Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 04:14
Static task
static1
Behavioral task
behavioral1
Sample
2aa48143ee0fae282aa55e00851e5c5a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2aa48143ee0fae282aa55e00851e5c5a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2aa48143ee0fae282aa55e00851e5c5a_JaffaCakes118.html
-
Size
37KB
-
MD5
2aa48143ee0fae282aa55e00851e5c5a
-
SHA1
5d981f03b47dac2cf6c9a3017a0fff1ac6b2e09f
-
SHA256
676d237c1d348c5314946ea5869d2aa0f028187b43d87a22ae959c674179c58d
-
SHA512
eadac8aec337875cbb7c07658447463981e2f826939647aac91fb6f93b739922fc1f1dcdfb93258c4b7c9cc99584dc97865a0db18c6fd9741f369c2597f01e64
-
SSDEEP
768:S9S7joqGsqGb2wQzR5OkmKJZH2JaGRXamidaGnEmehH2csw:S9S3ozszb2wQzR8kFZWJRigGEFhH2csw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 708a46374f1adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{60446001-8642-11EF-9C86-EA7747D117E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000d21096390d4670c90d1080414ef3a62f5b2c64cf34ae398c7020a8d50755632d000000000e8000000002000020000000bdf0c78017bf949a0ca09203a95c9674a91e1f00ee6cda5a255530e3f7347e8d20000000fbb1d4ca8d9c4b8d8b3d4ac8a52cc55aaa48f8953568d7bf871eb0fb3933bf63400000009c772c94941c8de2da6ce2d4dee4eaccf573948a47c496f3c013fb0c6503fd3241bb0e14f8cb1310185a2b50e972e3508854b84c16b8156f9fe97b2a26118e95 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434642379" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2436 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2436 iexplore.exe 2436 iexplore.exe 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2396 2436 iexplore.exe 30 PID 2436 wrote to memory of 2396 2436 iexplore.exe 30 PID 2436 wrote to memory of 2396 2436 iexplore.exe 30 PID 2436 wrote to memory of 2396 2436 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2aa48143ee0fae282aa55e00851e5c5a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545b314a12e2bedd7b1c717f31acc895d
SHA141acc874e0fc5f1caad720453d735f23b05e851c
SHA256e009566bd7b226c25b40cef08f7d7629f282bd917ee772495500de9dbb1289ad
SHA5122207b3ce0ab4591b4b594ece755264a90a54dbf124d7351d348164f34c8bc83857c5ca793533bc56bb6126eb8517063352ccf6420724930ce50c9d57dba7ac9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bbe5713d1511dcd29b792185d744523
SHA1cfde62280d289aa289c8cbb016b1861173e3c494
SHA256b34ffe9e9b524879176292454b5c8b98cab67a52be07d521c31d3c8d932e9f22
SHA5122301c3ed7ba41b43268ecec4ec9f09c66e111894cc288c8ba51edf740f4542be21ba7e978a0d6ce477dec8d22d4de2b6a5dd2dfdb0f39864451a64efd3f2ffe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545aef9ca60f673470bd05f0bb7139602
SHA1ab218eac6bc851f67b8c059bbd40a47def80376e
SHA256d6f8d3b418f4e185bf4ab18da62d0008b670e1330254b75c7c18102b9d0468cd
SHA512efbd6e27e6db5da0fc2b2fe9c85eadab9ce56071b123c2a7b8038980751de2fe978923ad7df8cc74c7ba229e850967a1f98f00ae5cf37e46887821e0a3bc42a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542d2fa87bdb7e8b79e294099ebfa09e8
SHA1cf65c564d877d2f9c28efc82732a062c9e2f7a0f
SHA256aab7e469ab288555eabd24b56be9c94a7e5310ce73fdd79061e6d4496a11aa49
SHA512df2efe413f057202a3005c9dd8ef8c870ec809312c9dabad2ba5f7bee147c1bfb1a3185cb95e9d9dcf471be8ff52bb5f8dbda15e7d5c383c4f9f9146398a581e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c18d220f3ccc85923a395be4ec12537
SHA1c639676034eded77b2657f466efff10647031a0f
SHA2567fe78684885cfc429dc3d15139a282d13746b3b8c4617be30281da544f355468
SHA5126b1280dda6459b5ce6345a314231fdd64e8beb826c038c3859994ff963db0b780c79f427bafca6aae50a4e63f543f33f13c07dec46a5e0f394c58c51ac03e8b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa0fe176a858c6a7b76b7dc9e9a15fd4
SHA1865571bfa8c2d80f55a7fe387712926629abbcc5
SHA2564a68d82554cb74d39e148bb1248ebce0af255e1f49e5587abb2e5e8df29dc72c
SHA5124c1b126b8e4ef2519b7bc09871d78818e9fbf521bc8447f62c342797e2693cd43b0ecd7f2b61757f25c7e6ff20279a3592c8334a9d029c18ee22fc634f8cd698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce6017bbd0d873318c812ea8abd64f5c
SHA18186eb14759db4be2713be6a08e0021af99ef9e8
SHA25605599a3796a9a6bde5274121431acaa4f319ce91a9badfa316e8910d14f6d2ac
SHA5124ee02b94f6384d2f310e0e6d3fd780aef56715afadc1556041a0d615a402f138f349fd88eba9d442fb0f8eb26794f3495835d33fa9938c27e8ef592056006b93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc40346be9c6e6754f67b89949c3b6ba
SHA14372be04fdd8f56f2ee970a422c52717bfc6db61
SHA25667cc825b0064bdcf9d8f20fe73bcdf5b925c01bc2c6d47a695c6fc885078cb1d
SHA512f4b1730573217ee4ae1d6651c2bc7bf60a5f9dfaeccf46e56a08e2bdc1a51d15c1982179c8478414817a797baee2fbdd4fc44a522c6ac2400a42a8f6849b86a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539513c810ce9428f3ee1bd6c78520dda
SHA1edd7fe3bc36559daf042e1e73f7ba5e47166cb57
SHA2569d8e54d89efc0bb66d2b2b1cff923f2327c100a8de78a9572e1d3c3491a32e09
SHA5129954acc3661ed55315e85dc24e1a315dda920ecc91261c8bb2325e317bb2543e3d3501e07d47bfb74026f7c040a4f772cccfd0502d104e0ba85f6990c47fdd7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5923badee79f8ac96acdc25b0ad04ace7
SHA15bada87884305b52dcad8d742c489d5c2fb6503e
SHA2567a7e5da1129a10626a0e4864f7287fb6a776948411f1a4e1954cfb645b3f7d57
SHA512c3c3ba8a363f751af556518a015956a63b00498a89fe2c64bb368edb61bfa87858c5d5b550717ea3e3cbc383f1777fc753beae35962f7a1de983bb0c5788fe50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52046afb3eb9e3d5c6979e71321f702ce
SHA189f4c6e5e429e0596b7cdc53d81a3dc900934a84
SHA25661c388d7f8fc8640f9e8d56cafe1a2c5c88e2dc50e67e84fe685463bfcb20cbe
SHA512e49686bc0c96b5e2904ba150fb078d0cc7c223a58d91fd5f1fe3853dfa08bb87aaef4fd4175af4ce1b38a34d036279efd6cea57987316d1fcfba19c71b1c8efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e77c627af38067b81029d8edb8d740a
SHA1ab31b5cf421d728f882500d4b8188f5d6d69f0e2
SHA256a0bfd667f448cd8e46ad1cfc1fc5974bf63525d22a1fe986030e031e616209bc
SHA51232d2d2da8b97c9344b78123ff766c6c3eab533695928ef3406693263bdc5bcde35d0af24975de7ac839a30a98fa174d0f780b560a9d9915efbcdb33540f19d3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f61fba04f4c3f569dd31385b1e2d6d11
SHA1eb5b8bf64a19f4f0e51369eefb449f2e6b93623a
SHA256fcf1b9204de4cd1973145d70d7c87481ab5858ccc0fd9136607ef1f4fdaf7de9
SHA512e95d8a7de2997eef203db0d6c205b9b4136a7f666165a2ab0192268050bd0c315539fbb873de6433365da425f4842feccefe5460be409dbda1eed5cf5c276f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56667cd6d951caba7f4c467f8e5cc317a
SHA1c1d8b66bb60706d0d6b1c4f2934807c0684341a8
SHA2569c6ceb177392c793a61de79e09f52784aa1d7cb243950bf615b09627dcfe93e6
SHA51255ac3b45a08ecf51c1dbfa2fc52206fdb1f45a87654fe4cd4236800f13eb3f049ba3553bd0511247c14792b5e0e74b023ed891453d47baa259f7298aa08584ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb399264c95b15c0cf6f7da77259968e
SHA1ee952e8c80071c528af0c62dbdce9635f542e856
SHA256833ba7ce3ff626e7da248e63ced69678dfd8746412a92d1ed58169b46265e398
SHA5121ce14998f589b320e8525b9a9f4d72d1d706200b81b9b0d941a515e55f811c1f5466b6dd2c454241d2753a569755c1245028b59477098c5702ac72551e556782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53474462b5fe404d7ea27ddf3fbcfe888
SHA11d69252ff26febc4fe05eaa947d45aecd8c4e361
SHA25619dcd1939a4a154b20e4d1ced4d919a1b8f34876e37f1a5ecfd5f898be0de62a
SHA5127781739971d17f5a53c4b028cc0b4913e80da9d323313b28cf9ceaf651121f5de2bfc7dd9f2bd75db26b51d863aae2a10529bc7d623413225076917751bab457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5706805540e7befb28c1bf5f9f64e281f
SHA129aa68bb86385a7fb05f4d2d7ca65e7d4e9fc9ed
SHA256d41d83391e9c3f4b544599d4b8c152ba5888c630ac9e1878ad2c4f246b5d1a61
SHA512570eb6564ea78da7df3e9d83c653ff8f49fb0222b734eab5883a7bb4057c70680c9ad6d2e408abfe8265d045c5096392e2929eba5f78d95ff3a805b2a36e969f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515fa3bb72fa73b59e81c1da213e49f63
SHA11bd8d4cb863cd0f5403c6dcf8dc582d13c9050fe
SHA25664dd02c201cd191c628e3462c0ec16c39902c8c0e3528bd255c673bd58fdbd9e
SHA512a03df0aa625e0cd83434c10ce975597e30bf83af4b4d6bca5840d56841d62bd7cce887f34cf31f8a7c61c6b80a2f1ea9c159a8c04fb0c1184fa8410f7da2c176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6f208f968456ed0974db5df7658a0c4
SHA1bc45885b8616b22f82a77032376335a5e8962f12
SHA2564dc1a34b11726245bec3308fa8a543068c15dff6c572a48d9476547e7bc5700c
SHA512b0e5c090cdf40c4568e29a3244893b75532a96f4410666e6f9ba65bb7c79bd3060d36d435ed14ca42e78aa4cb9b43ed06bc995f420e9ad705e82b40c4252efde
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b