Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
d06ea3db85b3e2d8d14666fe952035cd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d06ea3db85b3e2d8d14666fe952035cd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d06ea3db85b3e2d8d14666fe952035cd_JaffaCakes118.html
-
Size
460KB
-
MD5
d06ea3db85b3e2d8d14666fe952035cd
-
SHA1
4fccb685ce924541da92c6bd933fdbab2b2f82cf
-
SHA256
28b9f7d82c67ea64cecc9093dcfcbf06bf47fcf517ee0983bbee7e6c6142151b
-
SHA512
b11173579ef34af4187ac08a19b639610ad3de2fe62f7f657077c0739dd0da44c51373d460a758aa10e80c2fb9d05a366dfeb17597c2e5faf1579164c5f1b961
-
SSDEEP
6144:S0sMYod+X3oI+YaQdsMYod+X3oI+YlsMYod+X3oI+YLsMYod+X3oI+YQ:55d+X395d+X3f5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000043ddb424898bf11cf8021583f0cd31861f82b4700e5d583fbd84929ac70e01bb000000000e800000000200002000000064e74fc6db5c67b1e2ac4ab8bf60c60ed34c21860e403cfb70be507b1bfb0c402000000060ca9656f9a79271cf073acdb6d1a5a9c8b8ff877de4defe19bc9ecdc073716a400000004c32856d3ac49478ef5fc0ec54dc57da146bdb568f10c75ca177b92e5f73f68e7309cca22345ea87eca4b94645cfcab16a9017ea07ac4fc8718c0c51a8928cea iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b09f1ae29e00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{09918EF1-6C92-11EF-97FC-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431817864" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3052 iexplore.exe 3052 iexplore.exe 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2876 3052 iexplore.exe 31 PID 3052 wrote to memory of 2876 3052 iexplore.exe 31 PID 3052 wrote to memory of 2876 3052 iexplore.exe 31 PID 3052 wrote to memory of 2876 3052 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d06ea3db85b3e2d8d14666fe952035cd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527347a1bf032563c8159a31bbfe9e73a
SHA10f87408f2790859f0a5391f05010c99ac5c4e54a
SHA2560afdd964362f80fd411129a7446bacb91f91a9cf922d1f1bb17d6d9f8a3e2bef
SHA5121e6d2fde5c084236bf34558330a2f82396aadbae1b72b80a5a3ae343c053d4499490227b4d59d074f690dd4d4ac29583fb88e0a9e5c5c4ae8bee3c1057691a24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528fce6e52e35e3feeef970dbfe53c4c5
SHA1c84c9a584f953225ce0e2f7d657bdb80c0447cbc
SHA256b3435a89e0059f6da23393355712bd5cbb623ad28242c06b9cc5dfa4c5b040f8
SHA51265dc161fa26d4a94acbf312e9e6a62a057bdca37590d71fbeeab0836375112459a3de0a900c13410b95dc938cac3487150de0480f2fc95accea9d39095388efd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9229f3870d7e486f30408fa0cb03eed
SHA1564b270dd2e9b19403d3a68bc72f51b434d59c0a
SHA256b8171d0220b84079cedd6b8e8e490059530684dd75dce06ef4ec16c3c16429ab
SHA512618a2f314dcb967d625ee9d08c5211e00b8a48569d1b9c3c56df5aec4d551f15ccd32d5723d489e53be2d91949192ac070cb950c2f1804fa0c27aa49464cc96a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8098726f784d6ba954bab18a6383977
SHA1c3146711a1f954f9ea82d65a8d687b3eaad6ac41
SHA2566b0c3d0b28c9ad974074f4076e745aed2ecf7c0ff58b319bf494d0d32004cb8b
SHA512fcca1873ef319937b4a7fe9d06b8b87fbe24126162f16ad4b53227bc19d3980e6a47b5a684984f5083190e8c22e3b1a4a7472468590d98825f05ff5278694b82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e81aaeb9b62d97c127e395318525e419
SHA10ff834d9e1d1b7d47c1a109d1dec83412116adbe
SHA25685295caffd3b40f3a52e9d3a57e81ff87e6d3ace356238f66410ff9443d760c7
SHA512ebed91a77bc248daa675215ff76b4a64c1ddcecae8d47ea6a121374ada4070f8fb31d8b4cd4678a4dcb781effeb3fb973ccb7a434a1bd6ddfd2f3600c3bebc71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55afda881bb6b047ebec016a029fee155
SHA1ba224b0e58b2c20b515a8aa2552f5f1afc8a4f49
SHA256db144dc443a4130149d60a1749518d0856c98ac95f8beebdeeb8c16ff9c07124
SHA512a3781753cbd35a63725a0a116767560d9d94fe49a8619467f2afcbbfb4583239f72ebc65fbd9d5f99638125aacbd70e353858a777468a787b8eee22f73421a44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da8a702b064a836ae7d11dd2d9d6c35f
SHA106cee04254f5ce69c4f1f3da2dc1d3a74184ab94
SHA2560be5614098304632ec8a7f929430771bdef72750d8ad32fe77e1b91a20dc2772
SHA51204ec9d04f247bdb20a34db94b936ac91758df0b11011e1f338763dab7eff3ef27a20ace50cdc5a1556a2f693e03e4a0c7ee993e23addae3a04e5f563afe7ab2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590903a6b429750263dd3ea5815ef28d9
SHA16328da0b895032d4a5614794ef4fdbd0aaa0ca8a
SHA2567e28d797162095b0746a81286ca8db2f49744fd57f318d353c6ab1643c92455a
SHA512df2d35c43f27ec43cbe810967b9b7fa22a4b00bf53036660cc07c7b263ef4c0c961b4d925356e8abec067ab03428c7d74dec8c7bba871072692ae45eccff3efd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a34df5b89563e0d846651423f4a4fab
SHA17850da92a59e2a5a2873284384a157d43add3f0e
SHA25650cccdff0e902747be7a97d817799b5afc20fce02f27c323e5e8dfdb4c345d80
SHA512003e96afd8d333a5fac98eb75c821c18a62d2ea2f312ad7068c414de9069036b6bd556a452780ea8f4c549dd228ddc1e3a27809b2aa53f6286487dde02f8a6e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505718fe6357eb6df6bfe43dd92a36a7f
SHA189fda4944acfa5e1009c7f26f53f8014dc586090
SHA25600d3047cfde380a48c2bbadaf19375ab177900e0185ea0a737f3d1de9481790d
SHA51241596a768e7cb7254c7eeea34df8700e156f5f73f9f41cd6b99aea7d975dc1c260d2d6f3e7318fabbf1afef72397e1a265b6135e244c964a6aac93b344818120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e15a4e32b14cc11b4bb5af66586bbf4b
SHA181737f782c2c3444336cff02b09c667d2daef76b
SHA2564b236ecccf0c76f84257d7bb9106a56b850a20c89ae447660db7f0fbfdee04ba
SHA512205d4fa46b31a1782c7c23098810d2bc9549569c3350897da4cfd80b200ea10273ac6f78f9a5f0371899b8e712069fceb2ec3be8c2d2643815736b248aabda56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59047225bd426814e7628fb0c8ecedc59
SHA11dfed0c9849235e9992809d086b7b6b6d38d9ae7
SHA2561e28829a23b1f037656c0cdad053def7899433cd487b1b37ce5045107a57f924
SHA51216254577d01b4b50a06d070cf6f4eb13a43981b14bc43e4109f7781aa15854bd2e7c4bf5052f117ab23c2c0392d823c64acdfcd99abc49c6429596a2da7a18a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559821bc3b89f006b3e00812ef7a4a49d
SHA1fe2136efc9257105ddccff0f43cf45edc7067fc9
SHA25601e99ff36a9cebe59c110251feca1ccd49afd6d2a93fdd0f88ea7a38dc70c9f9
SHA512d62efc2552b7b4a270c7526ad834856c63878ad9ec1508585f9977dc4401a1e0cc2b2fb7671561c44bdf47cd8088ab6637886b21d72c0f38613ef4991625bba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5aecb1261c259503e7e5181a035d90a
SHA12aed5c6315487af51ee7d8ed283105c932b5a25f
SHA256423265bed4f6a234c7f0fbf5c7dbf5283e797dacab41f3a879da87884f829322
SHA512768dea4f0da935aba26be29bb5dd94054e11b0595bf0ea9991d3045a0975ffcdc1de17506c99837d032a21af88629d9866fe3c7e9656121ac772385890ab89f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6d6da45d2956ae799950202b8559b3e
SHA10dbcbefe9d700fee1622a4ce748c309c43f2da3b
SHA256c3f339384ca1b8006714e4e1f6e900f755e1e2067802ac689c342591af431ad0
SHA5120df9935f60814367b501f979fa2b8f2c975a193d7cdc2f3c5cf6c0fa96cb955531ee40dc766ffc87b216d8361295bf84839b52cfd9abf9f79389761e795c70f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559239213a83ee79c7722521c928bcd9e
SHA108a92db7c4f978a57a888b978cb0253f8c5bc543
SHA2561a1efd7b488bafbf76ff512a180025fac711836b552e1863c6cf0e31de784164
SHA512a7641db0e2628e0360ed0bed7bc22496ddf1be6298afb88b707a08230b5242a344ff5e65a8a1e4987b38bf7fafa6902298c507bc55b5be2676f97d3529460a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d5cdd74fa88b7edcb623b165edbbd02
SHA1c666eb5536e937cbffb241a733e91d21268ffdab
SHA256c9ac65373bf03319abcdb253c44a7c98062c3cbfaedcc95d75811181e8fe515d
SHA5129b4f04b0fbd737f96cea7803f38b7ecd1032cbdaf9a536b64c863e22d2c00d556f354dd1fe3dda6f5c4f6ae012f12822d0b07ee910595ff715de8550fade3d3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58964a1780ba1a392bf1aee88cd1a6f24
SHA1ecb730081aea488a3a2468f614e16d2fd31fe3bd
SHA25621cd8531d83bed8d32784761c72d1e3bee1715baa5e04e97919b18250c698184
SHA51247e29ac9e55703b313cd4be9a029247b49d8d3c8d50766ea4f4a5cc576b8a1b548dd875b5e78648d3503d94e4f431bb0683e5b2433823da0bdba3bea21ba4c8f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b