Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 10:41
Static task
static1
Behavioral task
behavioral1
Sample
cf5be9424ab466506b1924772bbe2817_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf5be9424ab466506b1924772bbe2817_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf5be9424ab466506b1924772bbe2817_JaffaCakes118.html
-
Size
344KB
-
MD5
cf5be9424ab466506b1924772bbe2817
-
SHA1
b6222cc46df2805f5628fd40d5ff92d3845f4efa
-
SHA256
91e10b18d5063e3372e8071dcc2aade2d2c140bbfefad002a6c35b0f8b7143fa
-
SHA512
337da81c37e6232e38d98f8d55989e30243295a9efe742de61640a267c2cfde789acac79e9cb4e1d7f2f2aea4c2884aca8435303addcc535874c8f21055d4ab4
-
SSDEEP
6144:S/sMYod+X3oI+YoIddsMYod+X3oI+YrsMYod+X3oI+YQ:S5d+X3Jp5d+X3F5d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000006a907e85ab08a18595f3c92bd95a664874deead436bb2c585ffcf6ca6b351019000000000e8000000002000020000000773f1b153e3c9f415e4d3cff2a9293911cb354cf4ba54f044b0543f4340ef7f520000000f7ece499e57aa211180a975bc63b17508c6374402ad01a0976fd9529830d013040000000d831231d2e1340dcd578cc9d5332f7d82a86e901966cfe491bdb750aba58114c1b405d81894b826854089b6734317d6a30c074e7b63ae67f63b2e9b0e2574e5d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{84C29161-6C3C-11EF-AD58-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0d141594900db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431781132" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1036 iexplore.exe 1036 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1036 wrote to memory of 2840 1036 iexplore.exe 31 PID 1036 wrote to memory of 2840 1036 iexplore.exe 31 PID 1036 wrote to memory of 2840 1036 iexplore.exe 31 PID 1036 wrote to memory of 2840 1036 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf5be9424ab466506b1924772bbe2817_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1036 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5759c07271d149002b96de905b5d835
SHA1e0ce4a8f0de61a833c4194611c659bb38f119118
SHA2564a884aa9372f9757491aec837036f26d02889cfeddb2c1b7a931a26fa4108aa3
SHA512acab94f5cb9463ad077fba251c0449690de62f877dab34f947f40bf32980b8f343533f7251565ebbac182918229b046e78042915586b875b50bb5d7bc92a04ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586738ea7e7503b9a8762a650a6a79dad
SHA13f9d925c1838b9c70db9b55a2892b569ff97af77
SHA256287e2e5fed3dcc0f0c5b6713c54b26a9be1e9a24a75d066ca180af5f0e707ba7
SHA512568559e823c1026e51b4ccc427df719ad06e5a8abd928a01edcca2ee5ed8e9856f6774a97cb905be79b1c32d74c2ea57bafb0030bbbb3aa82db4e1e7d637999d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57558ac67b34f6b23ff5a090f4601eba4
SHA1d8717f554478256c074d7cbbccd602dbec4ffeb2
SHA256ef1229549136543c53896bfcb05e94e047a87d6310a041d6b4b55acc1830f076
SHA512f2bde6a5ec2c9fe09ad72a6993fa088116ce8067645cb167c4332459c28472ff5d077a0dff9236bceddbe75bc15269dbacbe4015d687e578dda56fc3428ad235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5746572715d8ec51b3ac277196dca0e
SHA1ca6cb677f5d80ec8d396124b2b22e6f76c866c4d
SHA256f0b1bfdcaf21aae282ff291bd04ac328c331ddbb181feddc791d536665bab57d
SHA51227fde29e1ab55e0a1d80575c937b021f1726a786dba7a04f69484a1c93138ec330703474dcc5badf1e6ff8b1774d87ad72a1bbbb9f592d2682040811d444e161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51321dbea31c2327fb3ddc484be5bebb5
SHA1af4ad8df926c1efcdba492b7820b2ba76692399b
SHA256a2e2d2149ff8c8bed6ffae547ada665bdfc2a8471f77e2ad192a803c1a64822a
SHA512f6c121a9196870bd99d811f640511d3594b18d8996bbaab7052cbfd04dc5641c1b4a84fd34aab15a433b7bf8eba4a8011fa2b2dda0ac94147d058dbd5dde35c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ccfd29c3e418fa856e96e685b9dfb67
SHA1c824afd0af112ab62d9036a0131c99c72e7e4c0e
SHA256339a07145f26b35fc42271043622239cb732dabc9311e3a297fe851f864622f3
SHA51276f789466a813e96ce796d64c9d072330da97a5db0803c2b927960067191b8f8b5eb6ce51cf858aed45b30d4a24753ece9fcd7f3138926d343f5d1d55826e03e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538644d83cd0dc94412ecf3e2d64894fc
SHA1307ab16d71c8d1afae53cbb4a691b41a22934a88
SHA256a0b8048cf8286feb011966d8ebebcc1cf0f3b09b4ef8068a3dbd042d90a0edc2
SHA51262f1695ad2e8959074c0af39a0b5078bbde42e8d22a0bad8bc2ced2188268ebdc672c26b5e6c49ecf4ad6bf922486ffb154ca385d4d18bd9d1871430a6b40f42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6321bc7de33dac9ad87f93597f61fd0
SHA1b640e3d0fdc4c2e89506d2892b40892f64e3dc43
SHA2565ef95779afd3238f5b4cf7d0ea190428347c799821a9f3e2d4ae8a7e4e2f645a
SHA512798818b6669a8e99f66a5c598ab8e7be720c57c07002d40ce4e557f38c9c3eeb3f0f50c2a32de197819a2c4d7183015c069c9fd95bf39f4fa78716211ed85e6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6ce1b82881499a593d175b2212cf42c
SHA1330d68aeca5143ae5b1e2fbde6ed2f87eb8fa7d7
SHA2561314bafe9e9994babe4f1734bef10d29dd7cc7b0e2ba504050020bef90bdc6c9
SHA51255aa91aa4e12599ae3e525c0c79b04f999aece2fe0b976db3961cb7fbae81c081706635bc1aed52996e4ef510f02755aafc2219daecee42a5aeb8e7a7025f322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58791192f7d5a434e6c485f17e85c2977
SHA126f568705d912e4e4702a92e89df88fd4ec49418
SHA25698cbaad05c17cdb4a8a8cfbbf7623bb653fdec3b473d4e74eed29dded2fd2b35
SHA512cd70dd7f0bbe5d53dfee739e42d5dfaafc50ff3180bec60f35297846e6a4dc52e2eef3aa4379dab9376a8973720a2e5b0329232f78a55c0fccd3bca7b4f0d0fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f5bfb5a3db8f63c18310fa2dc77ef33
SHA110c2455de5ff05004a2c1470bcb1967f135316e3
SHA2564f5df276dd1f498821f5581f5ce4dbb2d853fb40109d67285f0bda0fe58fde9b
SHA512d37b771212be2cb1760094fb3ca0ca7ab1bbec3cfcbbd59d48237bbba1d4feef01c82569d1f9b8d38ec82e9f446e2ef962a4a3fee2b66dd8b47d70c28053bd85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f1e37805b3ed960d0910bdcaa2c138d
SHA181db21a21b4bde7768d17eaca07aa4778ac4cc0e
SHA2563300053dd53f1f837aa074063bc640b77d945edbac58559e504ef36180aabdb5
SHA5126e07b50bf32b702f0e17645e53c470443743c70adfc4ab756a540703466f6cb33a4dd73e215a81a00b1952934ff02251a239c97413ae53692773c6683cb6c3ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e28a4c7cb1571513a427715e0068bdc
SHA16df5aa23440a8cc51516141885196af85b1976b7
SHA2567f8e838560e4e47abf293483ec4df0f4a1fd4b347b13ad6dee98698c44f2cd00
SHA512ba324d89297b3f9cb058eed93f324435244befd4bbd5e5b0c0af91f2f67ebde13c23d4a1d9d090764dbba5bcba3fde2fb101efe64ad19e222f763c0c12872e3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59464ddd99502f5211d56039a07e18f71
SHA16236591108131d89a5519f1a98596b19288aa2a3
SHA2560f6286f044d687dfe86133b202419fa8af09a6ca98f1d01c8e2a3807879ae1ed
SHA5121d95a487206b06f5efbf96932b345b0d3477e091048034830eba65f5c50fd241989d2f3c0948dbdf047185f9a784a0272c8c0475b2f0882313b048687912ea8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf2a2d9530d89edc9f8772027a05586c
SHA10bf939de2623445cb35793383f391150edd608a9
SHA25676df24171b8dafaebdaa992a1775695f03d63360b12b754df4b6d7a6160478ef
SHA5125587585d0a3f1565c0c75604a7be33135248d6b3f7fc7c45780c9b27e0f356aeafd13319ea10c0349cbe004390ccfb7b66880d93560d18881923dccab405196c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5313bfdd4f70d25c1f0015cb0c64e8b74
SHA1cf9383eb393cedf156cb3dd5fc975cfecd13c67d
SHA256ac55e5ef5567137c0dbbb493ba55b7f30a1dfd7f5426be1a5758f22399f39edc
SHA512df9766f023d56f8cec5092825ee3ade4a17d84f6bf2a013ea782896bf5dcb4ec55afffba74b1e54feebcbfbb11f43d5b9970ea7738999cfbfc0b8b7b3d1e1d60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5e07bcf559bd8a1c5b66bb8139f572d
SHA135ebc2fd1fef971bdd4dd77eaa01a6565f2ced76
SHA256429da18dc80afedbf8eb9c60c18e14785916934e61c7a0a92cf8ab9a45564156
SHA512e3fa75be8b41bb70a1f14c6aaf2845eb601e1b8120729b03c72251ffbab521163f7ec9b90c0dd2c8aed35c7a54d7aa38555ebb561f761d7804fb51b208e0066e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c74a77e3b967bb7915eceefda8875a7
SHA1d4ea1d88809ee2a9cc6f064577992a4d747fee2c
SHA256f1ec97bd7f8d3cef262d02ce55a23bb572b4708031cc0b2380baf40a81583297
SHA512fdf959ab43135d8d65daf611783557e8272276e5878776a61561ead0f46478f9c5c447d98fd32d14fabecee9e5d511875e61e683a0ac66c023292be44f8663e9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b