Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 04:05
Static task
static1
Behavioral task
behavioral1
Sample
ce9c718605276a900187f392c418a42f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce9c718605276a900187f392c418a42f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce9c718605276a900187f392c418a42f_JaffaCakes118.html
-
Size
535KB
-
MD5
ce9c718605276a900187f392c418a42f
-
SHA1
a8a396aa0989d3f851d9c7946ae11b493664e0d0
-
SHA256
601a2039049bb94f6978184238f8bc5a1b35add3d29420a539ded51e0a29a2c7
-
SHA512
065d4d0f54613698d849145205cb4ebeac50561503ba731927dba089633f83ff463b6ccb57559a590e639e8c06c86f6b5901bf839341981c86e68738a0558bef
-
SSDEEP
6144:SasMYod+X3oI+YzHkyWo3JsMYod+X3oI+YzHkyWocsMYod+X3oI+YzHkyWoH:x5d+X3pZV5d+X3pk5d+X3pR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46624B91-6C05-11EF-A7C1-EA7747D117E6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00fff11a1200db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431757405" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000008ebef83e6eee798c6bf9f2f6cf75519b8b1171a39b2aafdbacf232bcf3383d89000000000e8000000002000020000000803f35e6fb504c6869c36b51ffdb6f1c68d70a4169c3944cd5ab8015dd99b48220000000af780d513f53c10c53f85ae90c243f761e53f3b1a7fa464e2fe1110bf13b0f8040000000dfc99448694bfc656f62e1be9d851885b16ca675fb861493f715a37dbe8a7088bc9af4db7fda92ef4974671cc11e28c77900f6c18230542a69884d144d84b6b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2508 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2508 iexplore.exe 2508 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2540 2508 iexplore.exe 30 PID 2508 wrote to memory of 2540 2508 iexplore.exe 30 PID 2508 wrote to memory of 2540 2508 iexplore.exe 30 PID 2508 wrote to memory of 2540 2508 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce9c718605276a900187f392c418a42f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2508 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e9b1c871c199e5a8f970f44e51608c8
SHA16d46dbfe78b9de92d9ec088b36b733e4f632e360
SHA2560cd3fd15bd6a3a881bc0cad0e23135a574d0fbb41880a6262196c4a2704c87db
SHA512080100addfa30ec18d01ebf9567ee9d6d3957943df512ee3efdfeace6cb90541c8bea97dc508148998b25591f9fed71f0c3ea0952fe9a343fc24479645970a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2ae6052dc056aeaa575163ccf1b6413
SHA10748bab78cf999b4d21fd8486eef829d6f6c5d4b
SHA256ae83da1b086bf25d41cbfbb9641314f7b760a981709dcdf5542ff67efc7c5838
SHA512c8fc6638d0d45e33c15c89349cff9fdde5b67e44cb5153e0c57a484d61db9631aa4bfe98e151ec2cb11cc54e6760bb0752047ae75b86eba9f4b6a4346288a95a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5578ea2790da913c9ece8ee27e1895971
SHA1a6a50f7d11a3d196766fc05847dd597fc831e632
SHA256d94dd3e87aa9767ebbc00e678d70160f30e6babeaded4e11bd9ee3979eb83120
SHA512ea6a46238ca419a9481e2e928f7b0437f49767cbb4d32de7a805171f9e37026f4c22f141b7e5fbd0f2efcda761300d58348dd6a4769d906657a3f672e65cbf48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535fae93233d6de61491c31670f9f5518
SHA19863e434143196823777608b418ce7b48c3bc890
SHA25617a3c70e7796ddcd1f0a03af3410d47ac83671d397b39d26703d8239b47f9b8a
SHA51221c8ba5b2ab5f471b6705439e540533a04041c83968bce4b8a3c7f982dc728f5f6765e2176ca5fe292881a15830fffd9d842c85850a44f40a3638eadf17fa80e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a925ba03abf75b28e3d91535baa8f2df
SHA17d3aa9450771a56e7080be5c82cccd4d3ef02647
SHA256a1d5729d236731cb9a1026416bb6d31c0f041abf7ffcc205ea5750422a6acb23
SHA51291ad9d3de06119b2a960206f69dcee990632d2dfdce1673b1d7111e5288a9abc1d37a03df3edc3eebb6e7f6d21f9b96462adcbfd2b96e724926b705a80b5b04d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515ca2157778c2fc1a26120e03641b77f
SHA16f08633047a31e17201713359779b9db5afff434
SHA25609ad9b39145887d5662ac95b24723a4aa5cb40e5d2daf103a25f7f2271c30cea
SHA512d2e560499465cd5653d95b0ee6fe760fe009632b1038047f1071cd8677807eb206eecd0f8c51130b0222cb28550f55b8e86dbbd769274b1c16b9daac5b155614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581b010524244a9d4d5c79e1b96fd41f5
SHA16b2364f35462f983b12120eb9db295b62eade7d0
SHA2565448c36ad6ad07b9257ce7f4f25492456c7d39b7fb19b659cf4bf751a689a5d6
SHA51223c3a3f06aeb7ea5267df9a58dd9daefa4f41f72f83b1abc6bfcd33cd8059a37e8bbbffecf6fa805959f42d4029ced4fd7284ea148355e0ed55e9291a175e603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509ce64e041a0e4a0f5cecb2e60ebaf31
SHA1f136742f92f1fc45766950722cf170ec045339cb
SHA256fdfef90d938bc761dc7f517b752932c9b33648b74a2da19195361569cbeb1661
SHA51207b71f8b3fc0cb937304d69fcc9b9c62d5a5af48ae5892219474f57d4b7ac47a75ee4978ef656a5df08455abb913526f74744ece3e9f5aacab6e0ec5ff23c5cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a67cdde0ad5457296bff845f7471cd76
SHA1e5ebf5bdd657337a8a9d716e9eb22778a74ab28f
SHA25640b0544d541ebb58615e7c807758a735cbdc7735b4ffba6b24c0f72af634978d
SHA512b4554dfcb630c25ee0474bfe582c1c26d0a83ae095fd28b64b6b5f251c8c157a0c08e38b9a632aae8ea0b873f75f05bfe0661581cbc6560a163c35580be566a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558dec5404cb18ffc0e9260cfba67978c
SHA1ddaaea9559b7374999f06fb34d8a66f8582e801e
SHA25656264235a933d279df16b75690a34ba64cbe090feac76c210d11e3a90cbf7c05
SHA5125fdd8cd0ec8442c01bcff8a177617524f31d65ede2c6028676a0edf0e55543aa75a8c36ae8361e3f64ad36df79527b005e15f18dd109996321cd09e69d50aba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cea1e96379f00869f58f554568efacf7
SHA1baed313bbc3132b6327329f5d5acb823a0c0da22
SHA2564b82287946f35e307e8e92c8e18e193e79ae737773f0b424bf64f318f75c7b53
SHA51247f044ad09354eb59e837b3dd7fe0e5ea27a541649b814eca5d9a4a811ad49ea6cccb8cefffb21ca799698ebbb90050e82bf8424d80315af78c4b50b068eb87b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abe8534d334fea9d23fb380a750fcbd9
SHA1469739270ae2563e2d4d7b51e96719eca90feedd
SHA25628524e620bde5f349016fbc3bd4f6385050ff3261762a53076616f0af2600bb5
SHA512089880ab44584b15d01d9a6ce8345a7a27302b848689eb464221edb14e7b20602410d8bf80fd3a34d6c869360b8a103bf861e49f54d97cc82f0a4f97e79812e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec54e2b7ac2ed01a79f3dc0fb40db87b
SHA13d758956369f6297e5d2cf1b0c61a2f0248ae073
SHA256d2192d79e292963d757e109768abdafdb76711f1bb0cbc39fd7f13485eb9315e
SHA5123e9dc29a268dee0f74447b4f03fa9534766db4c82cfaa20937153244c64e615202f8c0b512b0a8f7818a7f21be1f367b2b117f3e494ae40396fcdce4d898fbb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5251299a3e31e3541ac08058b82388946
SHA169c89ba5f5bc6a8cb3dcb79b1a19f24419d7fce5
SHA2564d0f0805c64d0127c4ed63037282808e2769f6f7613dc5072e1f3705ffe8a060
SHA5129468ee094358abcebfc9dcfc1b47582c6a76706a3bdfe59a7be7280731dea77f7c396d837093dfa9f94e2698ea9c8d4a397b4d3f31bc6b43c646b8ffedb7ba09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551bf5a6a6dee7a6e05f066273b60e93d
SHA13dc4102921af0f9c7991cf9dfe4c2aa34d2f41be
SHA2560e9fc9991254260b21b23f2e3a728f290b45789e80815670c3554b43297f621c
SHA512d569c55504f27da4b9ea4758aafb30212ed7b243df86d579d37702dcdb0a4c9efc9eae696e45442b0867fac45014f701874b874b4fb374aa4d75a11c91166c8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a27bf0f57a51db5b12e7ecb3e494f579
SHA1bd293ab0307f4aa5d124e535c28b66888381cf4b
SHA25603bae5625f3d4da294769e1f12d10af33a9b538983b61148ddd1cc1728977076
SHA5129c1bf57b529e3053e2a81179c3e4fc40bff895de97032ea92ff872c6dff97cd46e0665e0683edf8eafc595e0fc98c9fa45a77820e973e8c55128a22344f56291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551477735994b17ef4aaee5c754426d13
SHA1082605939ec453542c1d89dfb3483c13e29495bd
SHA256f455ea82a1133cfdc693b1a0faf67826bc3beb4f6b206def43f36fe4b0247ea9
SHA512619ad364a9dd0da3ee8e5fe21f6a1e36edbe39bbaae0dbe2b2a15e0877b60c4a459f2c226957b053c13a47eab9c621d7b8952994e782a269e58ef504040a452a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566c312495b1f0228763f9429ecb00a7e
SHA1059ffecd808041c2bda6ef96e02a92f8904a43e8
SHA256455e7918b48e5910512f8e41fedd14f973eb20e645ea6aaf26a24c46044db8bb
SHA512f75de19dd17f3d2f48c7e870836dd8cf756dcdfc3d1d2d17c2c6a2c739c59cf8c3340d16b16a1170eb55bd5c0a262cf47599adc69dcb339ba9490ac820e584d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d343c9a0349ebcafc511a50303de3bb
SHA1496d07f9ec573497fb092d21b0947f53386b8631
SHA256b851cf7d5aadfac3ae8e45d89fcf0d676171f2123d56b0e67b8c2279c74798d1
SHA512d8555f593d5faa6cac232bc4d47957fb4ad224d10e8c079ac2e80565d9610bfb43996aaea1a21e93662b099a326f0be6e13b07a99899ffac6bf08b8861e7f56d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b