Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
d6292be5223c74956f5f043b7f6764e8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6292be5223c74956f5f043b7f6764e8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6292be5223c74956f5f043b7f6764e8_JaffaCakes118.html
-
Size
48KB
-
MD5
d6292be5223c74956f5f043b7f6764e8
-
SHA1
2592c8a4964b57fe619d4c8e98d88c244828fafe
-
SHA256
69a617ccf942a7489ae000a90cee2d8929de2da2c91eb0dc9b9a7a7db0ac210d
-
SHA512
282a3b7ee014fa1095cb21cf7cb3cd9f3bd407da04431d4da5a6419366a049af0610122a23707ec18287f4dc8bf566c5523c20ec0b7944cf840e7e487c137a71
-
SSDEEP
1536:SXQkMcOv50+yHjc2HfeaiDktVzlU5DrcdXmbeDRkR:S8ROjXPndW0o
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432040819" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3037b5fea502db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{25ACD4B1-6E99-11EF-B40F-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000031782fa6b14c3c0fb96c798bff7bdaf87a49c57b840c0b9b0f9914667d744b74000000000e8000000002000020000000cf84158be8df7acf50135d7af65f5a3963d9b55fcdfa4035beba595c5d1eb373200000007d987541e55cd29c1d1a715a1ecbb44c287b5b4db7b2aef03315dbd2f3d02d0040000000a695897ed4ae7a32fe987a2ba14374f08ddbd35461ae3e6c96b0251aaae8d2cf7529e3ba04fb750cec5aeb5f37d5f3923164756bb558fe2d2c55f688bf70d4d5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2572 2348 iexplore.exe 30 PID 2348 wrote to memory of 2572 2348 iexplore.exe 30 PID 2348 wrote to memory of 2572 2348 iexplore.exe 30 PID 2348 wrote to memory of 2572 2348 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6292be5223c74956f5f043b7f6764e8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50902f21205c8603a59602b06e7a38d13
SHA191eeff86a1b3ab8fe4dc3fd919da46dd6d98b3fa
SHA256a47a16c48fd030d4b9818f562238c484190accb7e5838e4e80d2567e0e5f9a03
SHA512a92571e1e2f369c10395c6b9f1ad66975e07ecd79d4eb25aa7b39d332cb83c99101e3fc80e31c5f97b3924de4f7309c923d8eca6beaf2e872836b59648d74efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56332541211c183d77e328de808b169bf
SHA1636c7c834092bfadafb3dc6b324a7a91b31e8ec2
SHA256c060f6d911a4c18a731137f12cf0d7bc78aa345d6516c3d803172e7fe1cb53c0
SHA51278eb1114fe304f3acad5d2d279651134938f9fcdcef6a434a1185af5ab2d0f7245532d2e9e1e608d72400e79dd8775dd58c62de64c72eb36789ad7d34777626c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba8b025c8f77f84b723eeffd66a9c451
SHA1f9e2d26d56e48aa5ca2e8fcdcb98746a8fd7eba6
SHA256ff2453304b99ddff0fa865d13c3b87f03e7abda1f4feffaffdda4e237abcd864
SHA51242d61fb155361a36e2f9b606389aadbff35fc6a2ed832503c5ca8dbbe04ee81cd9249b8dba523388e704de24bac1e88b471411a3a2d39e25996fe0d0dc4d8764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b631feaf14e94d414a6c6262737349e
SHA16a1dc760237dd601bfdf4694388e5acc0238496d
SHA256dc4f8e469f5f72db58839d086f961ae7b6c5634b6a0decfa8831c64e1fd12c75
SHA512fdca15b642fbcab372659ca0347e42c67d2a9bef1dfe9aefa3954ef8a1aaf114110b21b30da451f2b86febd2858fe2adc88168fc0041ee6bc3c60938489f3ff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a42e1eb3146e757e9321024f15e34c04
SHA1857db331171b5417135b41e3bd2bfcb26c56da1e
SHA2567f4f672d375f2196fde5fbf37fbe98f1c0e65bfd3064f1819b8a4fd55b982915
SHA512b02766f66e881dd380131c6b19e1434d719c88a0e6ff738189f67863110e8854b39f70df8070457c6e283298ff9a8aaed9e79efc358a16de4fab0c2267135596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5078e6e7bcecaae3a027292aa7099dc35
SHA1cea300d884b765ae26629771c5c145903b520e40
SHA2563256c1c32755a637b6598ad07ab2f5964379daac5ddf99ae897526b13fa1fbb7
SHA5128053964706da9054b7835e4ca2802ae00200c79206ef00d6c78ab815cc8fad74fc652faa5f1d63173d980852f1d5adfc21722e27a4b1a020fc36761166e10bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0525d70581fa99ef9724499b5bb3a6d
SHA168c6dd0079ec05b1926a683d7ce54ed71a32cf61
SHA25684dc5474aa4303b9f69bdd4fbf0e4e55828f13f4f10a1d1c82f8785af4a7a3be
SHA512d431116a4dc0e1f3e2283438d62048a6c8c903ae0dc922fb739b38ef958fa1885f00dab5c0b478fd3e04cd1f8939a2ad5e62e72eee25c2fd98551d589a1709c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b88d26eeb9d16e029f0e354276090da1
SHA1b826473ba01c8f348b9e4f9ea61d6f749726c3e9
SHA256ae3c5945d53dbe90c78d40b75e377cf0b6811d3739c693b2a13df83786d59d77
SHA51259169872b1af6bade74c6c7026ddd6845c8470ee05daf9ef2e3a3d80e1fe59eb936d7467f1ee40bf72c894e3989d806b79e62b7662001a762f6b9bb348e5c8a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f06940cee814e2fb72bc37b83f9daac2
SHA19cf1611fd8337ab3d6a911e4513e1a92353928ab
SHA2561348d2f18ad4e12d884999b03fe8e2ee08c0e9b83455bd7efcf94eb82743ca3e
SHA5122c5589f24fbdc67311ecc71afad62ada76dd390d1832a0f45f01b77a743093c2f026fb4bbdc52c38e8e5d3b10e228025d099f90fdca10325275fa4e6912025dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8705c87daa8d2f9671b062c6dfdfa38
SHA1e9a51c004f6bf06f758a8e799a92e8a1ea1713cc
SHA2566af2bd0ee4be84a1bb626fc61f4536557271da73ab53cc25d498daefb716ad99
SHA512939fa86a22563b3dd6ba58cad819eb8adb0dd60056fb13ab8e9ed1020fee2669cc93fd077eac803d0a8387aa4d2b62b1bbfbc13301f80462ebadcc163e9ec7a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528ee0cc721b274b4c73bf49d82ae7356
SHA1cb61690e0ccebf2008f3bae3e5d4b0e1a9b3658e
SHA25603cb6cb00f28da435a84d1f60f2ccc05d9eedbc5011bd28da7f481e289264509
SHA512c6096fe7c1f0b50397e507d97bfa1f264f4348b556aa2dcd459d745bbd8f0478b76eb97ddb4ba1451adc6c64f3b4ca7bea6fec2a5f5fdd5cda44f508c8b03d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad06e676f307bcaab40b6051f71e482e
SHA1c90883f20337a633b3218c725986a00ca12fa308
SHA25680b2cf36d908dfb5a505a64f3836b0f07635a305b468fcda5d58c367e2e54950
SHA512ce6fa23df18417ed2ad4bc8db215aa7bbbdedea3b25345aa94c1b2539283ea8e59a410fc8a2542ec23626f7ca3ace2196657a65ec116f1e314361ecf8c903b39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b022443c4372049923c0d142907d3b79
SHA1dcb15a550f024d69789445c7c09a57bb1ed90e26
SHA25682a76e6c7c095fd5b34ad09b4e264783d7765a4b7cedd2d74fd065c7736e7391
SHA5123b1c565f9e8e4ed1b5e18c41af94574f644c87926f04657dc260508f477f3e2a297564c18bc57ac6848fe5c5ec87e428d8d7b1cf356ae5820117388fbc3c90a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5719342686d764b9e49665912fca40163
SHA1d16c6bde7085d5d630b8b23fd70709d751c89b91
SHA25612f02790d4854b288304dfd2c5454120d60954b76e04509200beaf3570a50c7b
SHA5129244f831e1af6abc4df1dc871346dd418e4b9c60ac03d712e1c02e91ffbdc716aadd0bb7879a2c1b20d1da5691b58de465f70c2b44ab46bf7323138629fd26e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b30425f768afaaded4dda6ecb807f12b
SHA19cbf3bfb6d1dd1750984b94983c4413fed2ededa
SHA2560e74a447271a066e99811b74b8e49346a3e1b51ed058c28242ca1c11aa4e9d70
SHA51246900ceafb227177bee1364f093c97b312e4b9a62f9ee3f6dd5966d1f376e691094f26339830985029e8d098dd268ca22be47c3947700e5b519a9626dfab70cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f2eb15462471b20190f2eb561326411
SHA1f5129097798757126396f71b4e8833eff494b82c
SHA25641ba213eac22645a3e5070920379caba9652ec3e3e033d2234de9bf2156bd069
SHA51288573f049b6085b516b74f41c29356e96e96b8e78c61dd44f20721a12fb326bc6b7afe7361d521ea25f1d3936b965216229fa18accfb59a52c4ec44a3980aa63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c9584c29439e0cc63a72dd659984b9e
SHA1f2da4af3c3f34333147315d59315d6e939ca81e1
SHA256ae9d2bc8816e2c655483119e061317242f7f577b145748c9951736fe79221bdc
SHA512aef1e964497860446c257a478486c2a1d976ee5d87f258a60da9f40c9a763ac9d67e89970abdfc850863ffcf2ab6e2f290e17982967a730e29fe5633ac7125cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fc74e3a22663f2a199877878497a5d7
SHA15255879a7549545628395167ad80ac7faf5fc622
SHA25691c7e8594f305dbaed74d7810ca6a4b131cbbdff3c105132edf1a411a44a3d03
SHA512214ba97d3252ff706842f9d2793706472755238460df634959a49deea6170218c86d7a25f33a51a615c4715c56656dc5fb98cf8c46064f2b05786040685f0dbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bce28789baf059518c993d0593da76d0
SHA1116127b4828b667e38fe26cf6423192c99ef8b24
SHA2562e556eff2819da728ca1c216fc723cbfac07a1104cfcbd04747e3d7346e1cab3
SHA51232325f205e90e48f2a13ea5e89434136184fe23daf14a03ebb381409bfa1a5705d321664c01cf50c1c475dacd6a01c9e1903063c4fefe36579a3015a76395f6d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b