Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
cfd13fe157e2e52438c584b52b514ae3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfd13fe157e2e52438c584b52b514ae3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cfd13fe157e2e52438c584b52b514ae3_JaffaCakes118.html
-
Size
23KB
-
MD5
cfd13fe157e2e52438c584b52b514ae3
-
SHA1
995aa599fd9d7bf71c2f55423c88d187fb7ff1e1
-
SHA256
a61da310c5644ae72f9c5bbc6066204bcf8e0114f953dfab121c0ad38ad0a373
-
SHA512
316c9533170d73f8882add4cab403fb41e969fa9853aff628006e421797654b88d98b99f0c83fd3a5cc101801432454a6c7b57dc68c6ef56937c664e77845a75
-
SSDEEP
192:uWrob5ncf+WnQjxn5Q/6vnQieFNn/nQOkEntkDknQTbn9nQrCnQtBwMBlqnYnQ7T:kQ/6PE8j
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000971e926c60e3f6a233ff3e81ae075cbded940ac3db34d4e2b4692e6f81270924000000000e8000000002000020000000735b3f20833bea78acdeafe855864c068cb1ccedd149bf4c5ba54d4f80d7e4a9200000009ae60ff6c45793a0c434ac831524daba92d0fbb84444d0a0c42c2a8c22b751da40000000da54e2c88b44b97a521d559d30cc0947b7e389e5984e6a4b840bbe2c55921349a7a9db62491fc6a933ed7fc9ce160e12ecda7665f9d3154ffd2b45c3f90f6aa8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5B1ED9B1-6C62-11EF-9F30-7694D31B45CA} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431797384" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f072e3356f00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1884 iexplore.exe 1884 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2556 1884 iexplore.exe 30 PID 1884 wrote to memory of 2556 1884 iexplore.exe 30 PID 1884 wrote to memory of 2556 1884 iexplore.exe 30 PID 1884 wrote to memory of 2556 1884 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cfd13fe157e2e52438c584b52b514ae3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1884 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0667bde39afc1df8a2f038f820c2a62
SHA1349df9e8a68ccf5af3e2d3f60b09e88f368a8db8
SHA256959e73b9fbb38d7d754bcc7adfe5f28e1f0a505a0e9b62b583a71170f6e05f8e
SHA5126e4b9506d5d0b13e02f27f20d1042798864efcef143c47d8f226389c97165fcc6d2bc4fd43aba304a8102bed46b24b637c2defe685a6d6397d6d4469a83b0a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526156c4e593e769c9110c43e896eb64e
SHA1376a9ee0b69531f81a76a50d859b276c2937b234
SHA256732a6c6b24539724b856e766f522b58d2556c817a4aac2be0a645693785874e0
SHA51235846f6010436ca38ec423943750086f77efb5fbaaceb6b8bf03c251f8a3d298ca9226ac4144c7c7c1a9457c944e0daaa11fd301a8d06db65252ae767003b261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f9934c0b79d6c7d2b211d077b7dbdd7
SHA177676dc293c5e1ede3dbdeea699933aac1fc0d4d
SHA2567fc8f9414bf602f542ab181468026d62c24270b0d738b88ace9eb89f5f1289f4
SHA51261720bae2679b31f7711c8a5e8b8d3a61f8a91205f66ce789a9c21276ad7db0b0077d6dc22da82402ee442a99a6984c5d4e80a0a22a6efcba0fee2d4dbb5256b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5883f370f9204b2db468f7875d75a792f
SHA19644501c2a097ad85d6d3a8611cd0b524f5cc8bb
SHA256cb4076d681ad78b57ac3b7b51cbc61e2063650ef9612a65e2ac2a281a5e5c329
SHA5126393902ce4f277174fc7aa61edff850486adc74762ee6f3d749346ed7d8da3eb8a3df16c7bc998866c10cca849dabd5ee54494d9ff052f3a72198182bbcdade0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b4e738d1dcc9518b64d0bd976896c9f
SHA138b5b16015f4186ba88c1589369da03ad7d5b446
SHA25636ac767ed757600fc1529d8672ad33843e3a35124d9813808b33b9b8b9ce1ef3
SHA5125dab42e12dc5c218402e8376e6187a08e81691ccd8cae7e7831e02a30ccb0886e8e926be0e94854e0f08cf0f3a088bde9bd984780a791f3f6ad063637f65bd8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e54bae80aec68cfae2c6c402efdf570
SHA13844f75c32bb7716e53289bb8341950c84b65621
SHA256cb8645a23b4035156f9f19441fc8d11329b36143ed721e3dc4bd3685ba9223be
SHA51201e9aa3cd8087ad297e33b3fa8647bad91d00815c5346b9ca5046cf51dd2dcbb0dc1d3c2839e0e33396f5cf73861ce2f7a03fdf6ddd5eab6595f3a8e56272fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572df220060a1af26721c26db5ee1d955
SHA1f3d3fb959806ca8a4a6af1ca4bcc66a3cc0c34da
SHA256f60b245914e45af2d33e5c358bf9a183d8aa84db2abd0f3f9f37989595537c74
SHA51232d5b4f0afdad13956dcab8845df954e2dab5e5c828a51354ed086851035570e1ca224bad4a5720881d40218ab77f1958eb42af749f8916746fbf81543f28a40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5ac04813779203d062c2dee65b4f592
SHA1663246cae462c19b21d57c12b03fb4bcb21f5640
SHA256ff29f7c1c77b8f29594a9913cb65151fc357017ddf9e1077a3cb9daa867acfa8
SHA51222b02996bfb2a9597e27f9f88a4af99739e7b4abc499a1ba62f0b01fcc78c9a1c4de24db0e8f97ec6f630cfb9c55cb4153f6f602cdb6a36746fdd42175f97181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c93c65de6bf1f3057ef03fd1ab21717
SHA15c2ea5ac2fd3dc48868a6b8210a74d93e75bca09
SHA2568db4dd178fc594d9e5b667a23201c4eae6d595b41aa6d70b09646834a7126926
SHA51249a0d64956982d8e81f21fd554b63acfc9e0ef6c50472e7d2f95607123438eccf5e5df2a98486c39509a27d99c2ef03a9544faf2746cddd982c8666b6de6ea7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f29317dec8dbd84db24efc14864ed1bb
SHA1dae201f1168647259e5e8282ab506f69417e6925
SHA2568c8545fd0d3d2edbd787d678e06c2f9c969a80a51fae848c672a83aeb210c231
SHA512378b9c48d2825a836376ff014c017276f5fb6000fbc1be69995dbfb4b2f487e3add8dbee4d79f9c5b7c2871fa428b4adfd838b3b7b66cc1afc3c8f6a2db304a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d9423d2c292556359204090bef16816
SHA19e160d78d529727656aabdd6553c2820f6e6bf72
SHA256b03d34f81459bda9022d73900dd0308ec2b76949b3db6b10ba38664ec173ee13
SHA51241f7c977cf506f09ac4a3f5176aff5700a62d5d2517ff1629f16c482d51f6b91691816071b90a6d2ae800e9061a7b7afd5fa52ae742623374d0451058172b883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518f2b3a4d884de9d041ae4b2b05f703b
SHA1103cebdce6f4cfed39899c02a3ed5b92ae748714
SHA256d7634b5bdd0bdbf0d8098f486ff061b27aa35389465e37c9a87fe2b3f02c3112
SHA5122ad6ceb0bb3b41a2b2016caa6bf1ba38383206caeaaa4618e9e63c3a3d005ab3f45502dd5b324f54c435ab411ca7d61ff4772291a0bce90bfb903453781c22e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7e757e255689ebba24bdcbce027270b
SHA1517e615487e929954d7a4229b017c6307a969fd8
SHA2568217c84564a208d13e20a92d554f480df2b789084f00c63fe8a718c8c61f19b4
SHA5121a2d16d10444c2d2672b929b5345c591422a0e5ad8f844854370f519c70ffcbaf76d956a3ba8ca544dafad63cab10f6ca18ef4bed8f93e8ce6cbb22e8d5b78da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6007f6dcdedf54bb7c3b2bbf0e07ef2
SHA1494bd2ce50084da4f25d287ff4f301c35544ecf2
SHA256a5aa6c8af5709424b880a19a7022d5a8e826f4cbfd1e79e090351e4d01e01e0b
SHA512c389fe1a13226a1f7b204d477946939e74c8276ca110639f6ba4ab0bdedc38c0d9455b86bc61ad611afbb375a1491ab82be9d7242f44051bbe52353e30c0680b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e33fb1537ad88589db9007e988ae3a13
SHA11126829ea725d53e4aec67c33d533e1dfe2722f3
SHA25605ed7d8fe179362681c6e1d5c3fc9dc047e92e8c4293ff9b264d6e12c080a9ad
SHA51208c2f2f2b2dbcafe72a2f18dedf3b195a009213bb981db7bf07cf93bc4bc46f4411d50906c74f9745ffd944070dce15c4a40e417520b3463c64cee655c77fa55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc87808bb21fca073e72e35a9178f879
SHA1afeb0ecec28ac136999ce9d9d298e03f2ecb6f33
SHA25698e1419d9d6de29e446b106655a224bf88be07871bc669b296b10b5699418c62
SHA512783e56f7b82aea38aab00e58e860a7d1f11a406b849033251b49a03332c6bbae4254639a1112f7ca14c0cd2d6ff156ce8d034de968f18e34497a7a6dfa361b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea189b43a9d0681a726e28b2fbc314d9
SHA1f1ef6aadee30e81a0c02f76181c26112471c5338
SHA256a756d450eddbc85512ba2c8d0c9351a98f0fde9884340407c6d4b10685f91dc1
SHA5120f275de97e619dd1981269f98b642eb86e489b1dc9c6138114e01c6e082388ffc5fffc945542b063204f1083cac37cdd368ea8c384b4b6db23fc3dcc7ddd60bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff3fb06f5779df3984199486d02f2f82
SHA1155a2ac062f838652e6f5a159b34830b23cc71f3
SHA256f408f26fbf8ef57f7042f8650b9659aadba33eed7d748e85bc34dc733a8a69ef
SHA512870b7cf3a9260951aacabd041f961636c68e513db28a8ca115696c6e288cce440a028d3571f95b879b90a0cfa0477d6658a368cb73192cb65449353b25e70187
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b