Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 09:18
Static task
static1
Behavioral task
behavioral1
Sample
2e92284a6cbce6c5f8cb7f4d91b84779_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e92284a6cbce6c5f8cb7f4d91b84779_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2e92284a6cbce6c5f8cb7f4d91b84779_JaffaCakes118.html
-
Size
8KB
-
MD5
2e92284a6cbce6c5f8cb7f4d91b84779
-
SHA1
3d481af832d3ab297bd88597a9ffd720fbe85585
-
SHA256
41ad4460f4b9df997e1533b9148319d42a952fb9c826ba94820a7f44768581ff
-
SHA512
38bd11adbb9fbf1bf1487858c2b302efdfaf32c7fe8efa2f0cf7e9f95756033298b2701ecd15dd6f6fb902b14147150aa94c2e09460df2276e6f383cbad1aa31
-
SSDEEP
96:PhF8qgIaPvALNQxZao+8Z0DokclyPhlNWzjsGs0QapqWdUNH0igo/:JF8tgSDao+9+QnMLpho/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000058c45033e88804f0b64420d2bdd957ebac7c5f54533a044a75ae2bcaf623657000000000e8000000002000020000000d22f585a4da15fbd459479eaf84e0e877c0fa901da5c08d6108910eb92a6cf0c200000002b03c59492c3599df9c5896c00fe6af7d38d989196fde5c87da270b8406ab5fe4000000045548906e58c904f90f40909041d4f9b781d13247029ae52be22ec8c671ccfbfbcc82fd620b9cdf301bef8587eb6245c91049512842664636cf9c6afa86d8e94 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D1A6FC01-8686-11EF-87E3-523A95B0E536} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434671774" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c000c1a7931adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2020 2348 iexplore.exe 30 PID 2348 wrote to memory of 2020 2348 iexplore.exe 30 PID 2348 wrote to memory of 2020 2348 iexplore.exe 30 PID 2348 wrote to memory of 2020 2348 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2e92284a6cbce6c5f8cb7f4d91b84779_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54862083142b62aff4dff9ffff4bc9bfc
SHA1a5f75e2c319ab52eba6d176ca18a0c7c1df062d3
SHA2566053f87aac21bc740ca2dc9a38ba213bf77140586cb5e2c31437beb14629ce1e
SHA51251632346dd9fd93c9dc13af003076e5e0c1292cfa8a0a57d6e6ffbdb05c8d316f9fc288d059b881fef1240c09fdcf94cb096727d848193335a810cfdd311156b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b6810051a5eeb4bee6a08ef11b1d4f5
SHA1100b6dffc59b95883b6dee652a0ddd75903c9e32
SHA25608589bab25e7ea936eacb0e82f99538244617686f82b3ff1359d948350357f07
SHA512e5deea040c08faa48d060f905128b14daf2530ef92ed7b892e411dc23508bf83b4f313379b14ad3c0340ad426f7c3aac5b3fad6ddaa59bac614795b245891e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe0110be064b6a0083c87a9ecb3f277c
SHA1b5349e50ec9831d35eff8d0525560d1dbf31fe02
SHA2568bd4dbd030c1a5b310ee070bfe766a39253798d2180d7e5680d8e59a944843f7
SHA5129d7d904cd726ad2ce1b6ec955696262503cfc85f4f1cd04d21a6ad4cadf1cdf98c92f5172759fe82727e2b3c91b30f894be51226a57c7a835fba69e79d000e6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bef3e1c3743e0038eb402d5a6bf87d94
SHA1501b3e5fc2ce16526c8488e942f2df869b972da9
SHA256855b3baf5aec5c4f076bad6d1fb03d3e0ad572d881f884bee283e4aa827a196c
SHA51221e8fb2015fd90c22cdc627c5d5b4a09591cd37988fe58288dcc6668ab75337927882116c3db60cd4db01de8b98e4fe74e3ed2e37eac98284bc09bff0a61de6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ac9206472881fa1fed42c12c1bac301
SHA1b909d34c8252a40f25b1b1b8b1b23eb3a44d4ce5
SHA256e7777ca943dde4de7f02daa1ecbd7dd5164d25f84e41230d344cf19c0231460e
SHA5123024b8feb92358f6f0d44e33a89cfd5cae917118b12af2a94adce59fa33c363c60793bfed039cd75e1e7c0e4881cd00d1a27318746e84de403e9339ed8ed59ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50acb120322abc7b9454ecb3db22c3719
SHA1ef1041e4fb561fe26b01f3fb7333773a450e9356
SHA256a43d1f787b13b5a9684715cf3aab24df046f7c3438beeb5c84d0a656861b9a22
SHA5127f9bf7d838fea41e73e0003453f4ccee0b0d36651e5f45f1c47822a76f94d60b7d7415757e83b5b843fb6361a4ba9b600a8097aa5a572719ce060d8293028244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589527544595b613af8bc3bf53b405fb0
SHA1a952e75537423bf589bb7afb0c58c7c0f4a5320b
SHA2569dc47f93b74f7f2aa20a7aed8c2c10a3a2602f02d18a3b13747093197742e978
SHA512d8ba948bbb97379ce69e77b9e2d0f1bfae22f6f629fd7cdd9617afdd5ad53c85ef34e43f9fe2895fcb09a5f3059afc8becf5f072553a1058061859811af3038c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558768969dd2cf16f7ffb5c6369b9d9a3
SHA1585692314c51c267cac37cc2cde158586f3cb977
SHA256813d782d431a941929f620caf979ab3d63b9b9c1ee0d4e23f84f9340106087c8
SHA51252b1e78c7670b76b603380c93a81e4b7529c51f68587b1285818c6489ae0456366bfb676b46c011bea1ca00f9114e0b10a72c58cfa3c3364c8171294e731b855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6303e46e967364de1839b15347d5ccc
SHA1bd783fe4473a039c3953aecdd0f77dd1b00b967e
SHA2564650ee16d9b88415167b9a65f7ffd63426ca6a8318237ef47ed259864fc5099c
SHA5123bf7c71e6c6702887251ac118f4bc06f1a10320c8cdb2b4c38129774eb1d8b3c7e885350350a5fa05d591be0b117649eee6e57fe842bde37acf08b2e4fc4d3df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d12b8a7b0b98d92554a91a9887a54c71
SHA18dd5a9183ca8cc6a1f7be75ba7268c3006f3e8b5
SHA256c453ba023d460af2ee920282af58688696dbc2393fa810c0b1bfc8b2918fa8a5
SHA5122847cca9bea37289651f264edbd0466a646227f86c4a0939850e69f4cf0c06d0258e45ccff61d0c325b62bc9d5241ac0e90f847f3091fcb5a0c9f142c405dc3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcabaa953144808a433c97d85931f378
SHA12a09010696cec9c175fb59a63ea44a9c926cc985
SHA2561933b3953b87b1bef67a377d577fd4151a9fab7899285803ede31bedb4df5397
SHA51284ee809aece9cec97ccca673943b879bd78b0408c279945973320ce7a61f8204e5d122a1d900cdc617a1b54e9d5520247aacb82bce4ba3a4a179092a4041394a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e1297d682fd17a05ea098d8692cdb43
SHA1a541cee98e79f5c4c1a980fee279fcefb41f512e
SHA2564500045fa06b3667949a12ffe6ad33df224d8be9bff1b119dcf8170fa299deb3
SHA512373ac453a222b9de4ee20dfcf0f4f8820d5f2ed5e203f54610a6b194d71ef0dfb7207b400fcaab26a8e6fa99fad2015339add081f8b662060b268e0a2ad1022e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5092e6802fdd23ed00ddd4ea88b9de046
SHA1700b2166eb534d9955fe979a85dca4f26cdc5495
SHA256633ff2e858bea6b5f7e90361a304189c80371296e1d0486c8b5702663ff9e063
SHA51270ae8aeff9549fc73027402ed419c77d96c5de15e65e968af97ef60b610b3fe117c258f2893d07cc2025e6d925062eca046e33023ba7688b1b7daae513d6ce6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d2e64b99435b38e75cc07e6f163dae0
SHA1440d7909fca488d6b702020bbb050544f4102935
SHA2564e52b3994c29d8180730c637ea79c13ce401e062c433bf006b3b813914202c89
SHA512760129d87f666dd92e781fe0bfe5ae80cedc914c0124520201f6e1366b07e9f3f4fff8a353508386a4b5c58d4620b48bee2fa84381a6efe83ce9a6708ca9d2ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e6233fa37f6c81b1f4e9a914608db49
SHA146d4bf4e96a4d574a44c5222ccc941b08961b93e
SHA2568156be7e1ce84b6e71e723ab5a2b021c0ca773923debd7ea006900a14fe90239
SHA512a36580fc88ee39094847119d82825a34b60181def59b40dd19dae3e57312093945fa19eadfaf29aa2d010fd829bb45bb47c25802707e4655ddcfd1d63cb543ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568a1c3456e7923254425eaf55dcd1d47
SHA14bfcbf61f8e7657ac606523c86ba3d4f81d8eef2
SHA25627317075fc7e672d8b89cea075937efd04f966f1aebe94790a6f0ca8e00f28a8
SHA51200c180b9d6ece1c7a3d158776a667c51aa00871514382760b29b1d13fc52374197115fb39621c79eae3f6523405b0c4df4cc6374d9ade65f5c9f8b3f2c592bbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5479e04f71b66750eb5196a6d96257a69
SHA1e57b91241a0fd592b1027334dd31dc3d205b8e26
SHA25677e80e3fb4d628c9af23a4ff4f58d8f0e9628d33ba25df1134ad76e9c9efd355
SHA51222f77972193f8d231ec23faeeadbd8ac4d0f3d62b8671945b79f7c7a552c2d4e77d185b9a994c619f2c23b6b011aaa7de17baeeff753868e9b6b23c0daba2df6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b998daea692f26beed68871f83caa447
SHA1041fc167b776e9f63b0aa3c451789c059d580b25
SHA256ca43aca4e03b8f68dea53c9fb51f09064501ba13b602ae0befdb91ab79017295
SHA512c237990d81cf7414b2b8f0db402e78d1106129fe2dd86e53298f546577c9cd6679970fffb9da7dc1d97afd39a2d207e73379107f749401f22b14a52dd40e15ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7affc676de298552ce8213361169b90
SHA105a18f8365c4e77bfdb74c624abdcf29822a0a4a
SHA25606cbecb4e961a240800771c97c95fa2bf24f469b7d495c74cdab10654d83d98c
SHA5126038699a5a135b8fbe86c523b975298741c34f20cb83f25cfefcfb7aa6a6abd01e3a0f3a1e3c4403de574a086e809ca5eb64fd92bd8a8c7edb2242c12bb46aff
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b