Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 07:28
Static task
static1
Behavioral task
behavioral1
Sample
d9e00c2ef557b6dfc38a957bc489d7cb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9e00c2ef557b6dfc38a957bc489d7cb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d9e00c2ef557b6dfc38a957bc489d7cb_JaffaCakes118.html
-
Size
32KB
-
MD5
d9e00c2ef557b6dfc38a957bc489d7cb
-
SHA1
953dd0f055cac083a7d08798573b867b1ddb9933
-
SHA256
f3cb4d6d88916a865e8b8a732d536043101478ebb4e889993df49fb0f34cb2ae
-
SHA512
abb567c6f2aa1ebfe1811761d5a43f944f43a5c6f40fe7b6194aa19f2bc6759c2e8a4e43f95e9ff194a2f910a8fc0a15034cc5d874333e98691d33a96b42e9a4
-
SSDEEP
384:CMw74VleoxzYcGZofCow4wgwUwZswNwwwMwvfwIwbwfZw4w+wI+wAwOwvw4wFwZm:CJ74PeoxzYcGZoy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e08124681c04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432201594" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000003fc67ac638fd0530bd747a8e8d51d800d16044f7440c674e0c71f4a3d17fa9e0000000000e80000000020000200000000299183e766f9a920867a06fef3caff8a4f79a519fe91eb52ef7f8fdeac1c8b620000000a3368c95c00260d0bda12d220f5248d1f61db073573dcb6074ba97f9741addd74000000005e859d83061d89f51cf85bbeb8e19d79e89504e80b3fed2a1384c0e4e434321f355385a72df40d8b8693ab40a00d190a03e826a2bb6d79316f494c9bd8f7590 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79DA3291-700F-11EF-93F4-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2228 iexplore.exe 2228 iexplore.exe 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2188 2228 iexplore.exe 28 PID 2228 wrote to memory of 2188 2228 iexplore.exe 28 PID 2228 wrote to memory of 2188 2228 iexplore.exe 28 PID 2228 wrote to memory of 2188 2228 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d9e00c2ef557b6dfc38a957bc489d7cb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0839e8fc008f5ac7bb8a7600d07aba7
SHA1340219a100efae6faafb4fe47d63e2f2813dfb78
SHA2567abf1709a8c883edbd0853ff2b07c0a55063c7bfd7cb5970d180b9fee7e2703f
SHA51275e0dc447cfe594e80c7665a8bc376b1f5893c0df8e0764c01d914b4732e8227b11d81a0a17465c02de10351a2439cf36d27c0d4e8bcd3e129cd36e244ecd0a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53581a2c0e5e0296b1b47eb2a2843402e
SHA1a11d9215eac63db36ce86c1c43750f13424955db
SHA256920e9cf7cca86479d37d1ac42978856f5d220d82dcc3dc1dc448aebbb2b99a2c
SHA512c96e5b9f2e2e9455682c7238ec75f9e43d01ffda0a0cfbbfde419e721bea7ad8c9db0ee7aafc6c3ae3e16a4779adac7f8df6fa62214f12dcdb25e0d367e8f851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5003f3f391e6b01537da6e389fa904a79
SHA14b8ccae5c602034c578e459365791fe3864a2a3e
SHA2566e5ff0965dd2d018f59469a195b7b142f85ec34565fae2fc4a70639546e76326
SHA512fa4b77d888c0b701067b1affe55889fa9b8bd769345b442a2dee53da78f26938c80a0b9530bb4160eb7358cebcfb3364c2bd72338a17ecf3aa9fa30aee137518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c12e55bf419c0fc7c446cea2587d4bf8
SHA15aea1f473774f6b943dbb636d46efe448450cec1
SHA2560f882c8edf8f34ac4b8e46830e68d6035fc3db1e62df2d1d21bd2c79d94156be
SHA512f9d264ab4d83570672fea64c4e4d51cccde952725961fc6d2dd7dd9f8572e9ba21e942de208cc5bbb625b48ce60129e0d507c1ab58dfe0aec5aa0434da936e09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509a4dad8f58b9daac6175a2516b5bf13
SHA1bd0bb05aa3d2312d987d4ec383d6b70385a9fe7f
SHA25662a2a598114f6985370159c3dc524a8fb03c257c8dca1f2b1c11c296ac0a4674
SHA5127578d65cc38ec3c138db73620b918cc4250eb6e522f7be7c0981cbe112f8696c24853a132601d3c676e1566a4872c65e2007b7cd25d5ba6b55dfd54ee236d0bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db917b5253db32c2e656653dca73279b
SHA152e8bcf391f608ea8a3c23cc6ebed175626ed152
SHA25668ce1816475121e4579813c6f2d59e07905ba7cadab18b3cff0ba3b3a714c9f4
SHA5124b1213f8e47086f83005be0ec21b0269579c475f6a592fd85e7a28551ca3bcd22a525fa8b7c80a8703bb1c801a8718aa86a253dfea802c4cbd0c5c4ce2bb6b17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5816648ec0919a63bc123566488a2666e
SHA120567cdfdd4ba77407fabf747bf08af44217309c
SHA256b242561f0d215ba7645dddf98ba3270829b86985ae7909e9f6fd41370873e35a
SHA512cbba0309e3d4b7ab82e1222058648ecb86054242339af6ab2c11a5e7b25fe403b0bc8637c40dd3800820cb3e1d0edd98f4b5933ebc3452ba8853c178b86f4f9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529c1a9084e5c884649382ffe8741eb54
SHA16251c749a3d07605f3d1657b9f2e6fd95cc4f4c9
SHA256ab4923396caa1c7dd63dd1d10ffc778225e86826fb63e3f0abbc75dbeb5618a5
SHA512654b55101db3b3c1755f51322fbede549fa4d2484ed653e16fad80afd217fdb1cd3b984826b1f707f830b3b7d9f0e09cb6b1cb04c89d204a3c711526e5f0ffc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e8cbaae127d812434512280fb840202
SHA10f6329d9250c355fc5f118137df4c35bc8baad0b
SHA2561bfbad9e442e511cc7a302981027a5d2770f205bd67953369688e0160f815550
SHA5123dd3f9d72e34316ec4a3342e5023df49ebcbec4b57c07210b539b79d725e4baf321205fca971f017fbd985c8003521847af25c2570aef6c939552d16d03983f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5226f79c1eeffc8023cdc6e93ce4b4c9f
SHA1551093d4d66b69c3168d61b7d8d1b3d1193fee13
SHA256ebeb337925497473a777e5055e1e701c023476b144607b67e74c623b85e33ac6
SHA5123de79abc51dafa69c77a634ff786e4f8e0832f83853d5a38e6425f8e8bd6f99a6876f4c1c117c2f980a021f94f6ccbd9e04f771b65b936d6ddc524d950a412f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ede0f78746179fa018f2ba8d6e241ba1
SHA1e7e9bf2653a29e2b72c0850c0d4691102f9bf188
SHA2567c64f40756da68a9eb2fdc5439b08dad96e6a617f517abcde4618ea833536b35
SHA512c0c6a05cbe8b7758acfe777de570e12d487ece952ee83586b54f5581caeb6fcc6809baba340b6182cf20f972680f085c4b12eff4f2d73cfdb01dbb42cdbf96a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ced9f6df87aee94bd6001cbeed0826f
SHA1cc3b7cc9d49ead30a34f758c4d8656c01724ace7
SHA2565c4fe102e4e3bae8d974db92bf09879441d3bc6d0f06ffa0528db1e34aee5a68
SHA5120de023930ecca88fee7c05c9f942bd9b46a8b8ea3eeacac61aba47806711577cb5b8f6ac72b86723e7407f28ef111f55cdd991205a2dbf5b7de91b92be84077f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ad4f9e01645928a49b7960dd2683235
SHA15218a3a28dd7269cf731213c7bb52bf9fc9f7691
SHA256ea21d4e555abe34a62a2cd8cd6a9f7e5db2a2c08001031edef32d735f3d512a2
SHA512aecd98856453074165b4af021fbd02234a4607f4ae66960efd83677d62941b73db646dfa535c6836c9001a2814f7ca4732d654c4332630b528547ad5364fac37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6e174bf4937ae0ff2da36257ff9ef62
SHA172eccbbee798bcb3b90e633aa0bf8ef6065e582e
SHA256d0c184922967f78b5d6abb39654196fe9eaf68978459fd09c14fe74c1c804276
SHA512c4049e2b2d27aa5d217bd6c136346e19a252f85b98199e15eab2ee22c3fd95e16959b688ead8e81bbf180405973dadf9fe5891cbb8f1928772b4924f1c7a6e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539ef4043f0d865621bfa5f7b2f09e3ed
SHA1c3ca97b56cda3fcd87b47df6a51bd7c51fe77834
SHA2560a7e82bb7cd130904e789cf6e955df0d4f4f27e164b9ed7b9c0ef7583d6f5a3e
SHA512bf6ae17cc256e8ca808dd5ce339839e242850badf179e7107ce0993056ce73c56eb89f9b8261d34995b3fd49eae7b05de19bd217825a139265d2a2e47ad7db1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b271abe41baff85c794da9531d4f905
SHA15f881c574e5dbc4f8aeb71d0b8860b04bd69f769
SHA256a5a159cf5302ae5733619f241b01db04b7086bfe8497c890a7f86596375120d4
SHA512b9f04cf42f618172e78a436aaf6badf3bcf5dc1d6b68540af4c34c33ba4a6c07a84606a90903cc8c0bedf59bc16498ce402f61cedbc12ebf729780e2f2270c7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586193bb1142a73432cde2237e5d7b3d4
SHA1ab53d679ca5cacbab312a3d1a022dba994d454d1
SHA25602fbb91f29cc50e9623b8e55cc34b83fd51eb3a020836955c6d1821c905c7e6d
SHA5127e8fcf660579b166c80a2eb11080d2cb4b82b520e46ad26dfaac30bf7afa39da4f788bc1259bc77535acf5e5ad94456e0aee83ebf3439c7d145985a07a7b409a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ee2a18637462962b5ba4f262c1753ee
SHA11dee061547f100ac4a49a3c331e4e59c6018e2e1
SHA256dab2c60febbcf2e4d3ec2117d1ddf0c6b45a17d37dbb8c8a485a509ac2f9ef2d
SHA5125d88b8c2b0c24c56e3d5ba2c0f2897f927f889c69704819dcf55bbd235ea4ddd4a58474892c9623de5845055e69375523eeed0fe9c1d9c89901466bb526ed26c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526a53004fb77793b46ac0a99e263c417
SHA1373c245b331c63f31064c307da051f31865884fb
SHA256d87cac7a5aa9944eba9a32d25a2b28e88467bb18c4ecc6b0e51f02ccf67cbe62
SHA512de20186c6c5682c055ee8a1855e8e0bba1e10e5aa38b44266c4b3cadb41d2f2ce1924b76ce6bcdd6b13ebeef1ca2868edab219f47fb999c88b9679f08742446a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b