Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
d2c9b0c7a9d872a137ea980a457643e7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2c9b0c7a9d872a137ea980a457643e7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2c9b0c7a9d872a137ea980a457643e7_JaffaCakes118.html
-
Size
810B
-
MD5
d2c9b0c7a9d872a137ea980a457643e7
-
SHA1
52edffe92d273783b206c80dc5574604d060e3b1
-
SHA256
461b2abe48968aa4ea1505af76ad159876d18f1856238d86be667a972c41d71a
-
SHA512
c16b421d6802eba20f06644ec65a6070a0f4db59a20644143f92d925fee9bc04631947632f6b7233f38ccd9878973efaf4aa38291ba1c761fc7453606323946d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c032758b6501db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C64AFEC1-6D58-11EF-9C44-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000d9185cad9ea4949216867b3ef1217da1c9bb71aa69cc99191a25c123436fd27e000000000e8000000002000020000000bd5437187e2d17b67d97481c6ff3d99aee8c04cb21496ca83f2081600ab94031200000006721ea7412fa3af1cb438ebaa37869341526fe9f0ed109f748cf1ed12a1bfead40000000be7c00f54767cd2fa116a543816744e6275f9acca43d309f2623fbbd64dd80e1ff38d728f7d0672ac58a64eac9e416bc3903e9a03aa6a25eee1cc9ec5ede8d3c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431903220" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1260 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1260 iexplore.exe 1260 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2348 1260 iexplore.exe 30 PID 1260 wrote to memory of 2348 1260 iexplore.exe 30 PID 1260 wrote to memory of 2348 1260 iexplore.exe 30 PID 1260 wrote to memory of 2348 1260 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2c9b0c7a9d872a137ea980a457643e7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1260 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53959b042b146cbe0aac788a8b3a17938
SHA117e6db5ee8476eb6fe2b8b3b874bd410e3e3d97b
SHA2561bbc436e7b9b1a08292bbaf152fc54598ca024f6a1b65d87a9f52b9fe7190391
SHA512020c477aafa660a5eb78d2cc129d0dd07d3ae2f680e603250379451f1f5b2fd18dd71b6760d4d0763c362951b05c8efdb5e322d2c8b44fa152456831969080db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a61d0cd1e68a291cee904f734ded5928
SHA176b94f72feb41d266e97458a3a0477b2ee5d964a
SHA256d05d5fa427494ea48a3dd0c879975f3092aac58cc3c9de92388d666558962afe
SHA512d854374c6eed4778646d73c747dbc9ed0c0978416b5f78a46eafd3d963065debcb05fafd5d17283bda6ccc70f712265ca4ccc79ad34c904409a89f503d8b4344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bc039fe78df70e172dd0032225f001b
SHA182eb4c0b5eaa7e90e6764dc3d195f86e174ff9a6
SHA256277d27a29132a802f1a9f21edac012b8782c39ade6193e8f76017437e6755455
SHA51260eae48b067b4051871aa6d70792126196f3678ef60b0f22e34aebf4b0693d8b9b0423c3800af7f190be7ea537c83c48542e43743aa1ba1795db3102ff944331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb4e9abd262ecc9c9b6771847afa7373
SHA113786f90ff63a94b05d156fd3730752c9e5785ac
SHA256b3af46c5adc27b724a5f7fc918213091b350f9185473046a724e684ed4854d39
SHA512af68e0e5967750de3a33589d33fab2a26ab08eb098c3c647ba47271139ba16336b8e2c502b9a1dd6fafdd9608762bba499448da7a7299f30b6fb7bfa33baeede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b59e50974ddf52f49fb954d915abf0dc
SHA19aa4fc7def0a4197094db5b774d541ebbe40317b
SHA2568527e72f7c74ce073fc4fe1d3220bfbfc4f20da7162bfc7047dccaee9efa7c1c
SHA512305eff3576674668ed9026ad6e41486bfcb60cc7f8656f0c785f60966e6a7a02e6c5ea6fb5867f4e1cd71eaabb0a038c41b360ed8228f15e08cda66086ecc71e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547af08cf5e2324dbd945570135036694
SHA19ff29c1e87d4e635895b50d4bd9ff4d08bf64074
SHA2569d7822d8a82edfcdedd21df6141a3721de652462f1dbdf4994131f2bdbd2c4ab
SHA512fa39f249099ed76b60b32d26efdd8d4ea2f3b3410e0ab7d50f2ec6a68d589a95d96ab1c43ce4246f5e98e44612b4c283b1b971e8617260638f3171edcbfd18ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd5f77d8dfbbcb8cd37a9c5a70a20f69
SHA18206d6df12faa4542b7fa01f29a18c5582995980
SHA256032c1e42a1a456b7118c61d9701047e011148dd470b02196b6a55f0a9a2691b2
SHA5122e1d3932e35d3233af0ddff21b3fdefb5932d8bc5b62e7fca6d429b690214b4c91b837c75c157121a54bb1e07eaa1ce02d360a53c35d3bdf60939469e0d32a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e940911ad4b59a282c32dacb9f71e62
SHA1e697767b05e2ef2da09a26d3c9b69e0bae425cbb
SHA25680a3d30ddbe825a09a08464342db629bb45341d3866ce0fa188e2e927cba7978
SHA5128579fa1ed2c1a12d8706788530248d0e0ca5704cf07df0c76cca6c44da48940d8ac632181efc4a1c5104ec5d80b4a60cf5b248992e37d3c63ca72a4135d11d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bcfc65a903b204c3e534f0ace054e31
SHA1052f4bda3a7700364e7917342a96ec33b9fbf885
SHA256069130450683de2c4ffb9510233c9253bc4d4c319abdedc93824a2c19421adce
SHA5128a402006f0ad9a6d4c134b952522b0e1605a59cdda220232c9776c806b5241edab3fa251d8f575b04ba444a8d9ad4eb06df89438a58125e0f1773de35af6c151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531f19a265c4ed82259c8ce5cee4b31d0
SHA1b995b85af6b83ee8ff671f62d77802c3048cdda9
SHA256884564aad6eb19e6764da40c4bdd7786f5d19398d8c04c74cc8b082aa974caf2
SHA5125e77761775fda5bf6af0a2a9508ae7d1e381a9aed734ddb0bcc5d7ead9ea7201e4e5881a7b8b03baa048fddacac5135ed367086934a0f8ff0520e8cd3e2aafd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dba38524c7b29facfc5971bdb1b8548e
SHA1614c11ff5bab434f7960597a1559876c430f3e88
SHA2563fbeb669b4c8184d9bc6459b949becdc753fb668b00d9ec93f9962712c51796e
SHA512d6072d008181e13dd07bd6fd1f58474979df365bec9691f7212a1706edf0a378a8394d7d72b9e520417c733b25568c00392d7bdcd143e1969514091e966a2bdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea13998fd06daca0f9b39243cd3ec386
SHA1264acd0d2a08d220e45ac8934df7b923024d7682
SHA256599ab3cd286012eff5fafad86c8bf81d60fa93451e3d05691c5f396d202b70a7
SHA5122a73feddaf421574eb6786bac37e66df1d81f695273f6a47006eedc84a097f5e11d66fc40f96e04c48f5f001018be8c3ec4be49c041ed246ae0ce311a26a9f2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dda46591ce055006ffc62405541aad69
SHA12f8996d6a1f082fb0ed755153850338ef290ea9e
SHA2561ff123dcb85b857341761411144f83e5d83588759d7d8151b6fc19c7930a264b
SHA5120d9cb74452bf7d6066a9945c37ae4cc658932ce55fac4e9026d497222ab26e8e5f26c34fb1ae4f53de3c4497de106781112cdc92d4b0b7f8d6417c1c9d2f0cca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f871ef97c707a3db4c883c38ac5f466
SHA11d44dffcd1d5e5904c124ffc8087c21d769071fd
SHA25660bc19a989cadfa083326b355aa6ed6e34975606fa4bb5117e57def94dede85b
SHA512dcdc509559f0bb1834c40f9473057e87bd940d0082c07518ad2af41ded5eefb907b7bb4eba70fbe308739f220494916b34bb172f893134c89b1e8a1139eef1a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588cfa06e9ff1b6ff4f45da0916173e6f
SHA1913ef9516fec9dc20b8631cf5249010113bf75ac
SHA2561a4edca77e9fb38d5bfa04cba2d071b697aa471b6031334d6ab0e33ce8d02f54
SHA512ab038579cb8979e19f8f7b2f1035b5d78f898f2dbd07e6e68dc0ce4d320d73fff9f8e86fe3b6e4be5118739ce7bdc9803052a9d68aad6243a00faeff0e7117f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52890751f35bc42ad97d3c11faf42fa23
SHA1143ff2caea3f90a119ccf3bccd5e8abdad128843
SHA2565fc6ee0504fea5f6d20f255364317341ed10df95c1774e5ba09b7986b0f332cc
SHA5125a8beab7bd8d885334c1d3c5527e546a610649a5fdfacdc03be8751ad4651acbedbad37d8a23d8c0c3042e73d7caa4944de8515e21a35cf54c867d87b4cc7695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546df739b34d30eab342aadd7fc7a9efd
SHA133617f0f3c269507c5b758e114c60d3c7f951e07
SHA2565e2bd0a44f84d97fdc2bd4569d6331870d069766b0c68cb33d388cf6a343c5c1
SHA512b5b0cb8dc342f14400717e11352266acd812f281722651f2405bf13abaf574ccfc283686cf8e59c3133f400cc8c1a280880c9c93ccf9c2c2daa3595a7b1d8e05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5ccdc0ae3e516f271065c6461618022
SHA17125a989d0c6a094841c8c2fccd168d508a60492
SHA256763bf70e644410accb4feae676bc656f4634321d638c6e9d500288aa98166415
SHA51229625278f9fc5466deb0bfa17e59c65d40783e4dc355c27c3872e7440c6cf5e29f81ed987cf606e8edcdb6d0bee1f386fb3e94ed39e1cee64b0e1e905cb91f3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58519d801c5ce0303511a34b3fe3a5f3d
SHA197be77efe815cc2e24ea7e389bbe7c175d00bd78
SHA256da00bea2e36d61c200127037dc826cc62f8e0fabdaa82a465e40191b083309b6
SHA5124ba52181069cba8181417c93730a5b7a33941482b31dc1861a51f07c411d0b89e7df368718a1da265235a7d643c31df5c4470f3f108548ea0ac78a74aeb4f76f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b