Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 06:09
Static task
static1
Behavioral task
behavioral1
Sample
d13fb1dbc4d4549117276f0cd82f8d07_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d13fb1dbc4d4549117276f0cd82f8d07_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d13fb1dbc4d4549117276f0cd82f8d07_JaffaCakes118.html
-
Size
150KB
-
MD5
d13fb1dbc4d4549117276f0cd82f8d07
-
SHA1
ef89b1f4af19ed4573dc896fb9a49a6f9f9dc430
-
SHA256
03ae6f2bee4edfe8a9bbc9f75e66579627cf37432c6c3878507d7e29320ca404
-
SHA512
d7ff50fa0ac25ea0ac173b6a4b98b27865bd6cb164678ad76233deb448ae136751579ea2be125d41fca6a0ea5d16e45d21283b655ab7a9ff35e68836f55595bf
-
SSDEEP
3072:BOxXK2JgMk7nO5XwybngwrNKuXXVGwHfpQlfSDs/8DGUqvzV26ldw3IawSEKNJGj:0x6K95XwybngwrNKuXXVGwHfpQlfSDsl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431851240" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000657a5b3d5733624b8a9547920dc5a0c61cda4e56251237bb31ce15ef8b4d1430000000000e80000000020000200000008acde41d360342a97505f64b3d90ccc7f7d5a3f5d8844c85dbbf81249104f8ef2000000029e911de73cde0a5e152095abdb3ff83f87a69aecb935ae68641a563bd45d7ea400000000b1cf6c2d51f48f2eb910b24f95c7fe1b6fe49384979da18ac817b830bc006ac7a7dc6044db1819297c63dbe69ce0284404ed5f5c37e3d461b0c3979205501d4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0037b8eec00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B476BCD1-6CDF-11EF-8D9B-F2BBDB1F0DCB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2864 iexplore.exe 2864 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2324 2864 iexplore.exe 31 PID 2864 wrote to memory of 2324 2864 iexplore.exe 31 PID 2864 wrote to memory of 2324 2864 iexplore.exe 31 PID 2864 wrote to memory of 2324 2864 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d13fb1dbc4d4549117276f0cd82f8d07_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD523b47f8284f2429a255898985806ea81
SHA13a839cd58c70540cf7c1473dafd044ab089ab54c
SHA2569f94faf3b9c99edd5a6a1bdd64d96410b9c125fc1d384a47d80ea8b02bf09b8f
SHA51270d4bee1d12812addecc226c4aa95dca7d8b173a4e2f671257707c767d4ac099dd2b8bfe68f01da227628a9a2a6401881ccc81d3fdf191d538787f5675caf6a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_5F8ABD199E1CF2EB9B30F8FD50D3DB0D
Filesize472B
MD507c8b2d1dd992e83e7e33674c3dcdf5c
SHA1361f94b02be8253342da98b8aded1fc55e0a314f
SHA256294d907e947b9a64a7713906bc9494581ed9bd8c26a7417effa9ff65a568e9ea
SHA512d50eb87242a14a43d3888e9a12d7637645627098c4670309709fc620152b85d32b0a7723a232e7a0086a1b67c362749246fd85e20276a7eda2d4760987cfe4d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_F968CA97A68F4E6D5C104EC7FE3DFDEA
Filesize471B
MD57e39ff496edfe3dfdb85dcd49da2a777
SHA132e828e1df87c0e0626525ea6614cb5cde671069
SHA2565b443aa82793c5f4ce5ff89a5547b54a2a49d7d7babc473b8f0e6ba224c6d21c
SHA51238b427b15103458361af67d3c2b4098d65cdb5272e52ead50f6a8dca319b05aa7c8cca2ddbbe10820caf2c55d9f9fe99a62d38fe38e9acbcabef857c74e338c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD57535064e60b92cb3e66b88fc58b487c0
SHA10d2d400b5a7f2082fb58323bbb853e384d11ff0b
SHA2568ef7eeabfd9cccc7898ee2d9a3bdda6d91c0de5410197540f3a09e3083c84cb7
SHA512c046671f42d14287067dc36caee99f261b3de9dcf0e24d509e6dea53ec74950a9e6be3e549470c456df921ab182ccb2a95a23b1241b771c08e5f840a1d2da6b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d4c44c1d53b3f67092887f2895affd0
SHA1355d0fed5ec062ad8ded8d139fa57d8a1b536cae
SHA25624ffcdca84c00aace34696db989ac4ce09aa58a288d425d2960fdaa99d199771
SHA512b0e02f882cdf822de3db6fbfda2f5d88323180c84ffa6413f7ddb9238a9c9b1e193e196e27d1795412689aff98e3db40b11b4e3644624c2c873709ea6ebae889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5506763dc57d8a8919586fdaff136d4cd
SHA17bb729c80480c2b6ecb9dffd6541b52f2cd5e0e7
SHA256c4865723de298b0157971686f664357d2fda1cb382192398ae94fac83aae402d
SHA512044a593152c287358cba7965e289b5372588d7bcc4043c33a7840954a8135a225ef42390355062aa2b91bb4d3fbc7276581040f975bb5e2d358540e98309f69f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c32aab67324c41c967d2592cdb744e41
SHA194aad35e47e321490a613367f623af4a643cca10
SHA256a915058032b2f92346aac1b98cbb7caa16a66e5cf719e7df1bcb8bd102d66b4c
SHA5121f22783673bcc3874ba8c45b56c5b6bfecf45ecab8c53f23e6562b7c6e15022ab31abf5fd1ae20ed127258a4bc39035b99e9793ab5f92ea4959f5a8808b6b0a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a96ea7c6390c33398a22eb1400c4403
SHA11a63e3b6325afee2077bd9b9f411087c5cc7be57
SHA256a0ad9db4b36c48691d61c83230d4e1f385f29ce2722f78277fbf8242afd9a7dd
SHA512d74f0593539344ab905a419a760b3ece57a818893422f21262338941476c818b46037acb37a5761dda0f5f19231ff797e1cce35cb295be78a5d19814eac70186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_5F8ABD199E1CF2EB9B30F8FD50D3DB0D
Filesize402B
MD51e04953b8afa12faed8166dfb025eb93
SHA189bbad6b21589b40c9f9d947cebd5a1fb87308c9
SHA25674066498ee611cb9c1aa408e2220008a986c8e06c497f018e9c01d9db274c7bf
SHA5126c43222631b57dd55b0f81d453ec22d464300673b6e8a4d8f4d025445c1ee6c09161eb8e28237ec2e11c9de45b583fd3af26d5b9bbcc3ac7cce0f45500dd82dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_5F8ABD199E1CF2EB9B30F8FD50D3DB0D
Filesize402B
MD5561a552ad334760cf179a31dd66488cb
SHA106533ed2ba2d18e0f3d9da87e17dd472c392153b
SHA256118057f9118bb2de42695c58ad5d33a2c8988eb9007f83269f31180314638ecf
SHA512e2a4ffe37fc3cf4bfa86cfbf0f505e563c91b3cb082da579e1661d232897a64ce34c9dbac520808d6b3e62e36f4c52317cf4d7505665583f3c96e2b719a53d98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_F968CA97A68F4E6D5C104EC7FE3DFDEA
Filesize402B
MD582ed87895c33ed17e0be760442554ef0
SHA1e73600d2372b276a39d56240a26e69ec6938b546
SHA256e381d9919c4a8255123df06431e63de1600371354ce875b2288a633632760db5
SHA5129f70edde78b290ee7b1ee5e4b71827f1f3efe48625418e8c5bfa097ff35d7797d07b5bd6f22910031af527de69d6bfbe4c20d42dbfb2d6af6627296f4218c358
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b