Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 05:22
Static task
static1
Behavioral task
behavioral1
Sample
dbe2c251265f050d148fcdfabbcc2a60_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbe2c251265f050d148fcdfabbcc2a60_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbe2c251265f050d148fcdfabbcc2a60_JaffaCakes118.html
-
Size
70KB
-
MD5
dbe2c251265f050d148fcdfabbcc2a60
-
SHA1
2433ec3560bd850619c965a4ccd8e899c89c3e4b
-
SHA256
3b2e8f319c20605eafd709a4195ea7d25c7708a92d42225f72a8122372526fd5
-
SHA512
4fe1495b0a8298a1033a13c126556e6d5240320956b11933b3679f245c1e964d3d3b7bbada1fddd22ccb634c0bbc8f106d1b94964e4133bf8618a1f822d96bbf
-
SSDEEP
768:Ji6RgcMD3sI2PDD/M0gyOn3YfvnaBoT2tgwCZkoTyMdtbBnfBgN8/lboiGhcRfQv:JxqZYfvn/T8uen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432280416" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301a49d5d304db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000007b514c447be34f0fbf940553014c351487274948a84e5330d6e7c5eb5099fc11000000000e8000000002000020000000d30e7930393a1f89a4c9c32f57cea11e8316b20403fe04af56a0a72395d2b8fa20000000357d3f96cbbfc7d74776fd0697f86b49bda532806503194c3398ef2f21d67c5140000000eb9f2773137be6ae3fb0d898b231bd5e8112f69a14eb5cc0b19ed45c088a3ff16baded6bd63372d81938c1225b13b618c08502879f092b5202c49f75afc3cd50 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{00955C31-70C7-11EF-8632-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2728 iexplore.exe 2728 iexplore.exe 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2608 2728 iexplore.exe 30 PID 2728 wrote to memory of 2608 2728 iexplore.exe 30 PID 2728 wrote to memory of 2608 2728 iexplore.exe 30 PID 2728 wrote to memory of 2608 2728 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dbe2c251265f050d148fcdfabbcc2a60_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcac321ccf73fb6a702b7c7550581ddb
SHA11c6844bd8b2e662622f240d5e03cfa48066c34ba
SHA25647ab3ad65b24ec6f2f0764e0def8d6e7f4e5d32fe8bac11e9e9b5fb30d60c161
SHA51217e9dd82a767e7684a7fec129efc1dcb076d690cd5de8a827ae58631e5e38c3a4dd991b42eae778fe03726dbd8d76e0bd7b15c79a5f213a7e590dd483e193b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a418d5d7a2fef89d35100df9b6db7250
SHA152af54515ebbaba6f09e1621e19feee440ac891b
SHA256884c721cb4bc5a8640e8f60e5e5c582a2695ccc72f6996cffc8a9b376c69aa8b
SHA5127c511298ef4c6d188724c9bf7c0193178a415210a50535ca8af5f6bd4df8511067b58405acda0c0b1a85c375f462cb6c7112a98b5a55b3a576fb731e773fa08f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b68b09ae861eb9fa7a07d34f34d826e
SHA1c291b2bb03a866ece104eddb19dbe06e66b5a731
SHA2565910af4b798310e7037e36adf6248e1f6e5427313610fbf420ae7aaf8d42e16f
SHA512b7f02e678938a1af4479b56d3c28729aeb6523dbd105af1ec13416a6d4f792041187ee77844eb506cea651929463a71c68ad7ce0842ccadb35af927e01a78207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cab24e2b7b8e9c90e76c2e34a5cacb41
SHA18212effa9e254f23428ee9952457eda77707a407
SHA2565ba1c7b97571c287a01350b816bcfc5b5b8fac4c6141b9abd1a1397962a424fa
SHA5121aa060a278c606f710796ffa9aac9f9ae9555b4cdf2a2e56d7ca394218d13eb0b1823d6a06b4bda9f9f6e249f17c2c40eaf8c0a1bfad8a156c5bee3be8e3f11b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5bf9e13e32db5300cc3a2ac3aef8129
SHA1509f7ad99e3dd38853e361962fb39a4c15108368
SHA256ebc8295d94ea1748b7288761cb4a292ddab31c01369bcd0b68356125a77e70cc
SHA5124385b0045659103310c4f47310eac932ed5235935b8f8b89d6668b631a7b3acae3353af06396dbdeb93accd4b8ce2806b7f6a1fc94f4eb9d2e0e0bb6906c012b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0822e786b6d304ac47021811a5f0f15
SHA151f975c6f2450f16528eb566161047266f743118
SHA2563774b6fd2e44ebd18edfdf1bb3a99dcc02faff177adc1da4e2eb7492f8e65962
SHA512f1e63fe54c89521dc55bccbf1ed22bda5baf8d95215fa099f617c35f10abe982e91e6f32ae665e2e2e93d52190ee2e1c42c5172d07f35297fab14421317650ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514863131ebe719dea323ad56735495f7
SHA1bd04e261abc1266aeddd075381c16d3168185944
SHA2561299d8b1d9882a4bc97b1ef3c42dd3e3ed92865cf16b4224b8a76808a05477fc
SHA512285ccb79ac427a972a180afbb4bbac22a6d8f9a28b82e437174c99612d4dc016f2a713781bf6577284b3849ac0a9e5c5f14df8fcec4d6b9a1741cbf853190987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b00703c03e9eb9f900944c13a8e0f2d5
SHA1d74dafbe5a621812c148405311b7465e399bd495
SHA256011c713a63319ef6c2f87aeb10a2543053967b08a9b2116cf209011fee191d02
SHA512cceda72a19d1fb2a96946df201ab72726b5cadd26087207e6a4e22353c45e0fa35be9c9aff57610493eec2a974416b4621d72847a4181658c087efe83350f69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5607f53cdb309e3172c84d37fe99616ce
SHA1ab8558db535fbfe82b05d9705aece214726d5043
SHA256e9daf2097d22f7326394ddc22dcc0725f2a7a54cf0cc504383595fd7af369ffb
SHA5128b5a3218b5a6df55c8f715e40dd7604d0dbccdd78a1fb6c72b9329778eb20d9eb433417b7b47ce2b621816015c6ba5324124bd63f48bde620f32e363bea398fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d32508ec4df896f46e1bef1f4d56fd6
SHA18c60dcf4923cdd87447d24b01cc628bf40d4445d
SHA256178a85c4268d9d37e506cf09800efae5afa27aef2937ba0bbb8fd1e984c4f48b
SHA512395d009f4bb9b7d6943d106104a6064a801cacbe08af58e32b942d2ac0eb39f5c818bca361eeb907a623df1e19cd0eb8646c51a4e751ef947851717d3a8d92f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe64e8246200d1e94b43bf385cb591e1
SHA18aeecf41e1f72544de991c575c8edd94ba7e1afe
SHA256f29bf4b506955c52b53bf767c1f5ba750af1add98523169c21735d2a8d1178fb
SHA512a9f72e5bdde8d881b778576e7a5f467e06f1fe7179d7046943e898bb6630a63bb17d99d339c5db617eb0b06fd6c7248df6c6918f952c22deab475d6fe2d1e932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aebdaac5fa478e5e969da9fe38b3875f
SHA115e54e2c187c437ba5678a25a121ed3c90452973
SHA256f49a114d11bbf175740f3e3860bec9913d386f67a3c2c85e471134ed36919b70
SHA512f20406f5b00f4b1487fcb3f8a5855684aeec1122026bb51215ca234a3aa3618f84d0e8fceb49da32f94aaf95ea382724b6903f14835f49c0ac0f8703cf018a1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0d45d3a50f911dfef94b56bbb6290c8
SHA11f5233e894fc8353c1daf2cbbe6ea7cd5466ddd0
SHA256ea8701967854b7f15813f6e8f82d5403087a70370a2922d3e47d1a3d1eb4c730
SHA51265b72ed2b5664fa10efc7cf624250a631f06cb1a38de4beae4acb8df0678f6f43dbfceb6631ae1a7238b8e951b07fcef4a787935fcf81da576857bd099f0f572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa71a46acf2de3250ca2a1f0bd7515c6
SHA17ab302ed30b13271fff7ae62507c963e25c548c3
SHA2568cc0618786f9c942a7cbb770ff6e935ac23659e2e84209d6ccad047d5f976d5f
SHA5125d2be4075e739644ab33537d812a8b911285ad96172f2ab83680aebe491ccc38370ba0b91426fab2c0ce6ddb2d97db1ed9a4a9b6a2a09f558a6bec8261be448f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b8399772d5872711e8b9a94dbfa1c93
SHA1ba65db42130dd4f76227e3932075fd8ba76b3b6f
SHA256aaa88c1450cc4c3cee63263d09db5d040218d8be3c9b7496016a2691d2811446
SHA512afb9a8051ef3d3b3e7bb405a3c58b9ef5de20d33cb30c93144b403ef4def1de37d3d1d6766efad18350526fc789a2baec4c30bf03dd191106755758e27ba60aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578d3b1c41e1a5c7f22a692c0ef7917a1
SHA15f6b45c6c0ee61fb443ac42c87b4795ded9a1e14
SHA2565c2f8997d9df2954a8b3db8b9593f5425a3ce2a2a0f3c529e01645721d73e589
SHA512f23061e8b63ae3ed38117024545e77828dabbcdbdd7e967d00c28b9bac83459e21c816f693981665b64e62625cf401e0e491ab473f98f3dbfb2a7df82d620f45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e8bccaf00d23ce05882d7c7ef1b5a78
SHA1a615befae531af62b6b9adb80b49342a6b42ed75
SHA256b22a9b30dd086b1f52646b860081da803ffc29838b2e9d8c2b5bbd2cb290e7de
SHA5121e0a7c79a1c9006e79b8804a4099adf485c49cee9948729597797b382cf8ade15e51f2542c4c24b0c931862a71f9527e6b430a181ab5c4308d25ecf4993dd849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529fb5a4b59f179a13fda7a13253359da
SHA1926d2084c620057083ba526ed039926864c85ccc
SHA256502d5510cf3ea992ecc41384ea5d2255e6d73357f1204367eaa54e53d0268fe0
SHA512445227129d302edb6a1cd2dc2abfd96c2b6f7bc6519b90e602d88b5ae0a248f937bf741968a953796759070622d57ef448a906ba11e8f1a898242ae7bcc5b952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5534904d9c5d3829caa165cd6f0303095
SHA1ef7e4489c269fedb0c51d64cd747ff8ffed4b7d1
SHA256ef53b892527f0bd25d75fb954aaa509433f7beffef02fa0ee2afa1517c4c4a65
SHA51251ba64d739e427ba8ab63507b70ee6b3520dec373ed44f8263ceafa6dd04229300425c5bda9c7b867360c8f6f2279d9d0dc0ebd0d6cfad93ae00b4d693735897
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b