Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 10:14
Static task
static1
Behavioral task
behavioral1
Sample
2f4b8363dc0826dd307d89716239f296_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f4b8363dc0826dd307d89716239f296_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2f4b8363dc0826dd307d89716239f296_JaffaCakes118.html
-
Size
7KB
-
MD5
2f4b8363dc0826dd307d89716239f296
-
SHA1
9ceac20eb0334d937950d0e2eb7f719b8b8d74c4
-
SHA256
7bbb45be0d8c799b0b0a21e31ecef5923c7cc72382fff7dfc55daa3e4040b5fe
-
SHA512
b95f5647e31020b0ae45e49c5d1686d8a0023f357f05c82b7bf0d41f492a976961deaa0d93b735017f7330654f0067261eb7d278f408d73e156bf57f97584111
-
SSDEEP
192:tik9E4hK6/b5Q8QtcGm5bObTqKvuQIpqwuJI3Td5Ff/M1ZJJZWx:ti2O6/b5Q8QtcGm5bObTqKvuQ+qzJI3/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000fb63eec93469dbe3c120f0d7bb99309c5f4e68fba860666176063ce594449b75000000000e8000000002000020000000b936d33b6a718d7953c9f75db1d99cbf4016bf2dbcf2b7570e2660cba71ae6f520000000b8fafac2efa3ab97ba8c5e84aba5a3d5490fcc0cd0d1a04401e72cf8c43212ea4000000066131942c8bba70cea899355177bdb661f0a3d00065b58e508083e1c2b2edaf2aa733251a32bd2bbe0421d05301e7aad8d98fac39bd8dd50f0063997aef315cf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A3CE2A71-8694-11EF-A087-5EE01BAFE073} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40efe380a11adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434677711" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3064 iexplore.exe 3064 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 3068 3064 iexplore.exe 30 PID 3064 wrote to memory of 3068 3064 iexplore.exe 30 PID 3064 wrote to memory of 3068 3064 iexplore.exe 30 PID 3064 wrote to memory of 3068 3064 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2f4b8363dc0826dd307d89716239f296_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c333edaf5b2f2f29effcf9fd3182347
SHA187f92a8d9cf039e54eb9308c5d058a9974b82cd3
SHA256a298a3d291973ea8e38af353f8d18c8c65a7077095a692fd2523e13057a7f7cc
SHA5124f13cca20a8b420db0114bfc9eb1e6ba64f52c674e11657d7eceab4bffd890743a5dfc950b31699d9c60a46272f584c3d170a494b1d2601c5f667c3c020d1e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56efaf354e662dbcbaa0ff211bdb867c6
SHA1a8d54998e4a9b4e4d144489b075c6f45e9eac2c5
SHA256a17407b64bce80c46f8e6feeff74eec8b4e4c64f8e625eb95d0a79f46766b43c
SHA512934b60bddf4280e3ea21839579cfe4d7ad52212070520ec1d8e2e15689557d830a5c92df72a5e23a51daaeaeac424a22b551d9bcf2b0162db9dfb76440523a64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578f605bf89d75a9089da10f62ff49cba
SHA1f6d05fffaf8db16055db3b0e4c7c6ed87f1e961c
SHA2568f0971bfcf3123f8223154ed11dae632f43283de93e624487649bdea28076102
SHA512f7a08a68cf29062e08048a765dd698b6322c9fa1c8775ef6be108f091e3759705c82315016e1c940ce14a6818a60064a52590fcc9a5fa64dfdef41dc29a14a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac711ad3efd0e704799476c803e1e833
SHA1595ef457718a510c78dd793fafed49ea26852ba8
SHA256462a0a92c82d68067218967afd18048dc602b7fe305f9f4789dd6af66a27568d
SHA51280de6af4584bf2e51f29d928b98e92607a37459ab1f66912ecba27a965b58b343e6976f40f45361a9474c48faea7448e9d30c9aed13ea1f961bd415218a7ca13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d240882b207c7e6d8bf52df4146d11eb
SHA10c195ef04ce40650c7583e500f80f4ce27ccc1e6
SHA256f544feee51c995b7e0c6dde9cd1aaf355f51b1a02c46eecb3108b6bd786d7397
SHA512c28783378145fd057f93585d66d526975447a9524ef0bb55eabc6787e78cfb5e3cce67cb30ad24994ad92cf8a0e00c1b70bf07cbafca5aee0e7aeb29288aa31c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5656572a77c762061d0e63a650622f36a
SHA144b3c357ffab95e235213ca6740def4b00f2a7bb
SHA256deb54e6f8e57cdd37d380cef3f898dd78d8f8c4292bd8b4ab3928b6d49bd0f71
SHA5122dd0022f8af54559c4bab8d46cba56c7c39c0389caeb60b39011c9a90a8583be11e6ba6c7e9cbe8bc44c9cbb202f520ec89ea342019466ead001bf9620509ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547203606213424e0a50774d81c5742b1
SHA1949d299926b75688c9f68c45a2f027a9478ae68b
SHA256305576addf2897e7517183ab60bfe849c5ce5397b51763aab9f9300dd9b3cc29
SHA512583b46d23132432f3bdded825b2cd8151eed9df062fb3e1576b712c0d9d7cfbe4aa8c82de03d4a36e70e34290010412e32f51155bbd37f32b456086f882c10af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c849972310da6b067809219845d38ae
SHA19078285bbe27a9b12f7e5fa1ff154ba78fa05b51
SHA256bf3bc9decc9314852872290b848089b43678d0c77320184de42243166e6c9b61
SHA5121e9ddeb32d01ac56108644fa62c842dc22cfbedfe420510027e1a997bd1785d76451431eaab95d224d7f86353e6bde72fbe53206f876e91b7885071879f34a94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbb6657c91c605457b648ad36ec95b55
SHA1885ac98ba20526c5ffb1f6da179cfec05f8ee7c1
SHA2560076cdd828a15d1d4b1a5de7fde94b7a15a568b4d3d9e2ae2b7fc7e0ab281982
SHA51235cc3146d6b98dd75e9eb99e99212f4432b08690666516977296c2a19e300a874004e7d8a9988558b7d65cf88a8d05f3cff3c3d8415c114f69a2b7f825f23276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ae762870cf2ae8ca9927f8fcfd5a22e
SHA17c237bb3921965bd4a01cf878b1a48da35e2bb38
SHA25678fe9aa9d349ce6ecaee6f903848665e47a090069b367f59b0d152332e1dce91
SHA5125e7ef85057bf5f3d0bd36cc86574ace760c2d9613334d8067f9cf6acd11ecce69aea0a10c36f0d19a0c1eb51e97adf5a87d6bcacd42af7a9f8430214c753efeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b095647b5a0d24d393bc713d032cdce8
SHA181c31638dfcdfb948e2a8e531272d69ab79234eb
SHA256485a8ffd7c77250a2e86cdd0df2fc2ba1d129c084dd24a3c7bcd4d6bf334cedc
SHA512dab4ebc0995ce27092fd71381284f4a7df5890e4917456ab37f23dcaf94a61bda322fe43fedddd5e24dc0ed019a53b68e392373cf8a1418d125417f710a5d030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef2e841cfc73660d903861f222761ec3
SHA114e999fa798b80849b18b3a19073225629fcd112
SHA256e6a5853ad77936fe41b4daabfa0d49a5504acda88f4a0dfaeef74d0ae2380275
SHA512182a93186e1fd239a5832df3ada2ccf78db1927adc3cca30e7705ecff52c60756599afb7c002f25ad0a9482034a6938c5e9b7797d8f655301f2f52e9960c639c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528b3b6fa96009c28d70a046b8b598c37
SHA16262eafef7284307179807e3c3d20c9a1b4844b5
SHA256931831dc795710cb3d3e196756de007d5a6d3a0d3977db7b94cf8843d115c815
SHA512f71abbde3b59e2666de21ccb97084fc9db3c96047b11d15b6c2767a49455d3ec4f9039d63244348bb1ac76cd64dbf4688ea7af7d79cf070f80630cd74e4cc59f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c346bde6b72a77fb48e831d43d1f76de
SHA1157e0898a8dbb3a25c8fd2502fe2a7e458643067
SHA256a6260ec41f7c6666df6a1bd98261d49ea0b6971993305b64175a4672b3685934
SHA5128b1dac88d122818bb26f4d67b62e63f42ff98b8341b31d9f6e9b49db028d00b3d2ab84809c87659a5e9ef7fcf67b3de9399dba83f87f24db68b7cfb99766558c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f60fbe93005c06f7a6d95a2c5cf07763
SHA1893f305f5080ad0288af0c3dbffa7ef4bc5cfba5
SHA25602b1acde67d2efa1426480b09598dd6147c8e83efd8f95e76b55218ba8174da4
SHA512ea2417fadace2db63b03961fbc46285f08fbed1de9ca6aea9bd31cb7b06af48c80c20e1c394de0aea137a35973dc9832a0fd62960a58192ac39426af7e952a3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc2043c4946af9ee9bbbd414b7501127
SHA19b6f8c113251651708c15d7dc73ec4244b893043
SHA2567cde15701620424e4cf292b6b28076881e337938bd2c9c49b70a0198381ff84e
SHA512b29b69cbc0d2a5738292db73aae119d3ccc88428d6da968fd8fe96bcdd23791f7be91886cf64313600333036f6b541d51804f9bd06ab68649ce9aff325b216c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534b47903d2f6661828c795114f54fbb1
SHA18a4b34b0d4034a3433f27d0c0e8d72e1f9a5b0a9
SHA25689e7d268b19937fcd4136862b27a3320e6e67b4519aedb3078beda84866060f3
SHA5121ed29c51984697980b42e0d4757e43a0798ed9cce44f28dd8520389516ee00c5546f5fe2683960e18d7858828d17997e54e70447e8be98f36ad806bb0dcd639d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d270a196f3eef2cb7ea8937cb8239e60
SHA18f75989415351fd13b78cb5484f28c0311a85a56
SHA25601f6553aeda9f1c0fee7931935a55bda39442b572d83c0467e9d23fb46bee92f
SHA512dc9f35f2d93d20e3dd0f507a9994df837579ac7e356a35a60cf3d429ef28b434482d374d6628c4c64e6b4be6849baa1604f1963eecb6db1152cfb7720948a6b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b2084eb9d991746d3a4a53a439bfe94
SHA1cc4eb28efbfb9e1f3996b258e27ea1e6229c94b6
SHA256ffecf6ac16388c4d581b6b5877c128667a2d274f8fedad5ad40a72231a3ea678
SHA512f3306f58ea4add8b228fb2eb19ea61e0228e070e1be4abb853b99fd4cb84bcdbf1bacc8f9896434c182cedcb40140b73cd2315b765505f63e49b4269fa37ad0b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b