Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 17:30
Static task
static1
Behavioral task
behavioral1
Sample
3b3c8ba667d3f1df43c97651bcd81835_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3b3c8ba667d3f1df43c97651bcd81835_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3b3c8ba667d3f1df43c97651bcd81835_JaffaCakes118.html
-
Size
2KB
-
MD5
3b3c8ba667d3f1df43c97651bcd81835
-
SHA1
c62ba7ace37c18001aaabecbff8ac33d9aa535db
-
SHA256
68f4be1705354a677270bb401e66466d44d00bf8202e6c4e55ffa4d64c7e0b97
-
SHA512
99c048e6b9b302f1d959e9de7fbf474dadd8b2fa2e5e563d1b9f81d905b8331845e82b591159f0d869d9ba48f71f3984dd59b7d7ee95eb871d3bd3a90dec0ca6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0052dab2cc1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434916095" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e8b0264bb934504bab497fd994105dd80000000002000000000010660000000100002000000022cdcacef11b8acb117929f9a9edd217c048612c3817b31fa331f3d7c90edacc000000000e8000000002000020000000823f1a08cf712cc85e03b7a9d0925c7b1a2b130050d1886f64bc11c4fc6bb7cc200000007da4d6e013e4d31f93688f7824f73bb2b8160357db4a4a6f39193033470bc23840000000e4a0ad4ceb4813abd062f6835c28c41909ac6e215d5f7aa52b788efb18640d695e09eb4c9f7961b80b6ccf9223d21ea398c063772952056ed8a991246e6b54af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC47D2F1-88BF-11EF-9584-DA9ECB958399} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2724 2480 iexplore.exe 30 PID 2480 wrote to memory of 2724 2480 iexplore.exe 30 PID 2480 wrote to memory of 2724 2480 iexplore.exe 30 PID 2480 wrote to memory of 2724 2480 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3b3c8ba667d3f1df43c97651bcd81835_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9379c610c8cbfab1dd16fab58858826
SHA13d9cc93fe6ede7a3715c6399923ff34398c37c63
SHA256a8e4df7b45a664bfccd3ba89d39da52dbe025eb683d999f6e35e8640c03d6314
SHA512eed56d2b6d4596341defc47550edca0565e832297ae13de65281134284793b4f0b954d38793cef30edcab45a7eec32e7faea73736bd70b184416de4154c877aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595330346bab37a271849997ccf485053
SHA12fa1c4678d2e203bcab5af46968d324f659f6526
SHA256ae583d96b14bebe9c43c952c5ffdb09f0c66b32a5fb86fc011314c67908d1e48
SHA512be33fbaad10fe253633cf9adcbae240df79ac08f85983d3c6b5c60c118991ae811371de8647edb249affb90e83cc67c7c93afe538707f67b39ae5bd2ae49bba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f6472b44e6a201ddabe7d65a58cef03
SHA11e55459e5dac938b5ca2ef49faea6acab3bf68e2
SHA256b1824bbc25f5cc2456ba59c3218d1672c15bada8d3585a4c21798cadc6ea1a3e
SHA5125acf35851fa78f27076fcd4bbccb3d731e2da3318db387c32f1baa0501989a214bb852e97332605ea1f83c8eef7dac80f445ed340648e4cb2e2b4357754815c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5541271a127694afeacf62277b17f697b
SHA122a43b31da9429b9074d7d2641282b1659f4721c
SHA256b5eee71bf816f64f0e7b23c716bb3b577f5717b6626b1b785777a03359752af5
SHA512f7b627f1c8a6533dc2cb5b62cda1a1eb15c7f25de6f2c91d772c1d4faefca694e1d9ed2b5484cd61f3522691ff9650ef3c792ab9f9520be464ff287248949ce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553535eb55e7d4f9d5eb40fbda4c63af4
SHA1795fe4c4f1dda56ac31e5f92f81e4c5d76c824b0
SHA2561a9921c54cfb8e37aeccfcd47e5f272a392fb6049ff2b4bb6212974437d8d222
SHA512a86365144c122816ecec44f243f26aafa0ad2ea71e232f639436d790852cef3782b9cc96014d42ec1e816a03bbcef0585f87d66fe96f72eaeac528c739f452fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8ae8a6a5bd77ac995133d8d05619273
SHA1cd2a5200899744deeae021f9946ae5b1820d6100
SHA2567a67add9a984b3f631ae6040c268446705fe34de368fe453bc99e9878d2fae38
SHA512c5eb8b4b4cba251576de225b18177558b1ac09db6c9f3fa6674a8a6f43294211e944d27a0a348292dc0825727cb57e09de72b9bde0650ac08410e537b9d5baa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3bd19c17028949039284a3f3fb42d77
SHA1a0c7676b2521be5bb8ec7d09c66ee7f028a531ad
SHA2563a50913024fbe17eb29f96c9edf974c42f6539720c4e27a91d0c14c2e26ffefa
SHA5126b8a4de4baf9a7c467f39894b952421ad38ac61047f9eb6886c20172e992c4900917212e2ee046a66690a2d9333701dfcf9276a8c9e3a6d2fabe3da8fc4509b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5945e47e0f465090a9f0f0d0b8d26ece5
SHA1ceab9b8b5cdb51913d0f9813186ac62c894e1b22
SHA256879f578a69a01632eb1c3eab249d34336a76eb5c82750f3acf0a276c4f334041
SHA512bd6351a4a62b095a4f40b3f69f7dfc0bb850b8bca406da4a7230df4cf3bf8204f5df2aaf17d1f8c7cb96fa482ece0b61da3c1aee756ed162e8d531fdf4b7ff47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d22c74201306b8dddfdd1b5454f23c96
SHA154f7033199fb02b0dd68a23280f0abe5a27ab4f0
SHA2565abf46656e7eccc7deddd6d7689856266db82d7572ed18de2d0b66fac2f472b9
SHA51258c899f84008ae6b6f5e4e530262b05ec9d238758a483266c1ce2353241e77042f6e149fa8bc9d3a7d891e0707d79a344be4e90f905b2c7c7ef7b716e27ab073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542508f7c041b754c33e08adf649b3f84
SHA165dcb70ada7c016f945c5fe2913be8c37f6ef470
SHA256058c83815ae78a9230b1e395e646b48cb2dbdf6661e924cc5700b46ad14b54be
SHA5129742a03101ef9cb5bd008b10d8338564f889fc93c8e9f88b130b2ac6a390164e41611a21cd772cb6cf115688e77acae5a96eeca6fa1fbfa7fbabadb3eb5e0c43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566b10fbea7955b9680497933d89bfabe
SHA1acc808b7fe8e3174a7b2e6aa43b65d86f168aa4b
SHA256fd7c92f5ad373674b6483230d7754ce55292e1f72475d0f3a430c535909710f1
SHA5120a5605f74073735d52c4a5a6f50ecf82ed49872b2387bea001a7e0130a9e20e2dc91b8391333cb60f1ce71ec603cdab306ed792ef28b7d3cf5136b8259d44d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e2f17439d2f2918ec0d2ab847625139
SHA1ad310cb09be78e47b5bb32e8b6e6fd758c1cd824
SHA256120348396a73d04cd5547a0e8a41296c5ef0a7910f6bcb5d34ff85c1bd3b29e2
SHA5120e68d2229d1d60a60b1d4f76b4d54fe714b9f056efa40a7f03e5622a12f215c71cac4f6a637df2a45bb3734ad047ee81db5cd457be5823ca714ae810dbf4bf63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c046c81861b72e0b6f11265675396672
SHA1a77a0ec89f1d8ea5dba073335ceefdd194ded88e
SHA2569b0a211ce3a1e7a643cea50228461a286e25ceb64434bb7af8b6ccea44c31cad
SHA512a3a2b0c3193e8bf804766cccc3a09c1ec277e07debe02c3f3293833dec1607c8c67ed1361c76512bd72c0bb7cbcd9beb675d2b6e8eac27492d509a20208c2069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc6dbba1b192fa873a5b8d87aa186c5b
SHA1ae7eca2213a72302286125459f49b31ce8fdb5ed
SHA256bc4a64166757fa74da18f49c99b48285813e031aaa63f8cac681c914a6dc165a
SHA512b1a5bd7d3c31d67d4230c865d7c36e45c16c7aa65680e971949c3ab764574d9e3af9e61582892ab508d7d164350ad1ae5bc4ac3cbbb43b0e51b4884809d2a0db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba2cb2dc42621671438ff3f1ba6dfef7
SHA155a2064c6caec814eeff8e58ad7c7378b4d3d251
SHA2560345a169730fe01dc6f1a97ae78f608e0d2034d7de8603a8463a589407aae4b1
SHA51279e723f15c6753030aa5b07bbce794c0dbbe821d8f3a00d86708ac5a9a197528b3d95f05341cde558cee8b27fc9051efadcd4b760c0ccbf6d761716288d8c10a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c1034003f52f003d2a088a0305602c2
SHA10a2c5707d42d681cf8addbe4e6417bfd70f0e0b2
SHA256fa6c866dfb81b399e88839a31b1acb850ae605fae6207b420b156bcbddce626f
SHA512451643721a222a8909f1e285ffa0d0cb0156d50519a87b64da0409c65b22dad2ae7ae5bd926afe37cf524d0ff681a74f9a35d17ca6f9f13a067f57f84e52aafc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed1d2da57697160bd10c6cbd8a442239
SHA16dab3f6240a8fd1801476d6b28ade3a59c23d9d6
SHA2569a1e05958285433281e316c4075293291793a0d8ebfdf888691714e31d5e5438
SHA5127a64a109f2b3dca6346c821747f84d421c9d9e131bf9b3af74bb1a2a6fc06cc1a27804a653eb71b0703db420dd5619804718e2d9a0b7f5db620e833333116dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519652423b17d042eb8186f818f37e627
SHA172c2b48c6c542367d02523fa0a650c3c259025f4
SHA256d1eea999c88c01847dabc1ad6283f3029318ef0f42fae1db3492e5caabdffb83
SHA512055df71ddb53e332e17a22d33e9d2018a279b3f5838beac60beac442dc88e15e6f1efb9bc4fe77dcb0379d33fe13c3cd556201c231059518f99f5aad7a6f1170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5306340af36585d3d31bb258d1d3cb280
SHA18afaba94ce64ee4caf70803687893b93775678b0
SHA256cb9b7b058950458d42f1a6664f43222a0fa4c2996348e282d3e55363a72c2570
SHA512aa3c5d464f5dcbf571784c77dd064d0d9a219895b99924ef2cb4bc18e200b7bccb4c8c96a3f8a89290da87aed29b50eaee64b8eca32227a6060a6da2a767a27b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b