Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 07:11
Static task
static1
Behavioral task
behavioral1
Sample
2cffece611d2a4c12eabb659f070e2e9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2cffece611d2a4c12eabb659f070e2e9_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2cffece611d2a4c12eabb659f070e2e9_JaffaCakes118.html
-
Size
10KB
-
MD5
2cffece611d2a4c12eabb659f070e2e9
-
SHA1
695cb04afcb8182cba045cddf4cc1641d234f315
-
SHA256
b7371987ccc6a516061134d65604be7df7df69ad66b4ef846f5a636b219490b6
-
SHA512
de2871a1f56e3bfbb42e66add1cfda61f1c3c6a0b2e573a0c25c82f953d60d407fef28d05e0436f5d27e154edef28752982ef2650f156bdc9dc83edb0a0cebd6
-
SSDEEP
96:uzVs+ux7qrDLLY1k9o84d12ef7CSTURGT/kbopwGBSj31962GBKFIdL5+BDlVHcD:csz7qrDAYS/4CzSj3zEKS70DPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA9F2D71-866D-11EF-89F5-527E38F5B48B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000083d03451ef5bfb38104b7d62ecc2724716972ff65352eb612f72f9b84ebfa7d000000000e80000000020000200000004ea644eb15f127ca6ea058391da9adde10eacf2883550cd103be01032dd3ee129000000014ad703ac8cc5587521ecce98e6a25fc84e35bca832857f6f63f89834b8817a4320300ddbb1b9b65387d131776dc3556b6239d0b1169c4b2fe74e558900dec6e41c1a65bfebe358399e2845f720da201604b5e746481616eb712097fab4391fa40f6fedf56d15ca8bf7bbad192bc411395be293cee83bf985cd16e9402740d304ab9462de671e88d7156b74c3a60cfbc4000000091a02c667b4c6058d196ea82b4b7d31a755c0151188bdd87fa5616c905e44de1458e96ed5cca83708e5efe481d77ca1b066bacfb366914fc9081fa05309af828 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000008841e4a04c27915ca605762631802554176d012f9ccf387a8c878cdee85c6bac000000000e8000000002000020000000d49e06054f6b6e003b031163ebe8b4dd244f8a930af366c853a09d9b37f3865e20000000d02355d6196e1b490c1da355dac01484c8ae56d54cb4597d469a354d611cff944000000017c25ca6161da12774e21827bb42e5639b540d6f6668511838ff8db2193adea9636be5be8a6aa6bd6ab03ba3708c85eab833caa157db8d639d7eeef087d45041 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40e31f917a1adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434660999" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2092 iexplore.exe 2092 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2976 2092 iexplore.exe 30 PID 2092 wrote to memory of 2976 2092 iexplore.exe 30 PID 2092 wrote to memory of 2976 2092 iexplore.exe 30 PID 2092 wrote to memory of 2976 2092 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2cffece611d2a4c12eabb659f070e2e9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa520d6ba4f242b176644eac13bdd7be
SHA165284aeb9df4b07e219e28977ab5e504ab8bb12e
SHA25677870b59581c3b575f6a64faf518fecb99c9ceaf549fdd049f9edd37dcff537f
SHA5121f6c2b51429199c013478f62197ea452850eba3219343d449e0f0360839a21bbe145cd91860067f6f17a4a3c6ba9d888eb9dd271deb457f069e782bd86546a61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e1828b00f749349c04952e147a0d46b
SHA12988057624580e5d90ab0ece82cbf6c0c3c86d1c
SHA256d95d7cebf79a809424223a1d9dd10e7f5bd9b7f26ca1242d9915b5b05219634a
SHA51252b6a54de9031c1236c07476a68fd6d123d25fe6d94d5bb76e62825f325c9b47e117f83f598ed97c8a3cb68dafa7f1d3edde45c877280cf4ad2dc2cfc5fe03f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e679b69afc25d2303ea6949806963b28
SHA1ba6684bbe2a209b0ff61241aa9f99fef677c0e0b
SHA2567f3d8b4c187d012a11221279db92b76e2646237f2cc90e01c7a9130f9f7e6def
SHA512a8e591509eecdd368af817a76c77c1f9c93540ed95aa76dc3c6c18fc39b614ccd066c1cbe2546fa08a2328310307c68c014f63b3ef557793a1a6c0b9b0f64168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deb06473c469b4980a3533feee2e6c2c
SHA1ed2de262f6786b5a5fba5dbacfacfcdd6b07b4c2
SHA256c8aae2b1eae71330e162999559c6888fa2e83174ed217f79a38842286b5aab7a
SHA512ee466256d0cd816695bda66cafe9d0d204d705ff0583a0792219c5822650d4bd3f63ebc36806b9b3759d9f54cc6ac99e9a103790d5511eab218d60494aa993d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dbbab37d683810ba30b409a5d2ce179
SHA13c98c07226d5526bc44c62ec48aff751a50a0964
SHA25678ca1dc2232831d0b3106a3080779e67990a2f4dccd056d1b79c96bc8dad3a40
SHA51227348b37252c8792678fb057a137562877e2c8a026bc322731ba7bdfe45087873be8965420a9223d9391cc890069f335a66a1d83bdfe34ebe694cebb01ef38b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc5e65d4d005a72b95db404b99a4140c
SHA1d477102063e992dd127074a266a8d293a3000c0f
SHA256476de7153e29200310eb5dd61c678d18c479301f389d1d31dc15bd99ed9db49b
SHA51236f3fbefdb01e49ba7d1981c593ca2338a43eb6a72dfecfd15abdcf25c0b242306a3d8f171d708922823193cb87696dc0eb1f75021e6d535ba5d775155b6238d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fce46e07473279799c1ce661c452ba7
SHA13b2d153d35c3e885ab1f268e9fd8207ec3e5981b
SHA25612190e1b5218bbd20ae028103d8338603ebd6fe272f5dbf74220213f5bb33627
SHA5121f5e05a2da89dd6f92279951d453680233d2d63d7205f3d8bc7b62a91689ec5888ea6f225224ea14be4870744dbef1d864f473668a7ee3b1b4b6b581d52d3e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504ad161509fd1668fe5e6a3a298505bb
SHA155c85f599c61d279d3c2bd02c453b6b6ca7e2587
SHA256ca2532eb382ee22628774c4611249687e7c6a64670a98ab0e961a2dc947e1f31
SHA512d1d79d038c722487705ae9eda9dfb188ac46268dcea528fdfca7d097f59c4c80e5ca7a0b690cac28c6b84141ac83384ed79091954bc52e21288d0319c3e1a16d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5587ad17dc4e0b212fdadc5d835adf7a7
SHA100027a6b1be919f264d89a3d8b2314d07f3538ba
SHA256038095904ba3f457165c7fbe395787531e63e053761e8cd9a4fc63446582d339
SHA512147273a2d3589efa45792adddc7acdb7cf1ca2162652d1fd867e0c251e5128000bb0e252bd370f3b49d07476a1287ab2eccb41006000ea175d2f9e2b1c7eeb7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e60202bfc4b34bdd6a5077ecf007bb7
SHA12455e772717e8e6c5a4ebf819f6fa1e5d6a0e95e
SHA2562efbb1ce159d2b00eb7d9f30b08c4b95bd51c11b9a430c0481a7af3a5e6b535c
SHA512c295dacdb10fc07ed07b25395cde7a0b31d410c002afcf1871ceda915f13178e3373450dcc1b05e4ba387c601ece9355f23b3374d7405a5a61dd74fd1f52ba2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f09d23ffa9add2cf728b564815516ab2
SHA166332363c2535452fd46eb1e9bb19b800ba81b5f
SHA256f0fd27742becadd22199e1f249cbe1393cb92d0ff74718a2fbd37461560686af
SHA512ca1255beb2347f0a8f111ca3cb783d95213f8d469306a0419b9f8f79242dad58088b08dcc4da8c7ab15e101a134a505eb5c5e343d8f42492ead358fd2367614f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e226354b26dc8a3387b204e6ee479aa1
SHA1150a782bd308eceb52553f93ce2f10528048c181
SHA256d18c8dd7ad5211bff06e4da22749d53470d076a202b5873ddebe41f20e7f1f88
SHA5123d1690f65cebf7ff5849f3064fbee4241461a7e354cfc52dbc680f8cf4965c88a1b5a461d4a5ce71a66ca0e8f5462bc299e1b1593e0a18a60674c76bd018263f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a006c715a056f0257e3852d00092aa55
SHA184f2909abe15580b9934fa4395b1baf2e6fcc95d
SHA256b517e7df24354843da8f61f18c9dc807c12b1e6b346ac1afd93fdc2d73509111
SHA51295a2b5eebe681b21c2e43a0c06629a797cdece19e3424b1211cc3f6bb47777afc5d3c826f618ba6fe7059a8e1c1ff965f57786455b5fd75d535f55e75b9acbfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdf46ea4ddb36355508e1c1826cca523
SHA16ca9746a5115036b685e20e0786ca838d79bd289
SHA256b55de5d0f022ca76109a79592874be8ec92741bcc1859e6896f3b464159467bd
SHA5124e52c8fabe291cb621ad357bde7e81a57cf60856b50bdbef6733a5ff52e3ad4322794f64f381f3229ba1840d12819ae9443e909a6404810bc7d6e768c211b413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd34bac1a22913e1d1187623f7a1c954
SHA1d7287f2c162e6b6fb66783ad307379f501bd7a94
SHA2564bc0b04daa4d95de2d483623674a4c2e0cc4b17411f9affd63becf31a459186a
SHA512aaf46a174af7335f349bb2c477bd3eb000d9369673ec908f40808593b590e83f35b47caec913853f2d518d3697b3528d2b6954a9cc989ec6018fc0d08a8d6d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598bd752e8e8b0b45a39172f74d756381
SHA1f08e5e86d07ca66642fe4593bfd8d2bb16897ae7
SHA256ae0a543a1b82f84e098e7539e4432a6490364c53bf67e7d2aaa2933bed81eb44
SHA5125515b02ca3887688d89bdaee527f18d5a09d97c7f0e02d3a3cc7e05b333c8f11d34a6f2e0a9901f2dd4a9eeb11e3f7d4681dc36b74954c371577fef86701fffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534e32c49732b85760d2f8eca4b34053f
SHA19f5d615ba5e4346165609a239f1bf8f90dbbfb9f
SHA256549218af4fbacdbb1d39f2937a33c715e975f84f87b4e97473d032611b35fe3c
SHA512b25500213f746ecef403089893f4dad5ce46cbc8ea694d2b36abbdda454a2759d772f029912105c306bee7ab9b5ae0e7d8774684b6b3f3c34f9bbab50a7a89e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b86e583d219a7d62fd363807d9b91ba3
SHA1973f493a43de5d90d7f6595c0bf36b6c47ed51c6
SHA256d0c6561f476d527bf8ca9ea4b535c8b314b950ba24e49c3b0bf97017ad72d115
SHA512f2747069181e06c798293dc2949512a697bf4b59d1546e2ba5777b0be6b22678a8a8bf4204f010271cd03ae0df652025f7cb227cd21f06e5200da6c6ca492fec
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b