Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 01:38
Static task
static1
Behavioral task
behavioral1
Sample
ce5ab8dd1994dcf31485516f159aec2b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce5ab8dd1994dcf31485516f159aec2b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce5ab8dd1994dcf31485516f159aec2b_JaffaCakes118.html
-
Size
86KB
-
MD5
ce5ab8dd1994dcf31485516f159aec2b
-
SHA1
244cc9e72f9ff73a24e340e7e9b158a969f2ff95
-
SHA256
5f06980cc203cd47874f8cb45b61b029969f0b0bc9c8c9a2ce8a108ca10a7e4a
-
SHA512
ed717fb5025ca9e751145ae21c7a8d658e70820837fb15f09e4d8a52a35a914458af213adad37f443a7f575a0e721bd2c2d4c37659d74cbefbd7fcfb163bb2d1
-
SSDEEP
1536:O+6RgZ6/oRMs4nruUohYt/RO4D/f19r/IBcNyiK1skyBtcWeLExzOz7RrA:96RgZ6/oRMs4nruUohYlROKl9rgBcNy0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431748575" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B62611B1-6BF0-11EF-B2A2-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b5648cfdffda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000006c2bc770d4adeb162ab52a019aa75cb835c39332e34bd16a046a2a901e6b780000000000e800000000200002000000043b0e9a5ff3bf97e4a1845e7784c0565adcfd9a70c12f0d5b83e87a3371c84bd2000000041a15da3b9e3ea1c01307fc8e97f9e12a54d1db9c3476d45d8727803979bca21400000005ddeb5dc698566f7b4a9dc371eb82affc1966595e39718853ca01024306ce153cb0246600a72c55ef9fcf64663314648e312e2cf085af84c666ef722f9880acc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2168 2368 iexplore.exe 29 PID 2368 wrote to memory of 2168 2368 iexplore.exe 29 PID 2368 wrote to memory of 2168 2368 iexplore.exe 29 PID 2368 wrote to memory of 2168 2368 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce5ab8dd1994dcf31485516f159aec2b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a8821470c262dc5a55983f7344d62af
SHA1ee97587d27ee3e6ac343d44e1ae0258c74605752
SHA2560a4779ea2a04f4f05c163d3900eee65e58f06a49ef886817339ac64ad0787609
SHA51278af9525f763d9343515699213c40c3a4ff0873a7df62220383bfd69f82317e58a5d720dbb0a07b118cf0087a30cbb1f761d69c316f06bdc543c2a5a92829fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543e0cf7892a565552517d42fe4e4d086
SHA1fcf64e11edee550bb0c20967e9646c3e1a2c676c
SHA256ac5f03eb3b6dffbab3749f8adc5d40d87b492a6ac35fe3bad9a9d17d8c93a8ee
SHA51295fdffedc09f0b17147c791569a98ec92385d5850c1ccdd1258e9ccb7be34f55248a978b012820653c4fdfc3e717556a4c43cbc8586517c8ba8d3856b50fa2d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513ba4594a076eabf83101cc4d6c78743
SHA1d272b9f3586c1edea10507ce6220a9294d22bef5
SHA256d75c2f9e26da1e633aa1307e3be21ed25074e2c8d69dfa1f1961a1392d56b48c
SHA5122d0ac6c2946c9c8382582ccfd23f4ab65f484b06a501fcc2a2599f364c82a4027df6272f324085736c73ecd6a26d72560c56bf1c06fc77069aad328251425d72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8aec68212dab272a4d138feb267c971
SHA1a5e00d0f62b99834c20e13fd404d67de731555e3
SHA256d7fa6d3947508ced97274ae2ea841c3705aacaa8b3625567c9a939570f71c291
SHA5127c66caa14c91dfcf075eee4a898250560f152c8c06bbfc3edb047d4d3b2f49f4d52671b692be6a617c3467920df7af0a06d1bc1f30082c7bf3c72213d0a76bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c62d1bb6b64a87d0fa1caec1594308a
SHA1b8e4940445c7225cbd16029fefb91318112f87e9
SHA2563f3c405a7477f99b42643629b4cdc27977fb049e6112a934443f3fd8d6dd7b8e
SHA512e56c8c3f2cee1e495b7982751f8ad718e817c38c07515a5ce26a7f472e8df99c7a2eb7a622d5a92e3dada09f378a3ef80378a574b1e8c50d32c61f4190428593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544a61a0fa2d06bb47ee62b9e4bed4c2e
SHA18ad5490016440fbc0bf2d6ec725f440d0638f71c
SHA256331fbd9c4bee2cbfea5490b292b376a0c9904c3de5df94b283e6ee2ea5eabf45
SHA512086e2997393667b0f9b3e4262cefa8967ea67465786f015ef26105d31192d452dec3deda563879e94df5e12ab3e1caf6e26f31ae252b00d0ee7b9e01a50c80a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1038e4e725b733395ff413f4e449011
SHA1de9961f9dbb819ec6ac53c47682d9fcad4e9791c
SHA2561ad152b4f8d0437279d5487ca753e2f6c693133fbd43315ee7c210734db77e4c
SHA51254065ed6304d1a82df874e858b17e35251ec9176cc624303ae05222acbc827d35298bb2e30593bf9e1040970dcb55603500f330fa7a0c72ba0068f593252926e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544441b4212cd3259b0ca11fdfe416fe1
SHA12200dfc056baa43a956b9a0c7852605f2d7c4ad5
SHA2562fcc122db811f1726a9e6c777e27dc91d8c9483ce59c5888cf5ed0ab0e92cd65
SHA512408b68af456faea61c1067c5d2c2795fa87e6e70b3350433a8aa03474503ed90d29d7485070fc939b02ee7f4b408034d0b9e35391e0e661a0c00e5480fcebce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4ac30b1ab55cf7e79915ae02394c917
SHA1e79ebf42352a28d654b529003190090d9cb130d6
SHA25604d32e19fe2c8ee1e9a04fb9bc6180cc691d3b04d5bf2092b77c3668f475aa98
SHA512ac4afe731d153533eef381a495ca5003f89179706e6b21c9142e91714a56416c0b488998d29472573517579315fe81b8497d5749df80c4423905be5f114a35f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c90362b647edffa6f204dff88daa76c
SHA1dcdb6c996dafb930c629b8e41493f9807ade401d
SHA256adaa829e2f8badb643adaab170cf6e1106851cf938df2ed2cad029a5e07a077c
SHA512e534e5f54f9c980953f01489b7c4e5ac23c22e8899f14eb3d8ad951235f6cd2bb2162a0fad552eb53f8172e3fd744a51e5e5a65fa843e21a4d62b58c80593f68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a7497bd7417541cac79674d4974a458
SHA10e6b47a62988dfae147b021b896df0f88c7b1c17
SHA256905ad23faa962622ab91c785b7bfe30f65d8e9f6421958b5e313e64ddde51cd0
SHA512d8b0790494dac5f1276f461b830e87f3255c2fbd4d4165fcfc422f9bee22c053b216ec160ce9d5fa67f4df75a1fd34cd28b0884e22fdd00b30dcc2d5709efaa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cac5d7cdf1c9f1fd16bea613e7436017
SHA1835a58c29cb6ff7107a88dbbb4ad0a0a20f60c08
SHA2561be588438c9a12b4b481d5c3cfd567080308d52e35d379926099fdb36d7facf4
SHA5127a18892afc9638aa882d76e10ad8e52c568bf892e745661359eb33516f475b0a76cc35209ecd8d7bf1ab1624c55a96e4012e0e2caf73b1130dff7bd7bb50c2a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5875d4fc4cd4bc3f48392c15c031b312a
SHA18230677e9bc9425a8c061e97ecadbcbcec65afc9
SHA25671a50a95d7d48a0c2744e717aef726fb752b76664666fa12003d70695bc48ff7
SHA5129c7876d1d45f28105f37178d538cb0202e47a3ae7a540c5575e9f15f986a6be00f4e89f51639c5b1fd4342f985f775bfcb70abd7f46053467ea19c683e2677e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b89bb6ccc4d221a59a3e16a2101ddb28
SHA182117385011d393fb8567c09c886892a4190a282
SHA2566c5cac9919291facbfd11c9a50827abf8a0ee85cc33cac67669fce3837e6a752
SHA5123f7d990c74cf946a6ce579cc42ca375f3260d93c936c51a4de118842f7628b77e9edfd3e93eaabd48e7354a78eac22db2996065a6be58b54c50c9216bee2a81c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e63e1cc439be4066d0a3c1b141c8d255
SHA17758c5a3702097c1980648071fbfbaafd07723b5
SHA2561a3cb5563f2a882900432fd1a9e77b4a8a5e4750f220fd92e1addbbb1a742a5b
SHA51249267192e7403b1e604b46d88652a547cdcc02488a3d765e0355dda7df2fa1083dd57c3de24f1e524626cdbb44f59e9221199ac880537dd915a1e801e2208aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebcaf214d8721843e5f800c172ff8e6c
SHA1c82a90efc8678ddb8411690d822db6390fe898bb
SHA256c4c6bde68429342494f5fbebf2364d58fc325dcdd932bbb618c5183b8ffbb9a9
SHA51228c28722bf51ab4450643aacd90a967733831c9ec3dd13bd9cb941c753619989bbece10ebdeb4de229c515c2648ef5ad6fdeff452fce311223a08be2e4428f59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519d05eac9af2565e4e6dc4539fdc34aa
SHA17a99346fe9b609a910dd5edd8b00b9401f337edd
SHA2563a1845f16b0e9bba1df886cec6b50fca89a3a0e53ae1064e0ab505e3602cef5d
SHA512bae0163309687cefe8ebfd2d1f961dc2d482b942e434979dde4fa275f1f529db68d40751ab263b94de343afd571fc57210aabe11558d1ba67f6d44b65057a8cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50078ecf36b430e7dea5d703fb888d40e
SHA15cbccfb0cf086789dee0c5fb52830e6520789e2d
SHA256f62928f9c550bf94c31671586a3d5765dfc40a135d44052555eabf5edc1821c9
SHA512f333d925b0c957f8e57b85e48d7e2399deb8efb5729f85c69f2c1490eb6f515706012a491e37c97658de4dea761cfbf40866721f9335ef7f5931b3be978b9ef3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b