Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 09:18
Static task
static1
Behavioral task
behavioral1
Sample
2e912cc66a629057143fea648eed4a5d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e912cc66a629057143fea648eed4a5d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2e912cc66a629057143fea648eed4a5d_JaffaCakes118.html
-
Size
138KB
-
MD5
2e912cc66a629057143fea648eed4a5d
-
SHA1
f73493c1a228045f9a31cd178e8f63620bcda291
-
SHA256
bff8842ff6645c32d1b1231b2f083e85cd40258f41ae22722138a4a34829ef21
-
SHA512
e063ab9765fe247c8d1ff19ec63a4b549468c22f86c39f0a41be28fc8337e70656b3371d3a2c80ec097f4579962f7451695169b7afad2a7cfb898c36a03abc16
-
SSDEEP
1536:S4tZMFoalwqyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:S4hGyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000009cba992b24d79d9d6fb2dc160eafdcb75f97f0a5fc8c8eed3c6033a5719d6be3000000000e8000000002000020000000baef75dea9740337b4ff5f7991f684bf9f7e1a43a02a4a6815f02235d6baab8620000000ed649b9e7a86e5b7e2c69d18a0f6e7a99353740918dcb23796d6f6a949c03a0c400000000fbf2163a4b8776a466e6290ac39964ecaff3cc80f2e8dbea4375e353e15a0d24b52b7ea26a978832a71593f1e2912cfb452dc3a35144b0e7b46c5264fb0ed45 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BE957BF1-8686-11EF-9E32-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 806d60d6931adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434671744" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 748 IEXPLORE.EXE 748 IEXPLORE.EXE 748 IEXPLORE.EXE 748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 748 2344 iexplore.exe 31 PID 2344 wrote to memory of 748 2344 iexplore.exe 31 PID 2344 wrote to memory of 748 2344 iexplore.exe 31 PID 2344 wrote to memory of 748 2344 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2e912cc66a629057143fea648eed4a5d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c2ef3e42a3e8013d90ca55278ce2fb4
SHA1c2b44f064703a73eb63d6aa50ce1390c1d5af888
SHA2567e9d727ac38769be61c131a3f1b45d9f3d287598dc746e7a88cd37d22ca60e42
SHA512b3d14ed59904139e4231a4721f115eb0c8e668e43372d23e4225061fbc4e84b6014780d9b33ad619cb4058d931e40489e80b148a2de0e89d8d532ee3b3707b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535b2640cbd35a2371646786853887aee
SHA1c05e46f935f6c66a51a65ab59981d6d512a8213d
SHA25618ce61a0bb066efb9579b52bc9adeb592aca4c3e66b923e27ed3c235e67e671f
SHA51293300a260a98bed24fb01f08d43699a774dde1f569f9cb7870d2b8649963e15b04b8a3e13e4aa9b2c785360aafd54df72d61c0e53c1d8e681a97ea5d21e42fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c0dfa048108ed609fa20bb2a1d2f14f
SHA1409090dfec179975c6d833bdb4ca45c1a706a92c
SHA25625ee719ddea33bfe8c892a88453c9c8ba99f366964bf9abbef6eb1ad3591f44a
SHA5124b1c3fe266c012dec33983f5c0fad4dc842f01affb9b86b003c22bbc6d6447865d544cda9e39de89f2248e9bb5d13ecc894428217551402ee2a1492235100aa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ed645d3d81f1d4cdf2c5113dc73fc21
SHA12ecde946e620727bfba810175637c061d7d76107
SHA2562135fbbd120525a09749ec4e6d3054183340bc3b200448e4a7e637368a10bee1
SHA512ed4fadaec904bb5eeb40ff21e2a3bcf1460513d4905190ecd40d7399bcc0ffd683fc81bfabb38108c1d7679fa5359fb3ec8e1245ae11aa29c8366848e704e2cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fbc434a21c1329eae2c1a81d0f3bec3
SHA1c193496646bec17131863bd0fa35b61ef61be3a8
SHA2563be2f44d26b28380cde1d6927a260ea2af9cab68df55d8e55f39c09d8806e5fc
SHA512f8fecb24ef80744fa6d1983f5cdf03203a6c8acd46921ad976a9049d43b0aecf485a9554dc6138d5d306389c187da8b479bf523038acd0df8387c78468db8bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adb9bb950f0c987b04f171b7aae751fd
SHA18916389c4d1c4e3c5dace1e0bd45d5cfa7dd1dd9
SHA256f079f17c60c72d22e7a5a900efad79cba700b93ca06e819a43fcc36a4d1a54f3
SHA5124b708b94dc2a1777bab2ca5597b59a28cfdfd1eef4b494166084bbb11f0e69e994c68f366edaa0147a6b14c6ce6a2e94c1c9fb7a6886ee8a96479e36e8db92bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b80e8034758574a4440e636c8a2bb2ac
SHA19e0f41d354c2fd67b63c8b71ed3073330ba3bb6c
SHA25627e401d171fe3a2b1ec2b551c681642aa0ac1b24a725211fe6bc55a257ad06e1
SHA512ba6d9c91a1c24ad1993cdd338bc988f1b66d84e17a7333b0fc4c72586be41bede155ab6cda53720ce28d7871d3feaaab9033c94cf6a4c5daa2c082449554af5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a962aef3f493f293a1725471e83ed6e
SHA1290d3817f3162bb7d9bd22531c998664bd4cb60f
SHA2560bdb0c7061b9a737025503962acee2e737a2216574561b7489b5909d3238b766
SHA512ba373dbd9dc501c5cf3f7da25d006b5bb6a35e27539c831248d5487410d582550d403af5c8121dd3aa24a49476131546cb5d8a9af5a29f639d3ac0b0c4a0bd0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cd3ff01279c7460bc4979247c6cdbe0
SHA1ad53c01e8df7d6bc6b0b2efce88d06b96358668d
SHA256e2a216182dd42d85fa790b3446b7d555183072940ff196b7fc6fcfa6f45665cf
SHA5125204b60425c57e7442f01954e7939772389d2ab9c3f4a4a002f304ca72be9f3c6d995287464419719eab5addf3853b461186028baf3246d5ab31e5325af00430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a4e7d902497a86fef3017d0b6844562
SHA155213fe20b926d7c07de76127f6e3b19bacbae4a
SHA256d177e712f5d31c61a5908aa92f73926e42b1af8c48e13086cf3cdf9a54311ea9
SHA512ab2176e54fa6eee678466cf6337f1f56e5f2a131e89438db1b7909dbb6d0138e0208d8a9e81f016c1c69c5d7980d5f5d4c77b5db0c38c5af56bca63e05b17449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5022507dc0823c44ad55eca8d6fbba9d3
SHA1020f482b4483ce369c7e06385fd5a5355f0fae1a
SHA256a21565c03a739a56ee1d6432402fb0cb4e64dcf70a28557e3043d8f88acf0930
SHA51244f6757df213d03205f94ad5ee0d214a7a36944e10fcbf4f6bbd0ed6c7f38d57a9e3775882612aa62a362a13eafc302687861a5287e193c0644411e54a3da5f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a451a51c392316ab6989c534cf6ddb8d
SHA1a75d5fc960986f7e47192483ef728c3fcd694e41
SHA25655c78f4c10c57a8c4b5c7368f46edfb768fea63570079cd8a2c1027037150620
SHA512354374f670da73679665a45c310efa689b8355993a044655da856388e982b623836ef4bcd5e5bf4fdb50ee860fff4186e7c3d15baaab63ad5929595f5ade0037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e80c172a9020f705d844161d957914af
SHA1875d4399385e68e8cdb8f3754901fd386cde3672
SHA25664d1a987ffb6c9671f9f0de96b7a3e9fd1619eb5537f88a4049055e261cdb66a
SHA51217d233a2e986a0ba43dd5fe3b22de388a06a2b6f6b144cce41a2329f04142ef8484f947ec7199dd939fab8b52bfc9f0117b6665c52a5839239e9b1dc3af66394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc438900b70c96048699a42c5aaa5e6b
SHA140cb387da992f6390134d11f377cdd28a9c90ed4
SHA256bb18d94265b25f2a1d63d76431ed1c8aae73d90f59c3ea1da376b9c3267d99bf
SHA51219700dcc3217554e5cdbc41c271adf34db0ec94e58cbbf5f5d2e0c495b9e46cacf2f1fc2c3b2072d52c2e9eecf3705ffffdad4404c4d5741bdb19d8ce01ab592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5976ef9f5210bf3119e37c718c8b970e9
SHA1a7596cc7dd2706d1b4199e9d463c64a9e27d7b39
SHA256d488df0c2b90e050fae72c21294fd3c85e4690a4b08693b9518c15b96020181b
SHA512c4b699147e6d27f7e95a4d97e6da69655b5fe6a0da888ca5841b8e8d8d442926de0907381860394c92e4f7469911c68d51ea02125b68f36ab0cd58867bf8f05b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e25b582a8ba1978891885bb17cb96dd3
SHA1ed8584ee01d2560c788747f05bd56d0943a7d7b9
SHA256d467197dd22ed43567f72c1e8b7e0577e5fe1b181ac0f16c66c7ca25d35e2e5e
SHA5122ca1e72915a219b1ec295db4e8a14f579fe3fb4a17e40800068937e847314652e14541ba49fd9cd59d66b2180bd0cb2ea5201451b283a2a94fd359e730c71767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55148b568147f258d18d24516134f8242
SHA1bd238c2773a98aab964929a2784d13119f5d397c
SHA25608a031682fccb3905ab0a80518f96344ca1e9e279bcfc4d2f4100680ee14ea74
SHA51250eea3699f74333432c46a9bd1ae154752be29f6295fe0c10aa47c29f036a75c07ec0f7137085b939db5033cfc7fbcd5b9b2996fd51a79417511e093b4358509
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b