Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 08:21
Static task
static1
Behavioral task
behavioral1
Sample
89a8789694bef6bf9ee85a90b53cc825_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
89a8789694bef6bf9ee85a90b53cc825_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
89a8789694bef6bf9ee85a90b53cc825_JaffaCakes118.html
-
Size
158KB
-
MD5
89a8789694bef6bf9ee85a90b53cc825
-
SHA1
1faf85da3f356d016d8130260eb155e283cb737b
-
SHA256
9786299700ecda4142ff2ed890acbc0f940c2c3ec022d3ee5051efd9e0cf7ee1
-
SHA512
8e67a9e713ac1e25abf17bfafff050210d0f0af88b8f1edaf14c4b2e04271d1100777ed0bac59af12a7b06fdbf3768155128890160ba92a8314f51d9aa7989f6
-
SSDEEP
3072:Lf9t0e0qUM0b89GG+In00NSv2AwBdOOQD2oSD1afHO5KjplCRZqHBWalYsxtykn5:Lf9t0e0qUM0b89GG+In00NSvKQD2oSJU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000f63ddc6514993b86d442927f04a37f6bb35ef042d302ad58d14a524a4f8d9620000000000e8000000002000020000000f6024fdd8947497e049a9c3949f8169782520da4780eba05752832dd6a499ad92000000024a2c62327822bce96665bd02ed6f0409745096e8a26f38d25a07072a0d6ed114000000093e6df27121fb07ac139c3912ba0804386ea330e38b575daf81c8674d74efcf0c0e853ea2c73ea40b14340d7f4f7773444b02dfccfc6086fc922c8fc360039cf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0cfbf7ec7ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429526338" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000000e7cbbe42cc2e1fe23aec7de85ca4c24bdac65537195cc1aa2d84449974e322a000000000e80000000020000200000006634178766614e0901bc4289c7bcb68a8200f0c730d5354d29bff136354c569c900000000b56d06d01b32453f09c6f18f4ea58b2c450b65ec85437b4a437d4fec581709136df31665287bf5b1a7fce70e8dd6152b1b3a7cd001378371ecd3d00533d6e08e63031b5bc1fe0b5b19811f5c19f8f8c4cf33f278da59014748311d59206965d1ce275780b9c81531887832de036d12273e8f14796f64af17f920332afc435d7d68a26a8ffdf1485e76e1a23b05230c340000000b77c159e10115681a322e0864f8817838e59283cbd996cc6035962c89f6e78e16ed3cb21a04ca413baea63853a0c5414dd3cae4e876b34f4af951375848eac81 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AA3B5761-57BA-11EF-BAC8-6205450442D7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 772 IEXPLORE.EXE 772 IEXPLORE.EXE 772 IEXPLORE.EXE 772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 772 2052 iexplore.exe 31 PID 2052 wrote to memory of 772 2052 iexplore.exe 31 PID 2052 wrote to memory of 772 2052 iexplore.exe 31 PID 2052 wrote to memory of 772 2052 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\89a8789694bef6bf9ee85a90b53cc825_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503886554d8fb5cd5650b0194e80c02c1
SHA12f7c6e67598c64a991aa0b6bafaba061135509e8
SHA256b135047d2d40014b4df820fb324c2a6bfb937460da0d1790baaaae4be114b5f7
SHA5129d26686053a731be1f678b33dc24a685841b29c2ddc5e9589758c1cb25ec218c7a42d2970ac5c842aa6c31779360d0549e8c25d749caebc959c3215cad6dd1f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ead307ab46507c2870fff8a11ae33d1f
SHA1a626f2480e131133c91f22f384a0f21a55b79631
SHA256b839fc6ed69433eea91f43eb67434b4c9569f6ffd1a2dfaaa41bdcaa8df0b551
SHA512891f144168a2ea1c09884b7ba8069fb3a541eae76e9268a3a7d06cf542bfd7de6907ced3803712483805686d3a4206fdbdfe6e578be6c4ccf3dbc29e06652c47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3b8abaf11946d852a33e35939f5bf62
SHA1e42c12ae3ff40cde038ce1f7307dd64395f2ac98
SHA25646e93379502602da5e4a1aa4ca50577ec1677b41106c3dc463a097a580108ab1
SHA512bfc59e2e28a2634e82d986856c0e52b6ef3967fb8a0ed52dbaf75ae50c5ca31a6d255b3f3e74e2e60051f7e8a9934a455a97ea58a20f36e625818f8ac62be9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fac1b9f3e382b35b989740a82cdd1a6
SHA1e3fa63c963b30abc5f7cc075ae49c558b467b2d7
SHA2560cac19d3e339a44944ed6973a0f490e65834b4b6b9d80937cdef5c7be4000a34
SHA512a91e97d1e91bdf6df930053990f7aa6984c4e1aa56c24da64e7f9b3b8578fc4b39e812524aa52627da4c676f0f1ca31abb80269892e873874cff58fc97eac151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54acb3bb37e3dc7ebbebcaa24cc7471a8
SHA1cc9ee9d5e9e38e11bae91def48e08175ccb57115
SHA2560ebab0f8794489a37d42c882ed91497e9886254f908047ad778371b1b38d18c3
SHA51210030c780307171f893f556df73000cbcbc030ec548ec2f9d720a5a808b7f4a247dc44bb5d018711d5a7e5312c399b9c78f5b8af6f09faf138370eeea22f053a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5680772c05992a6d005db777de10e9959
SHA1a09853571bcbf001f976871cd3523c7f345c583f
SHA25683ab49be4d8a3ab0dd94da3c017498b30100cff77ca044cb055d509dff91f615
SHA51205fce4837ae5d446d9419c0d77d3ddfa3edcc56487eb37b89919f6e6b7c674c445ff8cc88c773245cfe364a9eb46bc4c0abcf064ad637419662ebb43f2fa12cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a53ad516e36b60621b77c7b9a977ecb4
SHA1ae2d46ca4becfb4cee995f293bbd05a8af0e1f6f
SHA256da35373a2358516fddd1811e987c73a6663cdba1451c9bc0c24158ef2099c9c1
SHA512435b588412c93eefb63dce262c00154aacac0a3484f0ec4b8db1236e8561ebbc4a457bc2c71fc5231e14d8192ab044f4e99e88954df69512ccc2f6b012e4ff33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f0e588b337964551bbc668ef129384c
SHA13eec337667b12953f263cb385b545ba0fd5de698
SHA2562438b384a7ee0fd27af6d193a1e3ff6a455257af94010055961eac7c695c27d7
SHA512b54590972b25ac910ec52f47d88dbabdf168591179270ef766c9605b01217f934f9455aec0bb2542e822368c823c1f77d825132b0e04fd8243b919e1488b099f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5532d07e5d95b4cee987189075d7442a7
SHA1efb0c16c7deb301d45280f9627fa0bc539d6d901
SHA256ba122219f98b8e0dc6bd115c453e6bf601162821d29fa30a934869df23fa9f0f
SHA51295d867738185217df9a8f4f1075f646e7cab140fe741a174ef7e5c8461c995534e85e77d82fd545c41aab7da3f063df657161af8ec00cd72f3ef46f7b02f043d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552ad94b98203c56181abb76da4d0cf0d
SHA166c34788cf8e8982193e300d24dcc5f446aa40d9
SHA256fe176160c25e5afb576b8c82fd763a01d5e8979096965e8061b05d79744300a9
SHA512d45ad8020508aa42e3c71d8681b54a76eb779e211d3c05a1bc7ca7f51c6931803623f3a80d8769a5a46baf93123f094e4e9f40d1a124d39c40cec77cca64b0d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d4a977bdc905a1f1ff1e4bd9b95256b
SHA158653ec2a14593af1b58343be5e286a49b9aea33
SHA256b2d7826edcd6f6df7d84dd232abd9ec916169c47d4562397cc9a5667a7a4fc02
SHA5124f87a26a83ebc25528d74198ccad2289ac400550c0164f902206f6125d97bf97d7b931c2bc5d1b9f37b05ed0a0dfa872869e5a99b13e20b41a53a94978afda13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d919929856c538b66165e84bc5c349f
SHA13d64212813f8af485df728c654b020feeeeb8880
SHA256a61819da81ad086d108d2d44fa43e882c6566164d14c48fffb68146b4baf6be9
SHA512bbac3a6854534259e7aa5ad5b2ba2be8166bf6e1505dd50f21c0ec4354492b50f80afb413b5db68a4f64d4a04186f9d36f6eff93947ca86214f1334b7a6ef74a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b129fc0409217c9d880bcc5f78de44e
SHA1592f03ee831df2d3b550c2b95e556489525c8f14
SHA2568db77cff795ea10fcdf51c0e06f9f0fc14e35c26b261c7381f9a27780cae4de4
SHA51293d6864d062c25f9c8fa9766f4a12197d786daa40b53ecc1177c14c16b50ce0cdac18f051a605a70f404839eec1ccc5cdb3b8ab6f8306af8955361e8198a9cdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f1745b5a870fcae54a18f7adbc6390c
SHA176b91ba7a7d7af1823acf4d271d2ccb3d89b4875
SHA25605e00f69fc27929bb29dee20b8a4fafdac8e6b36d105b4e3505009fad268cf55
SHA5126897a1b5e6783d639f71407cd1fcdcfc0bf1883d033361a83c5d139fdbcaa715fff2209504f176102ade10658cee81efda3485f44332c45e9ab3270830da5a5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56431949bef44d5c553760700111d052b
SHA14f26bf5e7e31ebabc53be1591a9dcdf4b470b7ea
SHA2566ea8bc2f6aa52377c0bb0ec8bd5ee7721b847b90fecc82a15ab3e68786b485e2
SHA51213247c7fc5d36c4b93e103825c2b5976d5309eca1d371bc1c44189fbcd58f95a5a4ed0f256a3c66211e07cb8202a29b15e04d4219f5d5bed804834e2dbec4397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e24c0c23d82b142d01b285a1712afefc
SHA1729083bf7eb03674450a83d50a58a1b8d06b9ca1
SHA25626509782efc467cf819a721ad9176422f6950f85eb74b4905148d7b811693e88
SHA512367195a0e0f6263864144e39432a10ed281b1ed86e7f6aba28b5d059f83151b3915445b73867cfc5c5271f48fdda936de1b8ad077c637bd63fd52f2cf991f7e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5660372d64f7b2f90d9aed8616b4247e3
SHA1fc658486860a13ee2f47ec599bb12345c04d8ea3
SHA256eac1a3e357cd8e2ae9922240edce1cbd389c7ed80f97008ad2a4e05f488b9e15
SHA512f4a70b49bc9de74ab3de186714c35738a02d4ee1afaf91faa980ea2a30c3e50961d5af78a8da77fb3ff5bc3378e47c0cd3af3703e4e2b18f1e3b22090766fa03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffe5bb86ce1a17c68d6d035fad0bbac9
SHA16542e7af8c79e52d445672cd49416d1210a467bc
SHA256025dd74b29d272cd9889c06ea1bf5ba876c19d6025166d7350937f9d66e9f296
SHA512c4672b283e025902e9dd95d95dbdea473ee0c5b8c46abb85de5a6d6a5f518bfeeab662ba0a59c582f13b7984ef3203cd5216c47b8aa29b13ce368c4afefc6f1d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b