Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 07:06
Static task
static1
Behavioral task
behavioral1
Sample
cef558fe52e2f7429e4f4eb872dc4e44_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cef558fe52e2f7429e4f4eb872dc4e44_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cef558fe52e2f7429e4f4eb872dc4e44_JaffaCakes118.html
-
Size
10KB
-
MD5
cef558fe52e2f7429e4f4eb872dc4e44
-
SHA1
92d3b138da8137d28ff46713e941bd206cc54fbd
-
SHA256
d5e1a9be7988b61d58edccb43144e71ea24656ee3aa7fe9264a233ad60944318
-
SHA512
eb331fff91c8ecb9833782a7ddc13c51a6ae1fc11b7288795628b753e0207eff557ef48ad5ab0533e725f6e51ddfdda686818179f4b8fa4146ae355d157f4991
-
SSDEEP
96:uzVs+ux715LLY1k9o84d12ef7CSTUAGT/k9fm1p+H1/Q/QoBuyINZ3mQ/QooClVy:csz715AYS/BOURyIndPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000e2375e8b75796e823c2734fb5b5bf160b6b413d07f6b708c177150392e1c0f90000000000e8000000002000020000000d51d956024e88aa6814e402af36b9e9aac4163ab02ed62fbe6a61cbce3d97a4c20000000eabf770e6a865e843776025125e00ba41c3c0018a638f70e7c9b766fbc062b1540000000e3ebb47279160fb4149190bf2ed122af41b3ebb880b2b46c7e8e93abed1e326f42f622dee3e10afa772dfc55dd473ac116c6491d10388fab70e5d88b19d3f698 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431768276" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9602EEC1-6C1E-11EF-A5E9-FE7389BE724D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1084076b2b00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2188 2296 iexplore.exe 30 PID 2296 wrote to memory of 2188 2296 iexplore.exe 30 PID 2296 wrote to memory of 2188 2296 iexplore.exe 30 PID 2296 wrote to memory of 2188 2296 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cef558fe52e2f7429e4f4eb872dc4e44_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5482ac3c769e2d709fd7f003af34c82f0
SHA11e843c45c0a89bf7891ae5151983ce3df0b74404
SHA25651b019910d9d54ce090fcfe9d5b5b4cad68d16b35baef0ec8da3c9b0a7eb51ce
SHA512aee9c29bc4663f971b1056d1950c916116b627b085235dd6dd21ac7d79a1b88d4ead58d5eacb166ad0cfb10441a78dab448cff7ef149c9d44413d49be9e8cdae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5228ac186309ea544cba4bb97880d2976
SHA1a624dd0ed8c85c2400c59b7e4e8f509cde89a625
SHA2562beabfbab894633fc418e8d27d62cd0641c0acc30653162c290d57e0394af560
SHA512a3464fe356e02a4c5efa580d0a0e70c61ef4e1e37cfc6f579b0ed3d4a01ae5df454b0f7559e30199ad51af9e0000c214866bba12f249a0ac374c4626318f8630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502492713945596a7202d47e6c7633d08
SHA150ad2ba58f661b2501cc5c3be7a831cec54f855e
SHA25697421fae3ff5cb02617985142b80402758dad940a5ab1933762022d2b340b545
SHA512ece018d07e1453bd03e4524dba3911d1d03b7b4bb2dc856dedf25f705e9a0de6bbec7c44f3a852c4468c9a43d484acf490809279ee195842fe37bf7e48fbae9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5378af0b574620b5591fdb1ee2af20baa
SHA1660e56f7fba1b38273ef501f5e7e84ccefe997c9
SHA256e9db9a486e311a3b7468ee01ef90ac674e34ab412e114c2e107004dc12ae66b6
SHA51214b0087ae89eefe8c24ec3418ea42e4bcba56833ce21ce3da36e95d86abcb763720b69e946b1c301c50df9613fc1e0f65df512f4d2081ee4aa1dfb75e5999aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5773d2afa50963697bc964f829daf3ab3
SHA1b8efa048fb53851abd6e12dbff6101d39ba73021
SHA25664521ee833f06cc4a996b5cd9518f7c6d03ab6b0494ed03e94a237d03895d856
SHA5120d8003d806321fe12ca20fbabe62b1acc934c4ca78ac803f598b51ad1b4519252c845235d63e79ab8fb805ea0d809026ee273486fbe52eb7f9c2a4b12a2799e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de421a0b914bf8f945f4392679c70eca
SHA1e083023fad6d130fca92b813c367bb9a11ebf39c
SHA256cb5bfae3956893b90e91d94db84f39e52695767e0c2ad18753e5933f14915364
SHA51255475536b56997be32da0697da565a6612cc9570c199b2f4e164f3d60296c791f66bbf2817dec9038bce515b5e5d0c2c40feebe35527c32b2b4a7a06a900df76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4479e2b5f9ab957362e3f24f08655e5
SHA1e2cf9ea3bff011cf8a7529f8fd4c220e8dc3e53f
SHA25674b9ef54758d7bef73993fb18021c5699aa99e0d0f36778c2d0728de43d86f7d
SHA512ef87a0ce8f537dac2ce59f37c305d84bda8f06f8d2d85c596fa8a69ef3a7dfc78fe01b524a86bf589e592b0e594fd3d6509ea8253e29aa769e75a2ecf6c73bf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5114af35142d1d0c79b38a7225eadfa47
SHA105351901f8622130bef09574d3684500a9332527
SHA256b8f0daf15c364b2886a81f11ba927367dbd946edc112d5cb158ac63ef9dab5f2
SHA51259b825ca1dd1264d92c835825a51d1331128dc159559e993d5b62acb60de47cabb0a96d5ba7d041e91b198d453c342b9a6fd944c9288b581726eff80ea06d3c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8b3a6fb5b0835c5e58ac2162c60b400
SHA1ec7103ab1aa6d2cfd1325233b1a208b0ba96e301
SHA256f5e6841751301e68f18c45950b343f491251d46939276db87c0476c11efdb3c5
SHA51265af37de20b9a2f79e7238e1d59fc51e9e118aedd0920789d7f86b9d92aace84a8757b0075411c3be3b8c8e5e9a050ce8106fb4caaafaf0dca68ef58ee493700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b37130a9a24c28a1f11df3a4fd61a2dd
SHA1c1f1c22a5d982510e002c6272497dee756e57d86
SHA2564d981b80e95ad8fff82670048d4dac723074c3181015eee7f7f8b674444a013f
SHA512b4efd07f2a03430db762e06dba0315c764146b0c56bb4697b0a9b32a6e07f16e8e2519ab9f0f0efb95fa3aab068fe319b8ca8f37f3d88f4f6c53432209c553f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ccdff628a717b2679d0c3289bc560ce
SHA1c305c4c100132a6cbc3eaae6b37cea867f7e204a
SHA256b04bd47478acc332d041f697b1e306689de9485e3ecee0145601b05a59025eaa
SHA51299ef2179944c9a018df8b9a4ed8e64819702f3f1fc08c0fb7ae58e443878c8760be8e264d51bdb64004e713d26ae2e4f65401d80d71159748d5edc4bbc7eea58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc2ef54d0128c04f7fbb9d965b8405ed
SHA1f44a0108b8411982272cc86e2e2fbb140c303e47
SHA2562f5b390bc198ba16e97c131f7ee469414ddbae79beff4cf96cbcc53e4649d68a
SHA5125df9ac252c649de3140f9f990eab4afef22c154b725998e873122349fd0a8d447e4f8d16eab6bfd755db311455ea297d3379c1572b566a838143408c813690ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a96e7595c14b08e36417ca3b177c1529
SHA1ac7d6c380fde1f5f51d6e09d216b360b8b585e56
SHA256960b7b4bedcd8cf4b4a551fe62736ce4464391f9b3518a7ac763263040eb2990
SHA5127b43da26cc05c114123232dd0db0c15d35a60b2f159eda4e891f5fd70ba2e3e766ab0f1914cffda859bbf88ebcc49d049fe4f31971fa38a939ba58a7e52fca23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a51f855a27e618800c57e82985b91ec
SHA15825131a070902ec06f4396e428a1b1a6b1c1b3a
SHA2567d1fd16abebfaeafca88124bfa3538a67e789b75a777e6178a86252d25f64240
SHA512ceaed21be193ac434cd347b5205eb2ea5f1b21de651571348e23a0d60f76cdb3d874af60e85c4e9fed29925b969e0faf6e3df253d7e39b598471ce88dc5dae9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fc21e98913313679473bd8301204687
SHA1cfdff38de9f43d436e92ca368d909e4495d94f03
SHA2563adaccd655d8dd7414ca3b199325d552735c3d04ce32c2cdb391d8ca680c8fbd
SHA5125175326f958c3e5df15786706981f2b375b0945f67b5076fddeb686a3431340082ddc7cda19a15cc5ef69f104bb1f19f55135e47b5af9af1e4993324473b3a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53df635c336bffcf0e47341baad0433db
SHA12bb71e1186420fe732d246cc4a6be3ec74f39561
SHA25658e28ec480bff344786c8fcd5890366df4728f975f38b0dbdb9719aea55ada66
SHA512a0333afea9f3b633b94842621f152850ccea299dd30c2a3bf8296a86754a61d6e77f94769ce570cd13a9dd453a5a214c083ab82b7c0043648cbd968f2b482ae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d4c66677130cf52f18d8b78ca6d64ff
SHA17e7dcc3c1f2b2462ca38cc192fdc98d862c620c1
SHA256f9063fcd217e7b709d1b255c43653c535239515e5a0e8c63cf59718be6bb4d58
SHA512e18c83a120216a89c1fdcded245d3e2603a8f4b0b33dc7b5e207e8bf738b9d4824a5b5b8a8d566e2b2cab9ebf22005b12928fe7e6f86f6f143074c52b34d7265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaa587946e5a2de8ccc01f792fd43f15
SHA185aa964014b7fdc51a4119d639463564e5800542
SHA2561ca6313d347b330cf130e9611b129caa57176b8866efff29206cb870b37d87f2
SHA512c7e6684f7ab00b6687b95f2fe6986ea8567601a54cd15c576e466beb07d6363b0024646a8f517f825f4fcce4ce8f21bcde617a4bf1d0415c325a391778740214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7ac4ba54152dc10724867f6f38753db
SHA15227055b566026231b84677cabec347bc06b7f99
SHA2560f114dc7fcb5b5fb6f1705208f1a86c950b5a3c7a426cac6661986a4a3a3cd7b
SHA5123c44be40a61d2c596d62c113c08a1aeb609d07d4b0cd7a121b9e840f897d63bdb94f8df777f7453e17d572d9f8bbb053b3d6b5afc5ef5404fcc20ccd5875b509
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b