Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 15:04
Static task
static1
Behavioral task
behavioral1
Sample
939790df7e816c501e11bc0158a84a8b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
939790df7e816c501e11bc0158a84a8b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
939790df7e816c501e11bc0158a84a8b_JaffaCakes118.html
-
Size
6KB
-
MD5
939790df7e816c501e11bc0158a84a8b
-
SHA1
44b53fe5e203e564bd366ca2f03488bea67edbd2
-
SHA256
f749366fe7699bd9c50df91a53913a255526c6247cfb25a72623439837b6db8b
-
SHA512
4c8de23b526b595ba561ca26f080a35a78e938194ba422cd3e10c26877e6c3f85ed2cf513e3e9ba63bb165f185a8cfde0b6877583b93537d89168defc7185eb9
-
SSDEEP
96:uzVs+ux75i0LLY1k9o84d12ef7CSTUzZcEZ7ru7f:csz75i0AYS/Cb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5896D0C1-5985-11EF-B8B4-D6FE44FD4752} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000f9f44f28da217ae303ca83f0a137a9946cd0049d5383b856364fd728e4c803c4000000000e8000000002000020000000161bc5fcf60e2fd6285ce9064ee12f413ef0ee302f92dcdbed17e8fb54570ef4200000000ccfb6f06f1f4d2d692ed32f35722b6ef308520588250718e038fc8f38f290c0400000001a48e86d740d502cc8d90b2a0eeb449f1b3e2b4dd576108879203c60dbabda717277fa693be9e9be17cef0790695b6a9bfe5cda9f15ffd380e277d99164d406f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0d0912d92edda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429723340" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3008 iexplore.exe 3008 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2528 3008 iexplore.exe 29 PID 3008 wrote to memory of 2528 3008 iexplore.exe 29 PID 3008 wrote to memory of 2528 3008 iexplore.exe 29 PID 3008 wrote to memory of 2528 3008 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\939790df7e816c501e11bc0158a84a8b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d21833e3c9419374c18d992d7d11e3b
SHA179a538c56a27cf1d072a34ebf2023549eed2c6e9
SHA25666e7cd2ca3722e0fcddfec2fa7016a4e6892e5d70fa4c6ce17a283da32c77b3b
SHA5126f078755ddc3d566df4823aa37dc0118b777f7654d544719b25d78bb3038a148e6ed9b1cb2c6d0395e66efb153afa8dd44f7c3db20a0a9bbe4d8570c9269d30b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596e273e405316ecb0a4fd610b9ff9573
SHA173154566d8d6c5a5fd23820db8e013741e0718aa
SHA2569fb5e67b7f2428b0056d73d262a6fa6d4a4a18b63cd7e671309bb08c2ba24b70
SHA5120c19daa2146ba1375675ab7bf821a700ca50d0bfa8c990bd3d83a8a47b86abc2f3c31a2179c79fc9d999a04fe51c76727f897220ae53d5c68f438ced30c1cbe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfe3a7965263f3ca2c8796b29cf6ae05
SHA178086140074d787139d4da6a8787092cf8a3a59b
SHA25668e2fff967df99555c54373adf41f1b144b2796b11d0efd9571c8f78a4fbe7bf
SHA51265359ec2537e8bd0f761687f3e2a43c5ce91dca4a55c049f739e520ca93f73c905dca83f9d8de0561a0e1b1fd442e932d994bee95e7b4f5263c8a3b073e422c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f31e05e4fabaa1c2b4770716958685e
SHA1ad401a440aefd48a857bb2a415b79f785aae505b
SHA256ad60d92452ff2f01b92a71b3126f95b3bd3737e87787be0d8231252ffed0b988
SHA512b45d062fa5f2d958546f74f4d51a9ac0ec918ca6ce3620ec886cf14de9db59e6155c498d3f02e8262d48dadfcc06dcd06ca1f9bdf4c278886859170cc54576f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdd5d3b7e6ce32cf65f3396fabcb0a8a
SHA1ddf95c579027615c88e0bc5c974086e801df2e0f
SHA256999f3025b72fc301aa59eb3b272aeb6671e61d60fa321abf4f88048b9f42ad17
SHA512e83bb2c55854893531c5213465c002c9be8f26028fe7e8e55e8352f0dce4682e32d2ee8ba142fa8fc5311222820d369dff23c94cb0c85da56b4fc9659a1c3a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543d7a1c95ced74fb844be6ef4e4b7d7c
SHA119bdabbc5f2d8a6a5b2a650b12c76abee8a10e4a
SHA2566b6bb9cd51353d206b5f2cf07ab3d5185e143dcd99b5b63ca4bb21b74c127d92
SHA5125292c0348d70922043ef5b3e828aaba65c438123763b5fb145abb7454193dac82f2aa96c141c0b03be7d5e0a276a267d1500dd84e9cfd40c50151e55a9a371d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e365a021ec09af10881bedec26db7349
SHA1f0464d0b5755fc95473cf8adaece2c7466a579bf
SHA256b7097e3a123a7cac080fc2915c9a74f4803fe40c3fa3171211562729af650480
SHA51207b3712b48f5e28bc6d3508b06a93dddfed56b913a46c71b27a17cbbeae2ab497d9a5076d90100842e6698013b60ddda730fd8acfab77cfa2e8c004b073fe010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510b9ad8ac29b8d1c7260cc881351af03
SHA14fd6c07c0f8cd9083e16e6ee6fe2a10cce593fa9
SHA256b0167fce02a8c7410be237239ba3e29065f16d2a18d72d12871fe1b74b5b1190
SHA512cccabbfe389e8fb734ec20101168c5d24211b11f7ce164b03027062dc49a77542d53c2d0b0664cbacb066f796f8dac6153f21c52dadef35de0146d8601d384e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baa6084e79e595b607b0aa9a998ac41d
SHA11d64e46b1a68972cf8de1af8b687c3f45e91520e
SHA256310d5992248a25f521fdcd9307604fef83e09ee8a1a88be9b459aeacc5e34e67
SHA51279997e8aa4ae6d01da7f3ee9de005c1f6a9104eba98503d59b31316a1f9e5b8a49a369ce621e8bf51374f8c014b7d542cbaf4abad896cb6bcde6fa80cdb16475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf383bfe2b5a59719fce18a7b495bb0f
SHA18e34b7210d1712bb75f3e5d0fc915f596a7e0343
SHA256d2a440aff19a1d0b8f3feb991745434ef91c9e91928f74539e3b6a4cf57717df
SHA5124dbfb39ebd365e7c62445a0378a64d120342ae05b2b469d2eed22d1f115caac045c0032e381a9580be6d21b3a4a0ed9a9e2a5e36959308a0fc287540d39d5ace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58335ab1ff6503d8896a5998834acb279
SHA1fae2f623243c8ccf4ebf5564af019c964af44145
SHA25660e86c90d3b210a748cefda59d7fd28856fc8781661a757ba242063a60810e76
SHA51299d3582c03cb09c7cb3432f4fb4c0ea1339a47068bc045ccd2b222c1183f333cd8cc38ce512bb970b057f7ab574961c2fa77eb2f2292960b215249a5dbaa50d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9b0025177550ad4145c13dfe08d08a9
SHA1552544928ebb1ff272951aa3535b9c858ddadccb
SHA256bd67c0eb194d14109771341cd46637d15e3ae6be6655f899f2979e1c1d037b4d
SHA512e6a1704ddffc4b3c6ec14cb83187a5ebf46a58dd05051483a3910e26853eb355e1e8df649b09a84dabd3ed1cd4664095c317a00328abc3df509a22274a34db7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b4625040a6ac82d5df25314a346b4cd
SHA17e1601bc1ed0da705aa55e3346eed9df97aae8f6
SHA256f539b0e6b1fc98e534639e6994dabb5940e1b38997ed5c88c2ef752310903a3a
SHA5123d6307fd67e62f63794875986bd503623fd92a68fe83adc8e11fa1d5be1eb13d7f73f774079af4faa3d0e6cbc8cf8da063622cb15aa7848eb42c95077fb74127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3cc49baeb0aa93f6222799883f3cb4f
SHA1c5506f85b3fd2b3b59863ace97d4c974ab6747ce
SHA2569eef60a74ca49e0ca892ffcc46d667c6273e10a1ba71d8a21320c5429b262cce
SHA5127a787b3ef5bb341ab19e8898ca196200f016f23800eea943c6797eb7d8269b65051e1ee296a359af20135e571e8760de6aa69d6d6d58cb3d65d62c607b644d1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bba59593ae99ba0af4d0b26388b47ab0
SHA1ce04e816cfe65912394a200e42fd8533dc1445e2
SHA2560ea3d01d8aa11ba360a8b14092af3d37f5458bece0f43f6be0c5a656735552ae
SHA512b07c95cb8d2301724a63b691d0172ec535f13432223368215ec6b4d61e3801be51dfd97e168b65700a2da8ca68c3f52328a3f6f993dc81d6daa6155b15e76676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eea991d0b8e4ea58a0f926445fbe102b
SHA1922cf209eefcd0add01346ee4ec326997d6c7ae5
SHA256c64af949a0529f9c76a088960cde0fd3dcd4b5af69d5ea385b0e9c7487a138f8
SHA512b8a320fc56e22fb4a24cb913f63b3f2bcfc3cbf2057f495e0be111b3e3c0a4e74854cd18ec742fcd6169831abeaed401e4115ec2ff67df8441abd45d114b4e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5876a5e43e233e6f75cd76ef5d9efa709
SHA151ccdbaca7489759ca26729b85e8afb269930e65
SHA2569a860826601b93feaa9a603cd7b647ad7e185b9de98f22db6585101dd765ab5a
SHA512d4c64671537c3a8c818a6e90700fce38830c3ce503ae9364f488662c4ed8b1eee8016c75f95b7839d77fa457b243b680516a43c41aa1eb4209e8ec4a506e51ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578ed521a59833ce2444e6eafa963ceb2
SHA1730e58b04d7d0997d0c294e430caacce187cb554
SHA256af00aaa5489ded07b4d6f92cd9285d25c61dca380fb1b15d30f30827bb95ae97
SHA51250c50e2bdbcdfde2c852ba7338a01e8ecf816311b4d9077cdd5a3f55a22708c290a88df66e4e25992df25056fbf04ec90e1ae1f5a9b97db654ae77ee968cebdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510e99337b9cbe5a10fcc1c2c6ec45e37
SHA1001f7b36b6e34c47e12d85aac1106b175faae335
SHA25672c08af9d68c712f27705a2f77a10db0ccdd3d58c1da5dd5ffe55a97d8ad1c6f
SHA51292ee144370b614890d022522b80103d28ffdae843a166d2a8e0c8d81668c016572c62941e92bb73612422386c72ee88f3e614ce194a0ab8e29d0395727f72e64
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b