Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 22:51
Static task
static1
Behavioral task
behavioral1
Sample
d2ff79689ece245a1af1cf45f7b5a54d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2ff79689ece245a1af1cf45f7b5a54d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2ff79689ece245a1af1cf45f7b5a54d_JaffaCakes118.html
-
Size
2.8MB
-
MD5
d2ff79689ece245a1af1cf45f7b5a54d
-
SHA1
b4737359a4412b852514b8c8d3caf9d0016a33de
-
SHA256
b066f1cfeb6173bb043db359c94ea68e19bdd1515cb35df19f240fc51646d59d
-
SHA512
66858db69dd1d6f12639a353455d01327d128e3ccf1451a9488e67b974c88b7c3235735d45bf335f5195121185b543253a65f4ce7bc90aa58b4412c6b50c57c0
-
SSDEEP
24576:bUSaQ4MbY77bJSKikgZSADswi1JHeIodVdz1Eu9M4qPzy1:bU/Qo7bIBZSQswi1JbodVdzSVzy1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431911378" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000beb24910ba072581186f0fa45f921bf51f08c56ca2fad83e31a20e773c7d4e01000000000e800000000200002000000006deb5d636221384127daa506d4b4f1e254d2dbd31cc96ea167d2552fa15f4b520000000276bd0268bdb5c5fe90778adaa1037bbbe3976d51ca43bbd9456993b5c41ba7f4000000055c2769b4a58debc1a80d1d17181ef06610faa6d97f38cffe755840e3a254232416d319f12661fbb42324a71375c56e84b2f617b531e5e9af1b7e60b722b8444 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4D02BC1-6D6B-11EF-8CD4-527E38F5B48B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 700196c47801db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2952 2336 iexplore.exe 30 PID 2336 wrote to memory of 2952 2336 iexplore.exe 30 PID 2336 wrote to memory of 2952 2336 iexplore.exe 30 PID 2336 wrote to memory of 2952 2336 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2ff79689ece245a1af1cf45f7b5a54d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce9be253c083ca1be9185626bf7eedb9
SHA1d24ee65cef51a943502c13db5d5b8824ee49d246
SHA2564b88bb3841265c1218c7e95632fe2abcc08f7d5f8a58c99b02a764ee941250da
SHA512c7e8df6ba14792b4e385f82614950b835ec16f4f5aa6f928961d39105417146ce0322ed88f466fe056a94cdfa816982bf27628ed6cd34a85465ce56cf6894c96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527bf4312a597210f989116ad8a82c81d
SHA1d48fe5a606cb5c6828fdb8956de6f05a8adb8d9a
SHA256a053c989caed1daf77edd07cf7eb7106ffc2c71f49b49f359b8ce4d6cdb22d5e
SHA51203f62c5b2e566fbe00c1706f13ac21de21432f59d4d63ac32f1049f98e28f08bb4da0e78f8d3c4d10c8887180f3b43a8bfe4eb4e0151dd2538de259f0ee9ec56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba767887de8630ce7686d9e5f68c51c6
SHA193c2817f685f654487749c74c36de7fb89f09d0d
SHA2569fbabd0dd04b285ec66fa24e0cbf23be95ca9f379664348306003c063980ad4c
SHA5126960dcca74938b0d076aa9078d6d1e1a6337678eb0f9890784b3f4a7079b292e23e2a33d9b1b07590a43b1bfe24de6872674e3bee79bcb77d03db12616cab7f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5552502813e073cbda1ea2869c380df6d
SHA1fe2c0310dadfef12c10dcc1bed2dee2a44487ee2
SHA25624495f67adbfe8dd5cdb5fbe4ab52ec438e999413c84f9e4a0eebf086d6dd9c1
SHA512e993bb1de9ab4cc4452cc8b0df2f54399d5c2a1585f712957a542a373828e8593d8a14a93fd97d8bc60892f25139b7853a43cf6545c78068b523db9bd3d2a90c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d289d755870331057ab07c10dc10b375
SHA1f42db0391a058f8783dbfa8d5f314e19e39bc509
SHA256d1b1d09769e7ab7efd8e3088e3ec03be624fb9d482fe251bdad4bdb30628ed1b
SHA512a6ffc378059112ef4274fe1d60e04c95bdd69e2e3a86f208de6b9411c3fe776cb83f1def2cdd1b392a380c4a8c9906d57704d46dd63641b693fd04fd160a0bf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a3bf4c98a3645846aaaeb527ea2e1dd
SHA10f2562ad722f7f26b114ac6c3f0301b1bb9fc232
SHA25686aa66ca4d5868b0ddbb9752efa6bd2a3b31aea02af2135b22517f1af3f409de
SHA51285f5774331b06af8fb2cd89ad8400a94192a50816b3dae8b0777bcf39ce9cc0e63b4fef024561598ce64509c9d66d89d852331c288bee0626859635b825d3ac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abf5aa3cf16a63639e8e1c92b87e63cf
SHA1a595d8d9e586551ae071ade80e25b462e0802f8e
SHA25636ab76b962e237b81e9f68e0866df6a961872c7c95febec5310a03390a88293d
SHA512f56f2d68ab0d72c8d5f6c061b8713151ea1cc0000a0ec564fca0cbda793d244b86f3fdc4af559c58c3c2eb4d268b4e9fe02887b7eba135a20a24737eb0ad732b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55adda16a4f2ab1daadbf4c78aa0bfe23
SHA1a90adc1d5cd540467f3d1edfe80c6b551b445af6
SHA256eeb66ce118ce1ee560ea67e9cec4da314fe0d476abebd55223af71263da4cf0b
SHA5122c5a154ae17f2d65e5e5db76917be1048522ce559d77653f1cfd17ee172689041eec6056027f092ba35b56e0623e3df3cad327953934c043bd503736ac23630a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bec15a3f5af5b2405594b9a1c2ea8e3
SHA17d5e21633f6dcab8224bcb744b9c14815df4d6bf
SHA25676f6f01fd3ef8c3192cc4f6cf6137ce5ae781218a14ee90aab9ce318b6054b6d
SHA512b60a0a44260eb2de0323e79111507c228b48c8bf7a6f1da42eb8d75605bec967cc6952ae7acf1fafedaa598e416fa4bb7e3edee354b92492d158d7c8f79652c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a97e1425c7ad22f603eb8a2e6f493640
SHA142125a7fc3ffaf58368d297415e0a4c910617999
SHA256e8fde465f20d59dbd24374680724041334d0de9f5da9b6e88444ab5fc9aa3b6d
SHA51204f02e1337abb57911ab4c51b7a86dea504a8a2ecec3ad0eb32506a7347273f922cece3338849bcc2db3c83bcbb2948457212ea10de7d5d8e299e4f5cc525d4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538d360d848db5698cd919a52d35d04f0
SHA1adcbf22ca2eecd6691ed8299fc566dd78bbf0be3
SHA2564435fea41d53f33d708049dd10716be597831fd97a10d46a9b29884699bf0ec4
SHA512d5554a6afb54b9f3ef1f9e344ce3d3363200201704b17e236e2972a6aed5065e62ba0126fc8c9db19415f5016709a7291065afdcffa7f20c3636dcea0102c8ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d47ba69554f6f4969baf5fcecc781b2b
SHA1ec9fd53dc25deb8f94dbe2850f02d06488efde1e
SHA25685ac274c388255bbac18c3860db5977a8fec7aaead7ec14193c03ed8624b7b79
SHA512eb64781dbce1fd92d9cd1626d9f3630ee6fdb373c312606d60c2b2447c57b0c5c1d8eaa3e0d9d4d3278db2f9d47ee83147d0995808c05a10eb838189a1a5fd92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fc250fd32eddd683d8f3975d001a121
SHA15d107aa1873acba4bdaf3c2e748e90e38b3ce5bb
SHA25635809d7530148c9e51322af48edf54ae7e731b246b475d7b5ccd0f8fb1173ca2
SHA51277c1fd6f08bf7ef39e40b43cb4add939ce03376b27ac6ddfde8a769c42eb4fa2b672afdea4a7fba80d024df5d10a74ffb985f2a21df4c8504690aced9dcfc7d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550e3da0ed94b14e730a41863aaf44f62
SHA17a24abe8824d1adf95e2edb496bd3a634b1e5a96
SHA256515933104f6dc658c88aa1eec94abf2c0ea199fb84836ad9b2341d442aac0d6a
SHA51297fef2ba515ebc7c17feeb50a24a8522bc43bba508891f51d267b174cfe85d99b52bfe6607130efd437d56e56c8c29b7cd33dc51ad1502e48371eaf213dc4ef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb2848d36ec7d219f9d0941e127a3ff8
SHA1db6cfd6d086e5537bb311221bbdecfc8ca8252c6
SHA2565141d42dedaac091146ef9d397d909c661e769c0481dfb174c0f4e0bab62389c
SHA51242f84f6b9bcbd8997017c5d3078bf2a0ebd313cdb89a69adff86c0c1a5adda2d90a16bb973ef7aa3fc8b47f2edacf233363bf12c7ea47b709efa5b29a803a515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5272565bcba5e5a24cea4b94361549aef
SHA1db4a75c2f0b6ad21fc15f207ed35edc6383f4f95
SHA2564b65d255e9edfcb069d2548abab12918b344cb56ae32da0f0c4952aa9ef817b6
SHA51222a9406b25b738ab85219d2126bd8035d44d70ccafe0575942a5cb65358e5c31ee030988a4cf34371640bf502b65bc4b8d5c1313d01043e47f78f7c091ed6138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0c8592a02181ea4fe11ed359d1a3715
SHA1750e1747b39d6a8f28bdbd22d10daaab878ecc9e
SHA256cc63af3e4df122c2ac822f11d2731caae584b0cea8174bcda5a3afac175ea71f
SHA5122f579b247d595d2b80f06ea1c28b635322507da8e86717c90526f0c73084e79e224d9c047acda992218d8071510b2b532f78d72ecb7cddbd4a42c75bec1e04c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca4dabaf84b2ad20cc2d2b5bcbd25759
SHA129db51ae878f4d3ef79667b1ca166127a6df790f
SHA2563da842a23e2fd78fc82352d2340a20cd9571d563709f0e5ce8bd238669a84532
SHA512d9783d510f858b61dad2877393191f918168f2dff9b04708fce9485a22ae1cc93225e9a5df63594b4a43069dd4adb32a98c0d69326c3057abafad2fc8b317e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561154ac994e67882c63f2115bf2f60f0
SHA18abba7c20ea6c64d6ed8003b0736ab9b2dd70c49
SHA2565454b5dfe45bdfa425dd17e0955f50020d4e7ac9fb988f3e4f553a711ad708c2
SHA512fc6d29bfeafd9eed5c784b022faff1a1a3352637db1a008a52b73cf447eca339e8cb70e63fa334d3c1f8b8449230cd2d086722c192b3967ff7f851208237ac6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b791b1da9ad349848a726233b8029c2
SHA121fdf50ceae14e47b0b4ae900745afc992907927
SHA2564702ed4a6fb444e881636201bba29410da59aab6a1e9b559b21d952949503b42
SHA5126daad40e4c1ab8ad6a0343259a93b6af0faa72c9edeb9ee1266a1f7eeeb48b516b1a4ba0fd3c9a6f32e8f31abd07f32cd2b626deef54f9c597f2d99682cc41f3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b