Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 02:54
Static task
static1
Behavioral task
behavioral1
Sample
ce7ba471f5e65b298ada5bbe39891208_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce7ba471f5e65b298ada5bbe39891208_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce7ba471f5e65b298ada5bbe39891208_JaffaCakes118.html
-
Size
20KB
-
MD5
ce7ba471f5e65b298ada5bbe39891208
-
SHA1
f6d339240b523959f21923c7802072097d51f43e
-
SHA256
02c1eb6c3886f0ec2a763eef9416d633a0302cde97b2b7cd9a68859921290fa6
-
SHA512
f3ccb0e50921c311a0e4a0f627392d994980d90f54d80798ef2f20c3d113c3620e30413dc5c027d0e85917ed8059b4139248a9d6b67ae91909425f17aaca3b24
-
SSDEEP
384:1zwmOhg1QOSKU+fh3Guf01UG9QDLzvBNFPueC7d2YX9kFwa3z2wigPPFPwdtZKot:1zw/hgiO/fh3Guf01UG9QDLzv3FPueCz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431753146" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5A56AD81-6BFB-11EF-8595-E61828AB23DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10c506300800db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000837a9ab2dc25218420263826d8dc43d737076830f195d492bb36d514ed43b117000000000e80000000020000200000009d47e350975b023fc0f9b29e68e81270b836659823a6b33edc3058a01c8332df200000003242ac327f3b9833aac1209d12986bf016b9c459098d89e0a35eb5b72be0a50d400000001572bb4b2240982e9743c226d57d0e0bd9068c7cd9b279b7cd44c5af682febe0a459d55509f79e7f552a9d4457939b02579190c8e29cd1ca54ac045c716a61a6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1424 iexplore.exe 1424 iexplore.exe 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1424 wrote to memory of 2136 1424 iexplore.exe 29 PID 1424 wrote to memory of 2136 1424 iexplore.exe 29 PID 1424 wrote to memory of 2136 1424 iexplore.exe 29 PID 1424 wrote to memory of 2136 1424 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce7ba471f5e65b298ada5bbe39891208_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1424 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589ac1e90a30478fc04c136644a18a702
SHA1b12d8719bcd4aabe02d6db515557aef3040446b2
SHA2563ff4b14795fb51e49229abe8c52f18d61f66035793812a37f0e18d0c8ffcf56d
SHA5123b442c6cd5fd72b9953b8152101f9965ae8c5c21156248ba9dc50bc764b487ed3304c00601141b94b2632613b9de3947839e9f8782e2cde8dd93dbaab0a661b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5538717381ab89c0f6a7a9d7adfbe13d3
SHA1d324d6452cb00e9a939bdb63176dae8db1d5d832
SHA256eb4d1d038899be78cc9d3088f1f4c7b2afac70be0e528e5b9b58f04d76de7654
SHA5125953830cef83780cb1911274b27a8a2da30c6813fb2c80803a921f09613a16c592acb044561795ff494c960e2d29a8151a0efaddf8d2a6e6aff3cd5ca9b6bb35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e91e300b0dec1fed18e5fa3134f77482
SHA11c60f666affcc011b4806a4f7a9e4c6480f3dde2
SHA256cbe887f283a0d932ba3aa8a90549f55d13754340cc9f5bcc3c0b15936f12968c
SHA51251e1db6d95ed6191d6457eaa26401a23edb011088432041fd5b945100538278a4f28a3be63363d834633959953077148c6739f8a3d7a88fc2a00bf391bbffac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3432d15e421748e810787962d45575d
SHA184e4a7fcf33d761ce176c911d239c54a02e8d9bb
SHA256c8a52cd6031374d9ac701330492597337fe04c93954457c1d8894b32caea4209
SHA5126e6a66b5c488d17293f0b796342c1a7912a5250c4251e10efbcbd24f70d529fe05f72353f70c65f4ca66f3120c6694d7c8cfa956e4576f7efffada0e878bc3c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed4b4cb833d4c7f08b8d3423e04d3886
SHA1fa98cff85ff790f1921fcc5c07d6b8d4336c86c4
SHA256f1277e37b990c6d65516ecc1127f448d220e5fb89efd716965f5f960d2c293fe
SHA5122bef90c4c7721a500b3dfa6015b3c586fc33749c7ed1cdfd2c3e09927c645b417e7e251864f12b980a547677a9b6209e9f2eb00a8d29f17d5e449c1bc18f8e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab9a81cac6b6c7c06c42635e0d4d53d4
SHA1bf92b5202fc10313bcd734f81ceea509f60fca36
SHA256be9b5efdc2446b8013c4e7b16e4e713319cbacef999557ca81198a3dd522d242
SHA5127cbf8f844889b26102e8a8c2642dc89327fd38d0ef8fcb9f5e4df3055300665ad65a4068a13618ef67d22432257bc91fca08e96f6e652d9bf3b5f45c65be6470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506b34fb6ae9529765d7508215574962f
SHA1c23addc143d2038ccae930e5f150d32150ba8d23
SHA256ca6d1c25565e5ada176ab1604e9538e5359c4028bc5b5b2589063b681d83b03e
SHA512aff4b3866acac5bab0160983ad5788985f66ec16ff6b51a44d703cf1f3971ff2b8de0cd12d125662a248e117f8bf5d430cf04dda49f3d7288f276e5452d72e97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5528c8e2aadc18e5021c02fe47405f680
SHA1c0ef1fca9a66e7a469589b4a9f5f11f225a86ab7
SHA25629d944296f8cc37c4296a608c1dded075ca5a1ac5cc67bb357b82759659793d6
SHA512f30bed2969a6b2875352548ccf38bb465afa9cc48be64ca2068199cd07ec23704f25f7e958422ecf5dad2331e5f7b97a86292505b67208223797b230c4ed3143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5988003f4a1aec5972c21bb3a21aa5d1b
SHA175301516f0e56dcb194133112bf98236d0e9cd22
SHA2562f5b829ddb61e2897fe276ad1ff663e29cf531d06ef63ccfb27c1e475ab6b1c8
SHA5129dac36b8da2e500b5507b584f30601577a62e4c73f09126cc0fb2aa74d31910746ea0c234dcd59f27fddfa052bf1e33cf10fb7eed3c58f83e7782fc63f340b77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbe5af0cfc8055f652c60863d9c7d25e
SHA1f8f63161f84eb5b4444a91b07b1aa9cd515e143b
SHA256ab2c55d708c104cff5114576bccf5cdbf6b5dd4968b7670278363e238efec261
SHA512809f45c4d69e1a72929a1a30f25919165f5b22b192ae4b7a366e0331b1d56365b381675ebd01ac72ea073e7c43f11edd5645a8fbcabd80a7ab37468ca96e5ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3e9bc3c47516162175d5c4201715c2d
SHA190c223481da568a629de1fa45851538bc13f7956
SHA256eeb1b041d11f22ebc42030d5de21ba83c9ab558ec76e88097557ec06332b394a
SHA512b6963fc49f379ca708cbd07fce561f037d5f5f135288c4992d9229f200ed29b3b89002a27465001f8299bdda6ac663c22f694fd61616550ebc00c6e7483d8538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9ec06db7d972ac0c05cae810445ecc6
SHA1a414d5ce1e2042c09f7d29bc2359497084153783
SHA25625b2ab4ccacb2dbbca02d351be75015ee201ea0271f83ec3031e17ae082c4e6d
SHA51272e527952a1793e2aaeb5c5759906ace0a6d042c1983c80a851b7af8a42d63c686f3936bbee1e58418eac8970f812a63b9270b6b83470a547856d077951d351a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5068696feb4f60cf208dbd9361d9b6e86
SHA1145f9647ee607c827e53e00985d2ad71562d65f8
SHA25620a0ed5da76bea2b16022a18077e0f08248b36c44a34d67ba29d18639c741351
SHA512ca9428a90e0f8bf6ef8e0d82dfac53d03d274d14002828fcc75f602759a147f6327603e814d6e0a23da4d0490edf1588b152fa834e0f943deaeab1a3a7f308ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502e8d01b95e1a3c8ff14c9b696608bd9
SHA1b8580956a78577bfa62eaff0697d38c77769ccce
SHA256f8ca6738b9d35a4c09997f0db67ea750043d2760bf52949f4456de64af2dc5bc
SHA5128dc892c4d28304fe7deb043f6b4787efbb302a5867eaf0cc3377f435464df0266e439ab2ade7b2b2aa17c0faccca6234de520b90efe3a5a4583cb29cc84c5d67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eac72b4184991abb5b9982091f816f2
SHA1b8a347475cf33cfec0d07b0ad4a48bda2e07931b
SHA2562d5df0eeec3d3a649169c63e871367c4155e7934f324d115cecdce315554ba80
SHA512ab821abd301165c29c0e568d7a64edfe7cb7cad74a477d275f51a76525cec9bc9a88f80fcc81c3e387625dead7cd8f28e98d5c3585905ef21e0195b291826fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b98401c137a5fb4774f24caaf9d85d7
SHA146e6fb2a659279d97f3da89f97ec14c376e2d2ee
SHA2560025a25c597a72fbe110d0104bd1c7c95170c99481d8e853c1f1f3a27ccd5421
SHA512e90d427ba8979a463e55a303099c20f542ec9085e6bda048488fbd8aa91814459ec976acff746f1ddebdc70b9103b9396beeb54066aeb98bd34abf9389a126d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541ed06bb050650ded18549b913b381b6
SHA1703133acdf2464afe30d2c6005e808f8a7caec15
SHA256122a0b28ffd45495e57f30ec2e1c7095a95c183bc5c2dd3646d27db0950f356e
SHA512654a46606ab32c5977aab49c2002d13a25e2baee88b6d8de58990eb1a6438cbd90e289afdbe00b5818b1d53d2abc687fa859c9d2524c931eec72051d43f871f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cae1ef90a77bb2f00c7a88b6cbc8e9dd
SHA14ad865ea23ea2607693465b2d2453645f56dc120
SHA256ad76870d8849ef7b85036ac688c3f1ddf62334a2d4a7d7ba72a416e3f074f5a8
SHA51242f9de3dfc433c24977e63eea1887ece148001a27ea89cdd8f9215e342c6ee5df8167a6527a0665695ae9b5c06de1cc0f54903ceea25fff74c5e56cc49ed41ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f724d630618146265b4b175ccf67f533
SHA16b4b1ab77863f11f124285f5a48a63e1d20285f8
SHA2569ded2c3f1727e623cebd8c6a589234a8be618de6fe409c874ede0efb16f5f23c
SHA51220a61fc0a207867b068d5f9a3226e29aa0f314cbba53d95e5bb963c0064e703af0944b8167422ff317445e3cc4bd895a0b58dffd0d2267e068630968f25b43fc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b