Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 09:50
Static task
static1
Behavioral task
behavioral1
Sample
12d7873958d6232f885cc0f43e4b7232_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
12d7873958d6232f885cc0f43e4b7232_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
12d7873958d6232f885cc0f43e4b7232_JaffaCakes118.html
-
Size
899B
-
MD5
12d7873958d6232f885cc0f43e4b7232
-
SHA1
e589dbd4c4664cac44e4775ac0c635d8de19bb3b
-
SHA256
332da2c2b55919577f5538146a40a425f0c6cbd1d0157f5149e8b88cc1525c63
-
SHA512
24efa2969b3b78ff2b74a5e609ca994c378f1c18441ca8e0c08b48877970b861cbc686cd85c4636a012b028d407f71d0b634c445b47d1e4bd921abe986d1847e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434197293" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000055f2bfee658fd11994d1cf5b9084130bd35ef58a04be943ef31db7c36ee06244000000000e8000000002000020000000fc72a186737155f0bc5d6338c6bf2e902156a50019835346e3fec41d2a489ba2200000002378c292ac2aaf73cb905e295111ef8760f5864406134eca830c48fbb7232028400000005a78ea3e43c53ede0a32b824cec830039b9e3419d246c15499b5eafe817264288db26be4c2f6a3d7d2a492376a69ab3f8ce33045a8859218711927376e6d578f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a09f64e94216db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14EEB5C1-8236-11EF-AB3B-C60424AAF5E1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2528 2384 iexplore.exe 30 PID 2384 wrote to memory of 2528 2384 iexplore.exe 30 PID 2384 wrote to memory of 2528 2384 iexplore.exe 30 PID 2384 wrote to memory of 2528 2384 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\12d7873958d6232f885cc0f43e4b7232_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531785835e87889e758bc8be6d449e759
SHA169791c55a91678ac341abc97a602763a8dfe7fb3
SHA2566d0afb0b4c32084cd6b299717016e7129e3ea513dc0ed50dbd41bafac83f0640
SHA512e886711dddec7e214e4fdf0ab5d25ae134a6b915fc514be50de38651169e60e072e56dd60449a751e3eacea9da806f3b1a98947a23cf63f16d51b26175a1eee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf385f182b38493a0c2e4a89628b4605
SHA10f7cff0afbbc81f71940acd3722b0e38d44cc346
SHA2566c552c473fd63d78b74940e5b4d790ce00a9b75eeb5ea149f41ea8dddf918803
SHA512ff230574c209568cf2ef88d67fce1e3a8561d0af21d01f8ebdc1aec5053fe46ebfb7bd159b10534ab0fa1717de458bba91182a2433a7c875fcef131ae6a7d60c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4da3a78aa2be42b80c9c102d19a1cf3
SHA114323818d10fe5e65cdbbb64290e93828fbe1e0d
SHA256533e4950a681aefbef5ae2f494184a913fef0b9c10f3e6d1ac753944b20bdcf4
SHA5120790238c86a6ab7ce9fa6d72e7194c01456a73cdeaca659e2b88a8c98a75edd0a94296cf8570a088b42bbb9f49cc953d1bf12c04bc8463ae64a4d9106c8d5e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d7ddcf6502708bd8500bfa08feb0e7d
SHA1583cd42739365187e6d1490945c8d223c17a4c67
SHA256559c7c92e1e1d6b3f477834502cd1eba057cd24ecd1d0e76d185da1c7e471ea5
SHA512c0387ae374af723384c79f2fa0aa58e0fcee069dd93fd592b2885231a2cf3c7b56cf1b69f01bd2d0ad7ff6a789552aa6eb3e5cc49a5d050ac509b9d86234da90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5356cb762e4289020c784927cb0e55269
SHA10c241c47c471d61fb5dc4cbfcbfcb2e3eae8f684
SHA256c81f23a711dc1902c08e3d91a3d09aed921805b84a749b07cff963b6d52623c3
SHA512cdb663426d3e033d7d5a1724f58fcb6628c78e4e40268b93fdd02f4ab90f5510e111b859c84466401e574bd06886d02aac3904f1cfc52f0db470763fcf687679
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5141f1de3b90d711ae08644a2ee4b3c1b
SHA10f5501cc2e148e0f4d5487f7abb3372a02c1a851
SHA2567bb473f1c4d06835f36f73b29badc8f7e5efee8612dfa098e04c1bc0fb089890
SHA512592aa9c1f82f1dc0f2257114a96640cbb131e3125afa8096189a1095e71f45c528875290f3845083c00e77f53fd48793cc81be8f48634a7f52a4fd78b73de16a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5645df5be21e926b889ad3d0a60e9122f
SHA13c8de3fde5ad00d575424d4a5c2087c8d30cffb9
SHA256813660035ef35d0d62d3b011392f37e3a84355f9164daf791ce44fec97907c01
SHA512a3feb22011e2caeec1462673c223161879c4914e150f69c985e972c5f18e2faf49da93f891f62bb60bd84d9773b486a5ca0a0aa19bdc434f49c9bf2a90054e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b7dafba3ed03072a7456106873611b5
SHA1ed9d957ac13ae2fd0ac5dd8fed971ac2572777cb
SHA2560fe72b57ba7f270cf151a8f8456f8783863313aaa06234c06f40a2a889cd101e
SHA51259bd8241be907b6f519b874bac54d7b2de322c98a5091784c7256a8a5f78d276dea74ff33a1a31e688037fbf60f54d36ebbbfdc0168a52b8374e9c793719356c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554357392ea5d0a4236128cad920c1776
SHA11fe8b611e8b2a0bccd3bf3277d449fc781edcf75
SHA256cc962ebbd83bf6f526d5dc3cb2c2b38b401d5d6a2d83c13fa27b3b0cb3bd6dd1
SHA512dab31cac4ec198738e73fb9afe1020b07bcf51e06c8c93627932eb1c1d7dcb9a5173cc5c7a1db2f845d9d2e8ef8050eafd12ef707fe48f5e2a1d4b4866107ae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598075da63370c1b5b763eff01d578280
SHA167d9a6cf9ace766df8123178fde2df4897364229
SHA256d49cfd11413a6a4f006e1c423defb985d6be6edc5d186226ce0b0b37b265551e
SHA512f872b62b16b3ad582acc4c6961acd7561167199898392fd1818a5fc7f6456a05ba54963ab9ef80165e3cfeae572dfb180212fec7b1025027cc6f238485210b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c412a1a7e4ee7b3233f4747335df949b
SHA19ac0b17911e52b0affecda97937fc74138b83bab
SHA2566fc245d44f001c95ea76c9c3205d2fc9a575fee7639da551edf64fbba30db6a9
SHA512382fd37d1e707a60bbea724d4e9292d7a910844caecbc50c967336d1a32b85f7e329ca467604ce8b421c17ced243a876d115db4e04a982236c911792331de503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5161308274e3a796a8520a76bd39a9523
SHA17388721066d9d1eb2474e40f9608480080563a9e
SHA2560ba7a31abf0e331611afbc12f70a251ff5ad9f4aabd2bcade49fa72b1a1d2828
SHA512bf1e15dd0529e46bf943f3ae58222915e09d1de0093f4880f345a21eb6803b92c4fb7c63d7cf8b59561e011f6f09dfc24d01c56052e514b61d5e26614d47c2bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bfaa65f92bdc6f6454c71268f043540
SHA1ba3e4d2cffa573d28d9cf21ddc54a72d9577e162
SHA256e673ce65b49cf5cbd02d18a9fd4e7f953537da11bad2663649a9478cf3db2c7c
SHA512bd4a59d79a3f193884357a1432b8eec7f7ee8c6397fcb53a181ddaf6b5655969e9d95bc98f14ca4f35f134622d6d2633d0b75f0640cb8b262473a46dd8f69b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538b90a53816fc487980cc8ee620d7463
SHA1f7b04a72c2f6eb82c5f7dbc227975dd100729c2d
SHA2565a8188de88ad9e82355a43b069cccf518edafe70e9020dd16632ead361f9a98b
SHA512cba5670e5281b417f0dd7f82c23fcfdd8a704b7e6581ec5b0050c28efcc0948045d295ad63fe5a089877b1f4e595f5d5ca4dd30cdaaa3349d54d1719219856f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5474fef2c3eac01e9f65d28a8e3351b89
SHA1b5d9fb4c270e27bda49b9e4d732b479b2dd78011
SHA2565a0732ada3447f2e151884bb27e1be0cd82f2b942f9845623b4f7f96ccfe8493
SHA512831b2c424e1437517802f752ddaeec35102c43a96473499c3f116a42ac84991823fe80c3e8d62d130086f5bfef7821bdd6fe1c3fc2a9c8924334c5d18677a230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513d9fc38f4fba3f2be74de9e9f274db9
SHA1a8d0f05a1484cdfc342902965057ef2142374d4f
SHA25644fa5e9e64831124835912d604490e2ad8fbf7cdb243d6f4f7ec684adf85f66b
SHA51290e53a17ad63e8c0845b740fe6f7cfd9d7a948e4dd18a124ac064ecb68446da0405c89c465e9b21f39df90e6f8e4ff1ae26987d95d6dfff31dd8fe62a3ec901e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e3d650623c8583eaa2a702e4acc4135
SHA1f68003c8257781f05a3b737f9e6d9b3baf8838fd
SHA2566ce16640172504828b0f14ad201a97f3b6f40b41d7efb1de71087b241e3a4788
SHA5125de481b83f925995b3c78c9ada07b541b08e1c3088751c1ef165da6b7caf41a2a9bb944db94a80fd36f935f9fc75ad634115b2fe0d16173f228110184246026f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3aef64e3c5973bc45f1bbd8e7e55791
SHA127c09abbf39cdd779f556dafcaf34516694c8622
SHA25660a6ffa35b0a3e8c825bcfa196cf50d17a13687cdfada343887d3dcca5fddf17
SHA51211fed442928b3d0b5be7e1fecbc4b5326a3410fa3f60bd8424727efbb202995c401640a4a347a66806a11407dfe235cb228ec0009e9f05ea4fdd3aa955b09b3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c81328db4931bd904ac2d29eb5b40c18
SHA1e2a68c92cddbbe21e3f6db0fbafb3d2af457ecf8
SHA256c95287c7764f5130bda41f817c67fa5d689d53a0ef9347b20d41aab951e2ec53
SHA512d1ccde81965255fede337aaf6d2aad88aa10764dc9c2a0250c682abaf09cb7ad1569cd85551d3f7f42c7f7a69de8993bc239dc51398102165618ea6e2e86e6cd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b