Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 09:34
Static task
static1
Behavioral task
behavioral1
Sample
2ec3b1d92c15fc32139670b4f9dc7b64_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ec3b1d92c15fc32139670b4f9dc7b64_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2ec3b1d92c15fc32139670b4f9dc7b64_JaffaCakes118.html
-
Size
27KB
-
MD5
2ec3b1d92c15fc32139670b4f9dc7b64
-
SHA1
0215645008ddf63175100374f187ac37bc434aae
-
SHA256
ab72060960323f34459244f140cbc18fded967377ae102f83358810afa40bd67
-
SHA512
f8d0709a98308034b306dafe9bf33d87ce1aaafde3171c84017dd09a530f3a03642ff8dccf5cff8f9cd4ada838ac1ee21ca048f124d3eacd4969192dbda4922a
-
SSDEEP
768:SDzdsFqvfudlQVV1C5m1CCCcmzm3C/CnCQG2GkIpdAeV0yjtz2:SHdsFqvfug1C5m1CCCcmzm3C/CnCQpD7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0E2A9D81-868C-11EF-A7A5-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000002f4defb207c5eaad7191d46e578a27d46ee31e730c3e0b654f79564b2c0193ac000000000e800000000200002000000028a6ff4b6407bb2df2680144b7e39aef0ceb1fd77783f244a9b5f439a1808eed200000004f0fad53fe1c822b10c532519a050e6b9461f4b806335ded9f3004ca21732b82400000007dd8cfc06f166f14736bfe261f3eaeade1e174b9f94822f935c6111e3942b628baf29b94163eefd0b73f1358a77cf93f34c58b9704f0c9eb46d64196dd14c26e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434674037" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 801b9f11991adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE 1628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1628 2148 iexplore.exe 30 PID 2148 wrote to memory of 1628 2148 iexplore.exe 30 PID 2148 wrote to memory of 1628 2148 iexplore.exe 30 PID 2148 wrote to memory of 1628 2148 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ec3b1d92c15fc32139670b4f9dc7b64_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54a4bed374b4bd90d2a1dbe71e246411f
SHA11a4de264f9c66bdfba3d2b96672cd46df594248c
SHA256ddafab094c665844cd4ce35a595d6576d3723fb1a7947b2d85b717aba7607766
SHA5125361f6b1ec53139841a6a46297d94c414fd0ec09b1fa890e81072045b5ddf4708ba4fc3f16a8204260467432415b3dab5e51496f2078ae219cc873ce927133f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c197c0097e7645a25eafa3fadb279e1
SHA1d73bfd9328e707843fa0a688fbf24a94045a99b1
SHA25699f82fe9062cf23dd549515086117228af2d483de8a4d5ed0bf68227e131240a
SHA5126be79e3e4b9857f01e82807a98fb43871e24f1a7f21b0cafedb9eef2ec7a277b46c5f233936a546afc64cdd022253876fe5ee77dd32b0acfdc3442f3fd0619f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536ea069479c819964e08d7467ed70678
SHA1ed6cbf8a361ca0dc1bcf84c8d1ed839b89920a7b
SHA25602600788c930405bfd56ff3b7092980782db4df9387fecf296ce581f1822ee92
SHA5129d4f47f6272b56132a06e8156637b60e7f4e78df4d91e92e901f6c51cd1f60e75ac1424e5d0492fe7528fb6273466049769d6293da63ee22a2a8266ae8ccf5f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54971e33edee7d4b8fb0490d0d386b03d
SHA152a3527450740a5ea01f619e6a052f1626ecf61f
SHA256eb9bda5e307396e7fc18edcb4c51f29218395346991189bdfecac8579cd74232
SHA512524e5bbb26087695925a562c532a29448e4d06ff097f942b5cabe060d68143e8cc9b5461197e711f6a40721a8c4edbe712ae482fdaa19985bf2611e9c7dbc592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521a5e3b081e510a7d214ba65771f445b
SHA1b0c64af1560c5083915e3a299bc45da9437e4b9d
SHA256b7e59e621f58e59e1d64e3b09dedd829389d62df8f3ca58d02166fb95a709661
SHA51206d66ac262eb7cd2db3df182adff05c15ea19328ee1c67d7ad0fd30e61da5a8b048b11a504c3e3dc517d3fc69f81bbce151a8909c1a968125141fa028f8cd419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c141b14bc116171ca5f6754e21cfb7e6
SHA13027f7cceb65df4c3d3fdc27f83e5a1515f1bcca
SHA25632e46614793f50253698e9c9e7deda10effb491da3b3b6fdd46e03d7c501023e
SHA51209385ab4f7f9e71fb56a41b535cb6384ff9545ff287d7820d57bc82e5b1a3d9c02a2aff30ad639218eb26a5a04123555d88f241eb7eb1f7e84db2a0446c05f86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc27f2d9fa5d5cb2dcb8ace3fca59b38
SHA1b475760347c761fd5e62ee559d3271c7dc312d4c
SHA256324df1007996a085275c453ac9c7ad21e2ad56bd70630af3725bb9fbf56cb890
SHA5122cb603a4cb7062bba02e4ccb2536761db345f701a9604175a3beeaaae86fad0bb5f99e37a14a87975b39cd9c6baffa4193842d34593c901a491bfa360588716c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d8aa6949fbab6f4f5fd2ccf11aa2f90
SHA1262a7078874a8106cef75c83ed57003d7478e704
SHA256ae5aa656b05d3092d1accaa49055195a7d14ee5c31aa6d602a9c3c5125d4e108
SHA51245fff85c40bbb30ba061937a5b48d03ff14aac3237b68438b431e6726025a8f76801b801244af983628508c3213ffecd576c85d9d805f480d9dc64cce2983ad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5934f05b617078a77a8269677f5de1a59
SHA1087e2359f1145bf91c2c6bae77546fcd74cf0920
SHA2564d2130a80eeee048914511cf812f536c264914e03fd3f91f8597d8d73e8b9c19
SHA5123f5a6f93f4daa20d5c8f1e2b9994cbb91022bdadbfe15b0ee37e506a9c5a104bdd834efc693ea74cddb6511cc07e6a6367d8a3bf1c3c2a3ef7e9c0aca97454e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc2ad10dd59f0156c4ea97bed15fb456
SHA1d48d69750a3d091c27f2867c1047af2b04d41d46
SHA256d11232276bd355c8d94bdfbd4402fb2d6193e08e7c6a50d85dec4bd85e176c7b
SHA5128ad70ae25709e600572860442154e369c42746f3f54e214695386ed179ba82ff2e09ab938ab507bd42028da804353bc370088e80ff3370d8af562a8ae84da03e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500037e43a9f06f2d972e80ea1532546f
SHA12c601b3a4e8ad8458dedcdcc937ce282e0e44faf
SHA256df5b1b23d5377a498dbabc4a5ae488496ed2b484951c907c075d0a23af2e24f6
SHA5128fbba14903d7e331f367205e81d03997f69abd444c1d20edcc7b4bea4ba1334a919580db044b18cc9eb8aa288ef674c109fe54c2fd302c140f5523545dcd74bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD554075fd5ec77a96deb0520b4b9fcc265
SHA181137202017ec2845cab02c6014d0365f3508760
SHA2568fb7ced5a4ddacce474210f33ea0faf48037ebd6019029b9ce805a6d178b5fb6
SHA51212885b1659a38af346cd64a739c75510e304229e177e663c57db9aa48f6260f9daa8792aee75bed86b76923c6b507f66344a02b5886d65469fbfc61430e5be18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5fd8db93c2de8456bcc9d76c5ecba7f9f
SHA1d61afe829b6101604e707fd05d8ff4f08d43c654
SHA2566e5ea025c4136675b3b3cf21a78d9e4f352540175fef397f0a9856e93fc64f1e
SHA51285f217f8a8df91a3604e89afea63a03ff11d3003bfe7e6969b643786b06ada86a405a95ea2cc41f068a8d3cb94a7bf4404d1bf3f13942dc0973b9d206d52e6b7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0I0VVMWQ\style5[1].htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CXRG2YQS\superfish[1].htm
Filesize122B
MD500d64a82ba2d055e5facd3a30efac924
SHA1308e275068e3bec5effca608fe9df2008c979650
SHA256aaa3feed097fda6687c7c27860c24980f3ff105b6f326d10c98854145e9afa6b
SHA5121151e227086964ec19c11eb388ace411a56a6e1da96409b2bfdb5313fb5df75223add437a653decf3afdfbd2be2cde421c512f9de423ad74f2ebbaf81119d8fc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b