Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 06:39
Static task
static1
Behavioral task
behavioral1
Sample
d9ccfd16cdb374e71db5ca8155d402e8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9ccfd16cdb374e71db5ca8155d402e8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d9ccfd16cdb374e71db5ca8155d402e8_JaffaCakes118.html
-
Size
989KB
-
MD5
d9ccfd16cdb374e71db5ca8155d402e8
-
SHA1
eab60c851dd8f791d84f016e32333f5dd8c58f24
-
SHA256
786033845dc28325db8a1b9789fdab6f9d0e97ada7e0d3baddb640d6cd523225
-
SHA512
06ecc8c26403a2db7d71e81897519649634ab69e793cb9a2696ac2024ddce31675c24474adeff9ba9ac720e12e7d374ea9b74696ee0191160e1ca3959c7cce95
-
SSDEEP
12288:I9nLYWAVZQnH+JUiNIhWhOyOAHxKQZxl5xGvnqkJBmia:I9LYWA8EUi+UOdqLj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a731731504db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000018a5eff6705a7297a73bce07aa3c85174e7d53103117a0926350e104fa53339000000000e8000000002000020000000f33a0a343ddbdc3fe0288cab835ae084eb001820947c2d0d4383269fa2a38c322000000093711853cc63e8f76fe68186628c92ce09d19657e7d652e14f2faed0398d907340000000d3c1e5b6bb16528e094c6195ed0ce96a4a890f0ce5935c158c6eb24dff20f6775961d3383c1adf6b298c56b8c3ae4d300aeef3ce93a72f56c24dba6a076265d0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9CAE5A01-7008-11EF-B1BD-EAF82BEC9AF0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432198644" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1788 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1788 iexplore.exe 1788 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2500 1788 iexplore.exe 30 PID 1788 wrote to memory of 2500 1788 iexplore.exe 30 PID 1788 wrote to memory of 2500 1788 iexplore.exe 30 PID 1788 wrote to memory of 2500 1788 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d9ccfd16cdb374e71db5ca8155d402e8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1788 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1a3afa629c6a3155e04b379c8836384
SHA12c7a3e1fb7a8119cdd414fdc41ab2d754ea17fec
SHA2567ac9750987eb8d51dc2d10a72219f029e1c56983d1ff65901da5da88fa4404ed
SHA512ec02ea51cd1516f58374f2eff22e39e6d0284ca1cdd105143166b72256b1f6892d1e1a7c95765c1c62414f1e9aed2db6905b57664b5db467b2dd43661813d8f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5257887117127bb51ef6e7e6722c48587
SHA10bc7a6fac04e9dcf58d9b5ac7f27eb204c7a87bc
SHA2562628575ae15b689922190efccca1af610d67fe3a1e5e1ddc888df21be85615a3
SHA5128862d4df61c72af1a3aeb1803ecaf69625a86fc05737b5487b843d5d1c9fc47e4cc5df9604103a35805a3586b1d45f8f11fee2f386918bb148622c52a267f639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513c1c185ff42a758d9ba0b66e2ef7cdc
SHA195ae80a1f2c8059eb50905cc0dc1d2d454811332
SHA2563008f401f09c61242171406e427688eb34a1e10f921f1350fd3bac713c544b60
SHA512c7efae8600045c0d0bbd322751343780ad70e635595bcd831a3276ce93fa0cd147cfe571bf2c1defbb466495c7027957cb0506d9fb767ca580f2e641a994ae85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5427bc53bb3d2125d2827d6612376d223
SHA1a7d594033dd71bbaf8c6ced2bf261d505738d999
SHA2561191167da3d3731f2fb8720d3e3b1dae7d39ba0cedf2f83f5060ad35c72ada4e
SHA512e3924522a8ea8517cc54dd76f64a2fe83741ff31b2827aa8f73fa121abe35e78209ba1d29086e51b9897231226fae117dd605893d9fafce13d3d8435fcb674c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a1262da956e38ec01e86807f59bdc62
SHA134064e19a2e348543bb47e71a92d7ff2b5f21ca7
SHA25645fcc12d7b32e2af1c8fbd36b508d4baccb0e41556f07f06985dd451cea3ac84
SHA512fb261beb35627729dc8ce23dda4b7872ddbb6dc4a286e91e8e6fd2c3108a09224e363a9dd09cf25e74090dae78ffdf7facaaf37c5de9ca965c97e62ce5ccf8c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5659fbf1aa515242fc8b0bef5a5ea6d73
SHA16cc9e5e08cd5bfc7b8d11722845ec4d01c80d294
SHA25680100ca95bca6e5cfd2251864907a0b8deb4580887015d55fb1597727af13b9a
SHA5129ee519d27f7b37bc6592d9143c42436c11bc7e3a2eed99e4b34e9182adf7beb96cee637d64c06c9cffbedd8eab6470e5ff1c1655daebc690a8c1b964b3db4afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53258267d04d64985251afa4834e1d4c5
SHA13773aa5d579b9275aa33c7bbfa0c53ec0d445bbf
SHA256bb81795770a470d04722dd03821d394ca57f8e357596a4f74ae3dad418fa2e18
SHA51229a3ed5503944019771b35ab50a50dc416e13986d53bcc34192f0a1fe74d2af0cbfc1e17badde15d61c7feb6fe34de619cdc9ab8b8dfe9cce14a1c93955f24be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fea900ea7043029aa17d4b8e8b8b78ba
SHA1c3a4efb1fd94cf1b835f3d1f18c7105859084443
SHA2562aabc7b6bd93e04aabeb3e62c1f56c834c43957462742542fa992b8f04fbbcef
SHA5128e84df84baecc0079a3058b5faf32266ebc00892a1fd27347b0bed2134835483590acd4477e68248c62ae90bd36646d0d3216451db7d58a1ecc3fa48cc88fae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c6c5245016957a57ab3a6be572543bb
SHA1bef39e85982a543f8942bac799cef4d1c116ef15
SHA25655bfdd9c837db29aa44515b72a6f009204d03211193de8c462e1ec06e4396834
SHA512e1a54b2d8785691a9467df0be5d08251a259e0ddbe3fbf22930067d594afd6346d52bab34a927d939e5cbaffc9b5da2a3d408b99e42b47b3c61d68f2b4fa8011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4746c805d9ae5b61cecb25fd69efbd4
SHA1f1e35f526aefadd097d09a8df3ef12ebd998bb2a
SHA256f54053eb8a69222b20251dbb429f5d49ae2020bee3e2e7e1a42415c2adbc0517
SHA5126a3c5236321d48739d7b3f3f4e5300a6974d719063d36160f46be5c0a763faff3ba172e2fd32112f54d17683887e6131fa7925301143f24a620d99e6f3e20aac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fad22ec42ab6c01bde0881870dd496ef
SHA1b0233168fad0f16030cc2c204463f78809ab3a75
SHA256a701292020d42db207d96d80fe0ab24880425cec644a7e243777c8ee67e738e6
SHA51259d913fb0c9e3f9dfa218be7c39c9690057e3387d2e305cdc72da0ae49544c3a2a05c193bf17caca713a91e230f79a2b05a5d9dd526dbbbd6a88ba5e8dcfb1c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5f2d079bf8f0357babc9e7734cbcab5
SHA112c75aef8014ed4127f32c23a83ff29322dd8fa7
SHA25655e36007058c3ef579439656109794b3ba45121316791bc5a60ee3c828a336bf
SHA512a2cd3d7236f6d64f57778ef47f0e762a9d11e1d4db9a1996e0480f5620ac7c50125db871a499c6c07dc35541ab04d16f4cec628b3614ae48b9cad31c53bb869a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541c74dc40e6107ae9bbf4d40dd03e1ce
SHA16e12e0e08e3671cf382d750d32a677b8a3a40565
SHA256d4ef98b14ec71861d22aef5dfb952149551907ef6cde40c2f58710a7b4238423
SHA512d4c15f3d46f704f5747cb432e2219fe6f155796b58b290dffc6c2eb3ab9c12ded0b1436f05ddc3d23d59923d1cf337609bc60011715a4c47985f815308139e0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db1bfb354b244a79165f59f3452d20ed
SHA19100d6e0268ec3571da56521b6055facfa842b37
SHA25619c1b7d43a98b2238bdb014c6654d84f02e679a2268d62c62bfbad1c0a95ae2b
SHA51226c5116e550194ae3c9000e6e41462ba0478cdfbaa18057bf2dc76a447103056676cdfcb194a72a9a141f76c2467f10b751eca15a68f73238b67585b876c8e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ac2f9f1f97735bdb408b8dc4d3124e8
SHA1dc228ebf43999446316feccfd0b99594c9a85eaf
SHA2565a67a68ba48372cd0decc4b00f5cbcb470dacde72f38b00d6aaf1b2fe1d0599a
SHA51243fb2ae3f2d52afd25b2c4ceb114f197caf5fa895fd2560906bf143431bd8bb4eac5e8d888626155bb0db52a559b4b033b877eb4d29569067d0172c8773d6d3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586844fe4f0b26387ba1837004c5700fc
SHA1690e2f18b87653b64f31aba1bdfdd97390bb1396
SHA2567c0463278f4aab8852c8821c35804c5452609592ecef38d912f5d0e979489273
SHA5127e1b0ddd7e70d8198db9d6a45391fd79b34c4e8f86b8ee9beb7bf42440dcfb58f48bfcab756842ac5a05ee316ebbfbe601fae6e8da33a9576081d5502f57724c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5073532d0669e8716ead4407ee5c9fbce
SHA1200bc3ce5786b4d4ce6f5ccae88d95743439e3c6
SHA256de26013c851a1f18524cfcc297e713ae8f1919a878ecfef81e18ac98fb995b10
SHA5129b14c07489143c050992fd37fca443f56fc4464be945a85d7f6998a8835487037d8c9356bd20057151839ff2c147929f8d26aca9b8848f8eba926f9af32c2c61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589ccc6bca8ac5c5fe31ed2d24c7bc42c
SHA1a718210efebf9d7f70b404cac98f3f845e324844
SHA256e19a7d6a6d07f0354743f88f5c9a78c5309c3effb12f7015dffb9045fd49dd97
SHA512479dd7cb21a0de67f3c68159829fb861d34bb2e27cad9e4560b7a85f327186b21879b94392b72df96fceedacb29b6a9d32a9912515d5e56972fb589c512bd1b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53030cf48f8328038c10aa83fc2a3da4a
SHA1bc2941d47f0ae83be6717b163000f4ec8e59a05f
SHA25614db1fa9b91dc874e292d42188419d28165341bdaf8cacec9574f0a70eebe037
SHA5125f64049d9877c5957c806171f1b112858006ff3fb3467cc32c5bb959b3735393ee68d6e7eebeca01079ed9dd5e17c012794633669ebfd59eb09dd61f4cf927ea
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b