Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 18:40
Static task
static1
Behavioral task
behavioral1
Sample
87366214fdd6ab22cc516ede79307efc_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
87366214fdd6ab22cc516ede79307efc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
87366214fdd6ab22cc516ede79307efc_JaffaCakes118.html
-
Size
11KB
-
MD5
87366214fdd6ab22cc516ede79307efc
-
SHA1
e6f91b2604b6722408e8b0b6f9b8019ef561795f
-
SHA256
19d16e229f4f1f1618361e5963cbf51c6deb6620698262dbbbdc3105d6c38cc7
-
SHA512
5ed47fbb32187dcb56714b1a8ba365aed85017f5ab64d6e8aa6771e6cfcdf79969e26d33ac9c61c230468874cdec687e02717cc05b2b9385ec97b6edec5a327d
-
SSDEEP
192:2ValIsr0r57M4MxapT8IM/w1wvqVkt13auBuLbdU8d:salIcIQ4MxaBM/g83aguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000019b8eee42706b53a7b89ba9afd5211a53ba17b3d46efdd62be650de9cbcfdd02000000000e80000000020000200000007c8cee2cd9c57e837aeb9a82cbd922564006c46b8278a03250e5daace8e7c654200000001e9b4073f919eb2bd7c4fea45eccb2ebf779b5d0914610e55eb6738c4ba4daba4000000011ee52d62b565316eddcafab1ff60b416e1b483462a80b0dab299d083acab49cd73d17cacc77fc1308e9e350304114d1cf23f8b4ae95506193794514d88aa495 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0D3631A1-5748-11EF-9CB4-D238DC34531D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429477113" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00003c0b55ebda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2288 iexplore.exe 2288 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2340 2288 iexplore.exe 31 PID 2288 wrote to memory of 2340 2288 iexplore.exe 31 PID 2288 wrote to memory of 2340 2288 iexplore.exe 31 PID 2288 wrote to memory of 2340 2288 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\87366214fdd6ab22cc516ede79307efc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1be803d5b9f535b6c5e73a7a3642732
SHA12dae98304483afdcd8e7effcce29671387bac01a
SHA2562863581bd6c739847a900176a44108c3fb4747e88fcbc93fcebbfc36d6fa90c7
SHA512c89ccbdf66ecb2d3bb6c90346fd11c0ed723a5e4aebdcf78839ae9a5381baa66ec472ad0f55c1abff946e862c47e70701aef4e988ef8a7335b40e0505b8da385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5480ab3faf6a61f9131dc73a3e4acd736
SHA1d73879ce63d1e609e305daefdd505cc374abca1c
SHA256f9ae91e4c32eb4dc9dff33289c04d2f03bd512b2884775b74e8eb828c95c86d4
SHA512295a59f8bf801727c70be99c89811f25302137e004e5069d8394c96c27d87828ff48af9a20ee69190baa63ce61de3613c7fc3cee0576b25bd10a95603551d306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0b2643a767b9262c5e885f8216be723
SHA14941f3d84e5823b51a104eba1d591c486ae56fd7
SHA256e773461301c8cd767fb2ebfac7a8937a6494c5393409e9b7e83d6d6ed613d3cc
SHA512b7bcc489d8d3ae9dc5239b62684528671be416303c8244b5e91b529e2516f72e28b5a389d9d00753fa3d8d91db5234c4ffedf4465025d8a820d41c0fd52072a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576de029638673f3e1bb62aa72121e06f
SHA1fd91b0272f80baa75404ebc01d5052c56bf47ca3
SHA2569659832b96e9187b9420c310b4f5ac9a4db86a243e5adadf55ecbb72331df931
SHA512c9be561c70245db27ad5d6ff3eb7f681e67f2ab33d323481786f2e5a2c2dcaace81694c26ddd02ee0c0e7cb505e94eaec862defb57f530fa1a6c734b823f3075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539bab04033949f2893bdf32b030f4da6
SHA1791c576babb0550b928f1e24df270837cb543488
SHA2560f16498a083f9183a5fa53dbdf97e260d8885739deb04b6e59ce6eb049904e26
SHA5122db7e34a89abc79aa73a483a8d5c0c3cf1045264c4ac4ddecc121f5d3a06195afa7ae4122edd2ab4866b4fc0276b5546a26caa39f726d7dd721b72e500e921e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543947da9ad12d98dc047a541f3bd3aa7
SHA12e2a9b01763615a76d8e5537bd14f53f028467b6
SHA256e730fe6f353f8785e10e9890137176b8f8c3587daa912803902a65f184ab16f8
SHA5125cd40afb618911c6333aea0eb128bea9ac58fadf83060fcb7d5a6377c7e318fd23f43551b56c276d889a498197cd6aca92ae26c2310b499101720ba3dd294c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac5024c95eb8ca77b0e08237a9919008
SHA17f51af079762ba8190ac69ae1fb7acbda2161d04
SHA256234e567c47a55922eb3013f964d6bc18050f5c6bcb81d444e6bcc5b28e3c8976
SHA512d8727f6710e1f53398f75dc2ae143c2f998ac134d8b2502989e10a71b22453dc0321bea4ab185770da70b74033360bf268d654a35c712fd40e47c72565268537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5909791993d260e5a81bc720914a30c41
SHA18f44af8c71fd78f24f9c95f85d0e8654f4f9f8c4
SHA25686f934400bc0a4d08acfb1ec0e202a18a8328b7e87c2c0bc6e030b09f393f592
SHA5127475a2390d1249b19ae6e189d993ffa00b0c1042988161d4de1913980ff432664f6362c396451a747ec88308455efa97de76b1bf1ab87bced39c2ed109e222f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb2eb01e7db86bf7d3518fe9c738372f
SHA16fa8e656005fce0edee74dd5f05a425a01260366
SHA256de044816ff022c0b29862b3cf619574595070af54e8ec08a8c2f9a8db6df30ce
SHA51217d6a05c34c140021603f0ec15c283edc13a1e4be757a76088aec9ae872009245217c3f62345bfdac88538f43e8d0d13379f97a7098c97c4c2a149b324d86693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f0d3611736fc553386528747553858f
SHA1674bdf929d1f19899c8a0e314b050fa6ab820eb8
SHA25619d52bc9e7ec5161d0ff929de41cf590763c6e377988c77ee3d0b1954d70cc3e
SHA5128631a53f80c59b3315e12f2d9ee197e75ebae51024181cf77580a53d0654619be8f3c8c4feb5541bba2b43f57214de687fad916eae3ec635ab1fd80131082c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5286301140f99debcad3bbe9721660262
SHA1b035a992b1ba600ead0bd7965b5a7a51be072224
SHA256530a176836e868dd70e7fb05190aaa4bc27b3f9a74861dd759e82cd9bb21b8e7
SHA51227c49a1bcc0d98184c87e6c89ea152e37a25c109201aeb5885b0962569f18513a65eaeb3980146dec244474d6a31b29f6a74980a2121e4c4ccd534cf0056e284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563dc27df771682cc56afc070445c0c62
SHA1e4a085d0d94e10541875402b5e463dcf97d37d77
SHA256c5d9dfa9fdc8967c5bc04303fa9b3bdf93cb3294133ca3364a5530f885ad8a7f
SHA512c1ebc66648012d93d3b680c931314afec115a3c0d61ebd6a3d7d68ee92e287debef609a0d47be057b254747485e6bf9a5c81c39d23af4f5e88dd4b000f0a2ffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56547a0e8a624a130cceb9fd679cd9397
SHA151397cc1331786af5abb557a6101ac091bb3fab9
SHA2565d63ca35ed2cc9769fa208f3ea267021265e2dbae74f82557982142012cefada
SHA5121d39d416ed7428678aca8eee752878533b43f4d01456b71b9a8460f19d33e222c340b20a46b2f23e8c233508dbd83069d13934f1d6de68c2e223f6b87eb61ad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b3dcb75ff705e934ede45dbf01a9d70
SHA1fb3299660b9ceec1f9ac5121d552f9b04b795e4c
SHA256c1781a8c2c5bf78b578ed789dd3dabffaf60fed04cb2ba2f0f0292c768efa323
SHA51289624872a793b0473363979805e639dec9b615c6d37c85a8628a8b4dbb3157f7a99af900ad38347fdb31c2c5ee02d8f3d793b43b9f3bf124dbc8af1d762b66fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0af983a60783095a0084b16558a711e
SHA1ccf793aa0f77812920f2b830260e781fe2e05127
SHA2560786b5dae5f63fc5324f389e0c8159ce32400fa6d385370f1291669d575d7c2f
SHA5124eef81f0da45b8659d472ea721bc0f72eab079db578f9283bec48011547572483da9a06eb79e75a485ed94029de9a4077d9c25f740fbe9e6518d759fd9c6bb6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579191442f51b3ea41f1be722da60fca1
SHA19b80aabb3454349ac909b3bda013b0354885671c
SHA2560ffba1d5382e81b446bb1b963dbc93412d419f098e151ca79f709fc500480fa9
SHA5125f3facdfccc43ba953c0b58e507c0adf06b4dcddb255a848199e74492d483608f3bf23cd858b3e0f44ae70f75ae8550e6774cb905f9ee5327fcd6e9923ab2f81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550e4ab6e7e39e6f3213fd5e83754a2a2
SHA1cd797a4b21a164e274a61582c7782fc6a98bf326
SHA256b345363781e68bfe8e87ceda73b40248de0429ca738a40a72698616882b1d4b9
SHA512790d4b10550dc0a23e9b5a64213f0a7ed97a8d41c01302e21ddfe0bf5cd28e5a883964819c9393703b0d5f6c04f85a8926e95417743578f463098e054d81fcb8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b