Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
2ac5f710d747ce3c2d3d2e9d232da92f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ac5f710d747ce3c2d3d2e9d232da92f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2ac5f710d747ce3c2d3d2e9d232da92f_JaffaCakes118.html
-
Size
9KB
-
MD5
2ac5f710d747ce3c2d3d2e9d232da92f
-
SHA1
4c67c6c70841ad9bb7907b61443de76e8e7fd99a
-
SHA256
9bffd6b6d96f4298997fcd2e29508024406cede383d846e3f0bf31c357c4f511
-
SHA512
56434914a9556c9802318b8715571eec147c2c483f77565afa36d04a00fa57cc84b3170ec5b8a3327fc1fe44acb5110126ab4d33ba0b0901b363933e066cb44e
-
SSDEEP
192:H002Q6xr9HSoZ9+eofjtv+f6NYwNGpkEKhM2uqPxQxQGqa07:Ulxr9HSoTbyjtv+f6NBxfnPxQx58
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000c5ceb280ff16d2485a2f3097d9dac308a8c8637409fa168ebcc9a32b3cf755c3000000000e8000000002000020000000e42dcc00ce3207b0b15f29fb49b292a59e14214429521a6b13b99a59244570139000000038720cb078c253077d882f8ee77cf8fb8054a2726cac48a0bb240fb44c2889b72cbd454da3b8dfd5ae7f54de2fb4ef3dd78c1b6f3c6145ca385f0c1408fcb367adb49ef1f21a25c0480a2d212c85fcac3cf61a417a837ae229a078cad4678ed4464df51d61cdfef64b47ecd1f6568457ae5cd4fe2a5f27ebd736a4da1efceee0d113b1c1b63c858d161e59dd0d8c51c840000000ccbc10927a40df6250b0a64acde32184b3f0a178225d2a0a54d4798d0cf7de0511c8d5e96d278b76a1e1b550942f82038877d57206cba2df7006758eb7de6dd6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000095e6035b5e920fe59d2530933dfc2ef58d0da462cf79e65e5a24417c455cedac000000000e8000000002000020000000772bc171d8b46c3263cf19d11523d3a5286405045f203cda884c5006e01062ec200000004e1e15f268910bf816d4d431b3380eaa322c2850c93fe243c213f4f58d28cc3340000000482965d51d221aefaee93db6d15ae2fcc08b3a2adaa5b0ac6841763a85582de4ed53af27a0d9f71eb9c785e545d7923d69995acf734fe48de90d7a558cd90fb9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70ab67ac511adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434643436" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6473E11-8644-11EF-9CB9-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2388 2112 iexplore.exe 30 PID 2112 wrote to memory of 2388 2112 iexplore.exe 30 PID 2112 wrote to memory of 2388 2112 iexplore.exe 30 PID 2112 wrote to memory of 2388 2112 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ac5f710d747ce3c2d3d2e9d232da92f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506bf85b7e4bbd29d994941eeba5ec68f
SHA1187f0c341cbb3a3fe2962c8c680e6f20ae1cee1f
SHA2567eea1060f188da1cb800f980207c2825dca08823672d9c4c65efd9f1012d2060
SHA5128e20c3e62aa6f65e83a04db81df70e107407ef59e7a0414bb3b5ba879e24b4f3e5a36f0edefbe6ba91fff6f0e75f509bef22afdcdf1b26d913c76b737052d5cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1bf30d7076e2fe5a2693a249f961137
SHA127db3d1169d1f49146ad1d6e274687f6e7423d57
SHA25694b815b9aca3b6cdda0f4c9ac0f69e6d2712ff46806aa44ad454f7d5aeb8e79b
SHA5129a75a50e164c79c95bc3d596d295f16fcc5d02b14af550f2cbe28083f36e22f046fa46885ef897c98722f93e8484cff1f9c4983432db327f59dec38854849f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3da174b31eb50b9d6fa5b196c02cfbe
SHA1bf26b01497142cec4022f9f288b1885d6d6729a4
SHA2563cdc56c924243ea1546096882e584d4d71189b40c1a2e00208a447098340adb8
SHA512a2b81cd2eb384072dda30faaa38b7dd60689f4b752668404f4fb7b87054ae7ba805a6c68569675f629c0e680c0c0414c5dd3ac7f47df980f1e4a42b7f424427e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc2249b4966a23480e65e314c1d2b2c7
SHA1f876e5cd0991b5652d5669ddc9a052750872993b
SHA256cdf576e461c8f55be16bc4cc5815e80a6874ec64a2c54dd88298cf41ce89cd78
SHA51286b47d602d2d47c988c5160cdc5faa212a2a3097dc9a6fce13fa5b7f1d31ebddc3332f3bbec3d2306bfd4be6372d230eb6e00181aac4bf66e1ec4e11ce923993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5394cccff6e2cde5cbfa228b5c319695e
SHA1db44c8f74fa5a8749fa0cad2fb71a2c2f4036654
SHA256bf2f783eccafa19610325ffa83908bd0e29d198fd72c469785934b98c7e32865
SHA512e67f58bec4a89f58654119d0644597d50de50ac5a147be3ecb7956f5051c705ebbf7bbb4ecc4a0eabf140acd753131c197b990461cc577cc61b9f1041be1b700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d06c339eaa94eab19ecc31e4a5617615
SHA19d99bd1980ef94c1b0b8eec987193d57a1aa6201
SHA256b746d005b8130e0ba03d538d68de5129cb247aa9344931d961cf75cd73cb0b2c
SHA512ce9568591a17064031486594a1152fb6cc3d65d993c0c394f43a7369dd8eeac2ff0cf5ad06fdb5c3719cb1abadaadb59f9d674957d2fc26bf8b8455eba36e81c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f287e4306a067d622fd0b56208e2a34
SHA11e8a32d89b79bda38311fd779c5f73a84962aab8
SHA256d7789ceb7cfd368646cfdb13dd60f597e8423f5758b54bff291c9a1d5bde601c
SHA51288bbf4fcb630f297b604b8da875f0ca7b7ea34aa90cbdaf626f21b9f99f967420dd035827b9f8ad8e1cd15164f240603fe1ea5ddae19412bbc70fb4d73655841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531a908927dbae539d876c73a10072bd8
SHA1b70fc9657580c179836144264037aba4d3c21c0d
SHA2560289d09f1f88917dcee44c45a891a3af7259905dec31c728efd0d2db2e292acf
SHA512d0b63459305ae4681a2f2b24fe072bfe083112070a121c64bc1b5a9f0bd60ac0c055bef35400f0f69a80783fc732ec5ec87e3df4e42dac644a4b8042f7fb2a32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f67c7fa78f3c2e60d499e6c6a5b1ad0d
SHA1443108587a59e89e435ff6a91bfb079a0fded956
SHA256b3d663efdd04e06ee8c8a025c30f2efe9283a317d5aa37a23c2d948bfb7b12dd
SHA512ce9ab1a6940cd9a8a6c370712952a085cd4bcffed56dc85cfcaad66d84a616e63e3ffc7001bfb60765122716bff58589c1562deedf84004f5551cf63a165db78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9032107aa282b7f983a00164368a552
SHA123ba54ad4da8e06afb12ae4f6fc87b5967d9dbe5
SHA256b3d153db3df6e290e8eeace22e8f1f69de79a3adf3529f4e449dd16e7a6881ff
SHA5123a9106feccec5f5cc533d0a1c702a21e35732e6760c6e674cac5664a894a767d90a337a436ee628a5472bf38a1e8ab42a749d30d6aa7b96c76bda7c849bd34be
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b