Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 05:22
Static task
static1
Behavioral task
behavioral1
Sample
cec34aca569ca0b2a488495b577674a3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cec34aca569ca0b2a488495b577674a3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cec34aca569ca0b2a488495b577674a3_JaffaCakes118.html
-
Size
21KB
-
MD5
cec34aca569ca0b2a488495b577674a3
-
SHA1
8d675137e3755a23087a747ed631fe11fa3fb873
-
SHA256
a9af95336126faaf0bd2b9717e044eb16c0ccc75fda19311eb36b3c66cd77e0d
-
SHA512
d9de388a25f8e070b44ce667d7c3c1a3cacadca2884bc57047dffc08e63b5fb9aff82595b8bc1ac6010c858a4b9a9aaabf7135f0b36d11a49c016e75cf6cbdb5
-
SSDEEP
384:/eBNv5Dg7fDmxJAR7AHAi7mQocqhLSKXH5yOH+nPjSGTm3NOduxnNcvrxW/nWtfz:/eBNlg7fDmKi9s5y4S63NzEuUrjaiVXv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000eebf3233f0b62193066096731d51810ca5c94dfcf71467f6bee73e47b6c4686b000000000e8000000002000020000000b88deb42c63bf9c522e907353dda92e8d2debb117fe7f99537f080ee8f8b95ed20000000564f4294e49a35b4baf862df706cc51f8e99417aaa12c1df5b382eec36cd0b0c40000000cf4b90464cb665cbcce199e29a00243f0ea882e9bcbd359c9d1d849ebf4c7b5a89ec6f9e2498ae4b6bcba003253e3d0f94009b80274cbac8b84977c76746c76d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{094954A1-6C10-11EF-AD4F-5A85C185DB3E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431762028" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0fc0fe01c00db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2568 2364 iexplore.exe 30 PID 2364 wrote to memory of 2568 2364 iexplore.exe 30 PID 2364 wrote to memory of 2568 2364 iexplore.exe 30 PID 2364 wrote to memory of 2568 2364 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cec34aca569ca0b2a488495b577674a3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510adb2f95066e091bb7556eef27888cc
SHA1ac9a982a505ca90691a57a2bf6821cda07016ead
SHA25659187467a8160df771029ae7bb9cc70a79a587bc05d601a2b6828ccd6f89bc88
SHA512515e81ed675e2c11345a82719daddbc4a7f40f3a52ca7992b7a249d537da2224eacab4f71ae1690473034b517bbda3b8ff6093685135c40c8744dd89208db270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e2a9b9d70c4558ee07bd62a11bc3469
SHA1cf1a6e71cda89f3f1d1787d0e4eb4e15dd7ce54f
SHA2561ea194203c7aafa6a7c944ba04f5cab27e442aa1163dc9173ba98e2019c2a31f
SHA512b0b4f451f31e81f948499b55e2f289f0e6e431d4fa2420ceba77d091f56495feea0d5bb2c6534d111dd3f1745d69a4f08c6af8851a1348372b6f6e61fae22402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532143d8bed67e52aed68ae6221643657
SHA16b1e186fb04c5e951185b1a7788de7a931b483d0
SHA2566fec5f126f77cd3fb99b3bd56f4ec2c96254fa5804b87fd80a9345930a362686
SHA5121d437d37a67dc6a4e1833a59bc62b83c3a4454b108a7aaf5f0b6c40c206d873b2671e9010aa01d4468d8f569d33410b2b5d059607f3320cdd2f4fbf7903a9d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528d98de923973f4605e84e27b6b10862
SHA1857ee16cc92f876ab747070ba14f9c570ed53d7d
SHA256492e4621b378c25fd2b292e95d2b25518f72a4ca052011ccf7b5eb2b6039ce93
SHA5122364a35d76077d3d2ce1f3f89a2a3ffbd22ccbe56aace16acbd4fb00e0d7adfb7e59fb789293551c1586ef3f1419ad10e9bebf578cfcad98cbb952ce3369d631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4d5c2c802035cb0d86f017b5f93a330
SHA1eac7b52b1deec3616947244f46d2fc1649b6a0a9
SHA2563db5177a227dcaae80eb52ae5b0418e35850b98ab4f6efe7306bc62a6f3ccad9
SHA512eb92753ada2281b5fb6eb5094d2c9cfe31fd228ca3fd3e43c4f223002f67c0c5506f34ce3944b40626949adbb7146065114b7ab3105ecbe53c0892cb6b4bbf2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a2deabf21b98dd37aa1150e803ae754
SHA169cd1e870f6c7f4579b94a21e8c5ca980aed64e6
SHA25671d1d054eb5f9294d6712920ffccd9cb6771e8e26023ecfb2c16a8a543d74a99
SHA5120f4e39871da90fbc7539c2d97c670f4d2f31b5f308e64e0be5dc87e19d3052eb0482fa477d84da8b196392f42d6475a45033c368dc33530fbf6c4aa5d0970653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e90e1548aaa90114f011b1d3537d90c
SHA1e0641367a7bd6e448024d28d61cfc8e2c9b15fd3
SHA256561382394c78f5f056710d9e9d0424290f41383aaa9ceaaff0a757fcc52ff1d4
SHA51250903959d4d0a4398ff2095bf24e853501bdff3703f340fd85b53d10578ec01a28305cff872675042190ab159bdc94a23d2a666f790f7cca2517124e06727df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d6fbacae5b96b5cd95ccfcec0e44ebb
SHA15e049354521703bdb1ecc26c8cc6ffecc9559050
SHA2561cab482702feaabf9bff69dc6a4d41b31e4cc96b263ce996e95bfd45edfc09dd
SHA512c8d9cfd89de296aecc20fa7d6af60d27a021b937ecafe3dda69b681d124dbbd4ec55294d392cd2d59f0f072bace7a115f7535bf3fb123a7c36388e1f54828f64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59005029d12b067e83b5e5bd586f87f47
SHA14f83e1ce7c8e7e7c9236969e0cacdbbd569ca721
SHA25615fa6f49613d375c4404b0d6401dc5a7fc25017f2cc5ee7c63f451c1c67b59f7
SHA512823623d28cc01307aae86d0ead8e4496ff7ead16d9a39fac3057f831c83ae1e3f991ec387638da34df33fc7ffd253a2fdbc2dda412e1804f4bbfcc1b637a5e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51515cba03759bb36f50debacf4a284f4
SHA198f8110f07a47817ce20baeec2e139fe90cef6b6
SHA2562435fc38600445b74f45e74b1d2661148fa0f0e5da93b9e73bb3fceb461fee45
SHA512fa6ef71caefa262a74cfaaade67dbe2ed16197d8d316b138586a2f147d2a65cb6b6bb57bca82eaf7c7bde80c1dc9559a2fee5f89006d88e3998d6354c89a8e55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5969d2f6ce6be1d7d3cd7f2bbd79d897f
SHA11253f137a7dfcdad47ed9c13a7dc1e065e434796
SHA256aef183c71cdee947e4b62471f80deb9f75409607653e099e501e9157f227798f
SHA5121d579fbdf9b646376ce0ee99189fce5002661cffd3c82cc86aa81631d147edc164b0d6461266572ba4a4d985736fd4e9607fb1d21b61da55c0ef394dfe78a51b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f53355f25ff83b6650a7d4377b5d555
SHA18d7d36b916d2b650a8b264b21493abde054a5d33
SHA256901a187183ff9ffa10e7cfa4d95a22ccb59dc384ca235a93ddebeb88e12792e1
SHA512927c22854feae1837022d9b74eaec36dce67759196312ea83d5b3e31976f96eb71d82a20e2db3365a3fd47676afad70383e0ee03f4429e0edfd6c3d4cd8b7f50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e96415ac8af2ea42cf66ec7dd93d1c1
SHA1d7f03419bf50fc6a72588f271f39aa16f01c03b6
SHA2561ce83ff5b79b37033cee060f6557fb876a481e7ddb15834be513cbdc31de8503
SHA512fb7b9bc07d63ce2bf7ce4f96b259bb3d8eeeaf0f438807be4d2d15e3b0ed2b82dfa4ff9c91219a0bdf83a6dd1edff05af4e71055b191ede7be9aa7c8cc9d5f22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eecd34bdc9c2b5bbb5a567a91ccef4e1
SHA175e0c9beca5fab5e3e5592ec6200b5d366e3c00b
SHA2568b319bdebd94aebda705d95c2ab43a94e967c1b92f8cff9cfa1102131c181d16
SHA512776c2b3771c65759046af198855cfb6c78d248025d0920b744b2bac80c0e5f42b9f564a922648006294a2c5358b9eaf88fd1cc1b6894afdef2932508401c4160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a26c22a3e3a6e471304d27ec647c516
SHA167618cb3402b04b3ee82c35dc4d4cd796225efd5
SHA256d561f027e9c317c62e2eea60a9e77bd7b323a521609bc8354c6a19d87acbae3c
SHA5121af2a291d080b542dfb9b08ac7cdc39e85634d66adc63f07b3551e218916e462596b9c31efd655bde88f3ada82c35498155867bdeee53fc9c2543ad6bf7863f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ceaa8ba2fc9a915240ef13ee0b8b7ee
SHA112fbe345117400b50d4a2508866c6b654d195d72
SHA256c1e1ab2e80fa608c2984a78847fa61974b30e2c54911f987b643b0934a9766fd
SHA51275f54af7e67ca56292ec42296f208e2f2abbadd7d7d3141789f1f600c7b2471386abf566c7ea8014d754be3eaddc31d3b5162de37d33f69f8f5b25c75ba4f9fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5869344e418ec8493a9e3493725f4dd28
SHA11a3b5b886e7ed6cab527b0ce271401bf577cb09d
SHA25687e1c93005b5fca7917c08854f77fced5837df70ca087487d02dc65049728593
SHA5122d42e7b3cf0cddef41e2c8033cc9e68bf137aa4d39ed625e0fb209d47dd938ace42ba36f7ac3ce5a542957c5468d40d15ba9823926b234f3da994f982c5a471b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51677c2f16e1c6b8a7d6feb9cbb7f88b8
SHA13a9e7dd7676df87d6ef71d8e9045d4d8b44b774e
SHA2569c03dc7b46a0fd16921ae6a218be0cd6f9b6d48837e08d1c6055a10ef2274520
SHA5120ea575d52615dac7b3af11207aa1b120b9ba37b9f9df9411035a8f8f95fc6e7b0c799f15b9c93e2c02348f32270cd9cd17ca1a44889058219838b83374b8338d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a44d972b4daeefb95b4a03df0d7da15e
SHA1f441c07775a83edae6e59245d6be68bc025fef8c
SHA25647041fb09f71646a4ecc8a253a0453b368e8672aafbaa5b17c0b0872cb9b14aa
SHA512aa6e174f22d6586f405a3186ce35f6a92cebffd2a71dd9a23d6c80bf5364d25f39ae0ecda3d8455021a0c6a7b53ef40128916c8d0cdcec0a5bb578d0713efc4f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b