Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 00:07
Static task
static1
Behavioral task
behavioral1
Sample
ce365601e93b210120bc1afd4ff4b497_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce365601e93b210120bc1afd4ff4b497_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce365601e93b210120bc1afd4ff4b497_JaffaCakes118.html
-
Size
30KB
-
MD5
ce365601e93b210120bc1afd4ff4b497
-
SHA1
fa4a4496ffa072da987f15036578fe7d24042068
-
SHA256
21a30d7a74af108a8e07ff0ad4a5265effb10bba20807426660baf7cc04b969b
-
SHA512
aabbafe48b177d577bb6a2e48441d36727f81f9206e7d15bc2da692e77209462dea2924dcf5d96afe397c1b965efaa1b238c0c46fff2e36a68a3a8dd36977699
-
SSDEEP
384:j9r8PV6N/XBf1cX/DUXiPL+pn8YfOfls+H3hz2hvT+OxLtU:j9r8PVQcCiAClsDq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000b69b83af25b4b8a4e14ea3ccf2a3080ce10f6513272bfeba6e50a9a068ece6dd000000000e8000000002000020000000d3cd1cabc33bb17473f49b74b6aa7ef431ec795583681f58ab476272d08fbb9a20000000a4cf84f24425934bcd9ba7b6dc87da2f993d95287e54f0055036586da7fc4e4840000000c090a94d91108e51ae335abf624eb5d42160096c2948b10754cd805e723243f504931ea22d025ccb9be222609fd350e81ddc0f8f35f7ebaf274dfe83ecbba4ce iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 300476e2f0ffda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B8E2051-6BE4-11EF-9C49-4E0B11BE40FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431743133" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1600 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1600 iexplore.exe 1600 iexplore.exe 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1924 1600 iexplore.exe 30 PID 1600 wrote to memory of 1924 1600 iexplore.exe 30 PID 1600 wrote to memory of 1924 1600 iexplore.exe 30 PID 1600 wrote to memory of 1924 1600 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce365601e93b210120bc1afd4ff4b497_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1600 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c81ca3d37308af397d5c834d6e30e60
SHA1e42da0030634fe5cebfc551ecfe81bc695ff1247
SHA256258406f65bc9ee936cd468b6cc5c4c879906dfeb63e86c97bb2a7114e6f019dc
SHA512e0a732e6dbeee55dcb704a47db7b2dcfe94a6850ca108f774ff0b7c483264482ce0264a187a99869580fa0c2a25a578aeb256e6ca21d2fc58332de9f64e82bc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcc6d1f69769c49a7b53e94dd77423f4
SHA14356de9969a716fc6295df27d770edd97c2c69fa
SHA2569668c86124a3fd5ed1fc86edcd500c3b7e737d880cd5001f8dd6ebd0bd12d030
SHA512e84721843d6e5bf7f7695a8056750b92c5e51ccb08b87cd42a7b171dabd292b7e9dad0128a467b0e0eef54780fa21db2a953c48cdb3c560465f0947b436350e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a957ba06dc31d06843545ce01b9bdca6
SHA19a431a5e8a5beb793e7dedb28a4b3bd9e58b6a10
SHA2569fefc7f05ca1aca3e6d9031ac462aaa170251f1d99facf1fc04eac70b58dad10
SHA51227010ddfdbaf122a115c2082604f35fdcf8cccc93890ec95d7251867be36bca810a1b146629ee35a7cc484dcb6c5aac9b1f4eb47d4ee0866e1f1737ec92ed711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581b97d4a103b46ec3ad6fb0623cce641
SHA1e20faa467d57625d79cbb94f37c45f2946b04532
SHA25659699584a43230640a90b285daac5f51e397433324088337836dba87bdab0398
SHA512bd84b2c45d8b7c25d0941c8d0e7cb9c1d0618c098fcc24ebb5b67a67876487d7ede81e9766ac67012683053b700c88081110abd63b1941bb4897126f6e932a6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53630a4744e8546b60e60c62e89bc72b7
SHA19ce8cebb8f03f189a38c28137154c3276f22af43
SHA256bea52b1e2d9a96499685d29388360f96f8b238f95613f313bfdcf32c53777e8e
SHA51243e6e0f9c2c888dbd1796705ecf5334e885d633703f5ee2d29f126a4b110d09acd66bd61b006ae560c8be352cbf667783f2bb56db1c019731999f3fdad5fa207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e895a2d21f43188fa2f3e2ee384e3bdb
SHA1b0879c05cbe7e7cb13496a188029ed6faa23f6e9
SHA25611d060e6dc04ffffc5ab2c9362ce5f71e0e44fa2559f252035ad79d7be922c7b
SHA512f3a5bb4152227cc939efe220fcb9fa10ed30b628c7f66381c2798ac5c0ed54301e856d41bd8f633f7e70e77c3bccb900019a4f2fc8fcf1467e3b605665fb03d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c984e15d342226228188acb4e952e2c3
SHA1e50c502762fd11b2ff76f635e173f74233c5f983
SHA256af66d7ec11c90dd5ce9246774df3d48b8f61f822f568207359453e0f432dcd6a
SHA51241fa27dc9017525e4162415a827074b6b14a8723d071003c2ea0553ff4f6932c6d132d3ffb8fc64fd87878bbd7fcba2a96e8f92c075f94aa5c4bf56b4445e5db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9812a6196e1de7bd15733553a553b23
SHA1dbda98fa45dd96777baf2b6b77cf1a47ded39bb4
SHA25615ac1192c4d032000ff0d6796aea22f4d0a17e83d44be2aba50fe6e81a742c15
SHA512d77fe31400dddaad088a52af52bff87722de95052bdc7494780008c4982a4a3f05aaea5bef82350b7312791360c10ed0cea86130ecde1b77e408d184ed298b94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515ccc1a2568232afb0c8d20b4198a5f4
SHA121424035e7d210c3b248f5743bf2d140a3d9da29
SHA256ecb470c09306a38f8c46bff10b14a2032a248d27eb08b7840c5756c68abfb672
SHA512e46fb8265693ce375e650d05818a52849a11c935f15454ad5d7eb21900a9f015d10dee74dac9a4b9ce23387efdf0270ed6020dee8637a182dd5c7d8ac2c42b81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c819df13e5fc52759abde115cfb9a64
SHA1acb69a4771ee507512fabceae18ee02d8c893e24
SHA2569bd5f1a75f13856c7f1d4bfa32345299af17ec3c1798b907e0c8e17bf126b989
SHA51297494cd0e881dc179f3fbf7a13a47578470f794cacdfaa889e18a26f6c7ffdb20b78787036f65a40967ee24c4909d6993f8b8889e7e437ff610a20d20ac76fd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b12548dc2e1032a696175be565456c56
SHA17bfca2b550f6335d68be242eb218a0cd2b5538c7
SHA256132e46d13ff23afa56e4d19d6dcba3e7097b99676332f48aca9c52ffcea7b912
SHA5121700011903e41fc31d663f5378c874c1b92ff450e9c8f89f743e0f5e1dae3617a6408a9398fe02e122499c87c2df6a1c5d4e2243f8d64287288b4ce349633b16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553f7e60c1c74a3268827872481266533
SHA13d9824617d8db3afe22fa174443fbd5e9f2c6030
SHA256f3e30b9579fdc7c238327177e3dcf98bc770e4ad1b29bba751694e6e38967b1d
SHA5121294dd665034c317b6230390bf1e4fd0781b4288358764f86fc3a2b872f727f91331a9cf3b66ee62f96a5a0458ea316e980dfdb53d950bf7b6febc8345d65ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527f07aac0d998ab5b15ffe8d90466ecf
SHA1fda2ac94f257f29777a38777fffa189119227a31
SHA25603cbe9df1c1d7e1b1950a78803dd6274272bca588dfefd17601e27a3cdd3eec0
SHA512697459fbc74361f94181296e5ee2a77e5cff35da7d0734c8e50b5a4765148fcbbe9ba6c7822f5fbce1ddb908b6d7092d450de5a8b6cfcfe4fc34c9fbc9879fe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dd03cfdf38c24425a7dd8316a0b0cf2
SHA1d9fc643597123281ce5098bb9857c379b080dcb3
SHA256a7cc5b9cb7b642a1f552a6e73009772324869c5877ebeefd82f4982ea1775224
SHA51211ebf5ff25aca8c69f168c0c78728181b4eb56024628b348d6020fb5dfb9eac62897a5e132f6d449accfb64b6e13b377ff51da9c13b3f1521640c3ff3e54966b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559603eb7e66cfc7df201c904a1dfaf12
SHA1b27b3ac4a17c5353c178da0622a8673908d76318
SHA256f49840d679f9a376b2dcaf21cc4b09f1dd8475f3a37a50f6be4cae682115529b
SHA51249b4d410c35e4a854858cef7c6ed5da794527b68c4a176692eb31b4a6aa6ca12554ef4d7111dcbc7d40b3af5257e9044e2e8188755ebd3d4f304501f33b83c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aac740c3de59f8ea1f3c35dac3231dc
SHA1c3adc0bc2a6535e15eefbb1ab92c311c9950f4eb
SHA256dd6064007d0a64ec7ce2610d51f62716b771bdc72ab11948d0dfc7c4ba878d5e
SHA5126ff11358cb939807fd362c68295197269445c4f20e8c4fef8b58c85ffb34c5f09e4303237f1c5e5a05f11c07b159608ea53d2f031feb1002897604de807540a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579de3e50f29a0691396f086def00b722
SHA193597b90f16aa9f33bf607f229ddb2998cad95b2
SHA256409ec7f999b58ae47c6ce60e4db2962e950973d09b4451daf40f52ebc66e1b5e
SHA512f28ada3727fd8daaf02535d772642f1ed1228487e35e3f0ba80dbdba0e1a2ab09594a3e2f1b0595851a740fb00945b0e7c392333cca48a375c0e9aa61ffd3e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571a1be5d621eacde27ccc80064b1a5ec
SHA183007fd1231e16155f091c46030683b703d11d95
SHA2561ed55a0b090adccb9a4cfff6176a4490a9f4d6754634e60862932011c4983e25
SHA51275535a12719f2058742080df2b8618943a4c2a9cfe526a270c8a34a8c6ef731e8fd6689144e7f2681e7411e3e72a1381373f67a99e147ff3cd620f7246939d03
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b