Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 10:21
Static task
static1
Behavioral task
behavioral1
Sample
dffe81f472c60e9beaa7b3b532cf2145_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dffe81f472c60e9beaa7b3b532cf2145_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
dffe81f472c60e9beaa7b3b532cf2145_JaffaCakes118.html
-
Size
57KB
-
MD5
dffe81f472c60e9beaa7b3b532cf2145
-
SHA1
227b34087a0de11c2908562532452795942d5e0a
-
SHA256
96bdfeb47f36c978d90890eea51c370feac80e1613611b2a5d45ba45e9d88b87
-
SHA512
9b07a13ea5d038046319542bf54a1fdb8764f07310590e3219178c3fbb579314866b4d2944dbbcc3f9917d29c11f172aca8fbb8eb51f0e86d18b0dae11129f19
-
SSDEEP
1536:gQZBCCOdi0IxCOpXRf0fVflfOfQfYfefvfofFfgfufHf7fCfjfxfOf5fPfxfkfle:gk2w0IxbsNN2Yg2XQNYWvDKrpWBn5sde
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{195100E1-7283-11EF-94A5-465533733A50} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000004a863704fbb2825181e9dd76693f3578748ae6b3ece1f6e8c75d85b166487c84000000000e8000000002000020000000d05a9d69cfa19060fc03746cd4c076b06b69e038d5c29c3ae86b7b8631cb428b20000000416e599f5e79ab33692e15abf2cb51489cf3ea0530c7bda741d90e9efc3ce7cb40000000228ac851d6d73bf2f8aa9142992ef37a403387fc6386c4d8376f3e8c6871676b49a9d1d474d1f41f894ea3cbaef1899da865d86caec4a8f7a3278ae8f221fd1c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432471153" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f7e5ee8f06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2968 iexplore.exe 2968 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2144 2968 iexplore.exe 30 PID 2968 wrote to memory of 2144 2968 iexplore.exe 30 PID 2968 wrote to memory of 2144 2968 iexplore.exe 30 PID 2968 wrote to memory of 2144 2968 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dffe81f472c60e9beaa7b3b532cf2145_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8d97f841c21eec8c235c78e1e689bab
SHA1b9ceaaf3c37279854020ef80ad278ad30c0aefbd
SHA256602443bf24f73aad582be6483ed54785c08b1ff1f6100b5d3f10ee2feca00472
SHA51217a8883275069c340ad86d10ac4eb28a0699b58344ad6f6065aacab942412f60a82e0be71e44137e401c0322b49378a67d75e0ed8967b342706625bdabef0854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6670fac0fc643af29ee67c15353cc85
SHA1751d0e7fbf37d4e07b5763f30a94640241e40f36
SHA2560fb1f587a39c8b7180b9f24a94395eaccea7aeb952da3e669362b75a6b30c080
SHA5124c7723a68785dc2abb94c8eeec30a415be8dfac7528d76e0ecbc75f08ec376a5662b90e3088542166596a9eb63302358c6960cef38493767573075d6bae6f866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c15751caf7d0a0f6d0a403587073c833
SHA12841a53f18b527c8890038b6691916080f9921c0
SHA256a50ce44b56a3db797e2e26d0edafa46141a7c41c68d917b2d267672998b40d99
SHA512cce4379c67663613a297ee3d3c17c9c4bc57347f5f0d596da2157111645a319b4a4689d140b33f15c6cbd699bfa516a87f010013256ec97a80b4e8cd83755a68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad59a8d483410ef449a8bd05df70021b
SHA108de89fe9781029720118cfd4115105ea2709fcd
SHA2563afbcdb8acb9b16a8bf6cc644205849db5356593a1aca48e2f23f4d9304da7d9
SHA5125ad1ad188f9e9aef1cf5f10c7cdc1be7fc34953c5746a952ad319e60aaa406c10a92e1e26bb22472153981aa9b974bab1009564bc4ef8bca5a110c6abd7cb304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5250b6744446e7dee59cef097e189d1e4
SHA12805fcea625fe9edf333b856bc70ce5d05c81780
SHA256e304856a402de1dcbca6d0510d2ab84b759feadaf6d7e17a62af4e47e0a065e3
SHA512782630c450e572b50ed7025bdb81ddc0e43cc4883440358092035dc6ecc9694ece4ca1548743893861e0dc10f528dfd3a82f7359097fa38786b5b41bbccc3c28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9236a99cb55436f0bba6a50cfa41e4c
SHA134e7189002cb9c076517eedd5d5dc09402aa37e0
SHA25688d97da3075e1d072d81303670ff8123ae67abe8d2799d659002359eddb118ea
SHA51233bfd0a855037a131131e45bd426de25d1c5596da9819d63fdd881ded31c87bd25cd03d1a0ffb74becb7735fd34d902399412fcbd23f63fc6cf48e10a42b9e2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb62a44b7df80a8dc4d172de259eafd1
SHA1472cd0248d06514b1df886f8ba47a27c6d7a0a86
SHA2563eedb0b40a10cc71f5112f3dd1c7d8f781ab9a36fe9572789c03f6302a9cc8af
SHA512790a811898957ede07133b1d3b3761f0ac7ed8e7b8b3300e498ee4367acfe048fa6321d662bf893136c52131a8ad789a3243653b4a30539000ffd2a13cedefac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d73ab71d4132c7e6009a44fa0550c94
SHA1a8f1ca5faab5a2573163cc0223ef3ebba8d22557
SHA2560c925bd3ae4942ddcecd4bd9edde2d00866dc71dd8896189fc81f77e2564da64
SHA512ce845dd381055fb843122e8244e4132b51a7823723944a21ed511bbee3a841e022c350d00014c0652e1496d25f818b36bfe3d3215023c53440117a5027c9d7f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0ff9dcccdbe075e495eea2921f9b9d0
SHA13cf41007aea1f3f6d73e4ce934ad16c6a6346f55
SHA2562e5f4ffa40a7146922a1f6290d4b0ca2c80430fbf15b6ca009252aca85ff5be1
SHA51254aca4641ef0f8c81dcb1c4bef1bfa0ac87cf4fb1487a45f1bcec648a7b4c435fac5ae758803d6477ec3417cfbb4e3379f142d00225c4778cb32502892c6bd25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de62041b71ef763bdab3cb8e6ff1758c
SHA121f7a5788dca3c7f3156784e7a275cfa4fea0189
SHA256b06c13034ff14aabce8b615cb1ab20c2b1e60d127dab09f0877747d0fe1d48c1
SHA512c697bb5bd544eb3c6885247691a31dca9ec6184c15cd3a84ca75c34289c13303fcce130adc2381fffb1388dda662c450ce7eac76772736a280e5ad5d613b0cf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56787a1413fd54d8fa8bfd1aa9edc1a70
SHA161a36573bb1a0f0190c3a7827f6b37bf87227034
SHA256699f277a9fa0a8afad6847ef6b98f1abbea8f482fc1ee08f68cf009937a9d33c
SHA512e61dea53412da15520ff54a69ecd91f26c3775d684c0120b391814d8f3fb8c704fa09d295880361dc08ec4eb7cd5adc61b57796081eb7afb4608ed5bac357f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e5549bfbd38586a6194b01237d8161e
SHA119128217b51af670a49f8ae3f319002a2c1e30ef
SHA256bfc5b083aa394e9becb9bcf5d3de92797f2f66eee875ef4c3cb56acf44aa0244
SHA5128297b19abdf039462e590b2808246e20300bbc50bc9232e610c10484afbd276cc96e1c70cfeaaa36c902d0119983bb771cd0b3534ab13ef5b909985bf99fb763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ab76771cd16a1839fd7824b2e8f7719
SHA137375e5cd6c8f7f35ab4b10461bbb4a05ac7e94b
SHA25660a450a04e17d9a4a61d531b29d8a914c85afb3e5abff287d335dea9401f2fb7
SHA512ae1896270c97c05e8da47808853d087b694ba276ebadac958bf3850524cbb5958a0123b856fe79bf70b49ed2a3a91269d7f3c4f143a9998d2eb197d03887ed47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a70000ec5ad28686966bd67e1b70c841
SHA12c049361f48784aaebfb35500a7673fea42fe77a
SHA25634535ee32d2246e1c4f05fbe6390c0c971ad63257559106e76e710ea43eb0179
SHA5121471d97196aa60afb3058a33ee910c60b4dda2253b1ba64651f67137ee6f37725643f62afa36b4d51902d905bff21ba35f252fa6c8d39991c325ff5ef2e9d935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faca1577775befa45f1f7f6b0dcde7a0
SHA17037d331677f5416c548c998213b8d38cf92e96b
SHA256da0f3c4acf4d5866132ae8466399c5043a4090160847e242ae0d9f44f6398b3d
SHA51270c8362f2529f0ec75a5188a340c98890227405a98b088ce7522835783874d8fcda9a94c9d21b307cc0de63e4e8caeae73d2c4b62698dbdaded6d6694fdd2e01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d7cc5282fcc1dfd7133bacd25b36020
SHA1a05d6ec57b992349477f1d45a628581d310dff2e
SHA256144429ef687ed3b5a32559a82d34e188f1a0e5ef93ff99883f4b87e262118b7c
SHA5121dcae09830606ef41ee682180d096ee6aea807c0bade4942efd4ad8917e9c0190a2967e94ea8c13c83f048a4deab76662a669f977234af615407fa3a677a27f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c9dfa5a74739ba65f24f533f5d6726f
SHA1208a9bf82e328c41596145b84c92dc3320a38736
SHA2568b81c3b1c1842e2eb5531c46f42024ef041459694f4d46b08a5a6996fa5d1582
SHA51237ebb4a1a466a8b5a5f49c23674475312b410e272fa941a2f69ebaf2b038ed22d66526a5fae1a4db0dcb1ccf2d230d88cbd4fe814dcc922a6a06cf9fe1edcfb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5005890185504f38268cfeb20ee720790
SHA1f01c88ee11672fe8a98c701a6dc2389dec93f899
SHA2560e3c4da01079b87a74ca92ddeaf0283640bcd3cafbb3d8a12fd0da22cc5ae517
SHA512a7ea9bba5d4ac94d62dc083701e73f8518d1e35bc5e478183d8c39e928f53210c2ac4c42115d19071975585333e3c927136ce280081826ab82102c429daa9ae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8701c168bc24aa973bc4fa204f82ebc
SHA110dba5b4ff4031f599ad6c17c85a15289ad00cae
SHA2564806d4d5dbc2653040c1f8b4e35dae9cde972563e084dfce276c0708d484d59f
SHA5125e041e7b35140d899eb346becdfa679137553587a7e73c7045cffe2ce20a90348548ad6bbb1119a942dbffcb0679e4936654fce6e2534dd125b3991980cda096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5623a3960f82aa69fdfca60397f5b1352
SHA1358978744a09ac5a7263d616509346ab32bd8e09
SHA2566c482b7c9b5ac0dadaa4e7ead8558dc9b8dd1f4605ad4edd9a2f61be1678ae85
SHA512773c3187c571228da1e4a2f969b2605cea6c9fff72fbd411795a51c9c7115b231963e8a29cd6166bcf4d02aa24c359f0bb153d0b818c78124f546a7d2a47f9d9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b