Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 12:33
Static task
static1
Behavioral task
behavioral1
Sample
f606908d1f2b35aa2a6901e7fa6f58f4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f606908d1f2b35aa2a6901e7fa6f58f4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f606908d1f2b35aa2a6901e7fa6f58f4_JaffaCakes118.html
-
Size
461KB
-
MD5
f606908d1f2b35aa2a6901e7fa6f58f4
-
SHA1
56c3a9d7dded31e5b99eae8ebf8884ffecb9e53f
-
SHA256
28b5e641d5fb123a0a8c3ec7eb216187fd9bb90436473785a306aafacee32007
-
SHA512
ff93d8311bcee85b2977696bb011d09becb7e0deff38f821abbcd9b0ff93006137415bd94dc3ac5d3c107ec0bad6fc1a1a85b2c7a27bc9a59443f862c34c9394
-
SSDEEP
6144:S5sMYod+X3oI+YaQHQTsMYod+X3oI+YEsMYod+X3oI+YLsMYod+X3oI+YQ:i5d+X3u5d+X305d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000075af2bb3ab24dc7eea229a3c19c193aef752dfadc4c1d5fb2d7000918fdb340f000000000e80000000020000200000009c8a473fadb804e95ae0e24722bc4e9875387715831b04b797c62887bdf70cfc20000000351500644b60f6f75c6e2b9f3882eee92ec2507000ae6ae26fe047ed7cd2d39b400000007c96f121c40cf3bbc00726e720a9c237f2366730a6256492f947439bd03f9b8d3fa21c5ec634602d58ed99ad52c3bce3bcd3bf33370585a3ad4fe74b4094a2d9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80dc9241470fdb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433429494" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6917AE71-7B3A-11EF-9F7F-EAF82BEC9AF0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2812 2372 iexplore.exe 30 PID 2372 wrote to memory of 2812 2372 iexplore.exe 30 PID 2372 wrote to memory of 2812 2372 iexplore.exe 30 PID 2372 wrote to memory of 2812 2372 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f606908d1f2b35aa2a6901e7fa6f58f4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541b016e23f470944aa3c8642e68cb233
SHA142332d97863998d394673095663f9384d55a866c
SHA256477eb85fb7be916bc92293c2e4b334a20773ec8cdb5efbee3c048b4f258dcaf8
SHA5121553fa9f3a14c893af0f132567b802491d589883e29d048fe304df8cfb6136c020bedfeba721538fbf02a5a25a067f2c15950f4d8f3191ba3082d788bd968269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5809cd07dd36d3fd12aaf9a86aae3df43
SHA14233460b2b96a03e3c11f1104025a9a87b448172
SHA256ff410bb23ef8c57fcc7a9d573829b9e4a97197e575f9b726fc5a49376f543385
SHA5127bce142d8bf06c85d8b10bda155ab805301b45396777a55f81cffca7fefdb8ce15824f3d858ebb67befbbcb4b556f0f2a5ed69153fc18b863b5e5e277a3423c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2631723bd91fdc58fa3173241609e81
SHA11818fd42fa9feb5ef7ceabb5c3a056bb50ec2f0b
SHA256e9b71f1ceef90971a2018b7c6fb1cfa0de1c7a04dda7f2605065299277a4ab5a
SHA5120f320f502335276b5096a6a33a8a3a50abef46bd443d0f930f939961e0528f1f4d09789e853e4a532ba39f06e2af0d1975c4ddc9c1008ad19d6e5d8153849558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544b704f99c1578c077f44aa5a0fa1d66
SHA1d3d40e3aaa1ac95e1db86c26c7234a78ef7cae80
SHA25661c1ddece40b7533e1fbe6e9c37331ccd070b08eaf3202b49753fe209a1eece3
SHA51248cd46d386150e76180c88e3e8d21a2ebae317ef978b057be6a6ee3e168bc836821736aa9a8f6c359f332bec8d79cb9dbb82d094af414fd1a5a1a9f9f2245c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50357ed85daa89036e4ef3e6cd9f3140c
SHA1ecb6085ab6246156a48e3cad6f708ecb6388fe93
SHA25646114b202c69996f75ef0d563a2a176b6b6f72a75e58d41893ae2607843fe1bd
SHA5123eafef32f3a424ed98bb3d6f6a4fa61eea40423dfdd305a536c06b288b3f37852368b050293f5f2178e75ea86c6517042392df7fe37787e72411215d13a806a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1bb0f49efd821856c32a83d4fc3f8b5
SHA1ed37df6d6157a286c9a6fe59abe4492538b00d39
SHA25633a5389f5a3fdfc97969ec9fbf57360864bca7f0d129945aa2ad500fb4544fce
SHA512bb28eb06217d78d027714b9d03b7f89807e6651dfedea2add38e5f0c2370fa2eb69b1a2a3649bdbfcbef5ae87caaeff4569f1cac4bb23c168eeb2bdb91c4b970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505767fbd6bc3f311adec6329d11cd714
SHA1720c666c8e2ada3c8ed280960f4bf1bf4e1317cf
SHA256c80ad339ef99b65ef32c9c08a63671ddb63a6fe1fbc610ffd09e27bbd828bd04
SHA51266da8c3c52a8153efc2c98c19508dbef94157c224dbde97fedbb59ee9df868388167943807c1ba25f5e1eaf8aaa1c297989061f40db4f1097b395a01364528d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b23fc99968d377a586d1637c258a2ac7
SHA14589ef2b416590ab39c59393779a86887ed7a68e
SHA256a314f99b84e8a318e12637b65cb1ee3eb5960f020aaba07123706324d5c511df
SHA5123b8ff7146371ec2657dad54087ca069e7b1bf2fa6a8d213a202393548eb6659025b73f67324317d08e34f2a1db1fea186416268fa1b132b31ed44735897eb9d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591f81c60ff99aa07ae664e4a32c85119
SHA165ba05e1e5b10a50cbd9f68d426fc15e1a4da6b6
SHA256ceec7747f248ea3c60c7c711290d5037b7dafb7d7620b3bad8f747b21be71b84
SHA5122022bbba4e8105ff26e0e753f1d4e448c41a9674e15287fc5204f54dd8b10ed2e1a6244043b66109bcd4ab6e0f64e6cb638f7bfaa0fb40e8c9c5e186d1ed6dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552fb8f38119f096dbd7a2742fe32480b
SHA13c2f53915a6cd62f721bab173859ece18229dbca
SHA256869e9d12114211359379e713ae69352c969c98c7412acb4d8a58414a4111d93e
SHA512f261142239039efef7efef3d9822ae6d692fc374aafcffbfcccaecb760fe22546a5a2027ec21971f997e005ea1b6156dbc75b87762fd9803c98ab1fba94bc4ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4f63d3d2b8ae1759c76ab11f4281fa6
SHA14cfa715c7364f8cf007d91a15bcd7bb948109833
SHA256736664a9c2cc676fe468b64230c4c1349d98e0e93cedd4bf67524067ac1c0c41
SHA512bd5dca5e25b041613c29023c8e7d9c232228674ca92fe8fdaa255200005ab54799cc8cab02c9c4e33f7dacef82589ada917d1e77b6cf8e78bae694826fda92cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529fafac6519346dd94ecdd6a6b65b8ca
SHA1bf9f5abaa1c29caaa56d672277b076f2992248a3
SHA256099bec647544971ab61d861dcfe19e552b025151b5f7a6c939398aa4ecd542d0
SHA51257158e91e2b6cb31f3d5a75f3d8c5b91a1e235c9ec7ad8065d00017276544e61dfd35fa08d50bb18e99a7c59b07c7c9de265257ea48b6fde8cfadb3a356ae840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df70dd3ad01b241160955f71732a354e
SHA18672f20a8e090ddc8ce9a568e9d569d46be82ecd
SHA256c0ee1c20aa18e2228a7f420fc77ec3c7841fe732bf9780450f858915e43612cc
SHA5129b4a533b4e92e2464cf92f50efe893a04088cd2ee96f3a660aff81016a0084ccc16259fdef3a93af8c90a6f38893dd2fb80daac188acac084e513e3b93d98729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b73ece285935d7dbfdcebc9aa1c2e68a
SHA13622a5385774e158e05570bee636de91616a3f60
SHA256489fd25b302779461b4f4da2410e4f48a898164dc05ec0490e750b51d5a62529
SHA512b7d8f83111d047ace9317f7d519cc3d42523035e7df163ef7d7b3405106ba301d4a54f06b14a2c7e7e07181efaf997729ba6b719b35b4e567ab68d6760d6cdac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b83345fe6952b424786b157f8f872315
SHA112028d4102c544593a04a7b07367dd8d41433ede
SHA25661c9854b986325921733707e7c73b0c080b1b629765828a2ccf1aca8d44b13ff
SHA512a4c98ba0ca1dd86c34d5b8781fe31d90d90e9de47ffbf19097668e8263dda2bfb6029fd06fb7088f359994065f019bc7d2f3e0bd872abb5e3063ee05965ab916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5213fc2085865405939cac03138277cbe
SHA1b3e8d036c16d0378633237477d0a114e65bdf3b6
SHA256a3fbcb84c99246cd5f1f7fbd7cdb51b47b84d7b81ec6e3e609ad0976a27ba382
SHA512e6eaa61ca944b4f599c5ce71cc69db12b3cf48de770bc4b0b688b606228358226638151506ab23be2ad6a68a6aad0b1b03a0b7e4015af47ac864c4bba151d517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bc1aba4db4d31d0f756fbb1e581c45d
SHA176633e7a00989a08ae2680836c5254606f264d5b
SHA256b086ae74db05bdcc3682f0cd7da5695fc9b7e7d2ab4ad179d374cb2f2c290c99
SHA51261b9c4eeeea7b045421a8d53f5b4e765801e0d67b54f6755e15b7f1311d0a02050da20fd4f1861503a9f416daedaf7d72e925c295f8ec068743657b352376b8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd1c0c52fdb39a73ca4c60e260ad9d4a
SHA12401a4a5538f7ab717f27a30af3bd39a4e687ffb
SHA25613a5e6003c38f45eb96bb2c179635e04babdeae7927aa6192145ebee7240aae2
SHA512fd1b376d3a8e530e3db000258352278f5876149b5981bf60692777a25f45c8f3a48aac69d5dc5d17a5e4b4045d8ce2d2f2852de1189a145cff3fb7230215d840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef00dd02cabe7179635e8b17128c4970
SHA11577dbfc9169354787b0b98e268fb4f59f1fed3b
SHA2561fed4281cf871b243e45d2f3f6a9fd029906b1b9b8cc1a7b503bd79dc4507355
SHA512fd27ac87e141b143c7dc2ebca25977ebba61a6061af8481e5dd177ebb18b8b094387c55c52cc5e598ce435f97f6a0722ac76413aad8885176a0da56b11be3c5e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b