Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 21:53
Static task
static1
Behavioral task
behavioral1
Sample
d2e9e9f504e272ecedb2ccba25fb1a23_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2e9e9f504e272ecedb2ccba25fb1a23_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2e9e9f504e272ecedb2ccba25fb1a23_JaffaCakes118.html
-
Size
6KB
-
MD5
d2e9e9f504e272ecedb2ccba25fb1a23
-
SHA1
1fa9e6d97fe92f72d8d599d5670a10b2888bb7ed
-
SHA256
be3b2b78dbfda537e9c9140bed769801183be93fd6aaa14a672296cd533d5756
-
SHA512
5dc3331a3a27de460ea38a5bffe4958b0385f874cc1d1d5033dd3673f9daa135f98c4cdcaab976750b508b8e999e371d3c802fc860b17e6d93e1d82db70986db
-
SSDEEP
96:7B7wjUyyKzJU/R3+HTIZ07Pzcnud2jbOId1ncKRM1NN+JHkpIF6+3QlPWAxwnp7C:7yjMnYHfTzw9Cn3IFmlPxYpLdBChDgM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 400c59ca7001db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000134b78b08d666dd583d0f13b0f6ca910e78199db4f78973358149e6146eb0980000000000e800000000200002000000020e6ad857647b60bc14d0813297d019684b87da96d16b630c64de85815b0fe7720000000f9587f8c71b21b5e030fb572ccc81a9a283328c10cbd52b2abd56b43ca306db0400000004a68c260911000c4b1fad9b27f2f108b07c31e78258f08a480d110bae7e7b9b3fcd3f02ecdadee30e5d0b9197b203298eeb958fb7847786f269947780f2057e3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431908023" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F527B9D1-6D63-11EF-BFD6-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2392 iexplore.exe 2392 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2780 2392 iexplore.exe 30 PID 2392 wrote to memory of 2780 2392 iexplore.exe 30 PID 2392 wrote to memory of 2780 2392 iexplore.exe 30 PID 2392 wrote to memory of 2780 2392 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2e9e9f504e272ecedb2ccba25fb1a23_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5192c454d3a88bfada64f4a67d20faea0
SHA1759acd05c7e43683d46209f0c28a7a9a0aac0205
SHA256a38d712b80809884a841f50e78fdd857a4d3bd326234a16ae43c4a37b7b7639a
SHA51278c36c03093acffd69f8d2e5eb2853db406e1b64eee642ffe6fd731898366e2eae1e05c12cb3eb4c1768a1fe5e5a37043001e55eea86ffc6e61b22fb433b7b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2a737aa889922a6719b28cf67d56fe2
SHA1faadb8f9dfe95501742ee6fa09c89cffd08b6f3a
SHA25646d8c01459394d25671fb4bf87e08e487402ce7b110c64ab1b302c0d4142e9d5
SHA512d07a7b7faf922eb4a166fb92b19d01cd06b709a1a2e05d6a21e0b0c39dc56e96d696f4c3fd3d76195a5aa3a61513d3e3d299476fe2cf10ee36286e7383eb251e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b13a35bb163521bdbb1a4c12d83fd557
SHA1e5061b629eb1e7febe5b06ddfc8e328f31294f44
SHA256c09d11e533286ad2159e11eb904290fcad3239529cd4c95361be634fcc159e2d
SHA512e26d67f840e4dfb8be563d46bb6438c510b9ce07151df6f0d26995a14d1ece720d2f9dae30ca9dd986f99dca1368a1995d2be9dcf42f5c4aab74a0b32e80ad80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a598fcce907760853822c3f644960d08
SHA1ee3e86e230aa973c167eb739895d1d5aa2d72849
SHA256ece50034d4320ff4bc78eacaeaca15152678cbd610ba719efeeb79f0c1a81d9c
SHA512d77060e024e37353abb456f1bf09e27bd4dd2d846bedc792811827af2d33da20173931c2b9dd583c84d8bdb41606c467b94f290892f53d8b4b2c4d852d39eed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c3ce2332bbcf2cc1018c3bdf562dfff
SHA11d896a5509a446d42c319cb3b25d322f2bf35ff2
SHA25643ec9bfc68fad4790bc94a0e8aec384a0120e3407788f2c57f032f0693898011
SHA5128c6282d4cfed3816709975af3a16b424cc8ebb3c417759b3a20024e1a6035578adcb4cffb9462a607cfa2cdd7c3add89ead883992a1bc2c5291f2ee32ecfacaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6d7e26e00b8bbba664ddf8368f99260
SHA117c205e228d7a0bb3430f1548024fb669c1c36b4
SHA256c2eb5bc7ecab52b9a2f87af06698dc969cc131b450eb93b45c117c9b8333eac2
SHA512719df1f4db817bb760f7bb838b441c8682fb223ca78a82ba1bf13bcf65f1dcc5503052144c73eadc2cd4d700059ea83d00f2cbb709480dc8f93442da728fa912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bab65f867f714e2d994c5182875b046
SHA1731911e88bc32a2829bd876f746f8afe19c5af1a
SHA256413aa341e0fc767f34c7e6d7e90d03535c6ca7ba930ec8e641923d69da17f3a9
SHA512934b305ab2f144d1cc6cc2bbeedba9482a68e435612980ab87f582ef342ddc03e107b8ec997d9f69bcc61dfb02d0438647df6c297a84bd1f02dc7bd8019877db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5845555ef0f4875afe76f213d254d27d0
SHA1be31fc67306227d09493fe6cdb41450e310fc7b7
SHA256f2d7a7ada93ed004898c70c531a07d66ddd8c76a4d73ba6224fc1f8c1ca2ae4b
SHA512ff6a8fe2800ffe61e88be846e289df82ddc79cb4c66f1c94143c4028d28a1a66d3e911ea981c7c3861ea31f31192ffb68cf31f99f292ccc00b9d15bd6e81247e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528f7769bfbe06d0e0df58eb6a5b20822
SHA12fd6e9b7c7f06cdffe898168f75875ac27041fe4
SHA256d6352459cae459fdb7f3fef076b7ec5dfadd0bda460ccf1bb102f027ba5d742e
SHA512a3b6a528cb923930937ff95d55b09a62eb6a31237b2c0e4c6a18217a9f04037d08cd0184d1af8df854fa7c8dbfea7bac07f61c77649e3c5d0e28f0a95bb07fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ac76e955d78d80c4c3001b710f4139f
SHA1912c39b43dddd97b22c362e1fa867080877f75c5
SHA256b12e9d8a0e98d97657f569ba91475970bdb4945651ded48b703432c0f0c2d35a
SHA51233f8968f74662868813a2c9c560922c316bcb58564724124c0e6d9c38b7b0c545a99ece845e369cc7fa74b88362bb306c653f14abb807f3808893eac540e8f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5000401eb0681a38d3d175d2c902c1839
SHA1daf9ee1fdde15e1b017b4d92c71cd4f6285b5cbe
SHA25695801573f3e519c598e9c0e61b25723b95c8d29e4cccf9014b0fc5681a17d65b
SHA5125ab6bc4370498cea25cf6bd28869dca1155a321301a473491860b95c7bd4522e964da2bf3510013c8b12f173588441e0e0cfc1d1a65e5eb9ef5fe17d1f0e18fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab771abafbeed16d2642b884a6ea6890
SHA13dee33f602a63ad9cba2609bdc45c8cb02ebdf56
SHA2567e3163ae47901c1013e49370de149f38edb42b819164606a58abb5e029382a21
SHA51218e2dc1ed9c95dddcb3354aa3e47bf0ff7ef8c086c114026e549341ca99cbd05d4d2cff063b7fdfc22ff975d476e52e0b299d1045f7a338c47c0c8d5b435d0af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e9114dc42d5d5ba456caac490dc641b
SHA1ddbff584b17a75056f41e2a27084f245697f4c7b
SHA25609db3d2be65c4ad5b4825f6e64bc55ad0f75eed1e24bd090dda2b867b8a90c1a
SHA512ac50bbd9ebcfb921357f3601c73060693a25422bd54c7e548afbc9ee0a84a236e58c37314125e54bfddba3460614f778d5973f8f8c55646d2d6b35bc5fdde1ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5115a1405d0787fc5e2736585722ee6a1
SHA1a2d6e8a8e2a01b62f383ccc40886a9cac7a9bd5a
SHA2565953b229358c056a8414a10f0803b48b1bed9bc97229a7ce9fda51c2c99cd0e3
SHA5128be953ecfd39d06a29a43e8b2840a7829e085fdcc9764f373f2673e8fa01a99b2f32efd21d0d6e7181b6df36d67b15615e1da12d4ca998fdb244615877f34fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aef571eefa2f44182dc5e75a45e83f54
SHA1a6b481f18e70fb34c475bf3afe19d662541fb06b
SHA2568fb1cdd232d7d612e540e103decd24e5aa1009c1e3ff90d538b34ea6c7801c06
SHA512452bc2fd2d4288d705b94c040cb5d11b0c7059850956bd2425210a31a3f7fe1c4a24e8bf87233379d805dd7d39bb6c78805f0a33dfc874190c6ea548f1638758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575ffb63a85c95cd80a77a14905acb28d
SHA176de6e5983865cc9a7640ccf99640f501aebad4e
SHA256937276aa5aacb61f709d365f88626abe678a8f51c5be3802942133193c1131e5
SHA5126c991bf7e81912889f0d47bad0970c92aff0b4f27398f6f24d5d51c0ac5cc87b6cd7341d7ab84fd728c28b6a8dd410a7c2f173ed839fd1375d2e7b87b911b157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe5aeb50f830486440015c0bac3a5502
SHA1cc9423f6d267c9cfcc92b422eac5aff1a2d952a7
SHA256e706cb4e2c44347ddc99121e1e138948eb49bc10d734695f9bdaae35c98aa703
SHA512902a3fec96d7c3683f22f86fd1951d0573baf892d819cbfd1d976a7d829317e5902e186fa553bcd1f0ddc7cb73d8aa25e0b60f6dc081e85bfabd836cc98759d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56000ee6dca4ae93e1afd9c281bfa0d82
SHA1270290a47b05ec17164c662e8e6de214817bb3a4
SHA256ca1912daf419cbec653a7a96ce9b661267ac33e8f538703f08d48dfd32fb37d6
SHA51233196f9d37d25eb5b0dcc366854989e926523ff901cbc71f0267a365f805043642d449d70028ff2e5de0cfb4df06523290e24ee8cb2abfb3e43994e23484e5ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579ddae3f6d3f96d17b5fa8638f09ae7c
SHA11dd4454e54cb15f79aee823bf240bca844b66361
SHA256e3107a2d6d622af741866a62f6ec0035f17abbc2b347222f09b14d61bf894690
SHA512f0b1586ae30564474f94a2cd86ec7047c03663d779a8963324ccd42167a1e30d95b25954c25f501664debe3fe040e7dd69484c92e1b39ec4ae6864b351c112c2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b