Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
2fd1aab5471aba823a9325f55f8616c7_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2fd1aab5471aba823a9325f55f8616c7_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2fd1aab5471aba823a9325f55f8616c7_JaffaCakes118.html
-
Size
27KB
-
MD5
2fd1aab5471aba823a9325f55f8616c7
-
SHA1
c048f70adce3592ee632016a32b517f0d1713cd7
-
SHA256
d239772fda6fab22728c5c28a7d743cacd47fa9f67389c80e0a022c986505bb2
-
SHA512
cd9d36af84e8be03429c9463fc0a7622e9cd5520461a22b633c9fbb302b1cb6aae10f59714935f09e5ac0dbf9f77a2ed30ebe5af2162937e8b67866c9bc9a710
-
SSDEEP
192:uwfgb5nzWnQjxn5Q/anQiehNndnQOkEntSgnQTbnpnQ9etVm60nQa/kGk1+Ql7Mh:CQ/tIviQa/QSL04
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{04B6BBF1-869E-11EF-BB30-566676D6F1CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7093fcdaaa1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434681739" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000057285e909eef548abd6136638288f13000000000200000000001066000000010000200000004e8dc48164a6772254e77c1cd02d4449f967efdd2f135378e3c90a0e30cebf99000000000e8000000002000020000000f85e89de748aff75079c2cfaac8d56dcdfc3d036fe9f292a0fefcd7671ca458220000000e6c8dc6d93ab57327e3e77e9677fd8af6d5aa478dab12a163db4b3f9f0969d1a4000000069abeeb9ca805079955e91a850548f146a109cc48c6067a5f18bf5578a41117edc8f2bfaf4332ebcc3432e872a1ea900f5ff88c71ed8f5790ef261c86aa9d366 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2428 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2940 iexplore.exe 2940 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2428 2940 iexplore.exe 28 PID 2940 wrote to memory of 2428 2940 iexplore.exe 28 PID 2940 wrote to memory of 2428 2940 iexplore.exe 28 PID 2940 wrote to memory of 2428 2940 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2fd1aab5471aba823a9325f55f8616c7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2940 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f29e9a396876d0338b242f62c6d0a14
SHA1ed8d20c467f4cc0f58963bd961b0afb7dd986b89
SHA256c88c726bb52a03ec2da677d930d771876f4890ea03a505312bb4237137669d76
SHA512245c46452069072cf0ad8c47e72f83186ab536e0b9a312a8dfa072a6741898ca524a845da583855c263f55755363c38c3a0cf885111561f0ae1caae92bc27962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6f0df9055b5a8fa0c9906517f0f73b0
SHA1a650f47400f4dba254947d291cc777146d1c6547
SHA256ada07f467042349404ba08d233dc4be3d15d6a90b8d3c4cd9c20f21e03a93c28
SHA5125d413b4d23dbda80a22699f965f106d5f0aadf367fb5f1c9f7c3803bf8b2a809492cb0ad987c431aa1ec86c3f8bf54f53a490a538485405f7441aaee9a074ff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb65513a76ffedc5d3b16280a087554e
SHA13ca00655988fc283507cc463518ee4443017acf7
SHA256d8fa56aa4310a9a01a6c85adb70c6813f43a8ed030f8bd7218c7b4d07f3fd7b3
SHA5127f9e449b2f9e37d9df71e1a982560e3c36c2b6a006ab5b1f7a9d8892813d404c4729cc23741d81901a0c2b5e28ce8f751c40de87456df3a2a97f4252dee0b494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565f1a65892c63484744114cf5052fd57
SHA1f7f2ff88e212da5c9e5c765ba25b819a05f503ab
SHA2562f1c2803c5c099d252d7788ae4684d8c8f59e37e1f597f5783cdcd67c55daa68
SHA512bd80ecb87cfed436c7a290f7edb0c2752eb0f6108b94a8abfd76ca119ca6dfc3a0ae5a929b226231f69ec20536f46c1489b45487c7791e71d79b7fcf9de9aa4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a09c55724bea761a7599760bf845aa75
SHA105197e317c25f47066a7feebb70025edfcf5f269
SHA2569b803f8216513da821d4663f471093510bb12aec851ecb0d8e976fb38f175158
SHA512ad6ef2e9d41005fc89b0066fc368a1397ccb6faa23db9c8b9b8613cb2d6b36c9c4517923d7e11112e706098e6f2aba72c19b27f6d30c826742e40ab09dd8ba33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5809690893e7378ae26c71e38b6efcfc1
SHA1cfbfc4863261e3e16cef69453c517ed02d4ec6fd
SHA256e88d589b2d716a923a829dcf23b10dd74b8c33d2155d2a37cf49923cdef216f5
SHA5124473aaad4b0a0b568f7081d5d6fa17d04508faea2e3f89d9d90d982f902d8bc0cb936134415f3c0d7c946438dfddfaa979cea73161b8084dfec5670b68683719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5692e119bf7aa2156608827147977fa98
SHA1a51a190e8f81efeaf8982aa710a6a6d54b15aab7
SHA256a6d0844274d8746ece2c804d90bc26fa03cb3040b2ab02ed3d85e3188a591123
SHA512efdd14a71bf93605a737b042a9c01167b1bc3d95c72b8976bf1ba095d05edf7ab539fc1a14e779d1bc35941a40a9e6d61d32b30a0678a021d78f5c6a63a1720d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e73ce67c2880f965b93fb546226f7efa
SHA185783f378b2f49f68681c2fff9554e9cf74053ff
SHA256de2239ee597f020eb1cb45bfbb0fe21b2337b89b5496a63367a64c0d78c9791e
SHA512b7914e6f73fb003b9d5857c0a69afff9263be620cbbfd02998aa900cddb763b3e0522cfcb9fd03ff0e1acd5e34313df51d586c58525753f6a261ac2af58b7e5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54860c47a6058f64d1a8faddef52f0423
SHA14fc7c8c6e0cc0bb532df48e758cabb317c9d8a70
SHA2561dc273055f87b4acc387638bf30b30ae18978cd5dd13c811be12a3c373cf951b
SHA5123c292bc7af1bcbdfd6e04f18a2afef84d066d876099188308a4dd9cf93fee31206b16599b8b117b05f18b9debcf6bdfe26ee83850958dd44c8ebadb23ef4190f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c9c349ad8300e1eeef244f1dd23e41c
SHA1e41483c63aab344666ef4ec6b43cc6beda761b88
SHA256a37c4e89585d6f252d6b503464732a950b631ddc001644f0ae5c65155b0247b4
SHA51280278c45c5930aeb67ecb9ab197f2da6f8427bea66444ab63c6e7e3bc33e516312fa056ed587cd9de99d3d2b67a397a121bc7d0c028514b19b283244f5b0a41e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae7a881310e7e1ff4c5d0f19c419f264
SHA100d4333646105ff09f9a10362c4dfd36cacf9f0e
SHA2560a59246c523431a7413a33a8bfb0499457afa6c1bba4ba059068e6e84ed19704
SHA51254e9519c37b65da2f262a2d2b2e9adca2df54348d71338b6ab43bbdd8f34a2f60f460175a0246d00a46720cb5cb8020ccf86e8f21d4c1c3656185dd4f80c3e5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b616cb72821f7cc684495f524d82751b
SHA1551b02406966c99238eee6ad6fefd168b10cf058
SHA2568f2b83c453474fe3e8366d9f354af13121bc98eb36355bdac5158eb00c2aea2c
SHA51295abf9973a5a2c1d54c75f851fc5d528d3af4c0b9fdde4dbe30c166fd1c291275047c45495be056b4ea40f48c3105c616d79276663f328e7a24a6646a696e136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5debaf4f47da65c4c2169677f00fd5dc0
SHA18249742c0e082386c180d09b413b9352bdc0e5dc
SHA256bfe76f574bcd3d97413d598dc7001e392dffba808f84ee8ccb826f4325dd6647
SHA5128bc759251d45b17c9e689c58df6fa2e9a63b495e59f396ef1f69f8582783ff0ebfb96dab066f61fe1c0017df448704e620441766d1138d255975d5463086b630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527c9b4f2eec7608e943627b8ac7a4e84
SHA14efb58e155d0bfb51766b058f0958af4e5f43711
SHA256fdf2a4d26857f0a5d31b2ea3c582082e79e1443330e2b9c88e3b1b8a4988d61b
SHA5128191280a90b3be9ec23b7a63942473f578aaaeb0774b14510950e430e29d255ac1703f2c08bcb9c23f16a65151f2635996fe60d4504d88f843973657394ba8fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59226a72db07e4e3b61f32417f10c10ac
SHA1776bb6d5cac0532de90dcb040319b09e8e524692
SHA25682e8a77cd8d799f8daf4a560b0a5e5fc8a6d6f33006db7ead6b541872d980bb2
SHA512b510a872139e29fc10b29b129eecefadb4a15ae68b794430414a4d2a39e1b741691aaeddb41959d624a3a3de1e953e12d6a5eb6ac3a87606bb3d81508c9114a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556ecf340ff6938ec06deaf507718a9d4
SHA121ccd562f99ce675e83ecf41e4b388a9eeec6e09
SHA256664c06a328621aab23f1c1c3e0fbfdc2dd6320c871acbd6c7eb3abe897a5b8f8
SHA512b230e1284e77b4a31fc95ceacd756cabcd17438993155214be54882e60c6c025ab4fd6ac186907310bfeef0dec4086530365fd2ba327267dfe66865221677c5b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b