Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
ef8dd4812f50c1cebf180929449c22a0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef8dd4812f50c1cebf180929449c22a0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef8dd4812f50c1cebf180929449c22a0_JaffaCakes118.html
-
Size
460KB
-
MD5
ef8dd4812f50c1cebf180929449c22a0
-
SHA1
a224d9ec70016e5d556e8d1a6d230334b554e3c5
-
SHA256
ca655acc9e6003e088bc1d631cb75f10b6ef551b16247e91e7619ec2ba561578
-
SHA512
a3cee7899793e215682cf17ef85d2dce271f85dcb573cbbe251bfbc5564eedb02e6c624dbd86780766cedb5fea5bddf1bb8132473dc5eba216af8bcacb6b367c
-
SSDEEP
6144:SfsMYod+X3oI+YsDsMYod+X3oI+YNsMYod+X3oI+YLsMYod+X3oI+YQ:45d+X3uX5d+X3P5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433074775" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c072615c0d0cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{824ACCC1-7800-11EF-B984-5A85C185DB3E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000e5fcaec2eda25506dcb02aef5c1a568902aa63b05cb53f9e3404d6bee467c721000000000e8000000002000020000000deeae7a749c91592aed11d1cd4a3fe62d654faf267d44815180a7e84cca0c78b20000000c29b4e24798c2dd9ae04967d2925894aa71fb6e6eaeda52e34c746cf6565fa36400000003291ce02eeb36c728a469b8ab64f8849c2e758c5dc778d6dddd9a3be6093daed3744c8cb65d3c782014493343e8278f30bbe45dbde907bfe5f6be021a96b8387 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 588 IEXPLORE.EXE 588 IEXPLORE.EXE 588 IEXPLORE.EXE 588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 588 2196 iexplore.exe 30 PID 2196 wrote to memory of 588 2196 iexplore.exe 30 PID 2196 wrote to memory of 588 2196 iexplore.exe 30 PID 2196 wrote to memory of 588 2196 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef8dd4812f50c1cebf180929449c22a0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552bb93206e3770aedc853c6119e87dca
SHA1afd135bf795b13d3ef9e952f92f434fe8aa34de4
SHA2563f0b1ac037b9fc6b7d82a9b2be5180bef67bb77e893c9f116c74234a79290c4a
SHA512b35b6776ffc4701c039d43470765254f2b7e2ea3a553afa4e1d93ec6837a712526ec80534d49f358366661b042e0874f798208fb1a84fd199a4e5ade77686f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cb8164a3882412acc7a184fec48ee8f
SHA1b11848605655de390ee2c578e9606228f4df880e
SHA2566f354b2760b26059b01fc67720fd1873705895fa50a4a194061f11872bc59b7b
SHA512803c1ddd1d41fae6e2efe169cbca52d423e4525af00af45b88bdecce55e3648efa03a78ce3660a43903db16b5141d25bea63c773ded06f2e6cfe86910f45f7d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d10411e3181e27ecfdc1d6fdf9ac9d66
SHA178260e9b5d912021735c23897077e9e74c8aa56c
SHA2565a3c3d310c59edf5e58373a5e58030523d22b1461400231ccb16a5ce48959551
SHA5120e43e27d5ee2130e4a571e81dea8fd8c209b94c9bf9b8e162361e7deb66ba27f7c5eb3b27637bb92fe1c0622f97b1df547ea39f57e849ed60d8864e3b0078347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566a617217fa4c2ed51442fe68764e840
SHA1fc96317c51de4369b5c81176e0924673b133d10a
SHA2568fc5e4af4594ee2565bb210bba95d36e1c08dc7048bc01e0b41b3b0a8708bfc5
SHA51243e77a756073ca249ecc8ac2f3c45de1bae7e2d279357b8b35adde4775a61e7c1ff1562de1536408d597f967e80883abc144bd0377457d24c2eef06d1358c6dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f05ccbe8ecdb12704ff9eba510ad196
SHA1d00f29ceb069bd9aa5dcaf853e8b7a8f3bb4814b
SHA256e9d0ee9b6f84c520cc885e9698ff1b9260ea974e4325458fce19661bc0ab27df
SHA512ff172b5f82ba2cf7b8d574ca9e81df9522eb5f585da257131cadb28faadd50c47e4fd2670dfc5979a462983d2cc4630cf3d5b3687b30baed2d2ec246dff365cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bc1b94b323385aab91660594a17f464
SHA1715a26dc3f2d94190929a661dbc7fc30fa58f55e
SHA256ed5319a9ffa23cbee78441b97a78646bad3cd03b346a1c5e266502177c41f7d7
SHA512a37fc375c6e18b6d86c5fe4eecc184f888d76ca275577162f16d39a2b20f796188fcff7f5cde4f64ad1694da8c206e27cfcda81a447c34b0355d6c05305b1263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d32cc2ec2c656791387b846ff3bd18d
SHA1c64ca99f2f170425d6ab36b44c3ae1f1712d486f
SHA25655c4e7f978e42c6c012822c45c84bef0facafc914e7fa46ff31c422d3e781663
SHA512e9a5ad1acec555c6c6228fdc836f10f9750e4edb14f90bd2eef46c7f8d4ee7e573ddbaa6414d5079c20e7cf91727726b567a6b864a1ca8ae8e52f61489816dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8a12b4e31dcb6aca8b6def64a05858a
SHA132270cb5c00ecc6d6404711367bdbec5f2210401
SHA2568512c57907c2b223a8927bac2a254d32fedec5f908f4ee042af1981f43e10f24
SHA51247f5cf3737bfd8ca41abf3ba0cc5937c35c789ba01d9077e871fa2329d0a5d4a86b61caaa63500a490a39aa22d2b98e1101bfd7cbb7047a2fcbbd7dbad8f7bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564caf48899c2fb43a5e66197b2cf3cbf
SHA1de194a8afad6504c5a0b4b5545abc68a35aa404a
SHA256208bd2f4cfe970b3dd51916c291fca690fbbf3f303acc7f012185fadb66d6694
SHA512409cd8f5c9f8d2b77936185789226d2812e48e63afc396759cf533810e2499d215e83ff15330527249c3d0314fe7cbc104ebc0d7d5719ed5016f12540aab5b4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50064d7b60b23485b130b99677be403a1
SHA1d5455066a511b8268e15d3927a41bf3a043f5260
SHA2569b0a0e5e531669f4068fc6de2d279637df804073c6852d85cf44938911838624
SHA51221b1858fb30ea9ead9f5991ee56f6b0a1f7c3a58c605838a0a2b7b52b18f91613fbb626a29001a82f4579feeab6b76e79f6bc325d0e4bbf757b82db1b75223da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0c333970aaf0e942390e767d39464d2
SHA1c8a1f57ec046f077452cb826a6423eb502bebc8d
SHA2564a3d920e6f07361d67df7c9a37513a91c7e5bfcd5752c8a72b586424fd82b4ec
SHA5128aece559af3d4066ce90ef08b783d37fe7a02d3041a3d1b32c5417a59af1fb37cbaa2923523fd9d326d59042b532a212994f63bf128883963bbf3f2d263ec573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576d3c3af7ea5d41f19d3c8bf1a925289
SHA1aa06e50c3698cd521891c52aa1736f5fa50717b9
SHA256837040a15e7d5eb01f70d9067cd7772814033235bc7bcceb5be957c3629f4143
SHA5120abe6736d449fe259a19ac5db1bfa24efa79229e70ccd5578c2f7cdee31675a9226cb0436fb602ccc8935adbf0dc6b16042dc0e7f5cebad1dcc25b81afa14923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a55450ab9b29e26d9d1b04a44997782
SHA16360d3292e5f9114f6cdd9263b7c48a150cd79e2
SHA2563e750eb8484231cc7d993a31e91372b8c5758954c3c86988123ae52fdea12b02
SHA51269be486b725679f92bffd187669eab8aaffda75565b55fd1fedb3a09677130f90a7e310c7dbab59805019873c7bb93370aafa022cd1c0115ebde73aa93045465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b90dd19906f69785d00b484f9287e857
SHA103a88e453090c40a8f4ce9fadc94fe2a7268cd7d
SHA256be648c8479ffee946da8529829aff843c37a7f232ab8b23f2392e3bce6a5cc40
SHA51233d32dfb82fc841a59296ceac52d9e7d5e10746fc3b812039f30e124edca79d1119714e56fd2dc06f336100680ca2b75944effec74728e349cc8113c519de0fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db3704b8d8eec332be20f5730f94b173
SHA1507f5fd8471af25577fc4db9ec02ce82edb829ec
SHA256ea9c435b202c48b24eadd5fc4fc95849495b3a7b9d82fa427c935fa404601c40
SHA512c3f7df6f1e73c8d00ff9d9e278a98f666ee7f4f97d9b4604278af8ff8eab18263c438c14e054fbd62ee777d5ed475c417bdc2c6960984a61ae881612f4f47365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7d6ec580698cc03dd7cd1ea04a95326
SHA176031327755fa84db00cc722a2f91b70d990cb16
SHA2562d4534a7455ce688e6aaa1a55ce469b96e9f769bb745f7b72e0554eb4f8ec1b8
SHA512629dd9ea7344a9fd65d2149be6aef01eb5412162a957629730dd605b63b18aa91acc355a81d48e895214fc462fe9722cc95a34b0d31f588f402508fac6a71632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe52913b60d2e1d998984ccf799022c3
SHA1600adf1c88d2a1b4ef9a6b8df9924e6aca5b0941
SHA2565af28605023100e693d73788bd1588323b29e4b767751725c579cb52046e0c65
SHA5127d74d444165c42e2be0302ca90bd1391109678a820bfc44cc73698e59cfb41ce8b6573641a48452984f73f354ae61ec8e9a728432dfb38fcc58dba053241fcec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553aee7e5a1dffc3a51edf1704ffb2af6
SHA11fe999e88a3962a76c5f0b074a7d350d850c524a
SHA25664c86a9bbeebe526c52289c6a1dffeba8d31443399045906aea3d0c797ef0330
SHA5125e25cda8e528fe14f819d04ff749751f7c1b46430fdf86ff3899d79bbc9543a1c3f9ad8836e44eddac8af84df735293dbe9019a68aba1576db6e1110c949bd32
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b