f424c71a736af88618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aae0898f3f94e8d25b74b747ca72588f
SHA1590578281328734e435871669f28f6eeeda21ac5
SHA25690dce1b570057d576b144518ab5c6ad34ee014e89bda5d2743d2a502b5037ee7
SHA5125be4dafc1444ec615cefe76b4ccb096306088fbfa3e46aa93b81a2141262da31a3dc080be103fa6597f9042522e09da5b7a3506f4c9bd5159f83d077f578058e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e930b9369d4f02dbc32a366bb7f16082
SHA1c1561a9da0ff4a5b51de8b2d90a6cb27b7a417d4
SHA256c393e18d2e7becb1079423518e1319cade58031c702f1783591bc711f393e00a
SHA512803fb50775994d80bf4468a77bfc414346240aa843434df339b564a4f026a768815a905367b19693d94a14bcfba406dca264520a911724c3cc8b9ea59117b25f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5206e2eacead401a1ba708d0d144b0265
SHA1e02cb207323b1ec9ba7770077c690ced63dd173f
SHA256486f65887f5e3be18da276f76e463965f4aa3ba5aadc8aa57d193c808c1da902
SHA512b5d73ba87947638f2f8960e07dad472e2566be04e077eff50741eb8078820499cabf4406bb0b9751465503c360d742df83090ca8e3fad84f23b36708933600b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d3dc15652da47b59dd1445f360bd16e
SHA190eab051938897688f4573cdf5fcb65da670b57e
SHA2567bb4996647e5e08884e70c2d5ee3c65db451993e152bf492166bd3c2a48f7024
SHA512ec9b72d31198825b93a376fceee42973b1e56f67c8910b0eaf2861f84e2d5446952a56d9882eefc9b8b1462cb44a7458d7babf8b96fe047261f52edae6b4a10b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c3cfb2e5f741f423b8e0b09ac91beff
SHA1f019491fdfb853c3fa98e7eb6f3a16ae5e454d50
SHA25646ba3e121bd78c0e58d77cac6b09b2a2563ff178c1ea1eee0283f421d1b6a909
SHA51214c6f669dd9350fee3f3cee29f8ce05bb32112d5e37e68ec9581da401f6072454715cb9e9f7a4ee533ad01163da8d790917693378e765ebe73c1fa595a8f3b4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55480f9b1caabfe848e0e7af48462ba01
SHA13f6df01c21b12186288be460fa24820c066948bc
SHA2562735314c5ea73a277354a3b02ac6fda248a7de18ff124422e091b24b0202ed18
SHA512752e6d130de4d2fc4c32caaf1abfd2ce0d7d03be0911b6e4f15d7b4a7ae01f03a0189b9b95e1e9441c87652a481347335cbcda7fef8946a352e1f48f2df6dcc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b96436542480364513a132bffe722e2d
SHA14567ab140420e745b1633caed7c433f19b450880
SHA256d586f3b47b15595899f74ada91fa3f23fbca21ec5eb510747b49d480979fd665
SHA5122c447aa1745afecf6cab1844d6d3297d162304853da382f1c0734bdb77111b7fe285f1222b7b9ec59a6dc610de295ac04940378b6940b5d4e83241dd95466357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522fddf79f6cbc43d6b5bc9ae3f4bdeb4
SHA15ec477de61418c5c0df58354bf89376e88b45b64
SHA256f9c0aad0e39f2db8963310e7b572a80f9c3ccbb3bddc4b2f5be95e7ba7c0833f
SHA512c6d690e9b700059df666632d12dd199106dceb3f76493c8bded87cc7d5cdbbee929da937ffade7b78e0fe83a20e68e39b1da4917abd752e1167abf7a786b8cc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ee34dd994bf920050cc71f5abb08c54
SHA11deb6572d2193179141daf39aed103749ae545da
SHA2569394729c63cba7176f5bedfb114a9b82fe767aa98b20ffb7a33f79bd1b2c612a
SHA51209015af2527040bab71dfdc2dd267e4920478719880ca57023ffb32ae9e0579d4e973ab0b917db7828f36a1f4030c800a6cfa5f4b4771fe825baf56056a4bd4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582fde2d7b0fb25bafe51ca0d01737429
SHA1c223a4b668869c47e5cb146c4681338558aabfa6
SHA256ececf8d08d866574ea78e7386215e30be58c36dea3fd59a48c5fd0c6a15eae5e
SHA512b4909e8cdd7c707739800c8046c777ee87d9dfb681ed22d3059167448ca527a2e085d4e1d8ef416ab2e13f010b07b76a8ba3d52309442630f5f1815e6ff8ba8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537167fc19922f6c6b16fc2061fc72856
SHA1c40de9678375653abfaca55df751e6e5462a5777
SHA25635614e4c9947b0feeb4cc804702fc343cc32a8d1aec73ab78502c1894830725c
SHA5126958e5e0938da224050899211a44fbf1a694a02290cd4c7611775ec54c937c8a61da11fdb7c7067f208bffc52e54cbe8385f4b79178280c7a7d9f181e9034ffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6b75c7b45454ab2817bc28dcff2a87c
SHA1e5c1817127e204790d6907d25514eeb3d6f72eb6
SHA2563a5555232698fa4b73928a62b123f3b0eb376e3c29d91f2a8548ed0d3da46954
SHA512cf7045951d71a46ad8b1e6d3e143f3b323318bec22300fb3ecbbb1e7ee4d44a6009ed5efae72bb88294686e6e2aceef8180591fe7090b9a0232466aa90d40ccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c71a55127d1462dd439f49bfe2b3ce9e
SHA18a7c0de377bf55a2e23c524dd2a72cf428406a86
SHA256f83a93cc34ab5ca60ff28b281a8d742ec77b1ba4a0d0524b191b0cae60bf92be
SHA512b88f3dfa0167b2963a65da7b4fe04ac5392b2faebb3cbd525c1794fd2177627e488c1a2416dfa9021757c8710a13182f5818bfad2ec92b2132a3680aafd4678b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b