Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
2f9c5ef85f28fa0868bb5207e05a0509_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2f9c5ef85f28fa0868bb5207e05a0509_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2f9c5ef85f28fa0868bb5207e05a0509_JaffaCakes118.html
-
Size
15KB
-
MD5
2f9c5ef85f28fa0868bb5207e05a0509
-
SHA1
b6c43c623fdf790ee5a24662fb21731ecb059724
-
SHA256
072d603d3edd32fedf54f30de9f9dcdeab569e8bdc8c484d40ab55649d6534c3
-
SHA512
89bae04a41499ce944d67cb45670a8910f5812c52062dd83a6524cac88abf28464f756c7bd1666059a0ca134746a622d4ac2c1b34cab5f742a512da71975cccd
-
SSDEEP
384:ln8uqnGDnW0qQpq8U54T2L2vBHzq7dyBJYo1K2EH2wLLr5h17MyJdaJ8vb28sh5d:ln8vGDnvWcK5h2+vbVYzwI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434679993" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cba99b1c702a35448a53c10b1cff9e2d000000000200000000001066000000010000200000002589621caca4c47fdae8898f6752ee91b2253b1f6fe83f157f854dee010e7237000000000e8000000002000020000000e17edaf34a76c80be9a478d395534e8288d880d6cf19adaefbada498ea750f3b2000000047b348aaec53573b0b93d0416ba212f49175bc20233a2efde2fd0f124e34df8640000000285adb01cc371ed1f47761b5b041e7499e210fddd73a98c84a747a3f517ea213c68745840fe513e54bc241aa51e069df871bae4d2702a1b2bda595ee961be593 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F3FCADA1-8699-11EF-81CE-7667FF076EE4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0391ce4a61adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3040 iexplore.exe 3040 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2088 3040 iexplore.exe 30 PID 3040 wrote to memory of 2088 3040 iexplore.exe 30 PID 3040 wrote to memory of 2088 3040 iexplore.exe 30 PID 3040 wrote to memory of 2088 3040 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2f9c5ef85f28fa0868bb5207e05a0509_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e5925eaa62eab67b935dc170aed837f
SHA1090fa605fa79a8c96f81b89b673d6e9a9a1746f0
SHA2565b56e51332fa8af2fb89cd196ca598d5cc3f98a7958d5c2aa185ef79d887558e
SHA512f09b6f95336d605b9bb1e1e086b13a5aa17729b0592c853a5f13d446ca9ffc4d234ac5f2150e0f1b94427ff63095a2bbb31c2574c5bbdabdfbc037b58d34fe4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5448559b91d73a86ff3ff5dd8d931e9e9
SHA16f0c1536ebf62c7a010cd1bf8cd06041ccfcaa8a
SHA2569a74b5c8e2bf47e97d0c17955f29002992f210236cf3d7acd1c49f1d1c28dc66
SHA5122f607bfe6203bf5fd3d26f4ca41d8a7100b5c7c7eef5de3848e0fcb08d8dadeb7b83b547404810d62f46251d9a9dc7eea70af9a2b0f587e83c6aba9773843126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c09c362472ecaa46048279f6f6e1869
SHA1be6d22bcd5e4637b9ae566baa4fb775c5ab72de2
SHA2566bfb9f91a0b78ce77ae243be7fc19fdf0ce1f4944cc36a56c262bc71d1e39ae7
SHA5121352dbbb5756e67cc3a6a6972b6b13426fd98e4a544a5bafa7b7844228692b37ead9b52b83742f09971a1db8ae8eaf2042c1de2dce8cb23d09118790b8f074df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541d3a77f5fef49a5bb4bf1c4d27c51bc
SHA18088b9c14d5f94aceec7e1941c2eec82087ae149
SHA256bdaab7ccd0938fc2ba15e63f5cbc18e3f2b8dacf6022decb9b7d384bc2e30078
SHA512a422b34fdbfe1087ac8a970f320e369cc3197df7d60d710157a155374687d341248219a5087ffc2a42600fdff9ac99ebb7db6e5c45b9d7b468c33ef1961eb8e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529d065b87c993e1bf0173ff60c9b3325
SHA16a16f73917c86683f13a9b233cec331c57360611
SHA25644bfe065c4bba42cd8253a18d304131413b612930dc270ad7c504dac56174d42
SHA512f422c54506fa699b3db4debbb162d326c1ac7b4c9b601d5c7365d0e0d9cebb8d30b65d30ac2f2e1550eb21f68551c19e2e22eaac002649281b0eb302aaa48340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aec0ed531846d0ffe24e6b19f6f9b1a
SHA1dc2b0ccb88a8c29190ea2869522d1010c66183ee
SHA256cc16f5e78d8e1ad28a6d1dbb96fc2f3e58fe87dd48164019858b1ea78c1b2eeb
SHA512433e543added45d520e274b3b248107876a753b89809ea95f122b523cc8ea4236466f182cb6c8a83431c9b3c01395a1d0d5370777721fbb85e2110e56862a288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8312be0fe3963a57e57f914e0711376
SHA123939f87321099bcefebdf8cb641f8689da8d5da
SHA2564bb339fe92e50a8d31fe3fc847a8bee7a39b27782028541c8752b366a82452f3
SHA5123934ede3b8f3220bea81a6cc16c7062fa9bc5c2aaa2e97d0bf8324c0a9ffe27bfa487be1d9bc76108ba1ca05c0809d9b4b03045890ee465f314a388d5570d9c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50082b2156f5644c018cc3608f226b20d
SHA16638ad2d74a8da319b2a2010e2829dd06b24cbb7
SHA256dc7e74fdaa948608762f413234df0f29fba6d35931c2fceb839079240e951623
SHA5126c71cf99ca196a3006d3d0f552dc010c39f69d9be72c9cea515d129369257edee63b660e1d5af7ee1653dbdd60b5b1b734a6f6df27ef5b678110950ca8b460e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5790d389aa891fec7a6e06ec688130d50
SHA1645db21bf7d529363f16f5ba7d6e54248600ece6
SHA25614e3038c25d01bd3936aece5e6942579d24da1b0aeaeb370cc9d4fc9980e3759
SHA5124a0531f29a4d63ecb1f06371b474bdcc3009d594febc2c877baff729ca17c3b2ea009265b0a41b995c2e1483654768d63c11df7430343c0408003c311ce3cc56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a76d6761b8e37b23a55fddc3dc7eb44
SHA1bf1cf4a5e02ace59fb981980896e2fb7f81a8d9b
SHA25648e2a654303bb429918c6172fa7a3e5d3eea28455e9fe6d43ffeeb00815e85e8
SHA5125f5ecf0ba520a1c5e89a12e14d2aff1fd8a08718bb9d423a1448a8797eefab1036bd0efd806dd7c304c2ffd5ba1122050fc2de198efaa509a0bafe028f27d890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2c39c163b092c8e41595fc8d01d2483
SHA18c4bc90a1ac4adb7a4077d60ea93a17ec21b2ca7
SHA256ab46022c22b2ecc9a2af0dcf1a2db98df7058bee435ef546957ff1db07da916e
SHA512e0bb01be26dab2386174089b8178bed8dbd4268589c288cd517767f19a35100f516cf7d39bb251ddf7010c8545fd05264e8ab67282a4b3e37157af089c25098f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e5943969a71d864763c73b2392c76a1
SHA1a53baa276601cacddd7841bb26acabcfcda39e20
SHA256101ff47b0ad6509fae9fc084142a00190a4a0a2f4f475ff6db582ea620efbccd
SHA512e6110f4ed38da6e6d50a2f8273b225c62328c71e8dd9d2665af76613ff7fbb0c6bb8ec4d8cc15d15c06c4cd6c40a20263bd971b92ec0c95d502f33a5324c273b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fceeafaf36c7462fb6b2cc3114750e3d
SHA140648f053b8e5b5adb2694dc560187a629259ada
SHA256bd086070bd39820c7bb7fed7234109e6b6b3359e4bfeba5b82e798b05d17b7e4
SHA512329d37595102558c2d8cf31db18b56d81f602108a28af2223cd6560cda08e6ffa4b513524f0bc557463d30cbbbe006318d9db8e8767e51139dedb35f8ae99129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bdf171c34c66bc1ee179eb8aa428640
SHA1a572f16b1ef974c4349f0d2399f522ac58f92be6
SHA256fbbda02e240583f2799a7d1e3cb3fa7de0b1582f51ad78b06028302a09bbb8ee
SHA5127650ba3cda44af9eea718df4f756433b920385fc3bb29e966470c66d0aee0be87c1eb8100b2fded427c2a89e2e2564c780dfc165f2fde20fc6634506c91ac638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cc609632c74070e212b767b4ffc4714
SHA13d920e22af5717e78c390f9d16eb178195506b40
SHA2561d13eb15ddaf6ed534a32d5282b9e148cb9558551b587efa2fe42d47deffcb13
SHA5129e8ac1a58ebcb1974ec6c7b7a98a2bec9fb8c3b44997d93339b3fa5752550a2915dc9a121e22b929b15941a71265c0dbef76a1478d1e3fbdc7911ede2a9d5691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b795f66c63dfd2abf34f19efb0717bf3
SHA1e8f5efbbb426df2856edb424f9b3da7cb5008740
SHA256928b059b971c39f182619cbd108613e52b6a6c6ef0a64a4998a60d16b5b7c352
SHA512e6c87ddcfa21c96046c2affbfae8b8927e79cda04393508a2a58dd68b2dd9df45f92193738452c2634d2b661a4538ed32dd5959860081fdef428efa12aba682b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c51653cdb7f54a5089c8d310c753cb9e
SHA1ea130e499077c336e5a15096f59b3d1617a15bd9
SHA2564d79860b8d757320df1664f1dfd823f54af1115b8b9952203b59360f62576a96
SHA51236875277cfbdc7bae8c9e7a3bd90c6568e131e0fdaa0e434f5ad11f786e0c109dfb2e4da42a2f71908ac6fdb83a9143625285ecfd764a7e97092446c8f69a1c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fc0af9ccf2c4775afbf2d2ac3eb0aa4
SHA1dd7a298f14049f97902fa4380f5e3d8c02dbe960
SHA25637ef01e99fb599ac3f664e791caa8136058536b66445f66ede91c5049201a738
SHA512e8776033ebea34a10c2b1c16b3d47d6bd5819a3a2f4799d333cb7d4ba7635fb57331676fd5f3996c09c36127532857ba17fb25a0aa001dab87f3cd6062efaea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570ade6cd1d6ef0880229385b73d1c4d1
SHA185d028bc1d2a0ed0159afd2994116567de40c737
SHA2566f5ca0a8a89d16eeabc4a630321bb4c505f02c2b1987bdd527623a1d0cbda586
SHA51225539bbf09b0769cb67c6fb95eb67f8178fd864942e1744aba05901c66b79f9ecf80b463f62cc45d2bed326aaa18dd4225416e36d1036358ba985ef808203e6e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b