Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 21:56
Static task
static1
Behavioral task
behavioral1
Sample
d2eae3915afb75c38e40466644303ba0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2eae3915afb75c38e40466644303ba0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2eae3915afb75c38e40466644303ba0_JaffaCakes118.html
-
Size
57KB
-
MD5
d2eae3915afb75c38e40466644303ba0
-
SHA1
77eb4e67fcc02de96847d56cf14dabf4787bb12c
-
SHA256
13b56cca253e2b3780cf9bcad02482f899bee5d57eb1a36ba00c711ae337d78c
-
SHA512
263bd3313753490a04d33ab3b5e60c41e21171b6173a7aec900668aa09e5768d4c7e688a63d5ea639d39b3cce3f19ff61fb3a23e859043f7784d0ca592e26055
-
SSDEEP
1536:gQZBCCOdH0IxCYqiJf8fNf9fif7QfYfkfPfQf9fifmfkf6fiftfIfLfLfqf0fafC:gk2R0Ix501l6sgs3IVqesyKlwTTSciAL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3D227401-6D64-11EF-BF4D-465533733A50} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000004216bfb5f8111cc036e35453951860a0d2f2ae9e03bfd8329c09e4ecea6ea85e000000000e80000000020000200000008ff2a2c8525a96d64dfb0f056bd8c725f633dc8257c1ac00d660d4b8cccfa39a20000000d3d9a157fda1efd868ba48461a7a4288cd09ee5c8c6f0c06a1f953494a9d26bc40000000e12ceae4b332eeb75d312c733cfde430e0d8b845e9fcf569f51f93af08773471d53af4a0e03ba5824f819f08c8162a9a534dee8fbe10457704713b21f3ad5d06 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 007c812b7101db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431908148" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1408 2060 iexplore.exe 30 PID 2060 wrote to memory of 1408 2060 iexplore.exe 30 PID 2060 wrote to memory of 1408 2060 iexplore.exe 30 PID 2060 wrote to memory of 1408 2060 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2eae3915afb75c38e40466644303ba0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528cfe9efa04ed4501dc2e9ab01e9b1e8
SHA1e8b90e7545f5d1e747f73787e926150ec9df6413
SHA2565cba975eb3489ab7a35dd868793e42512d92616a04cfc7f6eeea8b4578d58126
SHA512602c575c8358815ae74221344cebf71b7d5534e0dced666dfdd582aace9cd1e445370f0a296ba28344c21d0e65f8fba0d41947592463b43f61cab5f56753b3c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0e97617413b57eccfc0c0731419ea27
SHA1057a36ef354fdc6f9f7e0632fa8381b24581611d
SHA256c9a61ea86976a8dcf768ae285f9b3d6fb668ef87a103264fba4fb35905fb2fca
SHA51282b78e0c388632f02da3439c70024d289936d5f2f9ebc0dab47a34b611e8b97c54966e1b39c2c0a06c794eb82834b25afb527e833879e63d5c4fd81a56246d9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58543359a0a254a20bc53653010bd156f
SHA1c228a2ff9a4814d6053a5594c6cedd3f1c97e684
SHA256d8f1ae90fcd6226833491fba6fd5cba760d67fbb71d0adb5e516ab8e2f937c77
SHA51203baa4cbf400ecbfff6b892c68af45d5917a73cc962f0714c762749518153ee41641c9341652f4d9c82568cc70913dafb866b87f4e810d8b800922c77f9bb94d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55206e5656c052aaf3d50ccb3b9d567e1
SHA1a49250cb479e29f137d0bb4650250e5ca2847917
SHA2561d6a01832e3d47b429d5c9eb935864bad7d952da6a61afb8ae0d392166e1f912
SHA5127e90d49a629b25e98c944f081e07c3449936a2104d3183e4b38ddeb7c8da106bad91fb313dea92fd7c5bb818a694c5f034d47d5548558164d237742d91b12958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae36afdec8a0f5ec4436ddad612bed76
SHA1dc7b760522c65d5bc244119b58f838c3845fd222
SHA25676eb58cee3d52606718e4ed5272746c213daed89fdfc1418a0339a9ac26ff498
SHA5128676f373da6e1a2b87ea88e1d707c41c39b106ecba3e1792eda147805851bc211551ecf8c64c19e926ce51f8da9c67ea94f4b7de8f649f58e16e23b577fd10a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfe7eaf7720ae801f7e986358930200d
SHA11646a02dd5c4d619c1bd4044048ccbf94b609f1d
SHA256894f5f78a00390ce4a5f697135c897309e571f032b55c383c8f10b1e4e1f4080
SHA51208ca8a8327a388866c5c6bd43a6dd7bfa78fd876dcc29c4ecf76c4effb1ce886d37de521bc7b680e8a26639c15eff3ae0ea336c5808a8b3cf02ac457c3d65216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc86a5009753370c206f420f1d4cb52e
SHA168d82c4b3f2da4dcc35a398a2f4bab03d63feaf7
SHA256a447ed4bad81162b22deccf4de4cf42426ca57f1e27fe0c6aa16a35bcf1c5981
SHA5127094b519e5458b2e8767192f411b1a6a397ee0c56289a0e6faa40974ab23601355e834fa4d4521dd8c5ef26a7510d696bab59eca6822c51244859f62f04816af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f84d2e03c3ad983d6119913b404320db
SHA1e556c3580b6550762c703b4d511ecf9080ae9d5e
SHA2568cfbc226fa815c57db5bc59d457ab4e9b5ac4fb56de29edfd8b776fdec757abe
SHA512602a96a81a9fb3164e782b4acb5e0a2759b7a1d91926b1b4bd0954a08f4eb0a080f12f7e0fb08b18d63700cc8329d4537074c56d32b549c5c5fc6bee0f93e057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1b29d2d44e858a4943e16da51b2666a
SHA10fc7e7e09716df96dc9bffdfc81a82822060d6a7
SHA256fc06db42cb2eb37ca02dd2f1bdb4d9fe20f0256369ba48b7d0d392f0e6c3c32b
SHA512a0f7ff66e8ae1b80c5a2d30e17bca53d35fc0aad8916f94b1f684f7b558272ab2fd132098752ca5605b33ec88e649accdb66f31a9bc3270ebedd27055bf1bb6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a0462f4a682ba5e006e5e4689511b79
SHA13797b77e7e236830c454a9b660f449be66430f6c
SHA2561f452abf81facf58e1d1777bcfdc99fbc6949271e1763f461c65b8e09ddabfc6
SHA512a9e7059e33eb888f8a3c3ccda554689c536eb7a015f4acf9b4b7276d297a075ddef523a4a7ff80745793df83709c523e8456c64e5bf866d50e5dd1b690930b34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528522adf28cf3a6a34833de0a171b475
SHA19846284f992c8cc829dfaa307fe6ed7c6358b60d
SHA25613b817d2c5c60dd052fab7947368b3041184c6f4fdc1ad2e1f4480b3a910a1aa
SHA5124ce2834ddab2a98590f047c6a08ba3046d4eace0d5b13843590e828b35c6a10fbadabfabc9de3c8529eb0542798d9b040164ba19ae97a3eadb4558cf9d6e98da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6e214963d10490517cd519fc5689f7e
SHA1f9a7dffe77b9b8b3dc8a490eeaa0146d5d29bb10
SHA25685b3ccdd641e88350dd8bd7c06535bf4ba36d32015ac95ca609f8c6bd5a266b0
SHA5126b8b5a9b00ab9bb9471fb314b2938f2913061cb3b240a653db535795769ba7148e8c80c362a472981ce94dab1871471ea12972ec5322cbfdf041579b8440ef00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9e306b5cdda53cd5e9d089805f2fb24
SHA160027fa3adee1e60d07607b59e2a6d06c744af34
SHA2566d8416f283a97e94d257702a83b3a607b70214204f8325ab598206b5188fcde0
SHA512f9e79211adb6085ba660135299665b95d807753af5cc979de9f6197841d5a5b3fd4a08beaeba095dd960fa28da4f1ddcc2a37c6fd3925d067cab7864634f52d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b53a0f05c49b77c62c0980510177b6c7
SHA19fe797a6ecbf8bfeebc499542c2be56b7dea5e89
SHA2567369cf4972bf0fbe9afb6065899b955e5efa3584a2de386ab65d48eac6efc968
SHA512a6f0cbaedb8df88377ed3e74af1706942b1c8e45cc6f24b87387223d98c9575a0836efeffc198e572bc3021de7372025bb53240cba26752075ef2861a73daff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53683c438e3576af1985c0da6bf708857
SHA1ba635f9123677e7b66729bcb407fbcc652efb80d
SHA2565583f7b80577c5942f4db0445794d9237f028a037dafc8991bd743405e6e0b50
SHA512584552851c541f46f8b1ed5f2b108064f2de64275072611360c3c84f7d95e43890baffc4b8d0d0762955be8d4cd3fccdf2ab72ead2a0bf3a650aed75bbe4bc1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bbe4bfc9df5471df80672b5d2b61291
SHA166d91a5f7ddacc68795ae4cff359225259abd4ad
SHA256e024dc169f6c159397ed0b6d0bb75116dc74ecc8301e1a355d64b0500a9a17e2
SHA5125d36aab9919a1427ba025ce0d7583fe32a1dc4f4edef5cc388cc8cc6485ff04b08254471780bdf330e993ce32025117b4f42c783967b3418db726579a848b0bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ee5072e92bc3bcaa00c56141971eb5d
SHA1d542d14e8ac2666cfb388c277daf11605a5b508c
SHA256eea66d44443ed1d0d2497943e1537d291a10442cff8e010d58c016008dee3e69
SHA5126203c395e62b616518a4b47fb0385f1e76c5f6aa8a6028c6cf80aec845721b6105fc30d52d8dd63b68a1e583104df85647abdb206cd3b999c3f65d26de08f9e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b000fdac63c55ddd6e55c677165fdd21
SHA1e057c16719ab5d902ae105190368f7ace96f919c
SHA2567793ac169e41b252dce9c9a74be2729eaca6600b76dca8cd7d1ad31529335741
SHA5125a58a51450cc0f0ebd33d338f215c740fa5b19c5c23a9a3f603fb0480349bfaa9c7a3753ecd21ffcba4fbfffbee83386d1069459937cafdc4a28b6c7908bd28a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5797f5d735457aa6f012c806de58631fe
SHA1f150ad175fd2a6649390a4f32c04b8a0f213d868
SHA2565fc7f7ba2f6e1199a95062a3987b6be07c26f8230cf2d4880a768065a4487b7c
SHA512cb7a837a620a2374e9751f2614c4316fdcd5257f75e48908af044b4e1084b4bfabb658c8e5d7ac9ff719cabeddd3500f10f5a3bbb14b70fb0f51473d55dce29f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b