Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 09:41
Static task
static1
Behavioral task
behavioral1
Sample
179086e02963749b05366c089d0bc807_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
179086e02963749b05366c089d0bc807_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
179086e02963749b05366c089d0bc807_JaffaCakes118.html
-
Size
8KB
-
MD5
179086e02963749b05366c089d0bc807
-
SHA1
afd0909b12dbb1bd0c2cd4cd9948d28b8a6b86eb
-
SHA256
aa018c10c7eedf9e77b88dda37072e3562c8882776156b138501b9258fdf6ef0
-
SHA512
ce0ce4aa3394399c8942123da7cb83e1e6a4ddefe0909b0b60bb12281648b01326e9651d742929113115286e918de296ddd852fedf93127d9355f8c48dcfcf81
-
SSDEEP
192:8DwpWdtta/QUURtCHeLc1ISHfyrs01/JAP4RqTnFOryyLatCGl3:8TaoUURtgIA+JC4RqDcfLatCG9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000076c4e7adcf2b2370625fa08290b56ec6a9829904a0a1161bd10450b148119a82000000000e80000000020000200000002639eb08b28007e8be7b1ec44a2d679880e598a42216bd2284b76324d2201b2720000000514aabd0c718f6184655e47163511a499a0c9666863511c89bad11de8dcc8e0040000000ef799f6dbdfdc3543aef320019ec924f3664ab81260357a4487b9b21f1dfe1c0daebe67179ba55928aa0f059cea5223ea85dc4b4298ef089e571eeb2d6119b73 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{350D7661-83C7-11EF-ABA3-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0e0270bd417db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434369576" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2572 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2572 iexplore.exe 2572 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2572 wrote to memory of 3068 2572 iexplore.exe 31 PID 2572 wrote to memory of 3068 2572 iexplore.exe 31 PID 2572 wrote to memory of 3068 2572 iexplore.exe 31 PID 2572 wrote to memory of 3068 2572 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\179086e02963749b05366c089d0bc807_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2572 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffce6ff0dc666fe43937db5505fd148c
SHA1afe3cbe5c09c330d9d43f36761965146de26e07e
SHA2565fa0a401045a5d85d2344807d66cc394b54616da60d00f3f008f477125724073
SHA512946e679f4118eefd9f3e0ac81ca0938ece42862a4c57cbcd661be258c72e671fa401b639d114845f2f684a257511db719693514f5b9f53512bcbf2c4e9120c78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55503f446d4ffe97dd7fc9bcc3839abe0
SHA157506917bdcce0356e1dc7de390f9af9c4f4e6bc
SHA256ffa272cdc12d702a8f7c8943988375dbf62743f107adfa4080ff7b5c9c792381
SHA512c1ff984d6ff910353219b7eab81c2e0aaf51be8b1926d69fb696c5e1e0b7e5513a0e642c2800840895d70059e538e2246b1320cbffa8e323154f9bd7312e19c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da5fc07903312be51d732630de9f7a74
SHA1a140a68d05a6637960fafa2bb842c0c83fd7b57c
SHA2560652f6ca757130c634e4e9e88958117305a016e6cb5d2c7252f1c2e464952ff9
SHA51261be04caa1955601c191f528e207fb100d477c8a011014e7b883e690acf9d34059daf80fddff565557325c7819db3c9e89968c74e15bf5c791b9cb199cd4f754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adfbebc3da7173a0e1e1eb60a5eaba36
SHA14ba878b0fd1eacf28ddf53a297b870737afae46a
SHA2568f86087c0922845f17c5be60d6366a0c876bedb855b771d001548d200dca5b4b
SHA51247badcd51d20c00385f767b725b602670f0ed4f45b93a308e5bc76a1b4772f88dddb61151d55e835dde2dd628b1f0025e24c4ebaa7e0a34f717d177c634a6bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5558cf2c2bbb4b8b3539d06aaf111d6ee
SHA102f3d1eed492556a8237ec6f552761e23671da14
SHA2563103a8eab3bf42d94f18b3285fdc4a891d3f2be00e085517d3b65a3c6baf4f0a
SHA51224494ee676e1c678fddd82c0ab7925e24e03e506cb0195dbdd8e2cbdbbbe176837e41cc1c9b3ded1173d725a6479f744ca9854d7c8b575d59166dd28b77db1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54493a5a082492c168145e7ec10c9c3b3
SHA1521e6973a204e010ef589ee92220ac26e979bd56
SHA256c75fe71bc2baab99f7211c13a05cb6d9a3f4a0ebf6154f5c7e1e6fd9bfa8d595
SHA5121ad56cf3f4e3af853a8c01ab7d6f0e99dddcfbc5262c3d84e95cb18819691b6e3788b9d2db25f22b96f16a80d37c075f61ba176c39c21f153455c0f1dec42328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56621c96a0df816c37151d66e7263b41a
SHA193d9486673318c6db682b5e2d826ce9c341ac29e
SHA256388c1f3a5264235a0cbe33937e746aa8b5538a065c481a831eed43a10a2ed670
SHA512eeb554ae511b778a24e7165736d34360d3365ba8c5b06ca49c67381e0a5a11faeaa02275ec0f38b964c5f67f3e1bea61480601c5cd7129258f75173bea003b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c88a3f6e0c879a2364552a6837928045
SHA1132980fefe12ddea5f332969e59025bf6cd105d7
SHA25664a1bc1656145648e7f7fd4d948b6effdc655b205324c35db853ee0feb6bf898
SHA512bc6c0c09c3002495ea2f550548483cf3b1df86c08997391711123cff0d59ab9520b31ae822007db3769380615d57566209e0034e0b8e10ad419506ace4da4b2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5038da523c871d132cc0df307282f756e
SHA1da247e03ccbcf3045143ea34056548f357fe9b40
SHA256427779edff8f0b1a51b901500cf5c2087e9a7dd62c67c38d7b7cf7c7c34e3c97
SHA512bde259d3641c1ab02429b2b46498b80df3f8ff07586edeb6d7e73350bf561b96e8ce7b9789d006b9413ca35a7640c92be13a09a0dce4486bfe2007b4a3ae8956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5406e9ad3eaceafa9ccdd3f438b51eff5
SHA1935a2efd495496a39207e76e4d71e8bf31888069
SHA256cae3f065620d8f1c6a7e7edca7815f372e53c81cb98dcf98f451b2f406912c95
SHA512c452a57fc975b64dcbb03d05bfa36a23b0dca461da2e71ee7d501ccfeb24ba7df34998c48924fd0b8007039d8a71d784702edbf4fc84f4746a60af9ac8dec361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e671bcb64c433930b9f49cdd1013e22
SHA152cb20cb2da4e338a326648cc268ab505ecc9ee1
SHA2565c9d0225a173dd50395d8dab8a8b114f2ad4d0dc6d2e60238eb5d24d1421d9c0
SHA512b694b8c6d294a92a4eaa008f1b977cb1e64ca24620d06583e605723752ad5e8bffb301d8ed60cabc04c5a5b218ce928c794d2a7584fcb67c2b9745334ce8d710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb5639b6c0b33f0b842ed6750a391eb
SHA15ffeb5f71b7dd5382d3f7970d94faa108a6ac41f
SHA25694abd13433bfaf7a1ff43b689c754fe66e1eef7d2c051683530f2e0727d2458c
SHA51294ce2fa8fb8841ea1e0d03926a0d18a9c179d2bf34c5ac1150feceff8090d719e9d8ba528997bfbfe469536332aca2f05abf626be6cd87872d8d3e1a5b6a10c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528ff13943dd0021a321f8452566e2d73
SHA148e449b7f7a2edfbbf3ab8093b9a1012cd32bd56
SHA2560070deb96f128bbd9a4cc4bc5c32bb0718bedf952fb0019f694cc8ad2ee62b63
SHA512c6ee53e2f3bb2efd0782dee8749717ae0e765c446d57607c32af269d656fb7aaeb7a569809a8b0bec98a9f71cfdcfca170ab8c305cd0eee9779c3586f02810e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f600cd04e72642926698eb08cc97f143
SHA1357fdeceab9dd82bbf6f7aee272a5bd0bf9b0af1
SHA2561757696f7cf19f63201aebd22d268424580a73ec0c89a7c100e1599e980a6c3f
SHA512b1a0b449dd5bfd141fe9982e7decb8d3164c011ed7d5f94c71d7d6234db945aae2d5d1ba294cf0ba8764aec10a6fc24d626ce167153b4adfe75f43445ae89d8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e2a3de31ed9c2607a432e51589440bd
SHA12712bb23e5dd62fe6c2a19244dbbb9ac476c686a
SHA2567b83145a06d6fc3dea77d15183d23c00bad88099dc220fd5f0e351c94f00ff9c
SHA512bc6535bab940c573c687b16f8f613b2030b6e4b88a0ac05257dedf12c760b43179724d94b6d7e01fc683d69a3c1e9581513dfcea90dc0d78c936402feeb51963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579c1797dc53edd5d8340adc429de212a
SHA1e15c0f6c056182fabb5030ab088e9dd1e4536868
SHA256f48dfd2eb4d680c413a88fa53e4b6ef0fb53ec14f9730b75b555271edee2f30b
SHA512c41c8664e0a96962158692ebdb92e14dc9cafb4f8c47bf9d773d33592f3f2b2a56fc52cabcd4045b18b382a6d7c98340b98a3fc2cfcadee31d43b1dbe8726831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5044680248134cade0d4e2bdd86c352d9
SHA1e4d002441d35cb8abaa8e73d36ef352910fffbf5
SHA256ed164f573ca44e9d4a1c265382d69632998ee2fa529dcc90975c98d99ec0b44f
SHA512a900d2fd3e774e688ac177ad762405f065f554a7238c6ba6690354beeaf1ce3e77d57fffa9f038395533f079c5fdea4349988e20ec47dff1188dc4e1a39de61e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f020ece0a1fb4f72f5985e1e78f0b989
SHA12135cdfa50974c0a9353e1fe02cd7528eb206745
SHA256cb7093dca37d90af56571d1fd08659a106ae23233b52a523889230bf22aa671b
SHA512f579013fe480e16245d69b9e41af8d7255d788c2b176061b0906bac490b67b4c4fd5bcd694f6ec34804fbe8882feff825d0dfa4ba4255ac4ca9ea37960b30e3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5249628f72cd2136bff10b2cf3b80d05e
SHA1a91b96b91444d53edbfca0a6453acd18fec8f65b
SHA256bad5a340b5d023db4ffc7b0755a27da3bab6eba38b90eba17cf9a56407acf3cd
SHA512bf58acea92b950446f934e7a7969f0fe98de5f7ffd43d0b9b01a3045e1eee58b10a5e9ab903b98f592417b92e841a7c301242dac765e009b7528665e3c0c4051
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b