Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
db09495b8ff80f17ed149c2b3c8e07d5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db09495b8ff80f17ed149c2b3c8e07d5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db09495b8ff80f17ed149c2b3c8e07d5_JaffaCakes118.html
-
Size
84KB
-
MD5
db09495b8ff80f17ed149c2b3c8e07d5
-
SHA1
2d28beb9039dec01a09111d33c7b8c36b302d711
-
SHA256
30fa2c9910b971ef47f75f377aec2b12a908b2529f86990d03466381703ab30f
-
SHA512
209b818cce5b33af04ce5047eb25b238078e8cd94ed0bce8f4260c4e9555a2524584ff3b3a3eab1bd51262e7e7aa5449eb026e391f5c7b1533ed0488d145c51e
-
SSDEEP
1536:9R12AcZ7GLCP31vpGVY01zSaABS55j9mf6gfMqxJXIfC8JwUGtQzCgfrSUXAfntG:cAcZ7dP31BGVY01zSaABS55j9mft3jIv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000006eaea0e6f00f974fcb39349c162c8780764ff2b6936595cb0484b415956c3d12000000000e800000000200002000000072c56d50d87c272004235abdf976c2e27e954373466b094d16d452fd1853aa3c2000000028f353422014bd860c7ef638b10fd25f6f9cccd12e898c70e1937f7891bbe1e040000000b625dfccb92b58966c83f8e5ed861bde9b98ee37e4852c106d6f009fca5bc5949933cdeddcafdf70f5729cda32a870deb89420b5a7109a5b50edf91990d5b500 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432243557" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E601981-7071-11EF-A8AB-EA7747D117E6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8049ef057e04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2988 iexplore.exe 2988 iexplore.exe 1368 IEXPLORE.EXE 1368 IEXPLORE.EXE 1368 IEXPLORE.EXE 1368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 1368 2988 iexplore.exe 30 PID 2988 wrote to memory of 1368 2988 iexplore.exe 30 PID 2988 wrote to memory of 1368 2988 iexplore.exe 30 PID 2988 wrote to memory of 1368 2988 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db09495b8ff80f17ed149c2b3c8e07d5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57057751c50ad6402a698c5a760d18af2
SHA1e980ec8b80e13b21fb3961ba61af344614b06871
SHA256f6a58b8e05081156f97da90ac165761b5fb4264615e4bd2832c52e996c50e258
SHA51229dffbc66ababe55078fa33c8755a3f90cd8d65d976ec4caea6c886fce3546d3e64bfa0b7693ea00cfa634e5fb6f6f13bdf6928c033660b2470f667f672301e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c51d3398f6708b5e4cf3d8a9cac27aaf
SHA19f2725470f313d352260844d8460efa70dd3e095
SHA256dfec97f8b168a6ab146ae1bf91c42e64b282b9c1b17100266f8a120970ad5123
SHA5127ff75dc8f3bb7defb24cf0c3dc2642c22ee8f1ea9a1fb42804d8aa9a8a749e0b07cf6208cd38441a9a0866c90b43e9d2de904e58948e62ce1b3858cbaabd6322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583db3014f665bf766101d01c743182d9
SHA15447e88b6437b484f7276f43ec76247ae5f2a7d0
SHA256afee0492638157b9f37d8d30e05f937873023be73ea4f5c77aa0a960f9fef706
SHA512d0545791bdfd4da7838a546ee8d3b28b910710e0833e2a2069f32e3a26d899828ee49ed013c7557a1c412b778f60435a4a988ecfad747f88b08645903c05cb29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af4732a5342acf854598821fa67d4dc7
SHA18e627f0299bc1accce979f3a3d8a7df753287b5e
SHA2561e0a9b0bf7c1605cfa6dc1dc67dcf97bcc3b834c1a1af4b8810104c6a5353c56
SHA512fffe436cc7b97faf5d72151210ee58e15eecec6c0c2c3fc54d28a414bc04fe6cad5c367812487ff3f6dd7de3356a58b00c5736a63263aee2bc7f4a1ce0c16e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fd202a0475f9773dca525abf7b98b1e
SHA14775ed26388c41701bc3ff37d5a1c4eaa0abcf72
SHA2564285aedb47b8da53cb291b7dbdc6f4341873029b37a692350231852ae147b050
SHA512a7c5dd61f9f4c6ef35dbda960dbbb27f6c5b9176b35fd036b1f4fa488a4d5a496d32f898c1e9ecb2e0d20515837d569f6808f421f271619113e4925f590c36eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fb6a8010675fdd27d3ec5f12e8c84da
SHA12a5857c93c7fb23a657812ffbcfaa758a1816842
SHA2560ee1fd7c92a7b77a83915490e30a9556a9bd4b00a2775a28335a85735c4a604d
SHA5126e8f454540a5c65a056e50a880b861e1e5ed25d50e2345cbf972bea1595649cf4f27d02bb7ba2ea9966669e4a39d08c559bec437fecad0736cbe87fff8b5edf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b47220d31fbeaec78aa13c81f80bfc4
SHA10be1fd377801b82aec1e9e25574b9037df4e6f7c
SHA256f57664b76b750b62e39ef48dfd67da253337097892654009fefd51e3d0ac5613
SHA5126cd15825e963bac4cf3925acc197a558498669845320d15620bc65c8abd095e37fdee38ff4d5aec7ba23e2a35718b4f73d6e606eb0eba10d2156dd709fe6ebf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fa700498bb03ac90ac795208b022093
SHA12485cea97b2efec18c1d3971f052a5b9b5308e3c
SHA25642085f7fd6ce33dfe5ad1d8bf992d90a89613adf9cc2ad5eb77049f57036cc39
SHA512d928fc312717837974de3b82f465a69198d87e560de00ff0450db03bb6eb284c4b804a32eabaa9b44ce94d63fab790dce05fbb92d7b0bf364b95aa03927ea9f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed5df1bb3eca499718f0076b2d44d49e
SHA1ce91bfc71f8915e699871b5b3071655088b09941
SHA2564fa9686a38b747ecea820df493d99e4f7066f922bed0279b9da108432e1d748b
SHA512d820c95386c1168c710f43feef5e97c0fae3111c95f34eb2b44cf9215044f2e9edbe0f33d3f6d15dee7b1843d0fb523b0788bef9a1a92b91b730d531877235ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e91532679a756d0950217f62cf352dc0
SHA19bd862daf82f101e41f04aa43a97cf61c2195584
SHA256d40cd37e0c028ea88a48e1b25f41107ad9dcba6c80708735ffc78c0f834656f6
SHA5126fd09c8c1f1516b4a168bed2eba51eb1b3a865545a82bbf57141751c39ca9a214a22cd4e37311b57cef140c539bba27035db786857afacfbe8cd2f99b3a5072d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d7b26651a1c825086e1f49387674785
SHA17737e1392e24a1dad3bf681236b334ade5015d58
SHA256384be0672382e4926b3bc226ab7d196390b8fa67a097b63e4fde7f7b85e4d32e
SHA5124600135697ca98d1265bfc0bd0f427c8586a6c802ee81f51b9999323a10252e969f68f5cd33ddc35751d8a1e6acbc199b14ff2f821a157152e7187abd45a94de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550b011efb30fa172c9932612095585c8
SHA1299a480e0b00a9fa01ba6a57e5774fff5c510367
SHA256a0c5abbb814ca168c851b3e6c413bac396f0c42b4f6738a700db73766566321d
SHA51201366e363900a9486993e7c0d4c2b788130a8d4fd7d98c7eda1a3f68ad3797ae9f24ee34c4e235ff8cda57bb4cc687704ab2d62dae6e72c7efc78d37e93d0f81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9bd0c90c3f686e50f6c50183c41b6d3
SHA192f568cee19108df8f3d4aee8249a6aae4f4258e
SHA25612374f758792980e4ce4c0387e83e6327797736faa0533359c868f2e71ac91fa
SHA512b3af4bab798925f7b39cf2da238ea113a49810dcf52e6feab54f3cf0a95b8f51627e8fb8749dcc794589d20b8a0c79dbec01dd500fdd535247a741d6bb4d3ead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a356f23edab8b57a65dc8c344ad579e
SHA102dd39d8db5f31d20261067c2719534087a2c7a1
SHA256c55eff2e9e2f83a29639b4e24c2ab93f65474587d6d71b961cf4ea3847b4aa8c
SHA512c4de8ddd95f700e9729f994e41a0f61d281b116475e51ced30b9cee81be659240209b4253687d9b4545a43e9a0d3b7f6436b5f5358d0409c6cc19248993f90b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d23195fc440fcba9deb13a823ab9572
SHA14edb8fc20cc541a8a356f57953fe651601ae5e3c
SHA2562f4753aebc7aac4a8a12c3a2da64e7b99c116be7ddc683d730c90a1207fd8644
SHA512de31722560f9137f92a2f82b43114eff401eeb98337e6318b6180cffc3d865bf59ff85008170d29bf4522aa33b9d0815113481233b0032b66b15a1b702af4266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560989c4d5f8b9cd6de50e020262488d5
SHA19ce0556ce3a9a6494044fc23eff2d34a136547e4
SHA256052609941ace703dc46903655969c6ddf93fb19f7ca0a146290f30a81d36f7bb
SHA51210536e9442b98361072f96dc66153650de5889925575afe835d52ad2ecc0d5d0327d45a64ccbcbb3d494afa8218badcecc540574e13c3f7230ac4eecb936d6ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b275f0697bad5e63c11b3ed4d58dfff6
SHA17cea0ad43a4c132a91ab55bd0cb2caf9e87774e4
SHA256d1de0e7fb5a5489a9a380272997106f90c61cba636d785a4c71e1532d3137535
SHA5123610b106385aaf0f7a566a30920ae26b78ce386391ce9a1662a807202b1ea1fcd10650df1d4289bc363165863795c3f6bcee4b38efe5d1ab52b6775fa60775e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5769cf50b57f177d58ae35249118f943a
SHA16ec0b06ea559fa87cae8dc46054d87836b2e07eb
SHA256ceff6bcca32394f262ca845a9b96799219a13e9f7d7f5aa3e9784fd076b51080
SHA512037d47cb9a17e5047de0cc751fc88e44c929e2b17771dd04bfe4dd26fc4950aaa8cc7c8ab7eccaa00222e495d68880a6017d80ae2cddd97b48a27a46a758e24d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55234427f3099d3a376df1381227a848f
SHA16095e6aea3d385913f8486bdac4135faf2ae3726
SHA256d5969efd4314545654c791239aa01805f0599332e08a1352a0153c475bc2b590
SHA5124cd596e38b4b8eb32206eda53304664d57a53a7c8ade438a09ed40eda86f75a6673165bb2124b51cbf0add75eca77a83267005fcf948e63c98dee0482be0f650
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b