Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 01:50
Static task
static1
Behavioral task
behavioral1
Sample
ce602cf52137a0fd2a45c122d45a7b15_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ce602cf52137a0fd2a45c122d45a7b15_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce602cf52137a0fd2a45c122d45a7b15_JaffaCakes118.html
-
Size
21KB
-
MD5
ce602cf52137a0fd2a45c122d45a7b15
-
SHA1
78236d09c14a7f6f1bb8a60baed0cc4feabfd1ce
-
SHA256
8050e5ce56acb4d6921c9ff686efea63640baab6f71294d57458d98041212a8f
-
SHA512
e5f0a6d9b63c0ca74db9f2045d3c9dca91cf6e71df48ebee97e31705c298f2060a6a87a3ad71b06c389d8e3f2922091d744d6deee479b6e2afce4ebd1e8b0c39
-
SSDEEP
192:Hqvl596UDzivWdoYsEEyi92oo2UQB7i09Vea92pSdNVMjP0kunU:Kd59Mu+EEfK2RmaeRP0kuU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000004a9a9ebed533f56ff02c47c9bed64274b611089f32a2258d0e601f09190d7610000000000e800000000200002000000042e539fbf6cd6bd5c6eae3056659d797117c5311f28711c43a152cd44d2b3add20000000257afeb5ea9fa12fb33ef4f339f9505006c348dc2b8f5c8ce73d4dd002b9dcaa40000000d0fb99bdf38a6832e6fd58cdd2b5f4723ec13684446a2ba49323427b46baa0305ad427fa0838831aa7e39ceba0add12a343bd00c81e583b524ad0ab067451a93 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431749329" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0059e04effffda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78142AE1-6BF2-11EF-B913-D2C9064578DD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1700 iexplore.exe 1700 iexplore.exe 1908 IEXPLORE.EXE 1908 IEXPLORE.EXE 1908 IEXPLORE.EXE 1908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1908 1700 iexplore.exe 30 PID 1700 wrote to memory of 1908 1700 iexplore.exe 30 PID 1700 wrote to memory of 1908 1700 iexplore.exe 30 PID 1700 wrote to memory of 1908 1700 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce602cf52137a0fd2a45c122d45a7b15_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9ab6091a2454183450f8f8a9aa4719a
SHA1d0b2ca21ae0f00ae358863d20fc57bb8a010db6c
SHA2567b9388bccf9f4a5d808e175c510837c8fd76c920daaf1fa2cd548cc8c9933088
SHA5128eaef3ea2e2621f86c393ad76a64313d31420e117cd90ea02b521c98a16a8c54228b2fc4501948c033b8317fc66fc6e7193e312f09beda9462cdf797955e6055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57907d7a2c51329ab25d58ac686498389
SHA1c143cdbc75f9ccae6efacd4270a50faceefd5183
SHA256f635522ddad8f0a6018aa61c0ddd18043434526cccd9988f38df3efefa6b6aa2
SHA512ee64c159db556d62f7e9e6fc38970a2fd492fb236a0eb9f05cfcf43a74325457a35103af5160ed5cfc8e3e2826b1b015f59e10ed711e7b93555e99235676ac0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9e6c3a45c95b6270610fe254813d72e
SHA17b4728cd5bcc588f498e57c0fab83b6e5385444b
SHA256e716aeba4a1cb82d01c70d4fd832ae4ad99a772d4e4f6729980d8c068a6a6429
SHA51251552b97bfcbea1acb645d124e4c7582d79b8f8f0882fd8f6abaf19db5e556edb491cfec64f5a00335cc0a4fcc6382b8c6d1ce3169c640eb8a254e372799ed40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a974ebbb013252d8f62f880e8f26471a
SHA1f788472a3b582c03838c6d26e0a791798058570a
SHA2564b2db366a22251f9ea1803ef0ed4f55b5427db1e6db0cc60334264449b667151
SHA51267d568e35aaae2e3646b8fafe2f7e9798a3668a2e9764cfc19adcffb2296f7a4ff552b32c1776d468f90edecbd96b996a2fc3c699936dd987989bcefda7d9205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55641184b89a7c33b4c2e4c9bab9660a9
SHA1c141509fe02ea87bbda36507ca009bd0e8f4c7e3
SHA25653870d1b48f6be49717c46b60ef5766be12a28700a1ed580fe3cfa4920b2c5f0
SHA5129caaaf4e366304f007f2c9385fc9188d5b2343e8d9cfd4a46410238a5f2cf4eb37fac1c4c033b6e0a9f728ae578e3e875114e1782505db0b19d20e112c2e2a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588c84435d8d316fef3bc5a50f6f7ecd9
SHA19d56798783b34d20ee4100b642615a5d1e6abe38
SHA256d330a3ef4bd958087750ef9f7c9cd2745106893fd773b1336e29536766258021
SHA5124444339ee33204be0f1d213033adce0262e9edebb048162c17d02823e8623cbe9027436218eacf8a686f04097503eabe6a6b7106178cb9a7cf6eaa3b5b7216ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7f4a3c444480c611d0d6329732fd1b1
SHA14321f83642175d462527b883376df61d73abf1b7
SHA25629fe0b6ca41389337baf3804cf9ed5096e32839e9bf5f13bf8cb16bc14ffd139
SHA51241d94978d5ad9ec2a956ad421bbf948ee90257ae34fa3bfb42134f0e6d9f93905aab3d24d7c9158a36feb395a390d66aac8204c12a772074408ef90b21f84b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dab9a5f59b332071340a168c71bb199f
SHA10ccba212814a0880995b1f005d462719200c70f5
SHA2562c3c0b8201d6c7133063a8e684423fcddebe2af392980a19f9cb329f8492bb72
SHA51239941e068257cbb33d65413e6de2c6d6295ce6cbb3c1526b69a593bdf927880bf8762a209cd18a2aff2ab3f27197af4255df8fb4c6c541f66d22c9f3c1986238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5155eb5f8424b80beef8140b272bf8a81
SHA160701c869dc28eba2da2fd5333f5e215e551f6af
SHA2568c2a29b9d67e54d01d9db55e409bd56edb27d0042adf3971b0063bd544a483eb
SHA5127503c6abbdc9cc7b8e57e4faab3099d21a7c78a85aed4f09c29ce9b5fc0e1137a0df2efe45c9ba38358c9db2cb64072cc0fff68eb39b65b03b4c0e5e28952140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d4513fd554385f53c3c5f7d92c7f681
SHA104376d253f1b800a69f8ffd388204def651d655a
SHA256030454174454d3322c0ca3dc66c468e6e4301484b11dad32978f35e54d5df427
SHA512e9e10fdc54c60479e0be2cff0f17db110c6b38bd4a26196875969b2cbeab0014e06f38b5cff6a24d7ee56b6c65cebccd413d1cf1c691fb3c101c58eb990a393b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5770efd439443108100346eccb5b1f3ed
SHA149cc2d5985704e319975ff32e6dae883ce472036
SHA2564872ca68bcc96b7da27cf4851c2f1e92c74ed3a1c16bd3682310b16f04eaa632
SHA512f58c0125ae465f59124ad72cc7ae286697034666297a0c888021b332f75e04062cb5cd198c03d83fd0aa51ef9804b300ce0997be235c7f34e1c6346c103bdc3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56666d74ac2b8781c84fb569bde482995
SHA15fd84da7c674f1dc31490047229b12b22b2313ca
SHA256a50a26e9a9eeccf300cf8eccb118d0af2107b1303d83ef5a77f468465a7fdbcd
SHA5120e414535af674d8c0578568e70f0bfa4ba4ac82346a6aaca9aa49caa8bb3a6c38193c97e23c201008065cfbb971893594479c483aade2ce08b0f89571ac6d855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3724dd574f1d4a99f1bc1ea199b0966
SHA17f4c9965ad4ac065cfcf9c4c9f4e4068cfcefb18
SHA256348d06dd121deac27ed3dba5e0bc57a454bca59ad4f8e88deba630190e379227
SHA512f4932755551dba09300a8226d555399f027d3759e66eeb3ebd5d238c2679b3d8fc932f4d27035db0672ea5be2b051422a183208af2584032e9ca508544160fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d31b4891744946efe45a075b7258ffea
SHA16d57c24207f28b706768eecf6844fe5d3f09277d
SHA2569186bbb05b21ea74329c470a178966fc04fb683c43aa3969132521919c3d26b4
SHA51246fd833069dd5f55397d175450f8d24979f5aff85912c9c79aa21ccc84db23ee9f0a8d654cf01ec45e8809ab6bef7cc21a226443bb45d46cd965278b14bdbd52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5622269ec39a00edd1f1e60b144e1c1e1
SHA1e64375907f3555842d9df6742464522c9bd4c474
SHA2569ace729cc4fd98f06b06e0383a094a36300d687b52b320eb5e14ae303b1ffb3f
SHA51207120a051e7f053669aa22003b043b6050ab5898a7d83301eb5e081e484f03e95ebf5eaa165ee2494dab472597dc7ed19590de0ad88ee3ca51bdecb19dd5b28f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5897c82eca0df40260ba149002b5af7fe
SHA1f9c3a2105fa39ac004945cedb3d64e327e5ff29d
SHA256d37fe776d8c36a64c9bbdacc6a0578a7c0670ff329969e7a0dfd0c9ae12707ee
SHA512da2dc8df2cde9ada3ac34d63a219d082d17d25cadad72fe5280fc4df30197cc0690749a20991e972a1f16320b7687ac0ff9272abb7e4e34ae1f1d851e4a93414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a49ef14a1005bf55a77e7c2384b6202b
SHA12f59537d3b860802a4750311713b715f307aa4af
SHA2560ef457869194e4224b380a9d597da6a88ba2ac7729d85d42a5c20f6958e25ba0
SHA5125334cfc951643414a532866378cb493189187d18970b30398c4a9558c9095dc7a4645e911150c81d7d37012406e150a44f9940327c4a14e23dfe128fa568c338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba67ebbecd65b37c8ba2aecf6ef33dc3
SHA1e28378b67013f2d57227366c99a018b066fea3af
SHA256f6c610674c9801de6040624b088f4cf78ea77d214e5ce9294e1a99b9d1c745bc
SHA51228963e8119bef527969a247c5596a17cb0224c8dc148929c69009282664c794a9c843602dbb7c6b299936d31e3f6eb869dbb8789b9595e082a8ea8056ca3213a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f80f3ec1735ab5248884c0f7cc1b27c6
SHA11be1733147e0a65fb35e3e8e3a60dd1a890d40f8
SHA2567996cb63d7403fdf45372f60ca5545cb4faee1f85f233c4df3cfef69894e7b86
SHA51246cf066409a9e99183dcc68f2e4aaec310c4214c9f815382166f5fa8bd7d3f2378ee9585df5baf1f6e770977796cc39af59927033edd4b80a67f1b28be307cca
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b