Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 07:35
Static task
static1
Behavioral task
behavioral1
Sample
2d4f0e867f8738974a791443536d9a31_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2d4f0e867f8738974a791443536d9a31_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2d4f0e867f8738974a791443536d9a31_JaffaCakes118.html
-
Size
2KB
-
MD5
2d4f0e867f8738974a791443536d9a31
-
SHA1
ffd438ec565ba98e6f73a6d32ec9e1d43b81f14c
-
SHA256
7730b8258d2adc44c416fdb0b1d42e7b1a13e2b3fd98a6e28d6c1d9133ee8c19
-
SHA512
8754bf1a516342c8461d059f2bba8e2816b4290c314059777f71463123a878b037b16abecc1df6f57e60affa9ec634b5eba7634280a4e17da8ca400c33b78838
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7030dbcb7f1adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434663247" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F68F5121-8672-11EF-B856-666B6675A85F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000d05c28ea627ebf22df3f72df54e848277abf19e0363a181ffa2ccc73e4dda9b8000000000e8000000002000020000000f2cd21223458e68b87d2b18df758a829a66242b34228d069ad524fbaed48f6c2200000001abae5606a9cfcfc252d944cffae17073b1da5d1a169327fc12c698a50fb3d894000000062e9c2cd7f1d09b701a5f688a578e1ed04941ddde6ee535ef1d497185e6e1446c58551a1858f53fab41114ebbad07bd89f9bc446284672e86991f5c7cba744a6 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1744 iexplore.exe 1744 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 3012 1744 iexplore.exe 29 PID 1744 wrote to memory of 3012 1744 iexplore.exe 29 PID 1744 wrote to memory of 3012 1744 iexplore.exe 29 PID 1744 wrote to memory of 3012 1744 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d4f0e867f8738974a791443536d9a31_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530d76f9e241e21c7f21a66c4fb5e4003
SHA12b3990010ad87df1d1e137568817c0488448020e
SHA25643e347816eebdd1ad3befd4e378f7bc4633023ce6cb6dc800801d1b8a6ccbba6
SHA512f9224a76f70283ded278d3af600548630c0ccf6715658b9dd57ce1f1de1c38fcc1f168d459510db5594fd307e24ba87a74070fa603e53633b20ab3cc8728eb8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5498b1f078bae5ac591dea47cf33a19a4
SHA1a21c921b3557bdbcd92a52e03c98e5f7f840ed52
SHA25630ec7e3963469b6062aa6ef2087d78804c85298a6c84ac63e6093a68c0a4020d
SHA5129a2f6e95f0466829a05ccd3eb39d52a62b2dcc35db24b185e3aa77a92da304542012410d746d6786ce0b913937446bc38f89a04c8d58825f4d8ae3f64c38bf92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdbd8b59174519634080d97f4aed2c18
SHA1b9dc56687946a5deabe430e73478b07effba9bf5
SHA256c3b443c77d817f3a306832742b868113c9271cc066407d881b4d0a71dc5a0697
SHA5120a45b2f72a5f8da7e81322091ffba388a5a937e6f0c70c7d25d5517114f931212addf6072622e94f0f504b354fe95aa34b760375f055e80d76138f921cc6377e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595e6ff269d026ca05a12f70818c1887a
SHA1111457064719853e11087337cebea8bccc7beb0a
SHA2567f430608ba95de483fbcbf2d64ea39a4805429fde16cf7a2d477d0482ffcdea9
SHA5126dc5dfef9d88827a48fcd7cfd1d35cc9cc2360f6acc1ca070ba7afd46f589cbff230206f398d096edd3934faf727fe3ada4f01cb27e92e20cf76cb1fa4943d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba3b535c651c33290a56af78e7ebf5d1
SHA1cc332c77a5afa6a333bf041fa8edc85547f730c5
SHA256cf3d033f97c5555c15800ddb14efac3f91b0ab9f8d624d60279e2797a8bae245
SHA5125a129a29a94c97f1829432f65554d427b72013ec72d873852e3e6999eb8ac5573e00f46c86f1f5ba7820570c7a166aa52b85afaa2c538656bd3a6c49b92dd162
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53574a5796ca0f4b59762c78a938985df
SHA1fb2d367498b4238b908a951dda3fae8eb876e55c
SHA25644138a6a53e1194b08050591d64fe0e384e36203817ff4bf8c484369fc2052e8
SHA51266e1d47b42ea7cca0dd12c1a8048a215ae608970caf51055a24ee37bf54822c41ace1636053a3628df03f523f020140e5b0cc6e89e3f33d6519e5dded1090d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5b13accec092b185e76bcc9de64f434
SHA11e83137ee5575b141f2ab8229b4a431dcd3f62cb
SHA256c68d3fa029f8f13f0afb1f87139f41a6d1efa077f72d9be31ec72041734a412c
SHA5127809f4230e4f575daf9414c61d2ed30b491b6ce7b617bb6b7a704bc14b9ae8e3ec2493d4ff2270fbfc2732fbdc4e2024d431f36f3ea558bf030a7a2c9f3a1965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cee81483d88a70151f5c6f93eb25853
SHA12c5b79d94f1f73085fcd4a0295591c1e6e9ce113
SHA2565f1a13f380f0a0027fb5cd488bf1827f09cbe143c148bd8ab23a12b9d1b8b8a8
SHA51258e96f6223f39e20a7107980b6a211dc4a434b4eaf236bc58d919851a01a1eb127ef2aeb9e9d01f5ffee8303f46528a8ab9363d5c534aada9b45e4c6b78534e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5453be0163e6bb0d0bfef943b08f0226d
SHA1af41b90b11bb730cedf713f0a8b4dcc34a30c0b9
SHA2569b35769b24dafe739f769ff240a3e16852a0bfa9aad89b7295af814d805b6b92
SHA51203a310834d98473e88ded2f37f510d712785c51f2f44b917ea92910b277ff4bf3a78cfbc75185a1c7c4d1d3b011a5a00e64adb3dc32b5e26f46693a27cb4b72d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c1c43a8c63d879852d351edc9cf2c64
SHA1bf9aa33f44af5c74bc3331af2b8377aeaad61e5f
SHA256c6e1eb5f263ab4986b72118fe05286f27b8b683d574669945b974952f8865676
SHA512c7350062475713933f835e4f4e4d13b6b75e2e3d55060c6941aff7e928ecd63fe0f6c1d3cf216b75f2a0c6776b35312b7a53555e68c95d7ee7479181f08d8214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b91c05e76a8ded5652d7088872024ff5
SHA1407fa9a27bfb4e4bc970b49ce7612ff823524a43
SHA256a3562f26c24b285655c760bf9abbdbd023789e6f062bd79be1c3dde1db1a7f75
SHA5124e1fec942a0c18235edaa8f4613a841a0203c199ce6c83b922a1eace56706ef005d6b4c5ba7bf985d5126a7178c9cdf9f074602451b750ed125a682b2ca5e062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56227f92081cfded7f070964d9e7ce619
SHA116cd55c55852b2bf7f49cc663b70ba13105687d5
SHA256be89bb285071f288b7739797bda8f2afa48ed78c406c83eee727429c728347e9
SHA5126b54770b76baa68a389d709424f15b6c006f348d03568f9374c6f82852967f15e494774ca1bdc1981f2438d1453603087ec391c8f32f855833e401a19d289415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502c5b2f80c49636c63187f9c2dd16577
SHA17dc23e54886f8442021bdcb0ab52cdf10826c1d0
SHA256419f5444cc7eb1a61b1e42e8b0ff2b20ea5d26df441c7fbb56e2472bb19c1c30
SHA5127084876985519c4ad3cb82e3f3a07bf162893f50c22d98990c74d8b5651e03f077c6d4c07577a0dc8d594be3107cdfef37fd7875a1d1d8e0046e9cc1a3c41bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d123e7a3aed4f5cac1cb36e69d6c10a
SHA10ce9bf636cd0c30806ff513fbab6fc461b9fd4b3
SHA256b0512c57575fb032bcd09902472d1d5cd749a7e75483b000f6493c0b6455d5f3
SHA51234b538c37dd601c756b67ebab80b2f5c2e0cce6498863df34c4d19662c33ac4361e821a23b7bb21dc3504b290819ca36ef53ab407bee9c060d7023524f46dacb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f76cf4142d461d9a6a56e6cf30b6406
SHA140abf2a03db9fcc499203a8d97fcfe872617ba5b
SHA256919e451d72c896baab97048ea6284fcecbefa05899415eca3da1a57e2c7cc6d8
SHA512bd4c9de4baec1996182627155f48cccba8b17c0099ef477b18f9cf1d564ed0a9e4ba06527f24ffe67417cda159defdfecdb00b1c4490d11c8c8374af3dcd5b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506f100655e21902cbb24fbe058d42964
SHA1b16f011735170869dbdf0ad26dcc7ab9f3efe217
SHA256120f5e0c1cbe3bf9ac77bdd13c4f0898899683acd29ea20fc06ae281a1f63aa1
SHA512c10ba3f1b53f36ade7a1b35245086566069a0556917d2a81dcd906ad01f949ad2bebd55267820af8d382371d030ece82109f1419c938d98d227a32ca8fca84f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a570c7faa599757af86049f8ba424589
SHA1595555f1656137209daf9e81ba3cdc40e53b27f6
SHA256c599b1d0609fd51fcff65e4ab36d0322a98ffc0e9e7969bf7883d8dbf8628e60
SHA5123bcdd239aa2f1126d196c613a7aa2768f4a021cd2a61c814922ce95ff72e64b9bb37582a55fd428572b3773c95861270b999692bd8e36f70c26e33ec9c76c71c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581c1986a1d85690d76db59329d609686
SHA19391847cec31d053779ccb9174f754c8584e7c32
SHA2567f448224f228af0ccb53ae96df330275417b5b0d80ed96425190b23dcb53eece
SHA512e74e93a64eb791272c1f6875cdd8bb96d612d0fd257b8d872ae291da5669e739bc3588b3061f38a5e7d9c55cb22b85941c683af9729881f3a69aa00b71308097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fcdfca1a5e8c0fb76c05ba9fa1b9151
SHA1580c4b50f2061d136670fbf04670888c94b34d37
SHA256fa19ae4ccdf98e06d541d8a471da40db17f2c2129b5e38f7c65720ed4e1ab4cc
SHA512a7df4f282a1024e2318ce206d33bdad5e48a794b34013fc72947d8bc932e42bb3b5a086abcf6b8c9a58012b0166f63654a104003ef486782014e71b29ea32ec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5831e0f94d4af63011c679f2e9cad75d7
SHA11caf192213acf9a9697f547e1ecb88a3b95460f1
SHA256bba16b5c22f28442cf8ed7513d6870bf872ae59e323e1ff957d6e3e306d470b2
SHA5122018719d64c51f78639a0e8da7734a002face7da8f9d420c4cc2c7a1155b009765c79afb6d6533c08532e8beb55368a272d9ec1c2900585414bd7362c6449cbe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b