Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
3c5caae677c27af30a1aebad37d7efe3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3c5caae677c27af30a1aebad37d7efe3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3c5caae677c27af30a1aebad37d7efe3_JaffaCakes118.html
-
Size
139KB
-
MD5
3c5caae677c27af30a1aebad37d7efe3
-
SHA1
be633361652e54764aca25be3c9db0c0023ba869
-
SHA256
0dfa43be43965aae8bdbff1095dc1ccc655646b2c0682065e8df24dc404ae625
-
SHA512
70fd36d8f9981aec78d78a114d5da7f1f3538f1d8a4958ef4a6e39862455b103a6a480bdc60c01fed97292f18a96ce7dd03d78abf74aaea75928d5907f763152
-
SSDEEP
1536:SMNM1wzCYlh5/an4lUZtyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wee:SMI7yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8345DCB1-88E9-11EF-BBD1-D686196AC2C0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20860f9bf61cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434934066" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000fb819a4d8379403c33a8a463a968bd8db53606b691626495b24db5c25ebbdbe1000000000e80000000020000200000006c6e09f75b8ffcccaf8f0c29359d433da022632baecffee1c9dd16fbfbbdbd152000000052ee701cb9820ecfab94fd0a29935ce0f546d9a5905dffe55a4d100b78abbd33400000005c9f08e5243897182adcbd23e3a95b148dd0b74eab0c91a647847de40f65ac200a98b031886ac38fc01631cfd016a1bee0d13d8e4832fdcff2aa686bdcdcd534 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2332 2520 iexplore.exe 31 PID 2520 wrote to memory of 2332 2520 iexplore.exe 31 PID 2520 wrote to memory of 2332 2520 iexplore.exe 31 PID 2520 wrote to memory of 2332 2520 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3c5caae677c27af30a1aebad37d7efe3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be8a641f51f9d1a59795cdbb3614abcc
SHA12b7893a0f5bf7ce8a19ddcf2b8018a169517a34d
SHA256eeb5d365136ee12c5319cc2a41550669c508645cf70e64dc43287e00cb83d00c
SHA51241bdfe8ad06786b1884ff8c0c9b4ed4ef1c884f913c332c6ccaaf908cb1387b80b414ad78cd850542899d015308b51987fa0cf186a0b7a5b86afae118f0fbcd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574e80e1044e90ca9c0203843dcf68f21
SHA1311c2e52fc76b173dd0012e896c2fecd02cc5b77
SHA25628179e282dfab85aa949de01d3b3158faab65a325c9c870076241d8ee392b5a9
SHA51245c7cd4765cf1736f5e047e5b06af1ba96b37c85ec827d28ca1e13cda91cf104892da5bba158bb5653398541cd563ec35ad590fbf0b2999ac98fa87094b56c79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524cd69b6d37923d466a0b08828b3cd4c
SHA125a7e4162bc655f5ab54dcc321c1a2660781846f
SHA256de82024e1d3da7d19f518640857c62dc18107007f27e49edaf4e56f55e34b4b2
SHA512496dfdbd2f9e8711b1a00a43a6c32fae6f6ea41f5cd1f6ff4cf34cf95807fa40c12c67813ea288eb1694a054dc5a33d682fc09344f124d3561b1af30f9c32f39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c85675ab386813c39781c1ed6a1beea7
SHA1d3f6252c07aea5a9b4f3118a01288944cefb0fce
SHA256768f8ea6e23a115116ba216d16d3dc06ee601255399812a7129dfe2be23a94fb
SHA512655b4d2c16e8da095ad1da3c30e8394c4b86f257550ad7781b48948716193fa596247ee087cb93e2748f0de7bbcee239014053827a6339f1ca53291c95e90ef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5974a74302904cb2610d62deafb399f84
SHA168f9b140440e7f25872838858f140a2382da59bd
SHA256c06c0b353c1d122199f799ef3dbaf99a7be63054c7c6e1f42ea574256f873d81
SHA5123a57689ac51b43c6b43f2804355a70f5c54e42003e3b848be74b2ceb5dfbf9d30eac3c4367187d374f95c764d93fb990c81c0af68a000553aab78fd21c39b891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517fe212bd46124f00d16dd2683cdf3c1
SHA160a2fa9ba5ab5909e4052b8f26da72b2db1dc56e
SHA2569762565b3259de1295045170eab0d756d58199a0a9e6e49a2966bc6e4cef6548
SHA5126647f5eb0f9c779b6476d661d57412b0a5e133e1586cace9dc9afd0d8432e9aca5e75cd2c75d7d00af64ca87e63704450e4f77612903a355d02ba8d0b556b193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ef52e6439af7ae776839667f615fbc0
SHA19db04d6df689f44688f7f344f685cc42f7d527a6
SHA2567b94868710547123dbe644ab6407978281a1bf42e1aec5ba78c4bcf3c0134018
SHA5122f5d238fc8e10191584e1ac8d3e4d18af03da74c16b864f2157058fe296a9928f8ef9b4500d675050b17fe85af374ce80e6c5275cf2482ee2aae38be574c6077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532ccd70fcc63922d1b20d1adb63c1a7e
SHA15f6ecd34916df2488f8636148e890c39751bd46b
SHA25619aea1c0192e4ba1f39ded620359bb2b76c363173a4632c51d437fc1b06e1777
SHA512d67b078a392d47ec045c6d06a2168ffaea52955d94d98bac63bf9a407f4a9855d42749215184b75ab72bd549812640820c72bfa79f40494d38be5e01c5ca32bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578cb4f6b8d41915c914317053532690a
SHA1fa55b14b1cd20a099d5216826e9928992e980819
SHA25666b3bcc361914de9166b75c726230a9de826e978c382dbf94e64d205e1f73ac7
SHA512a49000f455a0dfca0c894f150a793e2a9d1b79b0d4ec6c8c8876f05ce6b717640487c67b46270cb8c504c84b7c6c7b7ccde645bf3c973ce85a72e418a75dc133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5503602a5f2f254f4e86c243304520499
SHA164f55fdf2624ac4134e92026a9449f0a84e035c8
SHA256c843e22db5d35ff30c357525193a082582f4fab5d626faf811aee8241b00100f
SHA5127fa949ee56ee4f609a8eb254ad32f09bbf0a0151830578a8f60ae8a9fdf76cbbee085310d9eca94afa470ca02c13f3292f66c80545b064a5740e74cddff1dc71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55079cdf745d46da68356b82257749cf4
SHA1d2a31802e6dea76f34a0446dee66ba8498c269aa
SHA256ca874087f0594a859ae13097bc327dddf41347e23d054952d96084844afcabd9
SHA51261b8626af4211e1321c2ce0d8dc488d411517db1e48a87119c508739736aedc70577dc511002ae8db9ca4a8f6b399639661f0bb48e3b1f0679d1bd342cade908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a0d2dda40d298efc74c0b0bd5a459b5
SHA1b46be2490d8c9e252e2c7c56bf82b75e55f85f14
SHA256210fe81d49d07fc0858d6583af865ddb8fefcf4162dcb1e7bc2b3ff06443bc79
SHA512777f198b2b94daeed5610960ee3b93760005d5842f4d912b684128e751a58c2f58983f832cec7963ff6088ab3374764cff0a56d55b22483190b4987dda863e1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbbff1d5898e0308c78f91c8beda0ee4
SHA1d8ee96468134c1ddbaac06d8d7dc141b9ed8984f
SHA25622567685bdff776ea125d4eacdefca7f3a0d243e882303b964a9e8989420b902
SHA512bed9075ad8eb9d5fe71872bb4744cee5633bbb96ba4dafdf74f86b28789c07e9ab9043f6a47f5ccf4f42ccdf37957092aab45f7366feb0ab7db86a91a8b27ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bd7949a9203e4f79a83fe89cef361c7
SHA1454c0358650c9ca303e85dd2f76f793be26dc4b7
SHA256f35a5d61206573a9dc8eb2f1a1ba44b0bfc6133919a6345e0aa3c2e90ce9dbcd
SHA512606c052d840d44053890dc3c14e1c72a8a2b9f57d78da921a48674a2d6eb4bffa24462ae84d099274673d765a09d27451659659d8f3d52444afe3954d5f8834c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527362c756a5de323eb55fa00b8a1e0b6
SHA1cbc23f1cd7d1de0c6457bf31a6e1c75f1d56270a
SHA256643b1cee99e5e093c693f8cd039a8bba9fea07a340fcbb2760f1bade79cd8bf6
SHA512dc1be0b5df7f2d819ec3efe3c55bae55bd0da21336224fb048408b52f0a312793eeb8d4bef6987b1adb928d6804f7cf36cc05d243270412cd0150fe796530710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd38301e62842bf085df94339c50916e
SHA119b0dfd00e915efa0830bfad0b44ea993f698306
SHA2562bf2a8701eccceb8f30750a001c1780a69de2a36a8b76f437a283f7f2a3fd90f
SHA512453560aa014eb5df817f48a045d05f0196dd92fa6370a35cc807926cae11ce31638945b5b1e8931bc50b5b268636049ab5762cd28555b7765c3c3b0c0bc655f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561950382048764e028775a6829a842db
SHA1bbb08bbbaad0e6cd0a5d69f8cc4a339c03de5b08
SHA256fc3d0941873471cd6bb4bc3ea1de9c1627d839ea80577cb9907552f85e2c3567
SHA512df053252455d1f4f70369343b6c82e0f22716c5b5d4a3db666b009e2088353de9baf6ee919752a8ec603e7351379b67984f50ce1d9f160a145f8c788e1805785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50918de38de4811dc771266aef28e06fb
SHA1cdfe7006510235558bedb13fb0b272fd674ae108
SHA256cff3576583fd201c787493443d70b37b1cd9d624a34128c9be8772d3815e93a6
SHA51248b95d38276ef33081269384ab81395e7e197f815d1210c188b142ce554bf36a72da683c9446a9e7f457dacc3c0d2739078b5e68b9c14bfa072086aa0202e915
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b