Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 15:21
Static task
static1
Behavioral task
behavioral1
Sample
daa42daaaccf2a7772a1cf80fb0b1b93_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
daa42daaaccf2a7772a1cf80fb0b1b93_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
daa42daaaccf2a7772a1cf80fb0b1b93_JaffaCakes118.html
-
Size
47KB
-
MD5
daa42daaaccf2a7772a1cf80fb0b1b93
-
SHA1
f7bf6135aa28df73b51c9cd0d16a9590d6d44c69
-
SHA256
d5165424f70ed7f97a51925d14c71a5e3a46f034b3b0d92c353c9adacd8273a7
-
SHA512
4bb40ad34a8ee498accd5bbec4a946d120cc45cc27d8617de8e4283dde1823e2bea12c95bdc9f0a8eec8acd26428127a0287166b734e4395e34b059b49e1c09c
-
SSDEEP
384:J2NcCt0TnYam6bsFYejFE3tHa/4Rf8KVzb04JAIBCCEaWFLnI9PttUmvxEfvMdV9:xVEYpepE3tHaYkwAYE2Mm1B
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E130BB1-7051-11EF-A7B5-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432229948" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000fbe4c56bf2aa3b6276ee7086c2b37266b57239cfcf4bdffa188c73d677bb64fc000000000e8000000002000020000000cd77e3c6be57793ec2a85d740bce8217dd291266251a1f0cec719aa4b393b76a200000008cf8b805db029b6b3e76b681194c443fde7ef225e428ff6413c1bcb5ec5728f94000000042240a80653ebb1dabe342efbfe643aaea6984f470a2ac1aca7aa0081fb7f94f84bb2d5416721393e8339b350ba971e35f631db173f893af67e9f1a824561214 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10d7406b5e04db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1992 iexplore.exe 1992 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2092 1992 iexplore.exe 30 PID 1992 wrote to memory of 2092 1992 iexplore.exe 30 PID 1992 wrote to memory of 2092 1992 iexplore.exe 30 PID 1992 wrote to memory of 2092 1992 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\daa42daaaccf2a7772a1cf80fb0b1b93_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea6f695b31a27644badb1cbe06fc483c
SHA13d2e3922acbecf433e596a5a3380e65909f40d70
SHA256a147cc67c3b17902cb8b7d98f9fcb56ec33f5a7fe40d7ea255291192b25eb7d9
SHA5128c41bb7640e8d636f7b37120afc1c71c3c669a984dfd7f1e59a6a843b8c2491ac42dbc9b04e37e448e6e6782dfd98012848070506c8df41c03b147fcade35849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cffb1d5f172b26abbcbbb29d726740de
SHA1759e9636cf5a37dd31e1f2d532d5eb513bfac0be
SHA2562000bad5c50a7120762456d0516a0a3e9625de1478d2a190dc2030ca20ccef9b
SHA512f0a3558061946a6ac4777073b7e7f4561069c132bc606527776913da241190436ea16b6a8bd206e46a2a4db83709e43d2760fa8849c84272f43d6702ffc2f77d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a43ad18e33a475566404eca514e4a4
SHA1f958c2eaf3c294118478fa8168312d3aa5e7b9f7
SHA2568de9eb41be38b664300240cdf014e6f04a0d748ea9b7f9326c2a02589b3bef3d
SHA5125c88088c1b06eaa91d9aaccd68893972258fc28ece205f1eeeac7fd51bbff4569e803780573b515ed878d4218a418f5f911fddd030f01baa42ad2dbfccbeb3b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebf6c305481eab8f60f429cd47f21002
SHA15ed5841ed521e4eb12bb0a588e01820a0028d115
SHA256b83b60c36c617f4fba55c312e61adcd16fdea99bc314af02f95c588a9dfb8a46
SHA512a1a964731677cccdf2812213a9036fe26f6ac016f0f56c4f89b9acd6c8881d5db94abef50736d0743cda6e749917c913cbcbacc9198d0158efcf4d7e6d262071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d750aa3da9288d5cf069452d0e849004
SHA1dd67a555f7c34062353cc39363f8b104a6a281d0
SHA2567cb2cf3cda157fb7fc67ae61a76d4f65e51396401f7595dcf06006ba120155a8
SHA512be5c68d1400ec5d45118ce9d5dfc6a973476efb7f2f42047ac6d4cfb34e16a7679637e1da8f7ed03a15b20ccc3e4876576c5dae476e7b4686aeb6348e658c9e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2f3e3d9999b530c6669f09fa4c09abc
SHA1f08d3db23c36e2d2d5ef6949e0bd56bb2a5e1ec3
SHA256baaa837c6ae170bc53f399059b80820ef986580b262615722d934a408cd6b294
SHA5122875df9a3088dd6429b58a47a1b0def671f9f29e216cf46ae9fe8f3a0b60d6e1249953ca48c78834527315ad16d7b3aa0f9a17ed44bb1d656995c2c43ee13cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539d6b0039a0a4b95e5a33ce805c985d7
SHA1e24e9a54a1e9492c6f560d0dd419636b1d033be9
SHA256c2aab3948217bb541586a3856b6f1a6fb9782ae835dfa5a5a9b9eb11e64aed7b
SHA5129564ae4b0d752f70633ca3d4caae406940a8dfedfa2bbe0bb9e5af3c1fdcfb60ee07027f50dd2abe0c34c17845efdf186ced852a271da46545770fd06a64f3c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55258be1318ce2f53ffb91a752caef55a
SHA1a19d2746ad0e312a777065f484fe728673e91948
SHA256ac52fbdf8a5dd40c4f113541f13628f7c003dc705edbb32317baf10d5988e02c
SHA512c84a4d94f65756faf6078f30c87c54f6a998ad15079706f7896b41f47799f98fb20c6e73a2a04c808f3b0163be892c2ffaf39141f6e7ad45e1c00dcf2333e33c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56faf8843babe7186370f2b2e8f082c02
SHA1410b3b2654f44435dac1a12cbd7fb25c580b7591
SHA2563b273cb304d903c5f7d4fcb2db65f10f1582908bbc6d64fcfea94beca569f2ba
SHA512a9ff72cad42f0703ee751249c16fc533b6d5e52daf6da67bb224738e4e2c7324fce21e7765a9695572053fbf1ebb7b4d394bf7422382daf80bb14ddf2e81f1bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ecbd82ba908af457ce9b72c3ed5b4c5
SHA1ecbd00d48e2b19c3de38876925c8647663defb2d
SHA256f72cbb08fbf482428b99ef10677f947868fddc176378c0dd5b30479cf5b7c6cc
SHA5120e7892d20b2c556d82c6253f1eaee02956a3b5fb29f7562b3173ee16d20454d46bd4137d85390127b81bc29ddc46a2ffdbff09d6e8a11b43919962ab3b3fb946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51de02dac13b4e2c433e0a0669250fc9c
SHA163e8f32fed69c2727d93ea562477b32d3ea64e79
SHA2564e28e4bdd861f10092140d47fce83f7c02d2986ae8021321c071e0d939c68256
SHA5126878de0c23775350bfe6a855e9c14154d653047f94878d9772f1f4d6a392835073b37e3b7c1d86598bb2e3b153f6188dbbecd5e1455230a42c8d502142adffaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528322c4d6e8c06c779e49457905d0962
SHA1377c36c529a13e77c6659e6b39c60690719af768
SHA2568d689ea32a1751cba7dcc94f0e0279ad70cee9415c4dc23ea38358e89ec511bb
SHA51295e5dd40ad799d63214f4cbbeb38fb74b72867ff7432a87945a8cb43b145a352535f2d909eace555f7d73bc8ec402dc1c3c3a37a5cc4d145efb56cf2dff48177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a4ef86279da1ffea3318194a4bbae01
SHA13cad47ccee92c9fb24a073f5e98f7500386f9904
SHA256d70e150f6c767821367e83c37541f7e9d3eac7ec2b88f14e9c313bd56c6607a6
SHA5125a58770b093d0cfabf5235b932c4e68b8c52d1f9c0a1bcc4da31e39eb6720aea1acc24766c6d93ac7d13268be6c406388f76dc2f3d24e519b3ea2391a091b037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5515a1abdb598853c0ae73fd8a286a786
SHA14a11022c9733cee371cef493b43f9777a15cc93c
SHA2560d938f442c5b4b9ba8d03d2ac15e1ab9cc0fcffdcd5d3d6cb8e24ac86cc6f1c5
SHA51294fc22969ef63f3cc5f4d9dd7625a1e6e5a668552b107c7ba91283d930ccac82ba7587f25cc4c31ba983c2a0407d9b4d168f75c7ae9537dfecf74c5540e58015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed9d6b69a33a51fce53d3891b0553f0e
SHA1b150b5a2b1634766d51881917812fd3bcc3d1606
SHA2565a0051b19ce0b306e7a8d960ee2303874f92ecf5177f5c1a9d23aef9a2df0f8e
SHA5122b64d35d05032466b3d78fcaea28e340beac5a30f7c5e7fc763bf32b6c5ce9781f18042fcbcde07aa189a9d167c0333e2fad11ef89a3975d3eb22e3742ad6631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee413f2d5609a183af6191652f13cdd8
SHA143bee7dbfb128ac095f8436ac4e2db7332d55e00
SHA256a97005de6b73b0d3bb71b8b98cd13dd642398976b2fe05e4ca8e9c3541e7eed5
SHA512f6c21251f46d3406dbc54b1e8ecf30f448b0ee94807bcec1940d1dff7274d870d2e293a852be77dbf2105516cc74c815eed2970f13e3ea764a71ec1df6a4b556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f63bc83302a6c862bd6880db045063d5
SHA134ab2bc884110ea5250bf8da3a5660e21ccbbedb
SHA256b3fbe3d01da0016b1f3478163eb17928ce52c3a92b8d8dd263cc6910918a2106
SHA512911e411367f93e2821fa8d85642377149e6651fbec70e1b3aed8fcee5456a13b3eedd8b06d65d97cc6800caad3b474f3117eda695bb4b5c6b78d4e71cd6494fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca9451ed0dff0341a27f18b16bb30f05
SHA13c732aa2cd67cf3814c32af91e142aedc76d8bca
SHA2569ce1e0c963f1cde7d10bea418103a91ee456b599705a96e46f58f541f3f872a1
SHA512b6dd405b9113f76d97d2faf44d0834f02ba9a7e20c2aca2b37c42e9a0f3b3b1f6d9e886f0c2e87a6bc2de989716f1e69d9504e2c307575c274c27e45f3743c3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b170b009cba1fdd919ed4412feb82a81
SHA192c491cd896facfe93d41c3a8cf3a97c24c11e9c
SHA256144f274c669d7136c02f9c43c5fa15b99ae0f7ec1c57e90cb29559bf53c7377e
SHA512e9c270791d8f996ac243ddc1e9fd8b082946a7964a8e28a3a7a36cd91642757f6fb83e1ab62d32f31345cec7f49547167c4a58f2bfed51d43befb797ba8c0566
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b