Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
17cf4a3e8050f40e65f3caffdf47cdad_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17cf4a3e8050f40e65f3caffdf47cdad_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
17cf4a3e8050f40e65f3caffdf47cdad_JaffaCakes118.html
-
Size
7KB
-
MD5
17cf4a3e8050f40e65f3caffdf47cdad
-
SHA1
cb17fe374889b9f52639a838325689c524f3c6c8
-
SHA256
bc7a60cdacf9de5662496213e5dd4d2f0362c5375998146e28465e5a04461432
-
SHA512
f54adf81d91bfb72306fdaa65081f65fd7637fd27af40c326f8e7985331ce2a666d98a8d2d781128d97426c36889c2856d360a0c4ffcd8a153add961471e31b0
-
SSDEEP
96:uzVs+ux7PyLLY1k9o84d12ef7CSTUIzfOY9T6G7IrcEZ7ru7f:csz7PyAYS/TtOb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000054f2e3d1ca86c622f68d02589115f6821036d6eb8a94db893271817ed8a3133000000000e80000000020000200000001791a105082d2957276676c197f353c248ba4a224e9b136ab3df68182fc4eef620000000e2577636ba75aa043d00e47e6bfd641a0b456394af0264f972acd9a473022f05400000004344ed80f75fbc09d2d592652b40527d924639bc1e7bc643fdfdfe45aefe05e65e3b9ba5699574fc0c8bdd3ba8cb9581af0962152ea48d114b91a90af7f9f18c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a85afcde17db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434374274" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{25DBBFC1-83D2-11EF-9630-523A95B0E536} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1652 1640 iexplore.exe 30 PID 1640 wrote to memory of 1652 1640 iexplore.exe 30 PID 1640 wrote to memory of 1652 1640 iexplore.exe 30 PID 1640 wrote to memory of 1652 1640 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\17cf4a3e8050f40e65f3caffdf47cdad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bb2d1ec1c5e211ed3bf384248364ef2
SHA1beab319ee7f6d9b6c7156917ec4c326a12e5757a
SHA25614c971bb3cf0307113f0793f1156a2c565d61072f473d74cbd9429d53d43f4c4
SHA5124361e6d904cb65f7a0961851a68a2426c22328ea16d5f2c267146db4c871664d06eb07ef5d6509410a80c27afdfb8087a721032877288a9fd629dd86110302d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5063635e66d0084e3c061b29c8bc597aa
SHA1b5f742c8e016ab9fa37f1a4fa86612e50de43a7c
SHA256d4d8426188f339c4fae5a7b54450367d721e7bea733bbe4974afb4589c533136
SHA5127ad89f74d6db2d7dd7ebaa60d52b5dc5db6d4ede067bd346aaeb56cf04e2f3df6a4718822df66d9af933cd7e07ce1ce4d53878ea63d9639f9d25f7be84575957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5ea964e7cd7fa740344e443724b2e19
SHA1aa0b35bfa1f260f08ea899a2582923cdbf5eea56
SHA2565d1ead3bedab94611bcd8925d53a5e96ce64fab513c8fe441b14deeb92872edb
SHA512351cc94322040f7d17083a5a05969b52d0e0bebc7b3abfe1e1e6fc9e008cd265caacda73ad974f3ad411ae5625417f5e5fe2ec057b5444c21a5cdd23601da0e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0e039b8a0651fd21a3c015cdb7e3cf9
SHA17f2fed3330190cb09dcca2475f26b58ae9ef7724
SHA25681de3747ee8dfd9394174d326687136def9dba75a923386a62166dc185020b39
SHA51253781b02d2fc81277da50be0678ee5c13f56bf91a3cc3ef16e9a3e5f1fb0c3b8158d49201bc9f11a0a0eb6e546982fdae2ab9f520b24080d42f012080ed32e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae6fe1660492d40867f760ba0ff2dd15
SHA1ca1bcc7b12f76d48284fd1863e15d227771e60c2
SHA256bc47e5800840a476a0fd57a608c9f8fbbc456bad9913c6bb5ce99b156e9ab01b
SHA51270290e4e4ceb6cef46df91577ce21ff535e6c530ca403a58665974e805a8804301b088bc6650cf8223980ef4359978315c447d85732123da5ebaf64b063c9449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5831dba7b00324408525fd5bec19bff88
SHA152c12d1cec2bcff1dcd70afc10bb5bc4b91f33c2
SHA256304510182f1ebdbfe5b386adf7c80742ed889069eca301072d5bd407fd0fe4da
SHA512ff00b74366d80b121fdaa63e22d052b540958c680350e9de3cb942c5de395f1e422fd92292de19a3581c07e3f7b81d058f4fc8dda8e2173af744c6d253eb9cd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509c4442927c058b6f31038e61cc6a1fb
SHA10d1990c4e9a4c73ce462a8080c619a236d2b12aa
SHA2565db539110b1e7c3b4332e29c7712426fd9b552ab7d03d6e5b3161843267c4a41
SHA512ff5fc51783b03cf42ebf272f1ab523343c21c063569e81c6a8bd4cf2ae39a250bc7e829ed30f843a0ac3f9fc024b88cec3ada859c5c71e9c5dd4ad743d9cbabb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5436b0d624e2b12e7e879ab3ae0d2939b
SHA101028c3eab800d537218346cdc2bf5e530dd651c
SHA25693cf58dd6bf56a7639898c3b2a8292ec146500179eee5db2612d45891203c31b
SHA5125286652483414c8f04c65714eab0448447c447c94f68a0ed476a3a507d405dfc283b1a0ef984a8f22b1a4da08348501c00f8ccd8b0221ddfbf0c6c4875521ffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb7ed10b6cf56a30e5dff88a132171e4
SHA120d2b5b87400274feed600ec71d63b39d19fd2c4
SHA256d0f17f4e301d41eadf30774654a92511b63cb5958c62a942a431d9f38d543284
SHA5120c74e43c43e129009b2a38e317823a3fcdc90100b78f024ca1a6df278f85125e22225421c213d00c6096f4075a1476004ccf3b8e473c3514aa34408dedfdc238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7ae5855aaa4a8c81eedc36de4a531fc
SHA1b8f3246339300d63d56d650b72fd56a73a8ff778
SHA256642a681afeecee04e59142096f77843a07f42c80f77a9535ed6534b66b74957e
SHA512df10bcaa19f8df0f8b1383c4b9f5e34dce2adbf90f030129b3d9c0a692dab028ad7b282e58c6900981cd13782635d6cb639b0652a20db9152090ade8b654c5be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa9ec29db25adf193ff7efdb906a4c8
SHA1116a639e707415870bcca6b3f340211b1d155cf7
SHA25610583fd5da093b724b1171420e8a8c7b2ba3643423d98c2b7e6b3c22846d3717
SHA512d489f4c60bc25f26c06b39676075f0774cd8cd6688d34a65c10d2b6fc5a8190383d9f4518c5399000a071b0b39533b1909a650fc5fa4fddf564ae07bd691a01f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab759fbbdc80c2e31ffbe37aa7f19792
SHA1dd54879565f6d3dcc81c3ea26f19900a88310d3f
SHA256d583d7f82257ed166d0903df65e3a5097d4e5c72f2478dc223435b3d72b6c9f1
SHA512abdd0ecbc93489ccc3dcf84cf46bdf333c6344c9eb10104c6b7e2fbffababe1ef57e9b908aa1cf87462cb60c4de6f64fecbf9eb0ca8401e29874880f6f42b07b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594c18cd9015bbd80d715f0736930c2ca
SHA18d89ef9404512d1896f7eea65aa6255419eadc3b
SHA2565348363f2acdc63abb1b41b842b7d9e696a3ff842144ea4f41f9c43bbb7a0244
SHA512cc677367d96c68ccd81015af62f596186789ae04e2692dbe9d4ff7c46e86e1d515b8269f2eb0b80273a19132a06d85f74a7c705535883972c7b31e312f103c19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5769d4808e0a89a68bf8359eb74d7d891
SHA10911162dc33563adc616f7eb365f4a425232aaa7
SHA25618155764fb602ced973a3f922356a25274a0ba222962421657d3083d04aba462
SHA51243708db8aea8325b3a0e9e70438e2eb7a6bde266b24f94bd7290f93ea520ef9b76115800e4f17dcaa7e01d0dbef821fc2b66d95bae75140cc5a85737b2544425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2d1c1c39b8cf034d3b97251b2f224e0
SHA19ae6a1831f2b21ee22169ca44849c9a0a056026b
SHA25675a35599cc158cfb2e2174505d1d0e67fc0cc910b1fbd073bd3ce9bdcbeb235c
SHA5120fdf8eeabb8743b8c77ada83094da08f224e6b7d752fead591ea5f84e41d7b6eaa8b6eb6ea857571ddd9e2ac20cd647a8710d4b4ce27b5a4d3389ed599b92cc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531c0d250e8a93c8b95bbe1b1cbaaae08
SHA135af83f900eb1a96b45fe8e800eb0d90add27d18
SHA256f9710231d8b04a3d3eacbfad5157edd129b1de6815b3d9c6a9b119b58e7e7511
SHA51227579ff9331ff8ae0495aa7008dda7ec2479c7aa75a5691d410562373e6a57c774c072aad6f3a9d4ec91796413787bad84239c2dca200df6fdb2cfabcb2d4bd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e1c2e86ec9c4d73ac2dfa5ec087c0b2
SHA1efb9752bb851e1e10d51004b166640d7045593bd
SHA25678bc402b03378fc1afd20f743cd3acbd3c5d803767521609c151e696036fa172
SHA512815d8a749d7cc431e1eec600d563179a3c4750633bab781312a315b5a00c6e34304f1057420e8b25169faa31d88d94c72752d99af983650d7eaecad3b47f55de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58db7d16b6a89809459c06c46677b96ec
SHA1535b5c1ef5bd9937137a9618cf189301c0300e7a
SHA2565b647af87c58a7a28cabeaf5c1dd40ff37a12c0ea744bd77bb23deafa49bc6d3
SHA5129e3b22b79ea56a97f48d207a943a7cb091771e6e6b2aa1032c18fff1fe000b725d914bff0442c02b53e0c843997781a08075b1a78416bdf738b51a0a524f210f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5780539a7b22fe4a002abde79104666b3
SHA1472751befb743ed77e6bc44fa181c8ce9182c37e
SHA25672022d229ae1cd53bcb18c81780a05afb61ce2c5fc56aee6dbb008008668446c
SHA512a89407015fd6588a92a4f157eec12693858bf5635ede807dba4e30cd6ed2e8d441b66cb2028c0ca9af342982a41fac0a31f7436a13e22a1a887486399a6b3b9a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b