Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
db0b8cf327a6bc42c7c04f904fe789d8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db0b8cf327a6bc42c7c04f904fe789d8_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
db0b8cf327a6bc42c7c04f904fe789d8_JaffaCakes118.html
-
Size
16KB
-
MD5
db0b8cf327a6bc42c7c04f904fe789d8
-
SHA1
2b9c41b263e907791ab636f87eedcb41128dda22
-
SHA256
4385eceafe26cc79afd73634620599999d8613c3a8119d3175c4f2728216a529
-
SHA512
cdeb245871dd44bfa39866820a7302b74d2fc492dd7118a46b133fae26b413cd118d98efe4a424db8397b16e6eb3768d12507eb9c9d5734970c8b07ac0de54f9
-
SSDEEP
384:5crjdoN0/end6Dp3+eZTOVHG/zsuUXAJWK6MSpOFN:t02d60eSHGobAJJ6MSpgN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40d61e247f04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432243987" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E0E1441-7072-11EF-BA28-E699F793024F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000804dd6c1edd151c67a5025f90f94c3f60295d2d0cefb211a14b09634f0a98910000000000e8000000002000020000000b2636c3c1cd3e5ff4dd607f37a6aef393c2d8fe091f4da29154e0084f88fbf82200000002c46cca52d2255d1af31148feb78be5aa27d89d28fc81e7af6b791d920e4c5d040000000224f2615617826fc8de0dab1b436b7f5e7cf82820644615d0f803ba1523a66f1daed543b9b195b8074c0f373a660324e8a2629e34ac8e8058eab52da23b270c5 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2316 2532 iexplore.exe 30 PID 2532 wrote to memory of 2316 2532 iexplore.exe 30 PID 2532 wrote to memory of 2316 2532 iexplore.exe 30 PID 2532 wrote to memory of 2316 2532 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db0b8cf327a6bc42c7c04f904fe789d8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d8466d7f4efc4a93cf5479c504b5557
SHA135b03510c8e622626f48f1dcc871056388f2201e
SHA256aa031c13c37b39faefd35de2e2290c860e2ebb4808da76980c1cb6bda2215b70
SHA51223c0bc6080e9a99715248c6af1a3a5927b96448e55cc94bd3a53f6678d642cfbce1a47eecde3072c728f941129662d18edf220f58075476fc3cb43675c19a41c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fafbf3308990f4d153c594effbcec09f
SHA126080b8e2d673ca04e47090308b63ea7d7ecb989
SHA2567d01eafd40404e826031ae50366b0427da3f7f3cf4823665a566bee4b851c645
SHA512451275911beaaa72af298d68dc5be32c53083fd3cfc33d2836277552e8db0f6fd93de00e689733b89aff6ac7df698f8efb36d7ffdb6b2d4450a2bc89a6bd68bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be6efe547658bc3f260290f4335194f0
SHA1c26504c594393e17cf5d99c447ace45cbf30c096
SHA256a0b54020c9b9dfb17be43e38b96244e0c954cb3cc8c8faa09c774a20c1217122
SHA5125953ed05bdb5b14d28d54016f29177d003072af715e48163499d346f07a089a1dcb1406e799ffccbaa21f6998af9f18c6203459a4b0e09a2dede213b2534aed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d977d7334bf99de96356b9b01876d7b
SHA19ddd33f44488c2b475ee405b9104ea5b70230bef
SHA2569a1055dc200190390cdef57c7523c3267c7be8bdd452927f34db87a48032edfd
SHA512d97606e360dc97174beb43e504d278112e1cac4a7282e7940d4a97d3b8f04c634c5c26da10d6333d78b84e750a6b3853b3b2793292fd6dd0d7f1f4e4a8215d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c96713d7bab8d3de14813ccfabcfb30a
SHA1184532bfd33d437d7c5d89b7847df718d72b2e5f
SHA2564189916db0350dc1015f28b7e8fcf3aff46e83af53041f5cd951a9d9b5cc1b11
SHA51221785c185fefd18902572de7e21eff5b2fdf54233bbb6b58c77da81eb9bbe2fb5ca1ba97d4420c7b9f13ff1dffa5ad5aaf241dc7807a420c51cfafa5d7511042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f92bf54ad70ee9b0274e3bf22c86f623
SHA1818e4eebb53e54dbb4db3bc6521f0bdcf8d498b7
SHA2569558c0f03d5f6aa055b9e1ae068ecc5a335c8463e41f281f6d1cc78af2db6dfb
SHA5123578374fbffb884988bfda6eeefca6dea62b85b58a3f95fdd689baedeb7987f6cb4a6d32327a103104fa5b0a02abe1e2751f82022b2036f59f2765566a89094d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc60d175a9e42a4e65b42be05580ee62
SHA1b6b37260843900b8964f35a6567fb96fd1bb3a0c
SHA256bda1368eca8e5c74a8e5a1cdbbc1425fd9ed8e7042e4e0c95788991489dacdf5
SHA512fec29e51a7a26c0e01b0a19519d458f34be138d9886d1343217168fa8c402fa06bb624e0288e2b2baa3056545d67ac0eb33c003aad09d55292268f7a72390fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa7a161c7f1219ee6573f6fcd6d55e78
SHA1c456a0a37dd8ac39fdb7bc399fc3582c8fdf6708
SHA25619c2eb57e272f30b3c0ef2fc94f4929c0f8ded037fe82af3ba49aa8dd77a350d
SHA512c6bf9a2fe4c4763f7cf3fe5c0400fc4f2463c44f66bbf87f5656ea83076f805f304bbc989d5fcc7deba48b58804b8c18294133707dbfef813051fdbd0a39c735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0788103f1083293ced14302027a1211
SHA16b5b316f8788598a6f1a2a84d2174b3acffdaf69
SHA25621b26bcef6666d7c458de4c254a93a3781674b9af17ada344f042a7ab7fd498d
SHA51220d7968f3b69117c0009dac01b9e43dd8452e583d796bf3642afac4e4e2d5521e7db4c23a20e3483810e3c9b49e30cf782e68c13bd5b55909b3d6e7dd103e73a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c954393cf3189fe3858eb0a713d34801
SHA1f0581a9333652b04f4ec26168ff9955acf7ca186
SHA256d4efd15c386b1eb50458f6294972d3dd4db1482b3119ab0a7bd45c6e17f1adfa
SHA512d450361e50cd9c3ab98c3a865609bcfa1711a768d2a9ee6114812fa3600554f13b38d9d5f6e88f6622d656ef6020a2c5054142928e5343d70a6418cb475ce059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500fa370c3f2aeb9309a9abb277f90037
SHA17c930d30d53e6e62721ba8efd1f6f1f55cea25e3
SHA2566b67bd74d71f6a96858d0cd142d0de7413921a30f974b2c12ca2e793eb2678ed
SHA512e8f4549c67fec9bb830be372979e063240887877d5f6c77f92e9145d1a48bd9307e89345ccdccc007230b672d5e927adb43c112686f9de63489ef0cfeca68aef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e061ba0ed9f12cbf512c486dc4573bbe
SHA183214dd0e9a8f43445ede7e506104f3d3b440144
SHA25611e4e0b004c0401508c923d1d4ca0f917c404da2832b5c5ca63bebc5c5716fe5
SHA512bc9b4f24f62e52c73e356d01f9da885debec7036eba84d1d78a45c789ee15a17467978f0a8f70e0ce46c9afc35472aaa6e1b9b35fbfa47c4604850498341c64c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcd8d028398340625f2170649eb7be99
SHA122252b16ba35f5140aaee0cba8533d622f94758b
SHA2566b5d72030365ff206181404d24d73a61519f178d4e13a16ef2adb40843c8708b
SHA51254e4a821beba5c8186ad246f6a0aa07e4b466dd643526382ac8c1d93e2a14049f05df821eabf67e964589c90caa9aa034a00dabe6b3205f46447295b87e4739d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c9dc6d8dd0bbc14152528225401addc
SHA1f93a32de8ac1c656c1cd89d2e5c734eeeb3f64e7
SHA25602b3dd12815998d2a523213b140750190f1a3d4364ac6e6ff860795c3c14cad9
SHA512c960a570daaa61275ce6240419a1962939b07bd11cb51c3b90896f1eceebd183928c9e21853a26b25fc4d35f01c95d6eb9c4b51512aa2e89f6b33784cbf9d9a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a41dd0b825cd1348ec6e125b21360097
SHA1c7fca0aa168e5b68525edf7d1bc872c524124821
SHA256a02bdf5e4a1aa88bfcdbf8dee068e569eab2329ec2f8d16b00d0880044bdc94f
SHA51257128cfa37c1a84a5084c7e1582e14dc5356b07cd1473167eccb1545eaa93b7691a3d0442d03ec4708e0fa8bdc540d8aa381ae7f0c62fd67dd48b78ff864a7f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f51dcfe141c10ed1d11031bcd3a44fcb
SHA1d961ccb2894e8754adffdc9fe35ed85214ac1397
SHA25616263753025bc59b58af8fa96e0bc53f5c24cd56ce5f121af9b18f27ccf158e4
SHA512c10e1c443ab1abb19c54851e23c365bda51304d5bafc2e690debdb23e178f679b326341fadb817852133d401b475d81bd360085fbaae5a89d35c7cd1859d1c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3e77726c34025391a2f3ebca20932bd
SHA10faddff0dc9ab77a84e1131f3e8e4a8bbc70373d
SHA256fb4507e0c5744e3b75b2685bd5c4153c03c1d7e83ca731e0d73d9f4a38154b17
SHA512c8638763364ccc3caac964078a6a82f8009ffe1907a3d8ae33497a6b9f801c147d87842a88aeeec1524bc0974cf2fc2a02846b48736a4bbe14fd183d97afebe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563138ab86818fae0c6c5c7ac899c5c0e
SHA1036bd4c667a0f5b27fb7bfe090d4a86b065bd8bd
SHA2566d74504546e403aba902f10abbce2801ebdfc81d9c3f2124dbf2b5d55b70e603
SHA5122efcd22dcd2070e48b45377d8e4f6e19769b793906cad8d171dc8623685fd15a09c112822bca2f264d71851f91ef74d40dbd637c5748bb8fcc9c14fbb506e95a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55737a6d9b8f58ca131f597588f7aef70
SHA1ecdc81fab19b6344b48fd530f65eae2d6afa7552
SHA2569df259aae01178e1024fad59aeac302cbb1e2c77f06e87a3164650f63ef76a82
SHA51258b4821556d08dfa50d0eb4ebb5d5094b5b58ac784eb7a90fb636e6a6687449bcfb624e8e02e3dbfaa6ffe8063b03ca492c455097939529cccf420cb064c7c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d46a53ee124157f2111d981f8b8d6baa
SHA1d07f48162754b69deb985b5d82d00e97a857f806
SHA2561dac4c3d8e1668dbe4bafcb3a8518ae5b5098067813a12c0a0e2de247f499ce0
SHA512955d2a86b764b2293673b6d57bf260d7bbdb05262816afb39f6801f4cff4dcccf33ddbf16d12e25659f97098b744282a944837e626de42ffa2ed8c9410ae861f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b