Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 03:35
Static task
static1
Behavioral task
behavioral1
Sample
2a148635bdd8c8ca0ff9d56d795afaad_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a148635bdd8c8ca0ff9d56d795afaad_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2a148635bdd8c8ca0ff9d56d795afaad_JaffaCakes118.html
-
Size
80KB
-
MD5
2a148635bdd8c8ca0ff9d56d795afaad
-
SHA1
124a6e646caa3313ddae9824218701117bc3f0d2
-
SHA256
a451adbde3dba55aae2a71a1b21a89890ade7c5e6de095ce12328a1f6df803ad
-
SHA512
59015129747e00d919cfd41de53e492c7601e27877e1b3874f33e4f4315ae5a1e05791d4ba44723ea775e26aef8653ec38d6c611143ec49f804502192c8ae2d8
-
SSDEEP
1536:x7yu/yM4RUURwPwYQm6kFob0GtEspq/+mtLioAxf7N7350SWMuwK0HsHFR2u7zrZ:5yu/yMmUXPwYQm6kFob0GtEspq/+mtLt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000d78d9b99b59c40773b90aab2331f70a96756d8981a0ad8ebcd7823c2844f28c1000000000e80000000020000200000001da0180f423435707744e4e64523b182c6a0fea6fb50ac1f1821b8f3a129b6482000000060a0f4d453cda6a02dd1b21b1e349ea1e5b869e0faedc883c41aa941f373d128400000007c0f52c85688638ada91eec0b3e5811fe47256fc98c618ed5ee8e67cf3fc84c6fa505672ae66de5f28d48e98a8f86569df530599ebeeee7bc1a2ecff508d620d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 403fd730451adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2A148871-8638-11EF-8F2E-E67A421F41DB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434637992" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2656 iexplore.exe 2656 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2700 2656 iexplore.exe 30 PID 2656 wrote to memory of 2700 2656 iexplore.exe 30 PID 2656 wrote to memory of 2700 2656 iexplore.exe 30 PID 2656 wrote to memory of 2700 2656 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2a148635bdd8c8ca0ff9d56d795afaad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a2e51954bf008fdf8871253d7be3cc4
SHA1186376ba351c044ee219682ba7bb42e78cdfebcd
SHA256444ee59c92f971a2eeb5ad2f3cb41ac957f63a6a39aa406e779cb206d5f0a28a
SHA512fd2f1b0bc6f7b7c55ee8d5f914fff2e8c21adefcf7d5b923f2c0ccfdb7176353fb5fba27a4fdb960f84ee33c38a9ebe9414308e301434bf30823e66c6d1f458f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1efe7593884b2629895be69dac7973e
SHA1128ea03391b060094d8152ebefe3051b27e5f6e0
SHA25683dbe7914b2b795cb10c649c606d18a178e1441c3aaa9568a54589ff5e0a69b3
SHA512407c9b160c3e2088315246f7ab1830a39bbfe03c1c4d7abcae89ce84fbc8e0f7e1ec219ba517c6f1a74c5daeb8c0002ab28b3c227613c5550d0bf94d30b2a484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dfdb2d40e64d1016b1db465473a0482
SHA195d25de1e17de1def2275dd68b75b04fb9fe79a2
SHA2563146194a18a50e7e402a8062fc11eba4fdcedd54bc13d5d788348b98753f2e27
SHA51230000442d9df71a78643b80d7339a4edfde971cb20f7fb18a8df14369acdb530cff859bc6d0f10d84ef6fb03f013b0a3f39ebbb2960936d0dfcdd24bbc250234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9f7ef4a16eb0763bb53c16d64d03a63
SHA1cf095615284f34477777fd0ef75ecd4c90e617f5
SHA2566843d5245e5ba818c32e0f78eecef8ab219b9bec07577e95f2897765b04b3931
SHA51246aa8baacf960015847eded1f964a215abef7ddf3b0d3bc803298d7957ae006a5d21f7cee25b19905076624bea0a6f4e44ad4993b7611315a3afa3ee80c314b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547c0ccbe5f862c1b2a3503310d65e991
SHA1f716bc35c88155bfd03cfa38d445a976544683b0
SHA256ab37dc46fbb00e6a304e6e557abf3f86b2e825f792cea05ef87854d85d66688c
SHA512ee8fe17667072aca3230384dd1802332ed6580ed054d6fe09d65b3d4e2a2e3151f3a7725d77f754127d8c219d34305685d1d3d2b8ed86281c40a3e8a352ddb6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557883303f5b42361f8edc46beec9b4ac
SHA178222e0643c02076c2f320347431aed2f4494525
SHA256ea5460f3056beea1e6aaf6c641c53ca395371eeef0df968f997084162ee7f275
SHA51229cc6e6ef0d87fd6422c161341d54c4c47c6f00d6769c17420b92a2a2add7b2270efb51756fb94f47d23343ea42471763d6b4c8c205cd8784f8ad66f13daf412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589f02128a363511d03f4af634449ebc4
SHA1938d57086e2b5cb8dabdfb05136ca867e8ef8b6b
SHA256eaa487fb7f145b60a40f636279ed6dd91836548d9ee42d4e32c70568e401550c
SHA51234a760e4fd60f832bbc72663b5b689615419e30024e3c9896c22b116313bc6243f55f49fcad2a023b7a083c404dfd8816b6d337a11259989b9036d7d85e93c06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5810a882ecab747d87e664314faed0cd9
SHA15bc57ee4969615ab298d760b46cd750517e62424
SHA2563dd91d2d30a7beb6dafc3de0b12048212098efddd4a88c88ed850ac56c443425
SHA512e08de6f6204b984bbbe9f8c299ae6a0378a054fbe57b395dab80b500a94cfdb65ccca81f35458a249550bd373ea21379c2cc4c0e28093f8299ce745e7cb3d2fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d433e35eadf2156a2b7e5a6413ac4d8
SHA1c88c34cc53b8d8363c3ec14772e141b30fd67ab7
SHA256105486ae144f105c5eb090df9c9bad6861de98405de6ebff8022889f2923d379
SHA5126b3216e6815b2e063f5029a754e53144ce57023fb1ffb1e1816b1890d96d745460d7067b406cdf84f6aab848a5e1548d56d7cf7bb7a7215e58266422be25fc5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53db0142f378bbab9cb002e6cc0e211b4
SHA185c56350a844cf53a1560bac17f83bf1bbd6a297
SHA256f7073b987d25117a5839104647c8db70e3298bb4d1fe62dcd661338192fd08a3
SHA5124c8ea652d6316a3403f1b2a297bf20dfd46914a4ff9ba814685855141660138bab679e3c43347bce94c896950e39c95401604bb301083ff8a5f5530c1863aba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc76f060ddf8361d4fdeef3cd3984ee9
SHA1c89aedb0356f00b3a43a49089a5f6b09a0727608
SHA25633bb7f055b73c2aee76a3ad7ca43a25cb626469833b66ac1af8486f119e51c3a
SHA512e161f2988ba78fd7d7bd55b2c6a36b19781af50562da9f1f9a37ba349cf429ded1b68139acd510e8140d115cf1aec36a2f93bac742289caeb60652ff9c0a48c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59330d77f36931bf5c9023ef8c049ee33
SHA12145be53bea7271dddf3b71702f75c5bb917fad8
SHA256f031c09d9b72a80923937ad76748782aa90858f6c5a8e78d608ef9dc1f7dd0ab
SHA512013a2a9195e77fe8b4a5c594113b49e652fbfdbb6a753812c1eb1cf5ea0e082ba06d2544df2325d8bdd86a07b55bb634b8e79985941e9f02274cb6f0cbab7b73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5312c1826f06b82436cc69824b9de36
SHA117e6c83b7f27c9dee208030b5127193815ff9cd3
SHA256877beff4da40b4121b2273133fe6383abda59154b0a8c18aed55ec98d9ea0e4e
SHA512a45d7de07b9ef8ccb1c19a301be8673c787d1911948c76cc3ec039cc42493c2ab6bf144ec6e656335f71df36ba1c66610f517208311c0036d3fa3b55b7b083de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4a37a7f370ae38a8724c95a3b1e5555
SHA16d1f8f49ce5c3b5413fd73dc736471b12f3042ba
SHA2564c3b31a610066c72f77f0e270146fbcc71d0939054e21f86089086f6a6497f17
SHA512c8cd7161e013265c229fa62a94ce0f7f94408bf752f45fa68f2b44ab656195076d927d5114e4cf95cf3a4da13989ae2e24fa41f98c15f2d2ce2bf726e0205e84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fecea8423c964e4daee22fa763746cf2
SHA1bbab6da8d1358811c585295444ed19c8ceee4ca7
SHA256d3e5bcf1ba0e1bfbd307d1d792821b584e9ff98247a6d752ab9cd75ad63650c5
SHA51223b249a9cd374fc0f36b735ed5a60fe131061bdf0faf93d42ec64837ec80ab80a80e6ca49107c71a963371bfe00e941267f8051ee505c8c3279a89d4c7082ba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575901de0b699bf4b458165f7605ab296
SHA17b7d5c5a5999a8b0d09e8643f1acacf3220a2228
SHA256794b58c27700519c72ca701a662c572b62ad18f87d31789aa3f35f223f9dd529
SHA512958946d103d56094f8cf6750e94480270861cccd305ff89b9d7820573be5109218f15793eba2d3d3626e72532772e686a33fc5bb2c206e6064822f3bce38730f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd5b3c8df7d6f800c9161737ecfd63e9
SHA1418ef072a52b152af1a979d960c107656c82ac48
SHA2563a7eaec43adeae8ee749d36b2c309dac973b6397375d4913196cca37ad95dc13
SHA51283a3dabbbd486a800b67d6170752e53cce7abd3ae57a7360c2f3b277561a77759bef703c00b92999557d4fb406fd7d6cf549c2c03bdc497fe00f6591d69590c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0015c9e3db4f433324d6247640657e7
SHA1c86d8aa54e5e3ae11ea76b6d19803561f711a74e
SHA256482dd7d406b71eab3ebe6cffb0290e577547dd1f5e71e61c3660a3a664d79f7c
SHA512d110527db56de44decf3b2eec132bb9cf08a7ca3f9ef29624b387014054f505f2a17e5ab3ee10001f9cd3aa62e3e4c853a9c73c6e6b0a0d554bdff0031e14187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca66d7fa66d638b571e4d7e3530b9005
SHA1e42c425c93835a94d7c3754ed0ae8da8a1ce2c7b
SHA2563babbd7c4ad0d728c4c8b724556bab72873925a35d27888e4e6975ab84ae7aaf
SHA51278cff5c01b14f3b6f07559b7c6b28cc3eeec7990b1e885cb5c9b035698f0565c15ab7e71d7e503dd6cf3f88b36cbef700db82716d95bec6b2dff2acd0081ad43
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b