Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
ce1083983b935eb8b2b3755c740f51ee_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce1083983b935eb8b2b3755c740f51ee_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce1083983b935eb8b2b3755c740f51ee_JaffaCakes118.html
-
Size
67KB
-
MD5
ce1083983b935eb8b2b3755c740f51ee
-
SHA1
40d0261987d5bee19521e7fdcd31a4312515614c
-
SHA256
360be8e8403479015f550ab447918491a1fab3d836fbbbf15036ba23b1be388c
-
SHA512
bfa431ff47ed90cb402fef199fff6fa3e8043d8136a08e9b9eb624f6612f75b8905c1862961570cae759759e312e6938cf89a98eab1400d5543225a108c08199
-
SSDEEP
768:JiggcMiR3sI2PDDnX0g6A8rFoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8s/k:JiTTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431736941" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000e27b876f847288a831a7ab4bc49de3fbcf373a1cde5b2622251b0773fe89a151000000000e800000000200002000000025f20f456df8e9f760a9825c260919b43c686461008f6c730833c48e6d5bcaab90000000fbf85e33fabc6cfbe94d7c7b3cf0bc4cfe021efdac8ada15aca2a69e0ddcf151e698607348d0e9807f364e2a2e41e04156b9a0a35a35e1cf9d9522c1f4b2d1fc48b88727d569c16c8aed77f9b5dab319592bba5e5cea84be7ec467322b8304cb6ed8264fe6a5f7fc46cbfeee8116f2fbdf084fb0963f0b6b32934882c143335b264b52cc15c371818b30dd9260bb1a75400000007bec65d3adef47bd179d7ecb2e6fe25c27ed78eb116f0339e0aad411302fc69934365906314ab1e2774a0f1c1ae54c0d7f8c42d8fd6f9a52e23cad10d7662a5d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e03eba76e2ffda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9F8FCBF1-6BD5-11EF-AA6F-523A95B0E536} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000574fd6e339cf2504ea8949965c57c5cba03c6ed7e3db96b22a4508fa0b38a672000000000e80000000020000200000006d49cd4c525b04cded14a1e5c515c78bd05b337c8df493913b6809332d1138c92000000059e1a757be45a5869e31f3d930cc16521fabc910025edd707522b22030d80aac4000000062b9c3e2a99102d45d3b3669ad85e18cd06bce10fc7f1a5d6ab5290b0211a04333076e624915f6243dbb5eed55b4c8b6ba52bc921d6c9cd4face98d8b6b11a2e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 940 iexplore.exe 940 iexplore.exe 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 940 wrote to memory of 2856 940 iexplore.exe 31 PID 940 wrote to memory of 2856 940 iexplore.exe 31 PID 940 wrote to memory of 2856 940 iexplore.exe 31 PID 940 wrote to memory of 2856 940 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce1083983b935eb8b2b3755c740f51ee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:940 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521758db647e9eab2ca2a1cab888f4dc3
SHA1d35ad437402e564fe08b52e3494ebb222f9e3317
SHA25686cc85478493e3611946f60ec934900af8e7b4f8c9a0b18fc3212f196658846c
SHA512dc6f2c7d4241bc506502f4be3cb5d812bdf471f65140b2c666717a3a58117876520a6436db3ae6d19718b0772cb4ad2ab518b4841f5ada423c700c8570b3bcfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553d48a7bc197df77ae7ce11ada45029a
SHA15a6fb54be13e83a75db632b71beba89f454cdd40
SHA2563bbd5ebc37b6195375953c80baf92809be48d2cfea40112f8f96a2dc2be85d4d
SHA5127b6b74d41487b66f66d7acd21c85756ceaa2fa83db9a7491df149bc45bf01d865d7bd217bd6d032af9ce623bdd2e64521bdacbcf27bae37aaced426685bf6d3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535562e2fa5dcc29b06946a13df876d59
SHA1d567281769efbd776aa6707820ebea36b04d58d1
SHA256b90dae9f02477aaf5e7cbd68b4c051f124532f25501716c13d97ee486bd9fe53
SHA512f90aed551af6c9cc160e5b600b9de0c32f5064234962cfcb8494ed528106a7b52b2f6f999a871fc2086c146993f4434da68c36ec463ebe3150340115410c0832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56502dff7a5d8c990c1f9c3f30d3e6f8e
SHA19d3b3d819edacf6feefeb16df6c90e57f3c53e85
SHA2564eb8610f2cd96972b840d76627c2ed4fb0463cddc18b9fa4cdb08c673a6a58ed
SHA512bbfc489d0c438347379bc2499337775ca7d219df35fbcc2ce48b7a528ec1f4ad102894501fa8bb7c0b4eeef656b4490801de8d4a84ee1289634337dcbaf97201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc867cd906b4fdf05a18925885aecaba
SHA1d4b9e77701bbee6105fe2b5c22a258a42ae22e1c
SHA2561eed03cd870faea66d95edbac3118c6e6bfdbe45ece29c3473f8a1eda8008fe8
SHA512bb62091c4f79561968b9e8823e8831f3cf4dbe98824b73c70b08eb58080f977d977af86bd650bbf93dc355e65778420c84afa2c1cf4f3425b04071398803039e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe6fab224c30b00232baf552227f340e
SHA1f6bc3e70ae7ce9c101c0563919d14c4c08af69ec
SHA256cd15113066e3b1504ab2b5368bf767445a01362349876d251daba268e2659848
SHA5120610f486b3973599b08a4f1e603377c6f234e6209f68ad925b2605d6b64beff0ecd110228fc3feb202335e690eeeb53a5a4cee5fcd5012ef4c1a2e9f2a742784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588e4c323584234b44b97acb8b426d285
SHA1ee983a87568b294ee1bfb963df57129c6bd7b6a7
SHA25677255cc6469279f540fbf2f76253f4bb45f982aba12f26d9f50ab52334955d51
SHA5123ea6c3890bc51166628e5a95d70b3eb76e71c99c63f75b1c26e6b2bf35c43fceb33555cb41efd1bb5f64c5773132a5a8fd7359df1b80acf2976f5610b5e05efe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581bf25cccd9676dad37d0c751698c31b
SHA1340c2362ee2a8a4c63bb7d38543680d54c1545ff
SHA256a21f2ae7e0c555f28dfa65268bc9bfa3d5c41727f9cf0b543ee5ba16a1fdb951
SHA5122a965ed3a9a0aafa6586d0a2f3141e2417842ac0bc65180d472919f9d2295ee11ab4c7c747988a688543b5a34da828980a8b4abc5a732eb86af4de6d2b225de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a60583749bfc46878e9838312374f5d6
SHA139d6f1dd4d1c50298b0ecf021dea9eae98f902a0
SHA25646ef8e1125b01178fe6e2b9680c04c1b9d7a5ae50429af93ca301e84283f4e4d
SHA512576eedced07dc5514ddb4c744354855154b31f1f65e62661e15b3686809122453b121e3016c758d370252fee95f8d09ec7cc41cc1edf074ef36d84653c38b241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56885ab302103660597f655efa39c8cd3
SHA1885036e31bb253cc7da98faf3c74ce7d5b4a04e2
SHA256426845e62345f7ea19e3dd8ca8592c1e091685f5d1e1b759607114c57c8bbaf8
SHA512d897256f80c1a9a13580c57726d90b6f82b9c99a21c51c4a95ba34ed2f3dcd302f0c442804b08a0233f419a76e4435a7465e16787a63d50e353896ff08792ac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc3768e94b4efaae72d9c21823b098e0
SHA12c11245860ef9fdd93798baf17d408a3439bda1a
SHA25616c5463a4b0f12bddef2e0994e7553d8eb1412f55a5b9e68dcce51f59c4a27c1
SHA5120ab2faf4bebfed0992cfb7bd7839dd4af70fde25aefe94270fb7e7c73512848a80c256f1f0fddde4e414782365c6bc9b2484042cd6a1ef7ec2c495a63a236aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d1f73860ecfaacd1e2ea0d0a18c3d86
SHA1f07e27933860afeb6e18d527894c9ad26f56aeb7
SHA25614c22788bb44efe88654be95d8069594a0e6999581b8cce9be15b75f0ba472c8
SHA51281715ed6d7de68cb820f5cfa911b89b5289b6d54a6ec1a3812a50cf1c8de378c8b571eea828bacf9f2f3eb535fc35bb3b1cb6159da5ae8c2faa14fe51b0ec199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3a1415e488ac3f4f1cd258dbd5b6044
SHA1b7410e16dbd3a235530fcf38149f854df87a8825
SHA2564cf04b046f69f567faab88a81a7471af51f614167625c87c0528f459a832aeca
SHA51252c15307f0bc2e6f6b4378128166375aceac2ef45439109d88e589573740c590a4f68e952824465b8ce306735181f341385584274f52f52066e5a84690845721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f11973a0e99420448ebb386f70adaef
SHA18dfc2d8fd3d5b484d3ce831018ca162bbb34eb46
SHA256f44d64e545b2bb4924474e46856072c82969abcf509371ca1fe25ff2002b817c
SHA5123ec5eccbd8ad4d7dd21b27954e97b1c39819e1395ed7e27fbfd9acadbd881629550a5a288636b817e940243b35df3b2b2b2a0b26685782193064c48c8cb82399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a87c2ab970f19f2a81675f40ad0469fd
SHA13b005ee4b419d3f6f7d5737ded8f614d309f619e
SHA256810d1e4da6a02218e2e9c0fb0ff1bdad9f47ecfa88c90a4f7b5a54127e09842b
SHA512e241820696b5ddb62cff2d1ba51c4d4e57e12ce24ab71aeb654cca579c61511c7107cd3ca6614e4afa0b2b278144565b6acbed2e40cd2943aefcd67676f9a1ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e17c7a7819b07b16b3087e55d7b8a89
SHA15499c711820fc055bd7d471d822075f43fb7e3c5
SHA256c1fef4d559d78aa0af1f616aa8d2d5825cbeab33da2685a13ff3fcf174f1e176
SHA5120dc2e5a1e07d075c124a120c2e85d5c2ff3e48cda6ae37e7d5065bbb08a67a97a10e176955d9870635cd5ab95141fd1261aea0dfff669cc251ba12b3b4c46a75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5896a201f2a514bfee48678a8c20c2667
SHA1e9e9151469d2d60604011769cf3613ed31185a88
SHA256b61fbdcdd9c5697461651d389f04b6a72480fce1df1b6010d335718c2d2a169b
SHA51242122e26bac86acf693240f8af991cd3076d24162e10e478c649e9361c69029cc95444d0bef1e07b7dc373d8e06f429cab6db409278a9274231582d365c6dc2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569f9aa17d717b2c89b69fec906c30c5c
SHA1f97925e366e7c960b5eae0e9fa9d920501378577
SHA256cb56318dba2786da73acee0d84a79e0ff45f00e3df49a6b0ce8e8dd252797479
SHA512b60eba249882aba03db65590b69dcc16253b5e45d902ad1cde0f3771a80ea994f72e9c742210de96cd26aa14fb30b3f532bc0319f67dbd1baa7589b1a9b2340d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b