Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
38f7d90a85eaa8f1572d95379cecd1d8_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
38f7d90a85eaa8f1572d95379cecd1d8_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
38f7d90a85eaa8f1572d95379cecd1d8_JaffaCakes118.html
-
Size
138KB
-
MD5
38f7d90a85eaa8f1572d95379cecd1d8
-
SHA1
e0aacebfe4b18abc041ef6103a4ab3f114862d13
-
SHA256
a83a44fa8278352f03f3b019431c82a19f0cfc9773c5ad053e593dccdc9452be
-
SHA512
8e9b524cbe867653b8f8b8574fa7de455f222e2b887dc68cdf9386f12227b305ea6100bcdc1ca5c0d050dc17cfd718590b526125d92f191f015d8c5f1cffbbcb
-
SSDEEP
1536:Spd2U1K01rlqm6yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:Spj1IDyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434879358" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0644239771cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{22BF0671-886A-11EF-902B-EAA2AC88CDB5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000e86e8ee568c9b8700bd69fe26bdeef243bdabcc19a6d105e3626d93d0e39a2f3000000000e8000000002000020000000c11007c0f2b1ffdd0ab4f20d858364e7cd7302fd6ee63edb6394ccccab2431b8200000009ef2096882d93f51848c5da59135cb1ff3507247aa1170fffb51a8bf28d406ce400000006f62311307c6b8fa4cd3f5b27eed0029276c9fbded613996d2042e4215d7d712401ff984c18137451fb709cccccc3a89c7ed970086441b3b17c24e0f552e73ba iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2148 2524 iexplore.exe 29 PID 2524 wrote to memory of 2148 2524 iexplore.exe 29 PID 2524 wrote to memory of 2148 2524 iexplore.exe 29 PID 2524 wrote to memory of 2148 2524 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\38f7d90a85eaa8f1572d95379cecd1d8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c11e9ddf96d7b2624f541d27c918b9f7
SHA16e916cf50d1d569872e620b94d853c70ad323834
SHA256704f28de6e165d663ec67ce90add625bb71a99be570d111a1ba0221c9a8cc766
SHA512b7921e5973fd0c82a090459ebd9bbd6cfe8b309ddfe428fd5c0d180dc07fd451ae1e07256e26334796807e9f384d12c0d221a500c100fccc09f6403e14375f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5759ab94162e561b261068012d7923dee
SHA18a55d479bdc58298b065492546059e045485f66c
SHA2565e3f1beacb2a0223d87b23cba02ce3cfe2f7c8c294f48274a3b5316d6ccfec11
SHA512285aba13970bb1f4ed92c5deb2b248501a3e62281e7b86f32c35d6d82a70599715be05c8ab1cacea88661766e5bcf0b3309417ae6b0ae6741fb45de35e74e325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c564a639614aeebfec77ee0238e2bc38
SHA1d7231a99607ee85861006ed8e07d29fc428da774
SHA25601c85ff7dd897f324ee993ff5754d647ce2eaf3c3db78320dc281038107efead
SHA512bea28c6426c8585816518c45b45cced580b5a7c7c7fd2343618ad28daa1706e3c644d3caf1e38ab3b1a2a9e353f3b4b3f4a69196a0665110a1e4ed0a5cc22e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5157d5aac0ebc032626a12a7d4e159e6c
SHA163b453f20a8ba62bd424ffd0f1e907e1b1d49c26
SHA25657cbeee15e39b447b9024eb0fa94c583ff364c649f212a92a9b0a7ab3b6da129
SHA512f8c09fcb830464c7e49e367195c2ae6b093d263e3e21293f1e62da9574b7f7ada232d37cce7cd010f5e542d3372a98b613696d834bc9f28a0ae39c0500c59bc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6493ee962f590764ec8089b3ec2e705
SHA1110d08e2b6f069179aea516030e19c532978395e
SHA256d517ad1bd0afdf50634d912008b29152dfd04a2f37a0474bd2e164eb03fb68d6
SHA5122aa809c739b1fbabcce092a8514792c16d452e4b7a5053852584b2de20ea851494a74089b1a69f089fe8c872fbbb2f486487dd4fcd8249196db7d0d4ec856d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586df67e04ed3fe3208cd8556db73ae80
SHA1ba8df62561d3bb6365c3b844bd9aac32949cb35f
SHA25607046bac4f4651f2b2479f85781829b8a4b68e3f9bd6ba6abc544b2ae458abb5
SHA512a7d8519fbb9880cec8102e5160a9957fc3b81a55c46e9178e705c1c8b2916006e3b3dacbb61ae0c6e3f2edf201e74c53979e67ef5630573700021c345d3dea62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530fafd9820472e2855d4e49852f4bf1c
SHA1d63b797096096f9dd3c188a63a2e57a2831d7142
SHA25607ffbc8020cf0f5618bdac9b0ac1f829ef3dfc8fb8e10ba8d823bc53aa41eaeb
SHA512ab9f2ad690d904db102d3f5ead9c0710de1a8117bd1775cd3db1e6e4cc4f8ea6d3d85684f0713b07e2fb799241720f9df564ae1471bab699d3e8f487ef0fb227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5646bcbbdafe207521bd8ad9736da86f3
SHA1686f0e92130ac2e74ab2165ccc0fb5cdc6e25c0c
SHA256206dfca72383dec8659a89d5a5a9de6f529fc40313100583569585562756450c
SHA5129769d7610a9b97b64ff691b7c9199b949b319f80a897ab525175b753b0937b6e4697720c179ae8f46306ee6fcafb6ba98c1ca78d3090eec42b6f545da9cc8dc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f56f5fc38d23729abee470a1f537b46
SHA163b0e27acc23c3220490033c11d4a90f650c0768
SHA25659f54178b41752a17ebdcb3e679daa64a31875d4c2d74505d943d6a06533ce0d
SHA512712631ceee681c8d7c6276de8f4ea09b9d774f3bf5bdb1b01e6559150613d5c0a7c830bfff09ec5b44475d06a7664d8ced89d15f469cd8155c72c3f996a95279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53da3f1a1250812f0f637f8f5fc22aaeb
SHA16e60fecd39cdba8cb52511b69efa08af041b84c7
SHA25694e208a93cc13b023fc03b1b70260a2120580cff409c0b03e94de9a321003f7f
SHA5121236a2823f4b4fd17684ccc3e644f4ad647d0bbe3cdc21d22734d7bb61e63cf61b0ecfd814c1bc5f15218600077d9a7ae8045ea699cda5d6e389b89fff6a8005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4098951ea9a2f77423f894087a64fef
SHA136f433c06a557f36e55d4790db85a74b0a5be3dd
SHA2563753762a68d1a9c60a4ddb5951e486aa20c0aac19e796bd27289bef284e051f3
SHA512d601d665d524ea1e23e34498a9c308dc302b158d416c354bf625caf378b951e83ad49c015a5a148a11996e02c799dfab25090f36936c9bfd81b185845c295944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0e917ff80d0ce16ff4dad96bf448918
SHA1928908f2de90a4e21cdbec888149f3a3df13c5c6
SHA25650d0b1b094529f95947f772981455118e08ceb161f7cc3de9056e0bb0f1cfe17
SHA512a175e939db2f89c3791874ed6c4fd4ec3cca706bdcdb1e03931823e839384fb4fd9107ea167ac5693c7e1d674394946a20d8934d4b14c991d44478ff2150c9f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51771513f593cd929b3b01b77d25213f3
SHA1b5d47d22c051f0f795716d0134b4a2f9d97e6c5c
SHA256699cf2218c26fd8923969ce2279fb546affbc223cc9b3cac89f5bc44af8752d9
SHA512943866534d9006dc7c75320f9be32aab45f570deaadd08da4c8c8b49ac87883c2e6d5578e7f54d9abc552d6bdef484b9ea993fa60f377aedb928c9571b12b3b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b1c150e151098ef961994db29947a8
SHA119d1c8b21dd3d92647cea3e9f333c0233b923f51
SHA2569496a591729a1c78ad416e6f8c04c826276d6413284d1aa6c5fdc20dd6d5e967
SHA512af2fd8c65c567e5fc8313d5e6227ab6edc78d3417f166356eca24704cc0478831c838fc7d2a8ccc34c55a4808fbb952a5388360799e9822ccfed2ba9e19b8fae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516a2e65c5f164ab8e39fe55f9a84e962
SHA1fdc198652012a65ec71d66a9cc1223eb70e81dd0
SHA25685960775ee13c1eef725fd863365302253f4d78658c2c201d3410af579938e92
SHA512774526842783d5365b724b0378fbb0714a3323a30708a7d6629cb00329b2176328ec03086d0ab23aedd2a1795aa02d5e84ce4681d33353265a9c85ca5973b31e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5939e3fd3aad9fb1fe35f83c6952ea11b
SHA1ce797c844a71d87638b5f6fc60fdf13b8247c459
SHA2568d101497ee4dc7f3388c8c9fdfab1291639138b2d1831c001e39697c2d3553da
SHA512acd1c93664337ce591769806425be7e546909c0cf4ea0dd3cfbb67847f5177d84474e11a8ce4ad3f51f0b18f46b9cbf72f14cc51c95252436bfe737dfbc0a840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5153d358c6b38d240af84499537e9d7c9
SHA1f3109c7840526e27c27fc1dfc179a8ef7021b5d2
SHA256513abfaf68e1c59ba13bc4c5eb1df06d90653421a6e8660b97feca8fe202a0e3
SHA512d0b0256642dd351e5b22875d82b54bf42a26018c5519b0b11d22f3c26eddd90b940751e3a1f2fbea98b4f2b42577e996d33822cb65c28feca079888ed9f125d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5093bbe80b7fb5e2ea6605aa58968a861
SHA1446656730476d9cb89c4e402af99844cfded1ffd
SHA2560b0bb7b1b183827a1bdbf02ed9f5672fd3bceb6cd4fb81ad2e41dd7059e53df9
SHA5127b13dc0277741b57429ab629e500b063d320c2acc5a5f3aa80e2b04d4bcea1a15e9e93eb1b5ce38a1d697d4d5ef99942cba46ff280c3272de2583ea48ecf9c05
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b