Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 19:20
Static task
static1
Behavioral task
behavioral1
Sample
02e7da9694c9dc08fdb50d341cb5a5c4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02e7da9694c9dc08fdb50d341cb5a5c4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
02e7da9694c9dc08fdb50d341cb5a5c4_JaffaCakes118.html
-
Size
34KB
-
MD5
02e7da9694c9dc08fdb50d341cb5a5c4
-
SHA1
7afadf808a9096a4b8c4b4e140cbd8c440373638
-
SHA256
b7d2ec78e97e69b085cfe66646a53302ecac3bd31ee0141c6407f9d46a170501
-
SHA512
327c0db4687d4ee6371324acdb9e1a5896be8d9b543dc2bf958b2f07c739e8198442a5b6f06a8cb2731bb3561c7c031adf656279e98fb044e9eee1e2cd56ccf7
-
SSDEEP
768:b1KNPw8rqoHqK2sNYNXNtNON0NBNEN2NLNsNUNQjgN6xLZ:b1KNPw8rqoHqK2sNYNXNtNON0NBNEN2W
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{16CCBB31-7F61-11EF-856C-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433885912" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d04072196e13db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000adb134db41b4603a3bf448da6b3e0448223384ce404b1aff57e89beef7b7834b000000000e8000000002000020000000d6989a31ab6fa7a03bebee35a6aa692a88340df2e578b299c6020a263f7b4452200000006217995f6cb5b36059a369b34bca244d4b134fce9878de87638977f6ec14a1b840000000f066a6334e4a0bf61d5397156579b173fa264b8a5af05feba2006cbeb412f72c2c6d95c9e22d21b9092e97b1d14f5fc4a2f786cfa2e2dc6b455fedb1fb1a964e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1092 iexplore.exe 1092 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1092 wrote to memory of 2556 1092 iexplore.exe 30 PID 1092 wrote to memory of 2556 1092 iexplore.exe 30 PID 1092 wrote to memory of 2556 1092 iexplore.exe 30 PID 1092 wrote to memory of 2556 1092 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\02e7da9694c9dc08fdb50d341cb5a5c4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1092 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a41c7268469b6f78e8cfdbd14bec50a3
SHA1dd3229f5c2a9c0916db2dce7392a2b948c97a12b
SHA256c907b63e983543577f981c760405997046719278c794b82491d960b6497c4ea8
SHA512886d962fde530b122f3593d33894506ae85546945adfeb11b5291981c4a8514591b1fb1f041479f3df294fcb6231451d393e4346ca00880b69f779c28c75acf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594b48bb381ef0c1cfce1dd676a59966c
SHA1292082545cbe04c010400b50692fb93bf92b7ac7
SHA2562b8b5dadcd7a373b3341d50af51b936949efdd016f80f3a4015dae84a3367c22
SHA5125450f28c6954defa72439a81bd6c9f1a50b9b8c2be8d912c91e554001116b7ddbccce88737777edaa64126458fde25cefeb38e7acf4b8f8b08ca3bddbaec5bcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6ec30b1033168fa18aa14830f8a04d0
SHA197dabf6f280ffad74df1129e552a707e57d1ed32
SHA2566d00411cd1994cc175d29900963b51bb5ef3eb721977a287fc733cf0c90ac135
SHA5121a34d3cb9f198e708b067f65310aa9101b4cafe26d7a06cb8dfd14a02a29ae9f23314930829c0a6657be0b6b96fc8d93b41d53d188b59e56bc31c5284c19eb8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fad1fd465654028eec562fb7374e09d8
SHA1d8e8a8c1bd2be0c682924cbb4fa87b665bd555d3
SHA256ae016d8f0d642945bf53c1722c1e12dd112fdfbb592ce2ae3bad94c41511287f
SHA512a501597f2ca2a727412fed0fc8bbeecf7cbf38480236de1664eb23610c17d339d4d48076ee5b0a720567525acb2634ae944faf5020dce09190fe4b1559672126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567bd4dffc087185dd407fbd077969d0a
SHA18153be69a6b5f27f61a383709287fedafd344cf4
SHA256386076045a821c518f6ad285334c19a3b6dc667bbd57f7b0bacfc98a10fb98a3
SHA512c1bc1e7cdfd6b8bb027819eee07d381b014ca6bbb62dde872ce67fd63ff460a1d7b0963d771462b8a1327008f70bc663f723b72b5fbdabf597288a9ef95a6157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e13450b01191392c141bf0c5a1a7717b
SHA108fb3f978e32739e9530f3817855458d52e059d7
SHA25656e83b806de4989182142ecb435c49962763de6ead193bbb313f4f25b2da495f
SHA51285b3226326e92cba30630032ffaa7106e027952da20020f508c009178a483039db6ca8e443e002b00b37f9f99f1ef2485500efd24ab3fd8f998d58b32f7d19e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abac1e96c7dbc80b388d22dc4807dea6
SHA125045586b8ea2c840b8a25b47f390fddf7e35ce9
SHA256f5b50c5c4b7ae010c1bed982c20154dfb940079bdba9f006c37fe5562daf1179
SHA512963d0f3335941609bc73ce0c1d4f8acebe19b868b29338e3a414b32e287bbc284988711a9de350de67b94990e71a40319f5a75dff166e469da2a4f7a55a0a1e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e31c4758b215eb4a792f64d7ff4976b
SHA17e7f9898da167141e92810f0f24779c759f89336
SHA256c08b3f6b23682dd58f4c106935d8fe33f15888b68fe268445ea4f9d2fd72bdb9
SHA51265778727af4769be16b4dc91709cb9deec7bd8ad1e12c092d99bb096a977e9b0e53f17fd7e047c1c866a0a9f4007a99a325b0ee74958e8ffdf6689f144c4e59b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db5cf52d863f4fae7d051f07cd8e764f
SHA1b9d944cbcff75abb3bcf52397d9bfb51ec75fcc0
SHA25665a3c6b98b84c16d06373f1c7a73f73531920c1d9b7209f260933ef9f4efc893
SHA512d1f6fd0a1cfcf05d6d764f9ae4745c54078fb64fad0f46c630b9fa0af91de38ecce1ff9a3e68d275c34600c9dbfffcfac3c85ab7d691ffecef211ae226747a55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d7114b828024ed6ade90323636eb83c
SHA1acbc5f297450a5303e4d16c2011ae7300d85ae89
SHA25643353dddf9ab37b705e7607bcc7c3491e24db84e41bc8297e1a660bb6d4cf3ba
SHA5129950380cb4d9a95cdb66d266ca87b6d6e271e71cc51dfa570a89cc9095f7cdef9269f91fdde0814dde527163f7fdeb67af89166e2c225a9ebc0bd89123c4b6e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd4686e5c44c18be53e6c22593baecdc
SHA1acacfddda9f9ba1c4551c8132633beef73aa5510
SHA256b0e6d984ed6921d62813df86eec1a75c0e3253d284844f605ccc9990b626aced
SHA5121e739c61d559561b63d4c50ddadbefa8407968563923f7a16142938511d1d3635b8d860e240c6ae0529fb417745ec7cbcb3ccc7e3f156997585e7d7344ddcc41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e713696d68092caa7cd87160e352c84
SHA13a89dd9240753e95964733934db5e800b373721a
SHA256827a150d38ac1a3f2be9efc61af96f0543013a9e644c2b0aec551be7570152f7
SHA512f6034e724f85edbc0d06f218c47b45aa5a966f7ea2f5d385d5a24619623e13fcbb166a04e06d58848c8015ddb74ba481d836f02330653f39452150a42fd1901c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b5281bb2ebc4826a8fc57669093969b
SHA145973535b57bc7ff2af663e3dccd73c74c317785
SHA256d0e6811cc8785ee5758e29f710f6d06b46d8c61be8be69287dc3c35008787ef4
SHA512bf430d557acdb116801220421178deef199bd163a16e3b661d5423ed3759e09fa8965cc7524910bdef74210134e3fc4b34368b22a34c79b4081a043477710cd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f290492c35a2425b4850cccf69bb9bf
SHA1f303f4484c32fe4dcf85ea6449ecd84a9c9b88e5
SHA256d5f8f952082562d2177f11ad3c8ec9cadd6f3e8f2d36fadc1ce260abe76fd3dd
SHA51252256190758769bbc8b9795c7fe4f3fd112ed29724b79983573ea972e09505f1c7f61c378e02e7a3ce0d85bd0bfe9f28d789699ac756e873fa18dbdf1980fd3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56432f8dbc77eec3bfa5498a281886e26
SHA16bc61c4be5696994bd6f791058aafc0b2935d3fe
SHA256b2bc36505d06e8fe03d694a995a26f36260b0d291900516ef676a19b66592a77
SHA5127555ac836465a0383af24ca78fd7babac159d3240fdd610b19b93bcc4b27e10092ba1fcc03cccb4e0971da69295ab45668e3a76cdc94ae602922006199f3a077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b19f94281b4cf03d41c3d44f397c4ff
SHA1be636d870b4d470dd61044659b73277fbf833212
SHA256fb51a42e92d4b8e634c8108ebc649487a49ba5a363a3ed12ff0da4e043514c8e
SHA5124a042a1ac7d074cecdea4b294ff73081a88bc3d252a013468287331568487b1df9981d035a01ac80765df098868354ebf16fdd3021188b383a3a4803278abdf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd7c4650009e3af4bf931cbacc34093c
SHA133bda849e83739622325ba8f384f8ef35852b094
SHA256ea81fc1be5a4c76e9cc46d06dc97dc7538345847ea983d183d7aada4a3d22fec
SHA5125a917f559e3a1983bc74d12844545b7b0dd52001ebb8281249c80e966f119d8588d913d4b1cfbd997fea6f6823465e80ac027ae580aaee398e3b3dd880460647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9877d80386e77d3902f97f9ced761ab
SHA1b68ce74c676fcc30bc558739e7d5037517480ed8
SHA25643e0943f190ab7a0f94f98d2b034d36692b6d80ee5904bac265d249fbcedd5e3
SHA512b45116c57d80fd8ac666e3ea78b121a0e52242b32d3c9b64bf9abf19a0baa22337f94ab6ed44d6ff10c46ff7405601404b228ce672de7069500e090bb76c2607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa4b61345beec91ba0c2a20f7cb04736
SHA13702884ee38304caa42227b707a0b69a8099e7cc
SHA256c5d572c7d3d34cfa9a1c1c7ba85e36361bff4aed25eae673087e14d09558bc48
SHA5125c904956df31c9c11f59ef1eac0cc56d4287438dec2a01457ddbf1594eae37c0cd79377285eed06abc99cdc6065f0717872c4d2163ebe3e6f3f98dd866fc5427
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b