Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
cee7075aad59208775184ddc59984f12_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cee7075aad59208775184ddc59984f12_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cee7075aad59208775184ddc59984f12_JaffaCakes118.html
-
Size
631B
-
MD5
cee7075aad59208775184ddc59984f12
-
SHA1
f568933bc70a64e3e0af17a00bbb52e9d1839cbe
-
SHA256
2196d40473978f2b23f476d26de779c2c71aa6e01f3ef33d52fbebe8702058fe
-
SHA512
41b1c0f24b8e43c3ec3f25f7ff1420d0425528b45c409baff0a59bb9ccea8de1155d5b034d977b68a69e990c00e6ad4321045578ca2d766a5dfca04f2c53f81d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{97C26641-6C1A-11EF-9E7F-EE9D5ADBD8E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000005b7371cbdab3ba7a97cb3fcc5b54a1659ceec72638401c40dd03bf7936ae1e02000000000e8000000002000020000000ac3c132aed824baac3798455423476e23f40716b5e794f1efc3c63a622c02639200000006e48548067b04ec408fc3f710370f3f54cc957824c93f0dc9ed53c72bd7804eb4000000029c033f890c7191e09fb823ad327cc848022e13953bddbfa757702b0aac65926b5a9daf5e17f01d78c32bc051dbf6b06e0e0635aaa9baef8d10af063cac95c27 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0a7206e2700db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431766562" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1852 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1852 iexplore.exe 1852 iexplore.exe 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1852 wrote to memory of 2360 1852 iexplore.exe 31 PID 1852 wrote to memory of 2360 1852 iexplore.exe 31 PID 1852 wrote to memory of 2360 1852 iexplore.exe 31 PID 1852 wrote to memory of 2360 1852 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cee7075aad59208775184ddc59984f12_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1852 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6a0df86bc860241affa487ea340598e
SHA191e980d8ba0cd43053a1779417eebc4effc1d6da
SHA256a6e89d22583231183bc7924c8e7fdb387088d3d70e409ab59138080649cca710
SHA512de1904ec98a505b47aa74a1154aad6a86c4952d8c7a62944175ecb93b1d95244bafe4c9adccb7795fce1ed018cadd0dc9d4cd31d16c4a2910307b13c7d32e638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afc983ca60cc903c9663c13badf17943
SHA1e3ff5dca084cd2a4be2d6907450338acd9cca2f3
SHA2563a6c327fd9d630352f51d3468c99d3ccd922381a73cbb2cf8f2b09442aa7145f
SHA5126a7d09cbef3161e371ff8902d0a59c3da49781751b3ebe07c002fd97e1ff2a4745f70dd7c799d8ddfadb8663c13d2cc417f02ea783c8afca6d37491eb40cbb7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae2ffffc2a5a835b9b212a9972d78861
SHA1c0f05ea704ee0ddc55b30008972068d76c447136
SHA256ab32c9ede47c50ddf715aa3e06129c016065cb781f50f001e5a26cd6236b6ec2
SHA512ab03113ff6f83acb561e8c94f3e66e090f791d0de02522f06b1013b1d55abe9fe30b1d9b0f6a2ff729b7f1efe9f7c01c1022575a857122589d1430dedc959d04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5545eacf7d9c6fdab122670fe8f43dcab
SHA11516a1ac42b35723435b05bb4640a092933b7e2f
SHA2562235a99da5eeca012a93318bddab2da13c5a14aa70f8b31ae17a8f08e5459842
SHA5123a98283198b714fb49bb998e2d3c204895c908b1717b302f5e493b7929cb651b1aaec7df366f1e4c4d204aeef759da57b2a700b1acf89a6d78058bbf816a0754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae7b491b5b5643e88cc95f18ffbd71ed
SHA1e74891a63329b647635dc1fd25489baa1339879b
SHA256c1b41da768df74f7528dfa8b10ba9363d1025fae7b0c5a2fd49f2a045f72e5cd
SHA51286499d0663c9dfa7a739458eb38fd24943ce8faf369dcddb24f88445dac16ff7bd664a87dc610aed33048990df97191fa7fe4bfd8d8e0b4e4a98f4c0c6c68c6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504066978454afb2ed09492438285890b
SHA1bc838b0ff32f5eaadb01323bbd936b72c95d225e
SHA25614ec3b9940e72101e20c2f8d71ce7b76763082bd7e9476a28bce51d145fcc4c2
SHA5125f1a32ec6533857a4c7790fb3d276910af1ff264a697476c2fc9057f8b0b4100c739d48fa814358cc5ea4ee6d8b4a8e2602806e1969f91de9f774cd421468c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d22072a28cfa49ce3609ef7a2549f827
SHA114c70d5d06870109b178c43085ea8f60da520e2f
SHA2567a62c0d8f5663c643bdedcb5185a0c2887971e61323d08baf9db9b9a003a0982
SHA5121fb82f84318884a8f16c038a1ef341ae64dbb6307108bc3112e5d527bd3f9b7439891b9a5761202fde1774366eb4e8852410c9e1efe9762e08f3080eaf2552aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5f8e893f7ec41355bbb39caf3ec8acd
SHA1af10b3dee94790da579982b3ca4bc22259b6545f
SHA2569b52d328baa0b8a5a8c6c42a946b4b1a4776c67b62fe607b01b0e9014526be12
SHA5126b565350ad552a459e125e4a1e1b0627b69a9bb0a4fc5d83ee3cf76f6367ea4b1e939f0b0607397be254caf6bf4c24541380971ccb2564f1615e6daaeee93246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57080a57c84580a0d2aefa65fac586aca
SHA1a9a811701bd16f4df144f363e0d78a274dd4162b
SHA2567882a9713056a0c7f88b93304a6a3e48ce66ec539e183ed2cb6a4bb242c6f936
SHA5123a604dfee0dcfbafbc5f65fb244182f216b2e479eb0f2dee2affaa9e013a0dab40e62fda67b9beb436922b065276d9c7cf096efcb1aef6f0ac513df3c6741ee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f9de6776ebf6c84a9198d8c95c9cfb7
SHA16d7123a2da0a558b9eda752a8a685e5d984ec42f
SHA25663819b6b7748271bf70b62f2e8a5c5db0dec99d8d5b203a227d3363c87ee0ab7
SHA51240a1932ff19be8440f42ba694f013cbc285fa4c969c20d0456af6ed0d008cefd6571ba0a00760a6a6dc8ea905db964cc6cec8d05028fb328421b70866a52920d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4a7f2e8e0f59a948243f5edb6b21eb6
SHA1003c882a765e522268708ca5ca39776b7375680f
SHA2561ab38d5d32d8380a5f7aba095a68d7ae0af2c072a82a2dcbd93008eb4268a31b
SHA512e9c946dce41a8b3c12f6ffd0fcc1b64bf8fed8081caf53d3dd1afbe7c280eb40c5a830e2dd7b9053216dcafc4540555f6c90689646794d37b41bcdad903e652b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e1f312f9087b9392d6e71e3ab567324
SHA190269216aa76270a0e691ea209ad47582c83f7c1
SHA25696a75282185b090d68b6332ab5a815baf5e0013498339113a0b87c4195ce3929
SHA5127fe66ac79a9b584c18a24a14587783d0fe29885e30d7c4ddbfb92ea05f87d323e3f674b8fa6fb15b12228b1ec82ae7fc834d5614ba594e815d832b6df6199cfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517f9ea0385d30416f09504e9eb385e1e
SHA1cb0977f22fab097f8fd5c683b608cefe489d9c25
SHA25655d8ff01af276afdfb2e00bacbbec276f4574dbf1f49485f146c186a93d9f4c3
SHA5125324c4425dfe52a345b271370ac93dcd1c77ecfce6a53b27a96143115cc84c56db8c737028148840f76e0b6293232fed3c91ced4152473aea3d4a967f227a42a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea51d42cde7a22561f67e61bb57ad403
SHA1a7c6d52b26ee802542fb7b28bdfdaff46cb33a83
SHA256bfe59700a7fdf75f7955473f23aec3fe9f7df03abb76e72ec95458c5cbc74f3f
SHA512aa73399af1aa8e4c9297de201ed55defcffa2142ab27fe4f91ff2f286d4a21d4110eb09267ef101294b2eee48514ead81aab177a4303ea1c03da4f5001bcc3a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbb8d52491d5f42e155bfcddd5a8acb2
SHA1f01c18e110197973604092ef59ab1262c54832a3
SHA2562493a0d515ea09191f56ace339a08e2ca6eca9e09be7630ca55a4f73129eeba2
SHA512388da67747881f07f2288195bb1a3023edc6d0ccd00e71ff3956acd0f27b06ac97b743e72aac8db9d00355bd8ed30e9c0398e4acc46553066e3c2e9722ffea26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c01decab7f5268a9e53edd1bd1e33f9
SHA1f9ebd70882830814aee5ccb954824c2fb21c3f5a
SHA2567b3d5a6a9ff93031990affcabe1413caee9a4eaa8847f81687dd13d373fdae75
SHA512122259e9f19dbfa924895472c6ae5e59c8db0d868c3317ee0a64071449669ba95b7afbb5f651ad6a6e7e7041f0e24e2158d2db6a4c058195d40a455bd4436be1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54df5df5abcce16e2dc117366ab39a222
SHA1ea9915b0c6964464ea8044f5a95f40ae5396fc45
SHA256dac1090f6cf670f63204ee07067c549f44eb10dce0b0a65342cd633fedaddcde
SHA5127dafa0f09cbcd7141a5b58472497a573d4bef21b0d5bc00a470e9c42e841ac5c6b1caf1378e0bdd00d6531bfd3bc722fbb6d50462e5d71c2ff3acab9ee9815c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57be5f910307888ab2c945d5bb869c181
SHA135aafb3bf0de87cdee50b56388ed14f614004fe3
SHA256bb90b0fa5471be6a809a0d095a274f5d70ef205765d2e9993342daac47b12ff4
SHA51282835e63dbbdf044675627b5aacbae5ff743292205ec88151372a4a2e1f73d9551f8f4aa71ea6247d9bfd2871e8d93fa76d5dd01234227e7ff9cc6f8ce76418e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51915dcf462ef0d8d062eca392946b08b
SHA19ad4c681bfdd6e74e88b5538381b2ac7a110cbc2
SHA2566e8cc6470b27ff05cabccba2963b5807cf05f6d9f3ae5156c7b8ee41e48c083c
SHA51296f1b65b7716a193bb4b0354f75f44e866b53d1b4d8e1d02114e0b639c71d484a40c2ba6599172964f96a442ed8d7b64868e0ea6852bb266f67aedea2ecdcd7f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b