Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 08:22
Static task
static1
Behavioral task
behavioral1
Sample
cf19eefcaf89ae9efe9e80d80d099b54_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf19eefcaf89ae9efe9e80d80d099b54_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf19eefcaf89ae9efe9e80d80d099b54_JaffaCakes118.html
-
Size
36KB
-
MD5
cf19eefcaf89ae9efe9e80d80d099b54
-
SHA1
9718aedc0ce665f7798b4444603011023c91d363
-
SHA256
cf20e50be2fdd25dc7273d178bf9598a5b55332994350c3884a903956ece520e
-
SHA512
2a1aa08e475aeb3b32cc4f6a04b2b057c9cb4e49203257ea1f9e0d1d6692e25c894f7d9bfa61326303353d9def1630d49ea11a3778d3495f683950e07a8ff78f
-
SSDEEP
768:zwx/MDTH2o88hARqZPXJE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6ThZOV6f9U56lLRR:Q/DbJxNVaufSW/P8yK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0092cd0a3600db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{31060DD1-6C29-11EF-A914-FA59FB4FA467} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000a7db79eab0701dd0aaec95521620854162cf071af29711c6ac45bdccc905611c000000000e8000000002000020000000db71edbc12020522e15ee6aeca876945bd9a18cc5d13f6ad69148b774d31b7e42000000024a6eada4eddb3969da5c222286920a7649bc57cffe519f977773d71ff10796140000000bbb6c56670136f790731052e5323dc0ff89087bcee6f19ef27d0ddb6deb1357edda55a032659a5b924112bb74c88f5e7af7eb631cc18c783a00a766b0ee0e1a6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431772842" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2788 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2788 iexplore.exe 2788 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2812 2788 iexplore.exe 30 PID 2788 wrote to memory of 2812 2788 iexplore.exe 30 PID 2788 wrote to memory of 2812 2788 iexplore.exe 30 PID 2788 wrote to memory of 2812 2788 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf19eefcaf89ae9efe9e80d80d099b54_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ebb47511d9443dbd3a5b14e8034a131
SHA1d65e1c77a8deb34491c0a21a026077d1a16991e0
SHA256e410eeb2d2192430955daa5e98e0d3bc3db020756504687ada28cc1f852928e4
SHA5123be393a09eac310851c09cd5354ff246e104a8c556fdb921ab963988cae82236e9a873456d8d1f096c27799baf99e94eb1f682dc26200371acce8eb3bf3de490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5694192ae7043972c10137870f83e7756
SHA1cd3975e991dd1f5716d6623411b0818118015d07
SHA2561b3cc981bb28e774f71678dc0f367021eb5529b82abcb7483f6a7a706743c1cb
SHA512aecb45de8599198b02ef4d115205ad1301dfa9d3ab5ed9c0a54e5f1c6d173a2fd964cb07e61fb5f291b898c8ec09025d4815090226a51f247b42af1b7beecfa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5395309a4d1e2b6fb73a2000d14e60962
SHA1f6a7ac1042bc2c53b7adafdc45e8487ea69048f9
SHA256d35064ff1797827eb9ecf30eeef939869362e046015e4ff3a36ca557a89133f9
SHA512149f3864c2c5cf28d0984d6f25bdaadb64de7d68a85b7b49d1244b3130f24c8c3570345af5f9f248fdc2be4200a9d06d891b8dfc3e14e414a8fe2e72710378a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586649b51f5d68bf951c78e5e73155c51
SHA1427bcf4d72a395811f5dd56f76de72c42204a988
SHA2561cfe046ca8fe2b8546c3f0f62b1f3daf0b1f6dc62d9809f2406cec312785b702
SHA512ee7a319011128494a2e54e215d733affb23278910a70945f5dd9b0c08c936f7eb1accdf39cdd4e5a22173b87b1b7d02d0a9135b57b99f916f8b7e9cda4d80ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53031b55f3de52c777cd0e751989aba86
SHA142a33b5ad538b321fa553356b120f719db64b62b
SHA256ae941f5c512e893504e0e75860a04ec9fb6ec25df9e25f444b0ac1838f786120
SHA512eb4b74551fa9828c566f660740eac7a6ffd44017d129b08119b4c07ecb2767c222c59bb6f54006dc04e76215cb1e19533bf7e07b70a5a92e4d2ef357037371ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564daca94feff948a1db05f3c5592b868
SHA12080866687848c264c3e72cf5808158127ce7d84
SHA25622c840d59db2970a41f3fe056abc8f2c66147dfabeec48f9112574a292332353
SHA5129d3a5eb7ebe22898dae581f50dcdbce94650b925900a47cee5e99f0672704d521544a9bda8e34b5f2c0c980ef18b89067a349cfb3c4ca12c398b387ea76ff148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3467e6c52ba5b42431dedbc3b3073d0
SHA120759404c59b21f0b0ee67ba4fee7b7783d46154
SHA2560533ef3100847f28d64c1b9fd0918c5f5ae1d0ec12df8f006127ef3c471de7e6
SHA5124e5e5de8f7116f9a70dbfb009aa675b5b37041e9b7e17ecdf9805ec52ca603ff3ada5347ed72fbcf70a0f8e25aded00badb3dfa1d2e7153283088ef42da6927c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4909e2b8ba3cbf499ecdbbd34e5d1a2
SHA1f4f0711cdd26e8b91b363ea3f89e0362d70ed943
SHA2568646aa3bf8a12d01ecc9d9acb3a4c132d62db9db5d67d7461c1bcce9a126e78a
SHA512e1eee12e0dcdbbc16a9c27f7df7ed9a61a9dafc27525bab85cff8246d11fe94df52c2e055f76e4fe7404c7ff4d323ec5a40131deb613cdd9add1e3fc6cbde6a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ebeac1c9a43dde3f86c5298aa77d31b
SHA14c2a049b0ac24152710ee7858fb1a2e2e97fd8cc
SHA25687cbe6245bea85bc7e0fb1c43c390ca51c39d1fb87391039b053d8d93939f5c2
SHA512102e0b393b65e8b4e8d2dc05d266757673008fc4bfde42f5a322d343ec93b50e83ea819e603e26344db570f102aecbc99e1140f01beded4522bfa174bb903373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4f1b4d0c5ea657f006aab6e430a144f
SHA1cd4b698964372ad3a761ed347e9355306e651b0d
SHA25639cd592b6a21f9fd9f6ae5bcdf72ec3aafe7015501c78e53c286c5607d703f67
SHA5128482a68150d4613e7d321fe555f366f104f80a424eb8be6392040ddc7279681ed58c86b00d84614f8e0fcbf3d0bb93bf8191b7ec095111d61b3f9e6c35167d54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5079020bfae03989651d2e0c78397e6a4
SHA16665c36393e85652c893ad7ff22aa0fbd0f5484b
SHA256c71a28bd29f4cfe6a3c0119052075176e9b144eb492ab021310727c88456d0c5
SHA5127685d60435f25c48ead52e9bd6b2fda6ab93013487c67754c238f096345b617b331c3d2655dc0beec88495b1296a6f65d1083554afa986dd3aeef201f871e8af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d90df1a1022918baf15be17d5a166083
SHA116d716e952280f73d4d8dd635d5ec094db1c9f0b
SHA256dbda825e7f0324f098f8e164a78e7975e8db3b9c63158b32ef2de13fe05fc0bc
SHA512e9804c5fb471f4ea3bf243d44c8666d4a9fed4a41f2d3f74589c5e15932df0032526dd1199a94d36bc4e0f76b1284c1266a9226f824474d85a05313da6085b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cffaa3f77a5503b07b1c3363beb93ef
SHA1cfd9b5695e2c9cd8cb1da16fd66ecfce5800975f
SHA2562aa2feea76b6c1278b2a00ee3f54ab925b0ff5dfc3a678cd85b678564a0a065b
SHA512e0a4d7996032e51fcb1b63557de1f3b1f157c70e2c40aba1570574bbd947092d922c99fb5467670c751cc56b13f880d8c799c5e0a2ead02f69552e0bda9baea2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b