Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
73s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 09:41
Static task
static1
Behavioral task
behavioral1
Sample
2edc1e155d5b3f5bc12cae6f11d0ac71_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2edc1e155d5b3f5bc12cae6f11d0ac71_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2edc1e155d5b3f5bc12cae6f11d0ac71_JaffaCakes118.html
-
Size
21KB
-
MD5
2edc1e155d5b3f5bc12cae6f11d0ac71
-
SHA1
9d9997ded009477bda489ff98f6eb00bbcae7114
-
SHA256
b1c0c62e7a62b030cffe79cb533b65a5aacaea9188d4802c08e6686324a8d329
-
SHA512
56122ee7e2f3e52fb6afc827b95a9094b6afba8bd7e9fe13c8cd394b258c9252ad053d44a80f7f73aff8f605f4dd82567b96959ed5b99d6e7d39ae889c56a1a4
-
SSDEEP
192:v8CLsWtnjnQjHnQ30nQiemnwGnQOkIn8CPnQT5nQnQQIoI7bMvnXoAMtn4nQ76BV:UuPmWMvxLL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB9A8FF1-868B-11EF-AC25-4298DBAE743E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000696b4f0cb58635169b402f08749bdbd8179f43c996fd69513f2e2181ccb1f618000000000e80000000020000200000001f128566a2f1f1a0767f54771d3882514e3eeb733ea5a0e7773feb08091da2b820000000e42a975df310d0b105e5665d04c47a2161e6518395eb3c13fe139f4b89df26e04000000097b0c6b96aeff28e7715c6030c444c7d3856f3d4a90ce2f3fa7422453d8cf93ed70bce157b18d849b70fa6c38a2672653544f6d122510fefdc20f4b962a83598 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 406b40c0981adb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434673966" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2268 iexplore.exe 2268 iexplore.exe 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2204 2268 iexplore.exe 29 PID 2268 wrote to memory of 2204 2268 iexplore.exe 29 PID 2268 wrote to memory of 2204 2268 iexplore.exe 29 PID 2268 wrote to memory of 2204 2268 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2edc1e155d5b3f5bc12cae6f11d0ac71_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f2a7fc17dbf9d64eec7c9def31e81c2
SHA1488f1c9cc2a1e6f345245fc9cfc161b54cb05225
SHA25602c41cb9c4e129b1bb8d6a4e3f0b152b0dfeaacfc01a26a2463d8c392d7b2a2e
SHA512a413962099fd8c1dd3c8f364e88bf7768459ba8bdb49d37aebb8352ce207deb9e27a8973e39198a2ec091e5304e32d4cf65995fde6d2b8e1182f9691d800f88c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dc10b399b1a2e64ac72757404ff86d5
SHA1c46557f6d4526adf1a3b1c52dea7de8100eae0ed
SHA2565ccf0fd741d758527e6f1d627caa6dfe0ca263dafe4f08f0bfad68e6e40bdecc
SHA512059db98e6894f9db30615b985b36be51cef25d3c5556879106e8a113afc7b5bf5361f1c1ba867f8586eb6fa1d407357d6e1bdc1d275730e6b582e43de424bfe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a27013cd49b3a91a8a840db6a07e8f5f
SHA126874385a31e5411fd949b13cf37a6bfa21a6221
SHA2562fae18dccc0e5438436beb1c8ddcb55a7d0f8ea371108f6aa583b1b3c4c32caa
SHA5126331fa33848b019dd45e4d4d38eda3236245ecf24d6b40b19b38ab8229736744691c570ba38a572a6df599bfb9958caede943b949dfa51c6c15fcbe11d7971ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f448ca96c1d41097cbdfa9866149601
SHA14b28acb04201212d0a9280fe19f5eb66ee7d3d1a
SHA25693a21a7b972ef7b2ccd33561052d33d8a5c99dd12da5e5f902bbb1a3304a9b34
SHA512b22a414d7a4d8f50b5b09c0787bdbb87ad521a798cceb606e4c35ede1f0707622f76f2cc560222607ba177677132903073a3ffb5d362ac7d3074dfc1f3538611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d605a6eb5e071bf61248bdb06a4701c8
SHA1963ed80007aa4e2c7e0ce98754445b54b7839a41
SHA256b12882f31a5a4369d042013330a140eb26405d1d203b8cb537b20bdad89933cb
SHA512b37017d05f7a3c0523fb521b5586917d6a863823331ce3758e4d5e6545858a64450ea26da89cde0d626eb444f7690e92123a6286ee0c6e45fbd63b6f9715d1de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c35f6a0bc41f1a105de24b1df570b23a
SHA19e81dd724aec988ea859c518bcc54239999d966d
SHA25683aa0a37572b6de369ac35b48de16ca0cee2fb6af929b81809d2ce53d26c29aa
SHA512dcce228fc9d2ae667ff385d6203810572c9f9ccbb11dc7dc81c61621fcda07a4249ce0f4d5e1fff02d874e12b9e02c36a304a5969b23dd042eaf3c1c15be671c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bab25bfca21533f5e3cdca1037592c4c
SHA1b881f4866a2833c7d5605c83e2ef3ff3c6a544fe
SHA256420b297283c1c53045818aa4b10a2686cfc78352cc47a99bc6eadcde999a162b
SHA5125c14213974d1010f1497436cda5dd3b73fa3e0e7453056bfd3d228c3343a50e2b586717d84e3b2ee1fc694351d61da435ba9a699138ecc04b6e6293b9baab309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9485cfe56b3ddef3461a0d38dcb7426
SHA1e299fab675000050e684a5d0880307fec9c987cb
SHA2561f9733cd450f8f1fb5852020dfb94b8ed633265ab6c67bc4176364413c85adff
SHA51209182c57c6e1986e40bd8fa6b1d08ac3cab246097447150d16db177fd6accf64168fbbb0ece09428ee45aeaf1e347554baef4cd9c286cc64f61d0984b33abc78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b419931ab0b50ab30c8c2d1e2aab950
SHA194c91c7955177dcaf9b78f97e54766bb783ed041
SHA256768ac588ab1c46529f258e7e0d7cfdacff696552bdaf995ef967b4324791afef
SHA512226dfd938878911eb018d6d8470fc4d8949f1ad96f42f4f172b15259c44f7e98cdd8d9e3a6df018ce51a0bfd2cf52c9e18d9a91a47f8b71ef8b6bd73740c6c02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5871b0c215a50b03291c5cd9ffc423d60
SHA117c1ee41bcd8cfe6f454384be0fe2ab1d93f6966
SHA2563a55b805eff75212ff81093904af98db462a661d5eac20f21d608133b9b67531
SHA5121ace5d7397dc8dc96eaaf762a5cfb233fafef38b5bfff354371ec81fbc2997e9757e772ef6efff7f75c677b4eb199b64972b47aec050da7c5ca7f4396c51ec3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afdaca24f2edfbb3d091d18262f1a707
SHA1c6eb1c91251d8f738101d6db023fffe56bd7c78c
SHA25618a874fb58780ab0dce96b992c3acc2958c7f487040db41b014314050b7c53c0
SHA512a98513357a305e75d440f6cc733236b0a5c28fb9b9cf87ca81a3b7b2af8eea10e76c1f7f94cc52e8727ba58023b9e781b2dafbb7d2d6d41bff2ea6201a4ef479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52caf432dd20d356373b94781744a814d
SHA1020a43ca424884aae3dc708cc1de84d784e1c517
SHA256d5207c4a07620328a8af11d63d68532da526e09f8241d12348560081013be4f1
SHA51216190fd1444fefc76bdabe87677f12addbe4af4ea6c1c1d236a2c5a02a005929ce7ccbd32c9e11e944f91bee17272f60c58d4ed8a4f2371bb3641f7d794a8528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5182af492e0e6c3e12208ecf136e81101
SHA1c83d19abc2340652a36e1906cacee199c9069a0f
SHA25601ff5345059d1aa79772be9e2d00b3434bb68ff7d199cde3a88a5fa3497411f9
SHA512516576d200489d48c4a6e2e7112d70ebf876813b3786f76b01ab61e11b84cfb43049f07edf0e979fe9c8ed3d89c18ae2f980cb610c8f5466793fb467d172fdc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559c2b939dfed727a4e3d9408888134dc
SHA114a02757a98053745842fc8d9ff5c7fba0ea7bba
SHA2561250fc47eedbc095ed9f47b991d92f00abbd7a2aa43afa101f03661b7526bd2c
SHA512aae724b2f893e2bd8dff6c42a93c26be92c08f09c8a70c582c922c0df0f3985e58dffc4ba2e1c6044ff7755a886d6417d082b167342a06da0e0f0191d7f53d7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b42e0cabb38da95f6a091b0e2f8a1aa1
SHA13dbaffdd27d6c728ef87e141f52f2310fcff5dac
SHA25693e3063a4b64ee03da19d04abb7a227b6e4758433ebb0e7682411226cfed6bba
SHA512dc41d34484b88d3359fc9f0601abbb9b2fb70cdaf0b63ce7ee835bd8a3be0eb3788d8ca67338405911b689ba47e4af020924ee17d8437079688d5d3ad39d5f9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556823983b44e5dcf9ec5cec5361b1fc4
SHA16d23215b2e639b4a7866452edf1aa53dc04618f2
SHA25615eb6294a3da1f2d018b5263d9dc59525260d3f0732d0fdde1ae3a643e8387d0
SHA51261d21122cb0bf0db2ea9560b4655125ffc11504ae89659a29a3b51b062622042a55f605c0fd51b79f16ff413e1727da684bc1cb7b641bcb1afe2b623034ac787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5370e8687595494c9f82d51ccd095dc46
SHA1222c223098ad89c44395bc3cbf9f2d7e5901b781
SHA2562fe10cf3f0ae1613f97e0682edae30c54d8358bd1f45c1e2e18e2ece10803665
SHA512dc759e1693e5e1ff81d6eeda764b64bd8588f7b54bb33884644687bda1667e55800d8131334cd9047e4bfddff6cd71e80f33bf386f5f56517f20876134c1fba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5409d0c0a929fcb458264dec0a52794a6
SHA1f0b4bed30b75d664392dc6142a90a2b12ee71b58
SHA256cb561f65cc5ebe1048836c5659ecaaf5d8c0f914a4d421cded681651ee3d3f75
SHA512850c258c862703439a3985c106f00e2c2f3aa99725dd56b5cc4875d7b08ab5bce5a39f020d4279a4475da53e2a8f4f928f01e03b58dbc2993bc2a29beef6d6a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f498eb102350817be5f75ba2d8f0d3a6
SHA1e9b856a1333d6b9b82e820704d98fd7c80360ca6
SHA25667ecdcb6d917332e8af401ba944c6eed8ba3fbaa665be58f296f443c69e02745
SHA5128f9fde651bcec32aa02e617718009f990a6326d2b25c72d9520e30230310fc67c3fbcc16f796a0b62d6c0a4fbcff763f5093f59abc109c9d3dfe92ea1c3db6bd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b