Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 21:54
Static task
static1
Behavioral task
behavioral1
Sample
8c1ecd4101c2ca36b33d693f81d5fce3_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8c1ecd4101c2ca36b33d693f81d5fce3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8c1ecd4101c2ca36b33d693f81d5fce3_JaffaCakes118.html
-
Size
6KB
-
MD5
8c1ecd4101c2ca36b33d693f81d5fce3
-
SHA1
44afdb1b8c877ab203e54d1a6ecb6991da27cce7
-
SHA256
592a20b0c60bb2143fbc015b528fdfcbcc258452bccf8dd8270cc479ed820050
-
SHA512
b44e4907915dc9747d18d8c74bf24ff50af3b4dfe057945aa128654e60e77b81d92feceeaf33b3e3a3846b29d6009def8fd99663529af9b463d3f9173beb202a
-
SSDEEP
96:uzVs+ux7+ofLLY1k9o84d12ef7CSTUrZcEZ7ru7f:csz7+AAYS/2b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{531A2B61-582C-11EF-B3C2-F67F0CB12BFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429575158" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000dae6fd146149d2bda8d8901c503f2a02522de85f099fe78b34e7a101044abc36000000000e8000000002000020000000284fb6051b9bf2ced86dbc4bb0386c79400a0946c93efa3e274109c2f5292f632000000075c1fe94db1f510f1a13d02cfd5072de9e14bbfcc26448e81844cf94a255e96140000000a5fc37aeb534c9f6f24e2e959f8e238877129363fdcd85ee31f58c94181d370c77eebd0cef61e1fd3c7e494f2e61abcc518e5decb1ef0f7b95dfe0336b6013a2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0863d2939ecda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2544 iexplore.exe 2544 iexplore.exe 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2072 2544 iexplore.exe 30 PID 2544 wrote to memory of 2072 2544 iexplore.exe 30 PID 2544 wrote to memory of 2072 2544 iexplore.exe 30 PID 2544 wrote to memory of 2072 2544 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8c1ecd4101c2ca36b33d693f81d5fce3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2544 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587c73ff2a3c9727a0c962919433e3e03
SHA10b7af2cd125c351fe0707dda52d02257218e142d
SHA25637f132e8d3ebf1cc5aacbae1cbdda3ea67574b640ba96c4510c3b52488edd6d4
SHA512dc3febf3f98787e69a9c2c2bb6be0f9ebf84870fa4ef89be042d8f1aac4c2d5dac2f4bde7dd5819fd41f74e439c936bb0ef1e8e1b99e2fe342f3f5cb7f9cd266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7e4675dbf44e3e46f23b9b84e0105cb
SHA1947371a52b2b956e4734761f2e4acbae1232898f
SHA25657809444e1616522f8e3c38c406e6495bb78bf1a294b1d2d9c87b47446fd9060
SHA512ab6425e60e51af6798c72c832f71a6530fdca88b13339fe7a2b2e0b4acfac302264f2937308620e1d1127a80d19ef7a38f717e313fe7899e2e1f0f8e78a3368b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0d53adc75dfafa40555d561801e2bbd
SHA102f381227d41cffaa1d52823b956bf0c3bbd4f2a
SHA2561c89135ba01debd55022b24787002d761b2022d1b17e7084ba19aef4a0dffbfb
SHA5122158041b2344a58a64e8ea2854572f1e456107273e604d47d906373560428f569ae9771152611fff8609935e9c87df818c99b0997f19af6a3e8669ddfd2d420a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515ba832b486d56f3d683303b7494c102
SHA15126816c2ed6a43f001a1d25eff2eac149bee95f
SHA256971cb5e52a4196287110008f46bb0e40ef24e456081ae5235be3d15a0fedfa80
SHA512006139fe52b202745d4ba472baeed9e5ae4980662de7e2fd73dea03948b6b03d63f909fc61ef90a6f6034e26f1da733bc2ce0d5f41586cb7884946c608e1c12d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7d68070c3c959699b312ab5c94613af
SHA1d0854289cf63a466eeff305306815f99bf0af2e0
SHA2560b6f6aa081aea8e04f1bf43601a2c30ce75c03a2ee095a1014b43599838495e1
SHA512806fa3619b0fe32b30f787c68797d77b04af1792aedea9b7e7f27d6e3b5295f78b81fdf3d86f7b2baf1449cf57d034cb3fb6e5d08ac0c92c9f6c6391620c1146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50663284f22c78c29ce13166bd8af1d21
SHA17cc381cb3cc266a2a05712bb57458a090e03672a
SHA25665eba49d5605d01d878e5e32e72fdd771d68d997bdf368a37e36ce096cebcc3c
SHA512259b45d97226d864e181641a16aec2b9c757461cb65e87ef4711c138a769e8712f3d58a818ddc6afea8ebd2b06897022425fe7d2387aafc5ea3302ff2d169b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5358ac84165896795e0f77f3e6754eb00
SHA14ea5780fb676806b24ee3323fededb6abba42556
SHA2569f9040425595a655cacf85ef509869bdac4909a2292665f74d0cd1dcd7322154
SHA51207a09aeb7c3014608536b4ee8d033a3aa262bee7e8cf1d73c5307a1fe8ae58b659c40b04332f08ed43cbf9bd0c952444116945791786bbccddf262980fd6869f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df4256c8e06fe60f080013606f000018
SHA1e511e9278bf913027ec73a2d36cd2e772876e66e
SHA256d200fa01dc82fe60f951f883be2ca3ea7a6a1c3feaef331d11a929fdde93ff30
SHA5125da8ac8714f8ec7f897806eb8ec5c7918fbbd69d0215068a739ee2198528e22e5738d35bf70a96fa014392b5804dc45e13bc7778c2252bf7142f7784946f083f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56deeb776453b979ed0414e7e2a805b43
SHA1b9e27ba84da08f6a1538e95cb4094933022d53b1
SHA25672afd5a682fa1c5a9f8a14e619336cd806742042710e92378363322df5bf85fc
SHA512b39b25fa98287f3df3373146ba870695d028a77c4b89ab864e4eb6fcc6d8245995e944c2bfb446a273233c0f16749a62eef01a7038896b87a8d551f278b6c62f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590e0830e4fe56751036b2aee089a0a8a
SHA1fbba2a0bc5857e184301280302e7b1fb52feab7c
SHA256c1302c74b8b388e5e6f4887361c2e1336054f56ee1e9350387137b06d71c62a5
SHA5123d182496712046f5a7847871c8542172e487b766438cd90036d3ed9be0f26773d8c0d5c0f939ee8658fc7e6f5ac7f12fcf5b9c12391230ccc323eeefcbd3feb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d059f22677fd1a13fa2a5beaa1f0878e
SHA16a6039ef72a8a01e5838abc68f8b9a38b73a8535
SHA2567330d4551fc66f996e587b82b2eda2de976410bcf10baa89bf0f05b83b58bd36
SHA512ae3025a0ab583d2e4c9ef47ce7a54e647977fe5ac2729d0ce83ca2ffffe445689790613db75d339d5de48c20977b2aa07ae1a7f8bedebb2b812c376b0dae3da3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511a29e47d86d9b4de09d997c78304147
SHA156931f3a6fab38fc3f333383eff0d7abf05bfea4
SHA25690e6843b6ede1242f9193c8bc6efff0a40ccdfe6035a14f6bbbfef148b31ae7a
SHA512fb0c81a3d4b04d5386091768cb04ee6cf3e8868c2eb82ea11fdf43dc60cd1dad72ee2504f9ddecfc5cf793cb260d7d04c94acbf4fe218c284e7e6333f6b9eece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f4a330b7a94bda7d77375bd37bd4d3e
SHA117bcdbfcc673db84259aad01355c2d4a87beb0d3
SHA25602c5bdc3238c27fb0c7fca2809b714e5f8dabefa59cf0a3da436d49597334d35
SHA512d5411e610a5aa861d9c43c4aee5e237f96d9153f4a24704ffc2c1580c3cb058d67f788928536f885920f08c7925be8cfeec9b281fa1c428e81bd638cd3ae0290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e91776c6facdea0b92932a1abc589827
SHA1541f21dc0270897190c86c781800dac53bdef9a2
SHA2561e96f252a1bca916ec3b6a26d15ddc1c78028bb4d40510f61c2372e1560c7b55
SHA5120b59062303ed15576fa12624ee0a122b0e546b8396cb7d40a42d738d72dc8dda212a128ef0ea512b654019dd305a0b247bed27c010569cc9196d12a7b82b68b5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b