Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 14:18
Static task
static1
Behavioral task
behavioral1
Sample
cfbaa0323d53a9d8f512ee6efe48c786_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfbaa0323d53a9d8f512ee6efe48c786_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cfbaa0323d53a9d8f512ee6efe48c786_JaffaCakes118.html
-
Size
13KB
-
MD5
cfbaa0323d53a9d8f512ee6efe48c786
-
SHA1
b12bd3760e1bc95279f2d8c1d29a91e1795b44b8
-
SHA256
a0b31a7f30c01eec9d0b4c90c8ee301474154ee65c1fc3ff7e6ef2e288fdca7a
-
SHA512
c8464ceaf5e5ab599729dd11a040299221667879c1ac75b980788b3999676e8dda9204c3cedaf35b642d3988b1d9ab3a557ed53feed313ad786cb841b6ae8d10
-
SSDEEP
192:CNMgBEOks1QTxE6av//X7/pYRst8p9jatVpJuPPFeP+s0+mDR:CiOkjHav/T/yRsu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DED06331-6C5A-11EF-ADF2-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000885946b3a6e0033d5f4617a68d1425588e5a0dacdd1619c92e0b1e80e3864b69000000000e8000000002000020000000d34dfa576c3c2ba29788f9470f695115ee3f8e303b1735e2d55730ef1698706d20000000db84ac15e58f49ed0e6731cbb5ee6264fce12d123d4bc333d601172420b97fd740000000f207601a4378e48ed1e1664661bbb88f3fe9931a6eb8b997fa66b726814d165be489d7dc7aa380f2d5cf8388ebdb4b104446703dc497b36862ff042d860efc3f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20ec97b76700db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431794169" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1696 iexplore.exe 1696 iexplore.exe 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2116 1696 iexplore.exe 30 PID 1696 wrote to memory of 2116 1696 iexplore.exe 30 PID 1696 wrote to memory of 2116 1696 iexplore.exe 30 PID 1696 wrote to memory of 2116 1696 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cfbaa0323d53a9d8f512ee6efe48c786_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1696 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3798be74343b00063fb1613bdb4d76a
SHA1708756c8cd0db2844df50b69da695bc39f90543f
SHA256ca3cd273acc1df996a76421000fe789b4795e80d6a415449a4d58d83955f1adf
SHA51296c211184153a5690612f3a05654e0dc5aff94cf52a0755c010ff044f4cf41b771f78ecf32320b84139f671f5c9cf3591936b7c8d2110670cc8ac623419dc02f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a20bf4f5172edf5bef9d53936d19ee0a
SHA1f85f2e765ef4532b078f8ffe04460625b6d78a24
SHA2561c3445e7010c5f2c68f4107d8729b84a1fdd388b3d53f8963c035a47a9b83907
SHA5123fc47e20c1902cc58dc9f1339205512d5ef852f02625c8b70e4d0f93ad526f98a2ddefc297fb11d85101f2f915b8e170cd232e4c88a03c2fba06f01fcf0719c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c2ee55e5b9f847e8c69f07957c64950
SHA137b9b516e55c75e5195466b9721da733275596c9
SHA256572ecf670a8bdf8892598bfc6d18d1700de67b117c9e1de8edbe4d4ab6072cde
SHA512a90f6f3440997e382f31c590a87c36f8854173636593bbe4c5cef03ce74b18840b4299cdbd2bd0ea19cddd2ae2b07d4a42e401984b5e3ebef888c76429148f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593496d0d175f877f63e95a07f1762e03
SHA18d3bcd9c5fe8657e4b31b9e220dc095922acc0d2
SHA25612c40a5669bdceb41b38061590d0bd85ed423e926bc3dd54232fd027be626b5b
SHA512c2d1ca662c7cbc65cf73cc7e65df1e3d5ebd5d70f89e67e9215df0ddda307eaf767d98706560b3bd5d60e8e767da4460fa8013c5fc2f973071ffccec1b677a68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af5b8879851e74295608825be58823b4
SHA1ec79546ff2d9bb4bbbd1bf6d73545e5cecc348be
SHA256e66383f172e5c9b4b25b6520b2bad32209cabf05ed8197e12940716277aa00ee
SHA51217c1da21782b81d703109d95ead6f0a8b1e8c3b0e449426e5b7ba48f0d68692004084bd7bb4c883671614748636a1b2d23e54592a096c036fa964824ebe169d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5435f5acbbcca4bb8a63063c718d72ad5
SHA119d6b74850dc09b2c09bd144492a92deda6dd36b
SHA2562cbd0e48745bf087f6660f37eca20dd2b358548f6d0811f650caad9c7900eef4
SHA5129d02aa103a266d7ddc199ecd2bd374ae5bb48b1071367b3791217415902ad8f3689cc6d9e2a8e7a64e43de2eb5276625707e59aebd08824a01907374af0aee33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaad41c3aa9481ca5b1c561014eb3e52
SHA1317276e4652131db2e7de306226e92f1198cc7cb
SHA2566e08df96e7189238b5e2fcda0fd44d3bb0fda0b57a754f5db7eae5516080b59d
SHA5126a862073fb6d60650c21920263a004f9301f6d09bd4ff427957a58b0ad9ca04c4d1f644bf1591a85eccf3afcfe21d6094b53c86b844de183a0cfe6c2f2aaa691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5193406779a0f8c5e877f10d1ff1c4447
SHA14976a7b0e8f8964aaf49ec1da8cad77145fb61de
SHA256e258738626c719191e0f35aaf81250d6b3fd928ee45bf2257da2d19e994e86b5
SHA5129a777933b0cb89333125406fe31a68c38f63fb58a1d22b363e135887fc7f631707e159dd4710cc4b63e4378cae87986d696d412378eb78aa9b9a5cb6f39d1f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b46a066b22e2b02902f328d021980be
SHA12cf78e207858799e04373047244fc6d4ca9d252b
SHA25665640becdfb8a68ea8ea8205a917e8290160dc75f8ce7f143e30f7adf14b30ae
SHA512b7b641e8eb66f77d0b334b42792b9883a66384a0fe6a190d010c4234c4320f1ac4672a2483e76970886f91453fefba04e35263cbc348d0a49fbecb10d1d8397f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc0de21fb6ba802cb825165a4f2d4ed7
SHA15f91a0f3d476963ccfb0bc198c59fa1d26dfd235
SHA256916141754224cfe8e9f9709664f77b085cd2368a6dfe5f3d81fb3f438d41136d
SHA5122152c0842785e5eaf76019b060e3d785ef8438a9eae7a190b29a6cc62b668ec2b08be52bcbb49dfb1b7e28a0f069b9dfa392892d3601c394a6faf39ee6a7a534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5186cd4d0e57711bcb5060d5d6bc42ef3
SHA1fec4a67a6b79e5aa51655daec6ab1065dc68169f
SHA256212501e6c86dd6345af50ab8583d154c07627e41b30a0acd2a8595f5e56ef0de
SHA5124920840048c9ef8733ac1d791ad2008dfe4aef5e0d974dd0b1b78e60bd53622ca55dd16f20a43bfeceea40d5f9905ae58ec2862bbd79574ac54b5648c1db44b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553e78d19bb0c9aea554b4b6bcc1fa706
SHA194b6dba376f3437eed1b22e6cd27ea6f20047d44
SHA256832d0deb3406cc4435ea32019640e579505bd1a2193c6814a21079a0e290d012
SHA512313f870f44eb4fb7f7c7a5e4f0716865f4d3c9a2db4cbc4a768e7a928d340fa944ea91c7c3ca5df3bd83ee05ac9de29865f89c3f815bd1cce2bb7999c0bf77a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cef6225995ceb9297f8a281c01a8af7
SHA1756905bec2ac8d023af8ee2a518df6de473eedf2
SHA256087316f1f9cb68d6cfcddc886aa4ddbb7fd83a92334b80fbe49b6c4a25807dd0
SHA512fb021e604b7062319070e66c5a7faa4788ef1213362ff6e266543a7969fd798d1ee8c9d7814f4621ccc4bf9e09c47db467b12c7a0eeb9c448e55c9d7866ce807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f52ce4e71ee0d18cdad63a75466357b
SHA1a4065b78f8cc4d5ebc1b39baecc8b60920893edd
SHA2569066defc4ca68ef1c7857dea2de5ad608421a312671e1c4504f099961cc594a7
SHA512955c946889a2f6f4049c1043ed6f3cf5c69c9e47d05225f27914febff5f76d69137a392a9a09056a0d2524242f75640a6d9599061e199b7c985e98683f8fe780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538cbf599461bc993a19f4d97e579e250
SHA146e2656cb3332f888c89e0f37dfc5b4b8cc3569e
SHA2560bd63f731e6febf5b739336c61bd993d4d9d1f17c41ea191c98eec908f688d38
SHA512c93e31f22e327afb9c6253fa7226791014e89464e3669c2d8cfe873a947edd9bf9471be42939226fd9958db8ef9cc88aa39916d248884a9f3cef91b131983c6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598122ba6959a7f5dc7e1aeee66d12be9
SHA105b0865de785b02c8c80950c4ac57c45790e1d8b
SHA2567221ecf4d7e9fa1509d9cf857385504b1cc4520c51f749d926f53341009b7bd1
SHA51256f6324d1e86ec2a33fbb8df1c52592f941580c6e576f2e99871ff9d1bf912d8af668721db8e0d7c8024449abb8801b2e4bba9dfc35b0ef7a301ac26b710b8d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549e44b36e22d4b8ecaf708ec91b7cc5d
SHA1a7a7b5380eadced47c99b7e87ee4f0e684a28e62
SHA256151a43d94596bc7ec5359adf568df160d06e89bcda3bd07cb9ffc88fd21e5ec5
SHA5129df5943b35200eedb24845781dc4af72e35d9ff49ca827a9e71b7f4ad124c095123a68ed1c176deeac597243c85a62731a26da67d9ada3c18c028c0f3b4047f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c7e2094ec4b5e7ac281ca502a9668ad
SHA157907aec7e573adf5659b9e06b84819287a9085d
SHA2562c25cbabdf34d9cf8f03fd4a0a324b2a65150aaf0d31132f354495fac3d7de19
SHA5122de75e48d225f4ac5e6470e31f19c6902c99e25e43aacd1892b6098990b5a279364226d303b40770225054beff4fdad035ee4538cbf98ee670712dd25082fad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ae3062714699b755756963bb4367d30
SHA1ac1fe9a20566a1733508ae9fcf4c2912c39fa069
SHA2566a2973da930a3e5b71542a96b102b0d7370f716cbb3041a105cd0befaf80c9e9
SHA512065ef3c2c092924515feaa47c60d6e052b8819e3e1bca7065af05e20977ce8e683264244c10790d0bd7fb154ac1c9effc44c3c651aa00b7742c51e8a0644f13d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b