Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 08:14
Static task
static1
Behavioral task
behavioral1
Sample
2dbce3579beb0be54cadd5a43c306e58_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2dbce3579beb0be54cadd5a43c306e58_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2dbce3579beb0be54cadd5a43c306e58_JaffaCakes118.html
-
Size
38KB
-
MD5
2dbce3579beb0be54cadd5a43c306e58
-
SHA1
9e6cd82e60980e927e87d71355a8215d5304e84b
-
SHA256
af8712080f80535c04277d5059effba8d1d38adf0edd77f4e38e13ac7d9e00f3
-
SHA512
d636783b1570aea1d940f9abb275cf64a56463d80f8914a3e02687e13353af6fa2a20abea1121aa5ea127675f37dab9e1d41f08c649bc363ec819da09968d77c
-
SSDEEP
384:SIIJ86XmsCyp4xPA+aTTip2yeHip2SXr9+isU8c:SlQvaT96Ngc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 504dc966861adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434666081" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8FC73A51-8679-11EF-BF50-D686196AC2C0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000f5443931f39d65ae25b2f8bddf4bc5942e66b0d186002ef12c4c0c92993f1423000000000e8000000002000020000000de04258623149f0d04ee5fccb03435de39873022b2b541f8dea13fd6aca9c0d720000000262d29aa9a75d49decb09969456ae0cc30aae3ffc22b99f2501c4b42f8bf7a2e40000000219ea569a2e15bcbcc1f82d9bd9f7395c22fa0c0a7565fb5643ba93c3c09bb3593c146ce67a575944eb886e92f54b6afd7e981936d33e7609663bf62ca684c60 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2240 2380 iexplore.exe 30 PID 2380 wrote to memory of 2240 2380 iexplore.exe 30 PID 2380 wrote to memory of 2240 2380 iexplore.exe 30 PID 2380 wrote to memory of 2240 2380 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2dbce3579beb0be54cadd5a43c306e58_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c344a94d85416261478fe132d32a443
SHA18b19af3b90d872afb1a996aa16121a7686076ffa
SHA256d8ee70e68686470f366188647bf2d73c041a0b47607a97e4676b07cde90e14ed
SHA5128599cf5b2491822f1dbc9f160d67154fcde50ec8e5b802f64b71ef7512e242249a28d6248a7d4a0e91a2e89ced54e585b3d30223b367eb72c4a4262c07d61865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b87d438a97b5c7a67f8da03a1ed00073
SHA1b862ee823f957a71c2e203fc1ab644466d50bd69
SHA2566be0b79cc263472cf4ce0be2aea7b83a7fe3f3566eae6406839a65332c8bc85f
SHA5122e08b2ac6ce83710eb7d7c32554d0ea443222859848a14cef6e392266fefd9faa1d9709c883c95c51b413b53357449b1d34f6f60cc5e8304c16c072c69d45eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533a71ffbf2372eba03c06c18cbca152e
SHA1abcc5d66b8992a07d519f1b56e7ca97637814787
SHA2560d837f77eb712dfa6b01fabc07a87f05227bc609e15653bcab1df09c1f4248a6
SHA512027fc7b4ea9e10f4fb11f6a6e699b5436e7a013a0fa2b91f29f28956c582a6ce48dd6b54292082e2a2806ecd98babfcad9fac15f5e69cd0ee649a1a94ff31a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed00bd0e8df9993dbe1fe02250a99ca9
SHA10d299a0cb43bd8bb950c1a966e1e34908b73f368
SHA2566f57020e7041f4c28db9753a71bebcae8f70368da03c4d7691ad5bdd35eff130
SHA5126d8872083e314a17af32ec3e9d5aba69e30fce25ec3786befa85d504ad2a29ed138088cec52100b04544e9d86e75369cfed2788a78d96c7f3d14a4265b6653c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ea466fbadb3aa43f6a452f77fcbf31e
SHA1d67e1106c3798d278793d6d77db8c78a876ebba0
SHA256e32a2baa5f883a1b6695e8bfdc6bb9370f13ff323579e4f04bd12295b2036afd
SHA512c993d125fb24e9aefff131e4a9c47b2bacdcabea293e051695b62d0419cf2c37e7fb1abc892227f7b468f0b523c16116cfd8a77cf5fdc846788a09d3a650b54f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec3c349432c915adf7be6df4c42ddf93
SHA173a0e25217b54152834ae2a732a0c8fd87a2c6b0
SHA256be5f14eb30285f5fa67d1fcea6338727b32daa469ed052c64bf48c61d3406319
SHA51200f851bd3d76022c5f833d5be3ee2a655c7f21ddaaf86219b6b06665594dad3f7ba7beff06e3ff23beb166c13c48ffa4b84ce1fb0f2735f26e9bdd43e472c62f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee128fe8dc69c24442d1642e39668ef8
SHA1c9fd425cec0930e5e42c0b4456bdec6012112417
SHA25691f6d842bb64b0f4981a07131662d709031ca95e21871f53d43b3509b59df9c5
SHA512887cbd705abc5937a5963e9e9c953694f54720ada67629f04149bdf7be3daf28203e201e9f20c7ffa0997eabe56916980c0d7d27ec44d47e6e5100e23e361563
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c2c487a2a526bb99e57944f35b0dbf0
SHA12d87f8084ce1d4308238e081872c2629824069cc
SHA256c5ac0eb4a83a4f390dddf37e6e8386ff9f38b13b516aeebb8309eeb0bfbc0963
SHA51228ff8178b49ae669255139066dedbd68f11e8cf4f6653856492bc5a57cb29881e35a2b9a4bb9fe10d7ebbbec0cfdf10bf9743dd5f080042e3ea99a8c6b836cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bec652cf1a1badc50b7e949d5f28574
SHA101ca4ec42b4ab50616df4516e0cffd74a55da29c
SHA256bb4eeaf963774fd27804a7bf4d7b00d7c45bfad1b51378ecc907e0183ccd7f49
SHA512edd996616eb1dbb628da3838e23a92565d39e34ed1794aa5e073c8cf23585ce13b7667bb068282392a8864dfe9086c5a5f4e8d1b2299a83359be17dbab6116ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d47a540cff0d63ef15a41a583cc1171
SHA1f642a4e02f4f2ccb560437b5f2506f785701d4b9
SHA256419b858193f222a8fbb7aa0c5e23376ab4f5c26cce1aaa5b82d5a1dca4691bc8
SHA512644913720b8be7edfd7327f69d540af4c502cb36a3376c49ba151a2d96f8f2e4f370b63f43bae938e020b3befb964709a5de89f9a694f6b9767ecb67519208ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b627fca0fac32bc1d3183b2a2c12674
SHA1918dff908a7250a75a64730d0b4a4744aa68deeb
SHA2563edfce796d5671efb75d1cf610fcd16ede2be66f12cad9d4ec14a2b31662c67d
SHA512b8683c5d49ec6fbb8e9dbc077563f9759a7a9f97e8b8f913e46f80e724b95f0499b6574a78966b82952f5791aacc7583b4c93e8078193ef36560b997bb692873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d27037870c12aa737e6c9bb7a308c9d9
SHA11b43dea8d9e4fca5371698e1174408f13433799b
SHA256a02457efecb8c3cf1d6279914b4505489f648d8e82d47bb6b8ed01e0d64f4b1f
SHA5122322895c34ce10596fb28bb38ef74660d051f5843e1e3c7ca24d26b69746aa5783bd8b22c03faea45d26d003a638119f04628ae9456219ec8afad3da0755b06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d7be642b3ef0c1fa349bf65b95b7aec
SHA13266bc6bef549240d165db64ae817245bbef27c5
SHA2567089f606974b8b8bb94b11dacc390754defb1b516edc5639825325be4e27f285
SHA512b65e8d9ab7b7c9108d803a0f6f4f609558133be3aa7f09d57abe282117e293c2661a7834fd47a0695d19908c936bfe33db5718d537cf010b664232672dc3a84c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531edff09729caeab146b9039abb6e3ad
SHA18b47bc44a3d0c3abc3094e80e4646d7ca8baa81e
SHA256f1464f80c81e3a877a3edf1bb3aab689af80783604cde0fe8494cef803fa20bd
SHA51253350c1513843f44117c2d495423a998a00ba92e893505123f311519f01fa4aa71aa26be4a91e9bdc9a18dbaf749b3496422d25e35a15d6309a0e7bc5f986b9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c2ffb0f4b92eef24abacafb8afbfb9e
SHA169ebce21d1430e450db223b044aa0a2107a3eea6
SHA25664eca776347ac9b992d110d30ccbbb25509493732d2a4a285b583990cd171473
SHA5129ffab596872637226ee8a1bca67d2ec52cbd83aac1464a26865c0ec9d12060e8008cfaab01fbd277779d2fb70fc066665e58213b00dd9c8265ac4f420453d139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb10e1a129376bfaf5bde09879eb3b93
SHA120f1efc55803b5ab7ca9f71d4cc18fe7e337d274
SHA2560229993bc350d055d420f12661d27373a1261a656e98db520ec3ef5ef5cbfb6c
SHA512d07feb436655c6b50183c9ed36037d975a77e805fef23926a606da45039eea47229ca88414858945bf63b7ac01afce655c12084ce09d7e95759c7e27af94c773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cd153c584a6b80315096bc374d5a323
SHA187db43c9f533b7cb8d689bf498f499566a429217
SHA256d06573207be622a288cf018b67d701adf403385f9e4132d34c1249494b7aaa96
SHA51236d997844159a3876f8dc58f093b611ca5935e55a0b3e01ad04b9351f07f3f956cb24629de75e356b2e88f5d9730555d20cc90c86309aff5b3813b22a45b8c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523cdf6b029b9eb797b2537f9f4ff4b6c
SHA1b7606ee17853c67c2f2f1b3a1b94b61c6b0d98a3
SHA2560855827f40003e1e6ef4ea6afdd4f803783584f0d5beffd592b1fe00723d466b
SHA512a3aed424e316b76e20e77dba62c6c32437ba5b38bc685e5ed86f15b5a2cc0f713672e4aec9585307f77f12358dbcb8ed5833b3203ca7ef78c8c0686fd76fd59a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee8ce1ebf7a41072e4410d0830af730b
SHA13a3cf4285e6c6240597ae9c1d870f7c08b18341a
SHA256baf82e27aa5dfe2a6d8a7082b6358c1a5d314ad0d0f8bc8d4cee55123f2483ea
SHA51294359db676a03ea502b67db115322cd5c4bb7c93c705118ac366b394ffc051190cc2f33cf8b0d9b77811fb2481bff20ace96a5976b669e5fa35974f76397ebde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c68df58a8b61d811fc0ee632e4f4f7e
SHA17395dd07ca43d7f9af78d580fb94d769c77b3d10
SHA256ef900cc310b0a1140183221caf8b466f58a9c6e3f1c992cf60c1f16aef41a8b0
SHA512ddecec2f33a0f8fbf7c86b4a9f5b8be1ab6db26f9f2ce80e8cc203cda3ee3d690ef3dd5523cafe110c7bd1da1b05b9603c36e48d4b000dde5628f56cae14ccc7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b