Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 07:21
Static task
static1
Behavioral task
behavioral1
Sample
5625d02fad29e7da7a2c12cb0634e83f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5625d02fad29e7da7a2c12cb0634e83f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5625d02fad29e7da7a2c12cb0634e83f_JaffaCakes118.html
-
Size
139KB
-
MD5
5625d02fad29e7da7a2c12cb0634e83f
-
SHA1
37767a788a64fedd829afe8db1d781137b84b80b
-
SHA256
1e3f7a820cf1b353117ce97097ef6001f0296f70c59a477c401cf4450193395e
-
SHA512
1f051fe0598fcbf5e1e46585a85d7432e84e400fb8dc26c021e6a64dfd9c1ea03cb6168cf3182e339f2ef91febfbbea1ca2296f94d239ede44db3da0190e2851
-
SSDEEP
1536:SMNLR6BdGfD/TBu+aaIlUZtyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP06:SM8aryfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435397973" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000f482eb72fc2957736a491873d63c5d614a65f9a168dc8fc60341503ad374e4f9000000000e8000000002000020000000d97e8e371f4a993ca329505558f1539cea0e5d3f61652d2050b5deba8c456de220000000c6ea9461f372715a0fd5f2941921526d6307dc840833174c05a1147f75d0f73e400000006c214e00094a924e830529245a4473ea9aa77620f4d06ead140c381b6bc474b358ebcbf72b51704b89df95c7e7536f18ac5456198e697885c2c9ba2a4d135a4c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8007b3b62e21db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0C941A1-8D21-11EF-931E-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1152 iexplore.exe 1152 iexplore.exe 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2868 1152 iexplore.exe 31 PID 1152 wrote to memory of 2868 1152 iexplore.exe 31 PID 1152 wrote to memory of 2868 1152 iexplore.exe 31 PID 1152 wrote to memory of 2868 1152 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5625d02fad29e7da7a2c12cb0634e83f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef9d32f8f084ae260a6329ca0d838911
SHA16be56eca2503bd88cdb2ba8aa0ecf023df5ad46a
SHA2560d8de0d89c5aec830e9e4053ae5d71d7d3eefdf98a8c26d335066b69daf09a4f
SHA512020ae970a15dcf15441a1373c4bb434b667a172ce02c90416d88fa9a3a794abc698074ba8f72cc3da4602424f4927f392d29f15a2bb67daf948ba1a39e7cbb4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa4c89c9e2083144a42e0bcde6cb14ce
SHA19eba5b47a3ad3f1fc9e266f53f412d3bd693546d
SHA25651d1208093287c2f674c3e9c4392015af1256f37de91191cb085b003535a66fe
SHA51277432687b22bf2451a42a46f83c946896808e2296c071532a934a335a47eabb0974d2f552b891a1295f82b58faf42a694abad7b698ac065f5b11425d158b84c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546ea1db70d7430f41642973f5329a406
SHA1ba924e4b14eb23d356f9d115ed66945bf83dabb6
SHA25643b490a03bc7ff3577ff7c061a14f814dabbd0be9c76afe4e3f1366dc2cb1d79
SHA5123ba225ef7076746592d46bddc2969852c6b405f4530872de980633218d95301a98ecef714bb58a520910977278b549982201970d0f4b5ee875c86b5230d680eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519c04addae7fc9e2b349046cb4d9eb81
SHA1148936d499a41f0a2ad980adb7588a7c03180248
SHA2568b42ded14ba2132b5dfab43912839d1745690188a92eeb30df7fa1bd8d459a3f
SHA512930b3a73c7baa7c3eaad07fa609f36e834301a26bd9f10dbe823e5ee222984a0020273f1f6a6c57dc129da43899721a2dc0e9e63912079e9b14356dd8d309892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509d6be5ccc213e47bd90f6381e3e5f7f
SHA1ad760eb32ff5cd32ca34040d338a0e41b4146024
SHA256e0712419032c5365fd6fe637a539145c880e25dde18cad394d0a2095c61abff6
SHA512efb5fbf606a33691f4cfa55c3cd772cb6086e957cfbee6547722f880e486b8d52076fceb3aae3067d0682aff7f2e83bdda12e24b4ab18ecf8eb5becfb68dee32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53669c78a63a9aba72eaef53cf339b75f
SHA19964bd74b0ca047f7e804dfa5436934e2a2df548
SHA2569f4f94633c3e8f15584c806fee4462f093e343bbb604085d6a4c803e4aa6395d
SHA5124f2397826d20daba9056f5a9801085c9234daf199242e7c28bb7b803a8c0668eb41af823345e0827cb94775dbb93d26ad187ecb6154eb617ca2fdb2c434ea715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7b556c1408f751c463f34fa66fba5de
SHA14781d975e6e595a676e48482fe712715ee652e84
SHA25619ee14f4bce775224c82b91b6bfe54a5e6c144a2ea7b32c572c281fed53985d6
SHA51238b23222a8b5600bccd40d65d8c291adb9a4d6d686b099ef0f292c7b34dda9f191b058cb57d2ccc05e31d7f1a70eed68decfccb724fc828f648c805ff4b475b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cae83bd4d091d45ebb7c1a03eb105600
SHA1458170b46d66191e96f964cba195e46f042313d7
SHA256cc2d590ccbdbafc5d7d5c0340d2554c406cfb6c29b77eb4764b2468b3092ea48
SHA5126821564538a5d387c28b65906a2c17d8538f907f89d184c75c402001a8f2ee3b253ecd722978d81406b37d5fcd3d8f7103a9a613dbeb31c589ded9981e1e9689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5268057e1e22ba8b9c67326b0d2000517
SHA1c9b73ac3628c042d0e9445ad53906af99b2f119a
SHA256c6ad4d68b74e0c014dba42d352b54fa3c11203c3bf599223eaa34bc4d8e9e9db
SHA512e6d05d7e5bbb401fbcd85dd65e00aaec0ff1d65f8b1dd85e1e07732aef74f62a65fe03e98fee4dbdb6c4f8c08ce70050f0028894be1713946f28458f8cfa4304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3f8aa60a0e689fe72592c02861ff406
SHA1684f5df296486263721043aed43f08569f739309
SHA256afd132986bc42a8a9a8745f2b11b0dd4e9048bd8a95222d104a1770dbdc69fe5
SHA512e2a5ac5f3ac5285cd486fd8341b6c030382cd97c8362b310de80cf1ebfb4a7782fdf655ae031b5c7abe6490137e0e700df90b8041c152ac04e4ea734ff56e704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524a7c8e20a1ae3ce4edc987fa6daf805
SHA18e225a6f4554e15c037d37e586f34acaa6b5b61c
SHA256997db4802b7e14b9b4ee987bc7dc5e391519a5f819b04f4fd24ad6a30020c339
SHA512ef570478ef2c7f2f7a7b3ec859a47953d71e9fdfe93d5da05d7ba8013b88336770728bb933c685bdf89088eb0a98135ada70ecc3399cd576e33af361c7f04afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a31fb17c8b5f60eaf4fba2c124e4739
SHA16bbbc22a68996011d79ad506e66d4be3253a5c7a
SHA256305d64472fcb662a7f1055374dce6e3647d61ee6c4989f957183858b45d48b6f
SHA512a8b720b42de76cb62a405bc9fd52e2701412c9bac5a6d4a779184c209586eb37de6f4073a6fd3daf1ad1eab1c82c511441e497d3369e916e1efcc738393b91c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531e27cb379f0aeae6ac03ad88aa73fd1
SHA1c3ccdcf5dac367599bfba8abf0e2dff2df303c1d
SHA2568f13f444e187a6f0f7992b6242ac1e7c85fb6b5a501b3c1bb18cee57e994866f
SHA512dcfb320c8631dd10d4fba4b64cb6c9f7ec2932bd90b9960f1d53c33ebc46bfca0f67613246f46851547eee3f46346179455690501978243964343ece6fb34ec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513464e8f20bb5cd4593e3f4f3372dba8
SHA103ad0a34cdbed71bba5191eee1f34ead52c03951
SHA25699096857aba715b39039b13411efaba783a592bedcf6699b122415df09cca502
SHA512102415ab104b64f2565fbe06da78e535cf098b102ac5fa47a8bc4d412984721b3bad85b8f96f7399e881972a233f0cf5597f5dc43b48eb83e20d72373fcf2bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2608ade7c72f87349ccfe26aa3e31b9
SHA1ee2a504e81cc2595ada5e0648d3915d40e95b3d7
SHA256513a72fcd263aa087191915fce7c3dd17ca7ed2585a30f4f9d10b59d2f8bafdc
SHA5121f1059429a69141d9c8242307fc6cff2a01470661d45acd105e2f1afe62880885027d92e0ca7d9fc7ee57414fdbfe405db4b26699873a0b1c1d10567cfbce71b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509311ddafbcf51122d5ebc662bbd9f4e
SHA1939ee21d10580782eb2a5059a913f5d9d33acdec
SHA256880095916cd1c4368259eaf9792211a24262feca1066830c44a45aefb350ffe7
SHA51252318d6fdc90053e6a4d78c96e5e3739831db1a8735bd9e8cb4bfb85299823a0e8c4ee3b37d39320e8642eb5138d757399a8d43acfab7cdf0ae8a0c0c057a735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c58d46add98c41cbb46971e5acb4e26d
SHA15dd45548438cff363429e8a4f67b3690b113d813
SHA256be8412048d033e3c93c745fef33f92c52e11baec11781ed1ef9b87a12f1f7d9f
SHA5129024c989b73026d519d132a87dd48e5f3c563d4bb9469d4675060fa357c45cf1b6a271e371ab14cd46e51ffcec6ed10555e4a63c1a9139ae3d6005814a8d022e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8fc968e5e6006f13a100d97d152e538
SHA15368c0122e24d500d3cbf1161ce1a637b9c498cd
SHA25606248fb15bc57adbbf8fe0578d8c4e6572c95e557180f5e2d6d9fbebf4bd777b
SHA512bd20a0d8819ff96a112c183518770b83a0a46a19144487e06c4d4b35a805874268ab2a55ae9b771f92b492914951fc74318514638ff76f370b3387bae486c80f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b