Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
ffd9e9073d4358fefbad7c944db1c511_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffd9e9073d4358fefbad7c944db1c511_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ffd9e9073d4358fefbad7c944db1c511_JaffaCakes118.html
-
Size
461KB
-
MD5
ffd9e9073d4358fefbad7c944db1c511
-
SHA1
a8ff4ef7fe291fcc9f180910982472de5377877e
-
SHA256
af08b167f0ced42612e3878b7acec11fc2bd687fed1edc723cef8cfec4d3e464
-
SHA512
86cc5775e1b1b09e51cdbc5c73c2cfb9fb37eaabfa0dce6fc16f1efd14fa06affb3ff8bae3f8f5252a6671a10df8321e17c33dde5e5686aa8ff9bd9d6bc8cdc6
-
SSDEEP
6144:SEsMYod+X3oI+YzsMYod+X3oI+YVsMYod+X3oI+YLsMYod+X3oI+YQ:p5d+X3V5d+X3r5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AEC14231-7EDA-11EF-9319-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f07dab87e712db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433828185" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000da4035940aadd4f0a4e6918d5762447bae034cb34318510a6ca7db3c3bf170db000000000e8000000002000020000000fe18f99346630f583e9d3822078bf8dcf9328bd3b5a6391e403fdbca8db08c5e2000000006fc9bfa47961cec089cfee2f46bd712f212d33c16da43a950af9cd6c25813174000000072103e78dde563707c7a394d9410f1281aa169981c2b6e16c4ba6a83df5bfaec4d0000281cd72b86d25b16ffccd8da4a23ac3fbc4c65f9cc0e1ab332a1b32c71 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 1392 IEXPLORE.EXE 1392 IEXPLORE.EXE 1392 IEXPLORE.EXE 1392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 1392 2992 iexplore.exe 30 PID 2992 wrote to memory of 1392 2992 iexplore.exe 30 PID 2992 wrote to memory of 1392 2992 iexplore.exe 30 PID 2992 wrote to memory of 1392 2992 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ffd9e9073d4358fefbad7c944db1c511_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b550304d4c866049a8068de7a401e91f
SHA1b1ca13b0c6047432b124742a0ea7e8fa9aa0f9d3
SHA2560cf28d7be05c7d3f3f6c18f8423db8e8b222f3ed521203b03bc0383812f620c9
SHA51224e7929169cbfd66def81aa15cac9e8d51413a59002d17d1f32082ff7014a76c21677e4d8678deddbe760b6f0d86dc38d09c5e3e7e88d502f4f2c1d8adfb966f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a004eee903e5e7534370b7e399a8357
SHA1720bd49d994cde9a5fc8f49e88408b544b8eef14
SHA25656587d31e92fa8150bbc4e0fd9960dea56c31e239cd20d8ec3e702c68014ec3b
SHA512b3dafa4b5e010e688c138dc91c4f117327bc2ad2bab18ebabec2d6f626faa2cfa23ac75f52c8cd8dd0f0b97913afed3a4ca016a3cda5dbfb77b1a828c90d751f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cee20718b732505ab6ec6235841bb890
SHA120f7beabb81101f5f10e7a878bfc10b3e829ceab
SHA25652ad454a804d6ad9ee25fd8d547d3d0dae86e529428c7a184f680e6d649c4a5e
SHA51284033ac00894d9ed14a3bc2e66ba15771e9be24f29168be6c0a3ba2b03ae167116fb9e3490fdc2eede5e3034d5f44e46360cca065e86c6ee04046d396043572f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dee0f8542ac40f9ce203351e1b347a66
SHA197a5d44570bc8cd6616da0979aa550446f92ef9f
SHA2565383387fde2ee38a5b0a77b699afdf38b8fe7e05bb165a68c43106f975cc7e0d
SHA512fa57697d6e5dbb19517d35f9199d47ce4e636a12ad90a7e1a7cd29800116c2d633df88d38e9e6ae84bed6a4c5673efda41239b0cf26c4960082d86030d4922ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b91f1741116f3d716f56e61d362e0fdc
SHA1b313c23a6d3c5a48cc45e48eac5b8dc60a931f0a
SHA2566944d267795905dbdbab4aab545a7930d7a33e3a7ea7c07de32f1242219c991d
SHA512db9a036364d4dbdb85199c3d05b24cdde5da2239ca4100088e3a87acb6815c8fc0dd24a3c68cc9f73c2be2d0fe4cccb5c1bde97218f5391e78bb11cefe08d4f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509d71b2bc20871fe57f42cbd88c9ac00
SHA1abba86fd14c2dc4cfc592787cbe2f6e899b1f636
SHA256f141af286d66335c9d3a6ad2505833e46eeb732efabdbd321d8c9719cf86e677
SHA5123d3b008216cbeb80ad8a8161a014f764f2fc55df26940df7c6a3a1d9042e39f9541a2b1605c4bf2dd30906a56ff5663c6242551d2d3cacf9047ec08fe3468314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e7fc0efb75020a1a0a43cd672f9f37
SHA1b5204839cda285b9456b2cfe7ff6538312b60117
SHA25624d505461e2b3c5838a9e613327b3aef67762f533a1bdad697647e8a9f871b80
SHA5120269f89e57c160efe1777ae3be9a2b942d4a8a305478ac380c57e5f53fb30e860f04b0e783b88c16094f42b7e500e5c49fd8b390f7a2f6460248f39686f700a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52be700214e8e33364ad3d589a445a68e
SHA11241385c951ad497cacc3a1f8843fd0bb3fcb2f8
SHA256076e6a97a9976ce70dfe257c50e0aaadef159e505e237804a4a6847bbec81a8e
SHA5128a7ba394eb5670a52e612bbca30cd7f6fc5bff4f84442aceabb0f3ff5472fe532bc1f43a181f1ebe29d492b056b185afb742fdf1ce99a31c16e47bec2d73eb67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5570bae89ee3b8116e6a734e0858a404d
SHA1d0cd46588372b1ceab99aa67d791f359ff581185
SHA256f05832313ffeb883461f44f3cc22c88da744c9ea102d8870f1a68cfb354e797c
SHA512f82e9bb092606e566bb975edbbbd6ed49d6d38d6c39577478babace9dbf1c2106b0524f0b6075d38837536285c1e44eb3f7d8070ab0b646dda1c7d61e475b8d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56776cf12ded4e173b958ae0d838f7b98
SHA1102669c1e00f66ae0f7bd44df18bb3d2709e97d4
SHA256bf85c776c4b6e9adfeb9b1fa5f0ba82622f947673cba789fdd5eb42ec637ae76
SHA5128fab76981469feddf7d32af3bcfba5a2944a28dcc4ac2321c6c554070a9f1a633ac60cf9f4730e20f8d5082b4864c89a795f015b443e73f031e3af591d98e7ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54812fb69e9997f5e4173d0e398cacc61
SHA153bd94a10064596375f50222781a2429f03b59bb
SHA256ef313f2fb8508fb86ba46180a7ea51c8afd7d92905ba6ba4b668ee36a9542635
SHA51281bc2c4bc2660ae8fa63458410df32c1577d939fbfb6146a2d6e280f7c9241237eeed92421988679c3efcbca6672eaf53834194c3b34e95dc1df05784458ca00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539d28c702aa55062ced1ae74148fd428
SHA1e34a0e1e7c4ecdfdf7ec3cd810d81f5d0ddf3984
SHA256549eb33dc3afa9824e70eb291c651899b7cf5dcb74c1947acf4649840235bf7c
SHA512f825f0aa61c18d676fd6a1f42658b8409a33fd4ce1831e0c2af4bae690900ebf2cf763d7539eceddb4ed528568f35715a543d744a72c3604d9a2fef055d8f2bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b39f0ae97df948abc1f92fa5d0eea80
SHA1cfa3c7c947b78e12218395dff4ff167165add3c5
SHA2569396003b265ec91bff3d4a2bde65ce025b684e3db88b2848a2f43b59f5b497ce
SHA5121456189e85745f8eeb63fc8a0882d351e3a007b80a0bdd138545e1fa828f41098f8d3665035b4514afe50254a195625afeb843f565de96a6d137fe10d289b3d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577017ceb3c34b62d6b6b4cb4ff0d999f
SHA1486e121331b998b8b7b96665ff18b36178f158b0
SHA256186865cc6668b6125aa276caec60d91aa30c1c98eb4b9618535bec4c0b5c2c2b
SHA51220295bb90c0ac25f44a6fc85d7a79f207a4018b0ebdf2391cfde71afb02d6e2532ce0d6ad36ef1180c4235844e5b6075539f294183aa20d8eab46a749f131dd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561ef62b0ee65e7cf4f82a98029749695
SHA107fd800e5f10b1aad9fb1a4d27cd7843dd719b58
SHA256a2508de25deba0d673ee83f139c7d1cf5b488569eaa80aff95f7a6222fdcc1fb
SHA5129b7df6ef89dbcda9db4d5bd79516712858cc379a9ee0a1550a5e7adcbc84e1edc78c6e85dc580ec493fad30750540b2a9fc5addaf4f2af79ca1fa849e1f1c694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee1465d537898098099a26b203b80871
SHA1bfd1a4f5fef71647384737a03df2299fd24b3d3d
SHA2566e1b1a914ed0d074328eaf526747d9126c78c1622b1e5778d4c1523fdfe78158
SHA51299de17da4dfa004c534557169071e13d2896a685b5d9bbb68381b62d2706484599666eee43faf831bd2cac5bf011d08c660cb432dd9f73b3242aff13b199f6f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1ca07a5a92994d1d6112e7dad5e1543
SHA11254edacecffb12eecfb1334ece964cab780e856
SHA2560f37d689999d82b2031044837aae2bd1f5c928e135ee59ad96d765ce0313af34
SHA512212f4941f4c584e1f326eecb4d817965a98cb6de0f35807c0f679542d085e8a77459034276e32e74ad40026a1345036ae675b797e1b87c24dc3019c6c73a13ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bbf8708c07be34a36dd518940cd549c
SHA180c6bdf55407f2f6d2db53359c38289a1acff4b1
SHA256c51d9785131b018425b02cbf3bc8d03af7f35d894f4f5a673c1d42a7fbb56f69
SHA512563b5fbbfabf23ad3fff9400eaba9b3f9ef7d9e907477b147c9f399bc066765c560cb7a37fad433ca9ebd5190de89223227dedb04018d3af83fac65b9cf14459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db532a7be31d91f84adc9a9e36878a0a
SHA1102617f3f2e400dd9e6c3a08b842e1dd774407cf
SHA2565604588f6bf70c5ced6a10479e690c0ac1ad08e2a91435188f67c7fc749c55b1
SHA5125871a0b2864e9d9128b0f3943e83c305f7578476115f7b8de4754957d2865e8dc7dd99ab5d0199633db6cc5082360c754dd329a5073080a49086cebc1237d032
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b