Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 05:50
Static task
static1
Behavioral task
behavioral1
Sample
893bc7aabc54b5b65c0411aace9cd9c4_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
893bc7aabc54b5b65c0411aace9cd9c4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
893bc7aabc54b5b65c0411aace9cd9c4_JaffaCakes118.html
-
Size
6KB
-
MD5
893bc7aabc54b5b65c0411aace9cd9c4
-
SHA1
d97cbdae1cd5f2ddab6bc05d55715e5c09aba68d
-
SHA256
f90ebdaf01884826480b0a418281e3aed565375c81482391aecfd2f9a709b6a2
-
SHA512
6693b894b82bab6b14cd511393ac0d56643bf4a2c2e5fc5279a84ed502acd8e156f5cc9d3388d59010c435fc32ebf5a516a4fba139bc50b033e72d85a2b075e4
-
SSDEEP
96:uzVs+ux77WLLY1k9o84d12ef7CSTUOZcEZ7ru7f:csz77WAYS/xb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A64ED7E1-57A5-11EF-9637-66F7CEAD1BEF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429517312" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80e2d77cb2ebda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000003c41a252eaa3bc8497bbd85c7851709b846628fbc4387a90dad9c0b0fc7bd291000000000e80000000020000200000009a67e228653b38b57cbf59578e7e07b41549a4ad2701d2ab3a2651e741e1f46820000000901372a8c538b101aa1621c5843b59fd181733a702f27ff1cacb27629a8e34c84000000039670278d2e27b7e524c5c2d22ebac25422a707f384e5f616a7bb17dd0cf35fb576999a4e55a4f4ff79b60487793c8bacebe23c53111ac6e0c49731336eb68e3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2680 iexplore.exe 2680 iexplore.exe 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2496 2680 iexplore.exe 30 PID 2680 wrote to memory of 2496 2680 iexplore.exe 30 PID 2680 wrote to memory of 2496 2680 iexplore.exe 30 PID 2680 wrote to memory of 2496 2680 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\893bc7aabc54b5b65c0411aace9cd9c4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a66ecacb06898add1544092590d0675
SHA104abfb7547e2baf8a79fb2d83553dbb61c97c0f3
SHA256474242929e01d93160c1b403588aef9727529e0640366ee7272b76349e60d3a4
SHA512cf51e07033d4353e80a3f3092fe9381210325a443b56a6ee58193d3769a0575955753d75e343f11d6385302d087f802fc867e26ea18b8ea14217242ec6f825d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dff607d200870829a75b5f42624553ee
SHA1bdaafbfbce3914526b462eb3be5b60e55e201bb1
SHA256b07a46252c78cf3eeb891cb3e71329b301a6c0c298668bcb8ae9f3206afd7b45
SHA5127e2bfe8906769720dd6ffbb4aa269d3e4ad04bf6b28451e4d7e50ca7827352ebee00d88e1637bc5f35f79f3225028fa3e96451f0b005bd0e55070a12756febdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543f1d1bc8f986d257c349372cea3d7c0
SHA1c6f010e4e94d32e234d4709ac56cc8a4ed66b489
SHA2569025ce54a1678209e8f77ab0f814cd57a8373eb8bb0351a1b461ce5937364770
SHA5122defebca8722cc04de8481cfd3438d9a5bea5d71a06bfa4259f7b524b8441888314fc646a4637b8df2cf19ab7ac507b2add35c8523158e8a8db4a3139be97fae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9113493ce291655c70144d362246e10
SHA1fe189edbeef275132cff4c6b6c7ca812e5d15752
SHA2563e263f795f2a004bbd6302d2180722995c50ea948625511bb12d1d9a97ca8ce3
SHA512ad8c90ec85dab12091ea3f29d1fb61c60e88e96cb518e546d64f52b12e7f3655de6b09dc1123cfdff2362c0c9e54edd9d635277089a6cbe800c274a50c02bdf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f79074b94477055eba3e5c19515c05f4
SHA1ac5163605c6ec7c4cfe3edb04e2040a57decdee8
SHA2569d247d43c58444e27c7227ed68d6a85e1d2f00fdc131e4763c956d087b8954a0
SHA512a5dd1f7aedf2f6e731bd940a9ffacc31db61f0867b2da70586767b59034c6e8ae75d62e795ba5f96e5d2ce1a87fe03b5bbf6b1773471d53ce27211050f5a37c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ede62b1a3d50168ab050acda7f1b7e8
SHA14c63f520acfbce0b58c2a7a31c7615f382e0de02
SHA256abfd3878d51a7e144e699c2fb33e721759688a0fc5a0149382f3e932b4a607ea
SHA51233a0942368974762258f1380880ba65f14ac6b2c68d7c22c0672824beaa9a7a056fca92ac6c3898ad2a92fd9ba947ff7bc2746dd61ab46bc7f1bc9b93f86cc41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5769a442acb4011ebed706df5273516
SHA120a6625562c6ac5c1096ba6f5f9fde6d3f73fbdf
SHA2561c36e4b4217e91f7db784f0ce21943f8c06c023d0c44e1bfc9bccad98be1ea59
SHA512467afe5b686118661379b50d9dcaf31e81d72354ee332e0d1b31fd9a34287b26dc904926c0622153b675c2c8fedf7c7dfee354bfa1512c6c50e7f311b03b4e87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51af44f86fd7687583b899a294a694e1b
SHA11a199b959cd86725b1cffdf6a31061a78a69f9d5
SHA25691407249e3f99781aa5b2bbdb74bd759da6efa03ab738af60c8c11e801fc3790
SHA51207cc467b82e08b0795f6749ce6377dde6e8380e250071214121e1d4de922dbd4402a21528cc371419062afd91df641429a870c270f7faed30c5ffd2ec5b5bded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac5d07729d49c1f20e755a9718a61b94
SHA14b94407fe7e644d714f9109ba6df9d0be7ffd70e
SHA256bad1dcc26c1cd65767d410651cfee747bcf3739bb86344323fba1c390cc5702a
SHA512fb1fc9ea1661ab58c2a9712a5ebd049a68043bdb433e218311fbe3f478c9c0003de3ed8ffd9bde139dbad8b766170a24607a4aa0b3695c24220c23ff7e171fc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d191bf96ebbc1586e219d58e8ce0bfee
SHA12ef7697f26e5b56acf871934606dcd6247c96590
SHA2569364758928a7ddbdd087ae94c36753bb056cdc84faa39cfbf080c926bf4066f9
SHA512affdcef2e4c0ce46f7b0ff9ec79df5b0051ec486f1fadc402436d9293cb9f84e4b6bb17fecd282c2b0e5aa50a392c0206a64e9f2fbd2ffff0a0cc9df194fee94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b15e8c7f5f6608b4067d0fb728a8b31
SHA15ecd1bd0c779549be73c60fdc07339117e4a9786
SHA256a830013c542b31375de458244fab9147530d51146ad1aeed3aaaef686375c3c4
SHA5124618adec7dd2bda2fcbefb5830347caaa2791a07a5d47785a8b3a6d6afbb3464d93c07ecb2dde9773847ecac4e358f2ee34e1ba98df52222c4c0ff7f4623b6f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5c314920441b7040123e3db5039221e
SHA1152172ffea6b51c2e0dace79626478d6304d209e
SHA25668da084423b089402dc65cbcaac3ea6781112bcc3f020c63e4eac28f7507b264
SHA512119a666f3f6f8d632b3984ba1297876b1ce39ee985f9f41a18465456aeed87aa99899eeec084dbcbc8a32ee0554c1b778f44a3cc2258c9835e5444ffc2759abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfb013d88f4b0be1eb7311ce2385fcf4
SHA1f451bec1c3b9ad29a01bf8f7ebcd53533cba530f
SHA256038f4961c4741663aa7f3942dd2be68c17e1755f4e2520dd3e5f5058c2f78d03
SHA5128ed64f02f241171482423bdb243c2c7cda3747cd6e0994688598c3377f02e53194266a75aebff089c5e54c381d482821e591cb4959b34061a26c6d8be672bbee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5969c029ef992967bca5a67ed81f9f2dd
SHA15281f11c31eebb80ca44043d7e70e2bdff2aa9a0
SHA256b13263ea2a4ee774a2d99e3041bd6d0808c9bf38f4f6f472e34f7d5820a3285b
SHA512a19c8532419547c3b91af8262f6fddffc0ccbb06fb9ebf4c6322e407d00d60f6196f2fa0ebb136bea8f842dc8d61457332cdb84cf2b429ab9014d9a2a00f7a28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b87fd8fef67bad3f50826c9812ef331d
SHA1eafedd5cb2888815aa9cd812ea3b744d71e9de68
SHA256175527f741f3502069f4df9d42b5d3775a8c7784362b29c4f4fd5959b20ff66f
SHA512a34fa8a2023f070c976cc80fedf1fc7bea07e9cc504805049546ef0758d528b28134bd1ff15a169530e64eab449577420623d0923e76c9acba88d1787966348a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4cffdb81e005b4ad34e02e5586b1558
SHA142a51de741caa30c7ff0362fc8876b0074470a69
SHA2562611f373adf4286de564c182cae092342adda0c569dd9b3c684801dcd7858466
SHA51231ade0605b7de67a2051913d618f5e7b0390179c9cc83d8efc1ae8005e8be1c4db14e13a157bcba4766e0fc28f0738994aa982abb01944777d469ef89711bdb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3f337f0a59c617f183836b4bcfcdf0e
SHA15d8ed99a03dc66ccf4b5e943e79330a9637c4078
SHA25624d63978de32f6d818011269334dfc38e94fbd4476832aca672c5b112886eb70
SHA512587d66fb31f4ebfbb25f91087f341c71e5bd60e0d5db73cf2b938dec58b6ad60ae39d261e557869321e4587f5d600e4291b70916717ab977ee4e9d06d4cd79aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd03c309fe4a5b99ae7ce249ed9af8af
SHA10792ade8f15f01be3347d1cdcc1482824edaa3fa
SHA2561c2f169f114a585c5c1e32842d29372c6070d9c5c503a7df3c14e0034a1e02c1
SHA512c040c4ac7c48e76700834f6885f02c3b08e3f40ae23e0b6b074241c013878b93642e7bad3c48d6f687f191e92b8e9b55b81083054a60fb0737d15295e2e2d05e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b