Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
d338f4693aec86c5c91746a947d8deaa_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d338f4693aec86c5c91746a947d8deaa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d338f4693aec86c5c91746a947d8deaa_JaffaCakes118.html
-
Size
37KB
-
MD5
d338f4693aec86c5c91746a947d8deaa
-
SHA1
670c63009b7a4f053c019c5070c94cf4f3bbf733
-
SHA256
9ffba9f8896f57d80a6188484661922a73ba9fa80a38ee957a8965f782099c9c
-
SHA512
e41976d6e170d53226412eef7f449b11ab7c249b2c531384ba57676c7dd0368c8cacfc6782dda53ef5950e8f7c922a02d87a7ef7a9f7d191093f811f7bc1665d
-
SSDEEP
768:yLc4SXRoz8+3esYxUWpqv4ZAp34YvXbbQsuhqNBi0IYRgQowi4JexjuU3J+QpUGe:4SXVT6tdj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000002d1a1d173fa64508a1ffe75e34deecbac900b5539d5972fc0e448e6f9f198ac7000000000e80000000020000200000009049fdf51ab8b55fdec6b20726313ca3be00b0e903c62f4e7c720a0ef9c564602000000060d5aa7d40bb025d1a55592cd4abcfeb83328655e96c17e1b666d9b331233705400000005c0c09dcb17550f05862eb94daafafcb608fec48b4e1df511ae2ca447a4ae1675d3f69a220f58475e73da00e8f463cc7d68d64c594d3e0eb64bff8146936456f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{50F56661-6D80-11EF-A14F-CEBD2182E735} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 204bd8378d01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431920209" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2708 iexplore.exe 2708 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2428 2708 iexplore.exe 30 PID 2708 wrote to memory of 2428 2708 iexplore.exe 30 PID 2708 wrote to memory of 2428 2708 iexplore.exe 30 PID 2708 wrote to memory of 2428 2708 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d338f4693aec86c5c91746a947d8deaa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8e2ac3339508bc5e8de4bd825aa0f83
SHA11ce43d37e5213d212a487835009a55df141259c8
SHA256498a59f60d0b6f973279186596ed6391b61ef7aeca67ed1294b1666d218bb0b7
SHA512d375e538093854d568e180d5f40f94bab245cc6a19f6f8577deb4aee88f3dc5998284d1463db4df37bf7f4e851cc756fb27a0de09e6db2a146c8a9d77958c4bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510a080e136c6e1c45090a1a0d5f77554
SHA19d4deea5468f52caee22eef083e23dd9e28ba068
SHA2566cf6d2f57d3835312e649b652755789f371e1d6783db906627500dad8df3381d
SHA512d2bdae5a87a2f9790898120467f51896dfe032ff411faf2c54b932e4538758c2be094240efb7f7857cc25c89179f652b057f56e0a0f18f5d87230dc31a7af494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1c523da99cc53e2365eeb1979801af6
SHA11344f44b638df342229a881cc98c731d83714731
SHA256e23308251c8e22eee5d251875c6ce76184a9d8587c36486505da6b665caa0ec0
SHA512e4760c75d145ef4c11786ab1be28e88b1acb144106f9cc478aa3d74f8ff4ce29601701b4fb9df63d1f642f840de0da369616c20acf7d6582fab52736d067f37e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c2b336448904916c2a55df7971ae7d5
SHA142a24f0370f6864e21988fb886af720ac7636779
SHA256f0eff8858ac1abf2cbfff0958e6ab6b95db622f886d6eda306a45b19e87b4c13
SHA51224f23fdedd5bc3afa50d1885f9692b8b6568b488640fc553a320cbeede83454ca47ae1114eccc789daf36b74534a1a0f4dcaa877a297b3ea8d580c457f778737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5474e7f20821e5f021652a000c11f26cb
SHA16da9dfaf8ae31e401582c485398c95f8369eb088
SHA256a6e3c824f9f068aba43b0a03ac280f1152d39835c8f30e322bd09ba75cdb2961
SHA5122eae60711ea1e0b4a77ec9fa8b490866d1220620d306185c51934d617a7fe60c8bab152eb41f90ced8a42b6d797faac424854afac891b30d4ad827dc52868e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534fdbf66cb82388ef2273a70848d4933
SHA12fe0f809685272900cd4580f550b54ac50f7b827
SHA2563b996d6ea64e801df5ac5d4fb4fd075fb585139c95d7a581e3e896495686984b
SHA512a9cf8335f81345e45e81828177574213ef54400500be4329f26db6ff57c0034d9d4076dd609255623d143f89871f74a52ff2d43006e613a2aa07d1b4332acf45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d3cef2333677e49a1dfaada6f12e91c
SHA100e2a290bc6238c7ff2f19a37876a82123a2fe9d
SHA256d8da38fa276dbc43b8baff00782790e2d91f2e00a22f4786d7fde00ac732fc8c
SHA5128993c0f9945dabfa2e2fc7c1aa84569bddc8da4967889d35171b8184d5a766e2bf45e59558f1b26d761bb7cc2c01fa756614700f694a1c071efda37477df75d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5544a24a1365940f27e9823cf1af610da
SHA1596b2bd2a2edda0d2fefbf248e40614ccfe871cd
SHA256cf19026f6066ec636a6a8cda1813f4985b24de5108ef913e4f2e6ba6105826ac
SHA512eae419543c5afbc8bed13c41e0f64083ab53bb4e8228f6aacdf3fc63ca608e1728f899a2249254d3b8b472625fa62ee42ceea4d7d94d4e67bf3c03ef0e5348e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56aa974c9d514cc7b51591b067dcf1ca0
SHA1f18cc0260ffcae52c16fa7ce0d5192ae6ad37952
SHA2561a83c048270fc52cd73b3d14e13e5704f26714c1babf877aab2a6e654827b2f8
SHA512c5aba96d2cba8b3ef0e865ad7a94dc2797a43fb4e20983763b881a55d001961b02c3643311a1ca4f038fb5a2bbaab5c48736c8ae992c3d4cc09ab87aed7c4ff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1734efde8f61e61322e4e515caca418
SHA106ab8bdbba96ea02eeecb226f697540f6af75233
SHA2569aa6c8b4d29a5dab1e364a7a99df06da4588ff0031b38376607bd5447dda8d2d
SHA512422fca54af25b284a9ddb3f3d7806a54e48e011a897aaadb4576c0c10cc23d4d59924442e63b99e464d447a7eb8372ea0025ad1c69d1b2e4a01424872fe397c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0832862efde7f177929885580b7f7e4
SHA1bc63f424969e9d3c98e7acbd9fa85ac703436fc9
SHA256ed39a9144ee34e7746a2b99bd0587213562c93a927148237aa4bd1acfe449774
SHA512fb28de5d5d414b98e5bbb51ea7fdef29df9567d56e2411ec01b1f71abf47ced34c70f78559b48bb1bbeb7f919d170a608f01a4beafd18d991afbb79266994168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5962aa05273f1e65c17af15f4edcf1531
SHA1ed446c9118bc8118205882506aa5b49fe2ad06c7
SHA2567ba735f723276c5d33b8ca11234e69518e03f5cd504a7cad31c172aab2ca6ba5
SHA512edde713cd0891f3736944f48c76b6d0aa4462795c018303ad9327359a976ecb2cb66536ad4547cb14430df68a5c0f44faa82eb9da52f551505de86e32a85fd9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0369e08947830324bfb378f8ae5eff2
SHA1ea636b827a149258727ce5ba3e75aad8867070cf
SHA256336c7e905d19e738c212e33b975bbb4aacdb6bc174383f4dcbc8777561f1274c
SHA512920b9fcce428ccba36b1678c6a1c2d61854308a0266b188eb0797791001d2047de2c0318165c777946e488ef2e5cacc7f4b46139912a1c4ea95a47155a3fdb82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535aa40bbd46a655158c426a6d9d9b4ce
SHA102296f86ea23e372dffc04bb49d1d46c8d4e20e8
SHA256e56a2423574ea229f0e85055d2ccca4f429b96a66872f80052fd68145652a5b7
SHA512f7fdde3a9d68cf29f17c6cd5691c514600c43bec28d94c8f71b18446080a57a0b3b4320e8a465f2e6fbd15fefa0d1163c3e9b0d1f0cb388cc832b2a138e5cded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552a4fcafaee81765669cbc192987d1eb
SHA1b1bd86736e465a17b2e9e645da2e373467922d82
SHA256e49083218cf9ea5d22c62514e988fbcb279d6f216d67e2665d225edfb108917f
SHA512ca0423ea1b02bebd4d6ed2d375866fd8176ca35d33b8bd1c4abb0affeef864d6bc126f8361a9291921ed9ce34f78a97cd2b311b8e97963cdaabec87c42e20148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c763f86e345baa12f2255c7a86cd2004
SHA19f20e7ffbd6c51d840388225a44e1af3d9d5f810
SHA25657cc5ae47d35dddd04ec5297dd883876e4c99febe21b00281259f75fdf4e845f
SHA512fb27b85fd3149bd600148394039e8d5aca4ecbb809e8b4ebc03f386d49c59c5e1c1811853685749bc101de9ddfa6aa55f6b8b8bd28655864cd5c0169156a9841
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b