Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 07:27
Static task
static1
Behavioral task
behavioral1
Sample
cefee37157005e22dd2e30b420d7a3b5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cefee37157005e22dd2e30b420d7a3b5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cefee37157005e22dd2e30b420d7a3b5_JaffaCakes118.html
-
Size
6KB
-
MD5
cefee37157005e22dd2e30b420d7a3b5
-
SHA1
aab994675dab6ac1a217611b29855f7f0484a271
-
SHA256
bb4a09c3dedf0e0f44d95bbd494dd7afe7149d4d88d50bcefbbcf8d1a81710e3
-
SHA512
ac0caacd855be85ac2620c3bf5a260432dd7e79770af7f55f868f3e06404ae422036dee5404f74fa62bcdb0bbfc1e9704312ea444a33e7fc1e7a0c82c88902b4
-
SSDEEP
96:uzVs+ux7t7LLY1k9o84d12ef7CSTU3wAcEZ7ru7f:csz7t7AYS/uVb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431769517" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70d59b4f2e00db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{790EAC21-6C21-11EF-A0B2-6AE4CEDF004B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000bf69db9c3371c2e468d576bd1093688ab2ab00c90542e1faf0d0e0fb6c02aaca000000000e800000000200002000000011fc47ff7320572f2fbbbbcc66c1f915889c52bf5163892267b648d073915c7e2000000093aa0ce2858f59eea7f7b9389801a0c321689fec7386c1a36d93291c6a54bddf40000000df789bf587deec04b7cf1f9a1caba54954537ad87bd8d5bfa1f83ff5926a9950a223357a6de4bf3a40dd897b57c5eec480f40318096dbec8ffd310123f0a924e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 1912 IEXPLORE.EXE 1912 IEXPLORE.EXE 1912 IEXPLORE.EXE 1912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1912 1724 iexplore.exe 30 PID 1724 wrote to memory of 1912 1724 iexplore.exe 30 PID 1724 wrote to memory of 1912 1724 iexplore.exe 30 PID 1724 wrote to memory of 1912 1724 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cefee37157005e22dd2e30b420d7a3b5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0155cefaf599b6bc2430e4b6b68deb8
SHA1b924262d58f9bb10a25a7e6c6b1333951983ed1f
SHA25606568b0da366a8f2d7fefe8837d09ec7c58873cc5c0ebd5de3ec80491c473d14
SHA5122007e7af1d525f84d8a754e406ec135544d7d88dc5186a0788ff8b7c3a145d497fe754e80996a225f1245253e550df4ed60972845d8db023d627e3843177c2d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557be1a10395d06da5e087456733df251
SHA104c01ccfa1987ea9406bd1a82c81f14d995b8f01
SHA256f79b7115bdfc3e89f86f1f7b983029490c29a0fbdbe8c60a2647f484c0bf2c19
SHA512426714dfa0eeb136f28bf5fc628dd577a953cadf2a353af64dbea7a4d7da9c460183814c25dea3b45edaa94f1405045cd1acc6d98ecdd8f6f6703538e2173f72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acbffbfbf15a6c4e9f2f9170d188b216
SHA1e949270547cb1fcb811903d31bea5b7e1dd8e3cf
SHA256cceec3b277cabef6e0316f56592e384bc53aee084a53d7097fa7298d54aa83f4
SHA5125ecd78a80d211802a7c4a7b44e872b1b9d4e6573de6b309d38fa6f027e000afbcdec4fda1baec28e9f2eab4b1eba2930804ef3a4ffcb8866027f8c686754bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d13e93550a393713f1f8cc7b3b16f7de
SHA161198c90933f522e08024c56ce2e917ad7aaa9fe
SHA2560aefb1b34516f9beb164ee6513ff212da866c8f0e2b5301edc59fbdf92ea5f5c
SHA5128b57fb0ac5869d1f572b7a6c89806702ebb5c63666ef94108e495c9161b81cf49a4a77dda72601aa0953b6caea534ba005659c824717998dcfaa0b9400b549c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2a489776daf1c9fcf655eb1585faee3
SHA186a7cd6862e1be07d3f15b5485a05b2039ced8bd
SHA2563f17d17b7bea2cde926b8fa2d8c490eaaba028071786157b30cf6bc77c555e82
SHA512a9d6fbc14e33b2c36bb925653f31506935ee9931c5a7016f714f6218902513ca6937a5285a48cb875c8006b34c924160a35442aab6d99d53b279808ca390b83e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508c43c3e0e5c976e43a0c76e84a46762
SHA1ab9f516b4a066b55277f99b9436e3cc7a22d61ef
SHA256b40fc247a17e24f0d15c63c11d383e2674725d5a7c337df794772659a7ac305b
SHA512bbd219a7339e92560184411e620c0f9e9af3f71ba42d635e0e12d733243afea7bdb4ba7127bcf71004e72c7e261e4977989845c97c4e6646d2762ea35658ac6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5740d67c803ad3050a08ec20dd2665307
SHA1802ff49877856096145207900ce013b02cbd9878
SHA2563c5c2a93aca8ff15ed0129f79f9c02d78130cd4258516d34f5d1f493bf65ef81
SHA51204be6aa44195def5ab83bb4ce0ac1c0ee827afa9b81cb53bd3a4f02ccd708de29c0bcc06c2e248ca14c3dad3a02a0c5523c6e06e8aa837f0ca291a0ec628eb9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593b7003b892ed5480b185691cbfaa4f9
SHA1af7b3e5f9ff5e10e90da64259ceb21f095777755
SHA2562174da1346ffa5d496056be4cc9f42e1835b9f099f0afc41cc59f94d06dfcc93
SHA5124984b64b28c45d2be9d474d2389e3bce68d1926d601cecbe81720acda4435f57bf7912a8a02be60840b4f21c16e002121910b60d2bf0df6b60ef59f712aa187d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58261b4ea846a5e619ca959684f77b899
SHA16fc708126acdcb064d2d8c4311ee0e1753c9321a
SHA2566443acd833a2f6dd32511b3e4f4a7caaa25be730a533fcbfea93a95f4aeee34c
SHA512fdb685ffdb3d93c4f4f6971d5ba14de6740d86790baf023f524336798d59eff69aba0a91662a3da5d306cd4d41c30520813f7760af55d6b6ad0195e63997489a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e731b6836911eabac76b0393b3428dcc
SHA17cacdb19bb84756de7ac9b63e0430da33b51f3fd
SHA25681d5c781b0bcf91a5e76476a30879d8e713a4e41ed222e7ec1c6b332de5786c9
SHA5121cb37e356bab5c3d078b19235bc5d39b98bd5758c5859c35729f327c97642d65d9f1b896e09c067287ab1255710e6b15fa966c43f546e40f629731a6f1e83b4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d33d4605dd22fa5a3f94bc909b3e6583
SHA1bf81c12c5c35dcd8239c0b91ba669d0da48979fa
SHA256f8bb3c8880d4a494b77438766a4244dfd19d448c5f624b031f6799a6e52f1a22
SHA512acf1e9c7f4e29e7fa287ae3d71859872006f29d00d77244961f579a408815f9ce44d78b8732725a9888474d69f793fb4187356ebd64eaa72a6f7568040673a53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f2865b982b2896f35bda5eb73d4414b
SHA14bab28e4994dad2ff752da7b62f5aed98517de7d
SHA2560c472121bebc294964ce6e0bd993c11d8cd0fbc558d21caac708b8f98f2cec27
SHA512e91f935c874bc853c26139f3291be37740bc130959d95543fad06d503dc41b0334b3cc1d3e35f1d1a5476d4aa0ab58d3a701f37259de8fa04a2dc4cef5f10059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501cbfdf428e99a6c8fb0a4bc87584a66
SHA11ea31fdb8e6ae4f181dd1189459256196482ff78
SHA256c1e0c0eb1025b875854db4f1c959071c552c79e63d6b8da09de6c3a069e1863d
SHA512bcaa8d66723c6bea8efed9d744d165d38c90e949967d5a4e30c3a57876daa2132fe8a587d34e68041ec452b37badb32e20307194630c8eae6d47422229c29745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a186e30d94c4370217cdcf4a3679fc2
SHA1d6d805d4cbe12610752c6dedf552689318222deb
SHA2563e51bbabc1d39ff86efe6ae88f227ad7e0ecb10d0d2d6671f34cf285f7f508b7
SHA5122a2ece45dcd5db56cec36d3c44113501aab7191cebd7f16b87ae07207e4f83d42106864b6d3628a16089398d6f54e50e84b2765015f6d2dc0538e6fe2b4ac268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dde4ab4c877acdd1c24bc8142c4fd543
SHA1b8735fcba18e1f2010b99672ffc119fd3053fbce
SHA25690eb03dcb0fd76e4a53ed75b1042d474caa410f434bd75ea656467d344b0731e
SHA5125e965fd08dd5c317b8a72a1a5b3b3e13e8bea94e0efcfddd634c5c7464d36f24065fcde03c11424ec3c81d424f134427c83ad37770d5c51064daf316fddf69e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a594e1c9727c5208c08eb28b28efee03
SHA1bd0d095ff6467a50e025eb28bc8f1c88c4791233
SHA256c24b7530497415ab376d584931e5d9a7776a8eec111bc1c693e10a55f6329492
SHA5128faf4fd0cdc00c7ce6d7b268cfbc5a51416e47529d1f19f7707832beae92d5cf11307de7ef23f4a853bab756a89eb1085f7d07cf9e1ad9d117dae9901937db8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ae2dca8ac7ec81e3853086ca7ed4a1c
SHA1fcd1ebb2b278900cbcab6bbf301a78e32f38eec6
SHA2561170ef89f4f0340bfac8dbc01822b8eb33fb1101e5a28e75b5dec655a0be7f24
SHA512248c5e9590934daba6461126f4b554cd11202da2d56b2cebd4d5b6615d2fc0bda5bd36c48e71b86b9812d394dce9ede8fa0ff43fef2c90da0de6a8a4ba1c493d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3f5dc15509687f9a9feeb8927c22cd2
SHA1a5a377a5019b02f2a5dcffcc69cf75bf550d308d
SHA256ab9007577b5764f895a23d62084e5bfd94f1e5425ee46ee9ccc3646ebf55ebbf
SHA51229cf31badc192b3c07d97ddfe739b0c97552eef802348d303e6ed2293ae0a333c808ff29d522348b153786715eb48c02341ab67f66f3a12f62da69b453456a3d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b