Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 02:45
Static task
static1
Behavioral task
behavioral1
Sample
ce77e1bb6bc2a4471705a9231a59864c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ce77e1bb6bc2a4471705a9231a59864c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce77e1bb6bc2a4471705a9231a59864c_JaffaCakes118.html
-
Size
1KB
-
MD5
ce77e1bb6bc2a4471705a9231a59864c
-
SHA1
4087cda1482efbe05a95fc8fe2b05f4a6a319cee
-
SHA256
a1a2b0513b93c6858c7d907231e9bbb18d778f88e2f6c883215c007f199ec8ca
-
SHA512
fbd9d38ce0fe05a4a20028a82d5294a8b2ecf592e8c18950f4bc705a2f34e18e15f2e9bf63d87543037f20982f3a7b7137d339e7a7473261e6e824d94ccc32f4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 709532f80600db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000fc1139d801b1ed24a8d3c3fd453e16dd92ade59662468ee3ec20d1e0dd92c6a9000000000e8000000002000020000000f0a17ce48e4d95e414bbf854bc6f468dd8cf46d148673ef1f9294cc0fc634bd9200000000e84e2945e6cf7d111defd9869300376fcdf058886b4cea1f3334a17882fce2f40000000fb5d5840bed36a502e73733c28fac87c9238ea875bad343341ab2a8c5d0b710624e4aba911aaec8a54261477e9561b04c45e833cf2c204ee06feed008b89f75a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15C7FA31-6BFA-11EF-BCF9-7EBFE1D0DDB4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431752600" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 iexplore.exe 2672 iexplore.exe 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2656 2672 iexplore.exe 31 PID 2672 wrote to memory of 2656 2672 iexplore.exe 31 PID 2672 wrote to memory of 2656 2672 iexplore.exe 31 PID 2672 wrote to memory of 2656 2672 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce77e1bb6bc2a4471705a9231a59864c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508378f068f29cdbe65f7aac3da380bba
SHA1b7784372ff703067ffe76eed4d5b3ceac5a245b0
SHA256b2e891c12a1d0b143a35e9f86d0c50c6247e53cb4692217f088a09527eb6e0b0
SHA512855773514722c94d82566279b0366ff8933a1f42421a85b4ac25cac2c59792a107933d995ecd579938405c142bc3eb2b0c54396f89db9ca55f554fb167316805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c42fce55a6694949507d36901b4a371
SHA19396490394501359ca17370e39331086312f4203
SHA25638289d251d159498eb31f0789b4b78dc2ee413d608dc7c11a99d28b31e7922b1
SHA5124218bc97e77f07f359bc8bb6a8e760e86e7b78b2bff3c2baa5e30b0b37451757fa0ddbb95448d70bdca23b12d3fefb8ac33998f64d395ff001b917987f42f4f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589a560b136ea6cd81445cf68f4a259a2
SHA1a00486d22ab1cf591f2a50c2188351486862d6f2
SHA256097e9e0324ecd709cd7de1a90b42d2ca945c8e8a35c5f8aad4f9388a1b1865ad
SHA512fba2c0c7f86a90120410656858d8c0644c1c83a375da30235984562d82fdb243a81d78c317698cc3fc4b51046a6c9fb52383b906fb7b47b3a1e43237fe2df7ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d2358b04a3c35a3efa829438a77f142
SHA1db8f28debd253dc7deb3e421b2854c74aa19fed3
SHA2563bb7e4b56de0fa79cee2209d839c8487454850df8f4f9c8ec941d2aecae9e0cd
SHA512fe3367eeba14340face993d775103273e5e74fffa43abcd526327a9190798d2efb07316296e30ca5367d5fddd8dd4443d5497f1ca61158c43ade4796a6e38353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ab084808c0e82987b466e348c226ca9
SHA1ae774f75f6b0e1bd02100551207d09011818f3db
SHA256fba564c644d1a283ca6e14d2ced749ad2e68e2207603a0b2f36aac5a4207e971
SHA512d65c6e34c8fc81eb75fd159f962ee299f1d03ac81e1ed5734084328a395e42bf26fc63f99fe8d74d1d6ca366e33302cf8b5098c25398d06cb46bafcf2e14988d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504b03b9755da9da624d94b53a10310e2
SHA17e2db101313083a9620dea190c4dfdcee117c971
SHA25685dbb185f9d334b31252cd79e0cd8cb12c283b089cd759f100d201433429f2c7
SHA51284c049ac918ec9379860632ae4011462a6bc061fccbb53801ff6d184c2d8b623bec4068b4452314aa35bd9d123ac1f9b2c72c3a3ea1f5d427352c42e09ef458d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57019e30339f50c90d802944387f36c73
SHA1f97dd3c36d44251b4a748ebcd8e042bc156102b5
SHA2562cb1b0eb720a3c19d3daf184af2d1ea2cf460c6cc63e12e3f16f254e55962332
SHA512b68f18290992614aaaf897148577516521ec9367773319f969ddc995530b4165a6f84d41abd946006eaf7698b9519304af331c4a10ca1e62692f6169735e9a29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf260e8ff9ccf1603cb3099d7d087af7
SHA14d01570195e56bfdf1a9bf55a2786779bed57a08
SHA256d47fd8023cfa3c1649ea4154081023eea9b34362aa42d8d4f9eab7bf767759b4
SHA5120e6e28151984ebcb139e4fa657b0fec79bf1958ffab6f8a6d11f71db19869ca6d6d8190bebea0c65971e41f50ef70ddda5e1e2ea20b5aea95fe6ab0d88e47149
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557d6fdcab2b477e55e74a6f36f247b05
SHA1bfc05c1f2c1710b3c7c392221188d3c4c7450d90
SHA256dc6bcd647edb2bc25307f94dfbc9b95269db89fb3bf769a60ae3ee6916d30624
SHA5121c8012abca283c798ce7a2faab8604a4f6118686adab4272b63d66559e076c2ef0a929081444acb5f1393b5bd685157a1f19e7f135d69c8f3588090b2ca37d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f99a61a567952f8b39f28fc339d8349c
SHA1a856fb69a43b87b02ab7f8c4a16d8c4cdde0d617
SHA2566b644623455b378c0d8158642a4a3c3c9cdfbcf83076286d0371873ae61af810
SHA5123048077906abe787bc32b475014e53103632e45069ed41956fc148af327b965e5baa50e2ab0586386e6bc3ea91593550582ace049df55d97589df41ec1dd1759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2392246a89d56b863fb98b256494365
SHA1ed9520d0da86424b05d2d8b1c0d183049e2f44c6
SHA256bbe7517aefd32a1b332169ba8b537a4237ba67a2475d0be431bfb30d372e07c9
SHA512b3e7d6753b2f8cfe2c3e5031b916186fa562f971f45923fd28b500f6e563df6969a6ef8302addd39fb94fb6b412c0ac54b0b1c31d2db85540438f112d4933d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f43f9a0d5f3e07c6773e3faa7151572c
SHA1cc807da73f4492e6cd7a98e2beb4c383946d8622
SHA256e303e1a7ba9ab7b9cd982502fbfda0de5b4a72f64894ea28fd67f7c411e61366
SHA51237957b19315ef6476ca87c760db4e08245dd58a08f43c0bf998de675aede6138826e03937b882122e2c90b380e061861eb8f8099085a2beb3c260543c075851c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8eafa7a792a9b542a239351eff44392
SHA118ca99350fcc52b96b8cdeffc299ecd9bd34a93e
SHA2562b70e1c0bb60f109212a59e7024064e95a7d435cd2536a126a671ff52f9119a9
SHA5128f7ce55050c7552d9340258e4bf61730c06361bbc54fc9d8f1a697847efec226d174e74d65b189e97e4d76526ab6bf790bc11187c92e267e1cb5f71c0bf74d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff3ea14fa8b44587b4b24fe920b20fb5
SHA1d27db4e5733c9403bc4540f6a341d56a65cf6f2a
SHA256b7a2fca18d7023211c4066be29e438ca53ec841387dafc373daaaebcbcf86576
SHA51249ed2680392062c34bc3bfe060c4d362ec347d7eaab87c14ded6872856f935e40bcdb8ce7d825fc87b67c43366a5bd181371195e7291c0e916cc922d6f882927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d81b960ce678b1039029d7d149dc69b
SHA1d9a9e6a3ae4f9272bb9cbae1fd22cf4455b9dc8b
SHA256d9d2c447004eb11854825b51dc0ba30ea1a854431c9837f02c6d56a70da77564
SHA512c5a0925360fc02f80f2e900afaf4eaa951b778dda307223aa939fcf15612377615af0c364615677efd42c5759baead718141d2435e0be1c202e82e5b6a8b1693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc2ab106724d4dd3166ee9e9276d3562
SHA1532ca3909f4b7d5f407d442603ebe7bd088e3f38
SHA256db93d325437fa7a395cb9c893a6d3f8f05d77e6c944aec1378bf070935176326
SHA512ea883d91c3680c89a59f981cb73479ab33ed1a3dbfbe9cb0331e2f5a3412461d7882f059a328c241fc4b88be14dbab65003b18cc758ded675e63c1171efb46c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f20f67c598a04d26180e8a982296c1
SHA1520aa8f10c880e540694caa7418b4ba0bc9a8175
SHA2563463ebd581039a5962b24ec4c61acbdf51e16fe58a3028a8f61abd7d12d8b2b6
SHA512834a06a9fbe08a35f2359f50604607e98e1b874deae136d16a5b6ec5d7c9108a49e5a451d42ef16dfc2aa8ea982b87c5284e5106f0fdcf5d4d53e1c14b4fda7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548463a51d28a978368f0fa49707afbff
SHA18c718da12306bc98b821599cde20ef6d5bde6703
SHA256b26a40e7bb407b67f8a8119064f79d9b1b834ffb52abc7fc50e93a87efbed3eb
SHA512255b5b983a822f87cb8d411201a3c3186ed9872828bb6f478854bdd715bf677df3651570ce30c6664a13fd8ea450182922440defd598064490b04300b5d02c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb0bee83104b94dca7b0bfb388534c8c
SHA1bc4d4689960b8af6c487ba8b322bc5868d911164
SHA25682fa2f8544d0db572a26930935bbd95219db54131e505dc4f0783ce609c3f479
SHA512e69326b1b60f2625429960c2098b2bbb95bdf3ce121f85e987d63bd4566346ae146d64d1b782ee3f4fd2e531e0c4952deb3e76f34d51662046f7025949dffa12
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b