Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 13:38
Static task
static1
Behavioral task
behavioral1
Sample
d47c96a7a1bb247d5d44ed2d8992d4ff_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d47c96a7a1bb247d5d44ed2d8992d4ff_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d47c96a7a1bb247d5d44ed2d8992d4ff_JaffaCakes118.html
-
Size
18KB
-
MD5
d47c96a7a1bb247d5d44ed2d8992d4ff
-
SHA1
2fba22b15be498cd448b971a3612c47bc0d495df
-
SHA256
f03b4e92d2c4c2cceab23ab89648eaf988caeaaef722c1a8ce997aea1add155c
-
SHA512
77476f9a16c8fea8892fa4a6e16abcdfeaf4100b4eceae0337279aedc9871373c687f08071113bc228355e3e0d716919b25d4d421c98046bbe28ecd524416197
-
SSDEEP
384:SIt+5Cuow6s2YV62VhhNgyavk9rr2LBqdRsQfnTW:SY+5Cuow6s2YV62VhD0kVr203PTW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "9248" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "121" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "282" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "115" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "115" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "121" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "121" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "197" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "197" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "9248" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "6" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "282" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ADD6DFA1-6DE7-11EF-BA16-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "115" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "197" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "6" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "9248" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "282" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "6" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431964600" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2612 iexplore.exe 2612 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2388 2612 iexplore.exe 30 PID 2612 wrote to memory of 2388 2612 iexplore.exe 30 PID 2612 wrote to memory of 2388 2612 iexplore.exe 30 PID 2612 wrote to memory of 2388 2612 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d47c96a7a1bb247d5d44ed2d8992d4ff_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2612 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54341ca107b45230a1f38bf101badb1d3
SHA1abef39f00662edb0c1513401f13c120e8a3ec5d8
SHA2567b59ffe5a097e052baeafc8fe180d9765919716cd1b589c9ea07297e26c66338
SHA5126049608318eaeb8ac90167454a17c5b77049a431c402d63e7e47838a2478e1afb7b69c4388e2b7b3613aca0ebaa69f82ef288a210def2a6796407d7f6bbd415d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d8a127ceb7616d70aa28db5b93b6c28
SHA163dfe301b892afc4519929fce519a86d32d5a280
SHA2569a8e51d889866adf53d462108998099ac7bd9c2f4b60d3c1fd60fa6a96ba459d
SHA512b8b08137e440b822839977494e3920e957e13b44228fd7a653705934941b4558ef66867ebd6e11fb0c5defae8759f6d1d39618a1de2283c45e26b7f5443a9b7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b3684bca43ae87dfe69da78a42aabb0
SHA12c1adf4bb98ac21ec0ad6a037432b909f4314515
SHA256e701d88d6e16dc377d94b16b391a03f2903044519ec6062412a55b3e14688efc
SHA512bac9687a564d8150ce80a072b4a7c890fc113c0086d7cd4788547f2fea0199e3f08c082ecb27d2757e9d0b70d813370b7d64c697cc8484dc6be061f5dc3b6de8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c6edb85cf745bf34386e01ac245a114
SHA124ad942ddce586369153c739822e582b66d7711a
SHA256d382efa34e880febf783da95c36297b38a1ec1b1bbf75bfc62c805e8b4d9d5ed
SHA512f55ff1dfb2021d9b89cded0847f0ed02fecd8995542b9917e37f830465f72e79cc1ba62f97b2dd73dfa8229c4c1b052b30b389c7d2bfb5e492141d004f4aea70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b71b924de0d042211fb35d60a4067b4
SHA1fbdecb388cd99e61384ece2eec838fa406a54d12
SHA256627bcb5b2a747fcdd8932c1f9cd26111d6f3190fc61eac1b5abce10e4cdb9d2e
SHA5124357b6ad3061eaa79decba451a07c88c9c780d1583c29e879a8f4ad19ef420cb6a267493bec0f9ef3470632028fef2e130c950489649ce54e46c4d7da7fa056d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523d1061ced80c89893c119112785c5c9
SHA10b95ab13f5cc3d79cabc1d6683598d012e52a644
SHA256adb92e6d0c45673289a946e89543139e76e7c9384d396dd8a411eb0e3e378258
SHA512fec9ddfb2d983b9517c9941fc53bed683b42a054aa7c9fe55245637e922f7d07012a448bfd7dcafa5af35d21177ab28b92a9fa16b78708fb14e20557d93feb05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58382159f7cc7c93f0d5c2739f388e775
SHA1d6b8f001a0493ddb58733f29266a439a489d4cfc
SHA25600f6e52e4f426de6f7ee49a7a58a2f4af80c06440c825bdddd6c33e7f26bae12
SHA5122fbad1f4a88eb84c9b6d86502bf52a5da1b24307b2c6b6d95190160ecb4c5452a8a4d1699c881c29640d248c04bd8515befbca0016c8946c1594e2537b2726a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54015ca487a62a426ef1c4779e771347a
SHA1de48f9bef719cac37af8f4a6a8ec4a1d0bb789b5
SHA2562648a24d7b1d4d5557c45687597f1f505eb4291954330a63de7460cd19010e6f
SHA512feb28ea993c4a4032e72845b6cf1c5ffa7ca33834cd6043e716a6f7726e63b9dfd7b08b70750624e5e4b62234a83fbbf67b85043c8cbfaa0e9297b9a877065ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56383fb7985d96eca641184fbe1a7969f
SHA19e2825b7297260e0f1ff741157a24590bce0973d
SHA256ee52264e8246e8d8455b4a322b03bca5c6c6af273c5fb2d7ac525173d8486742
SHA512a2c8ed9b48a5d1cc29d74abdac577919485699694719959698527a259ec538a4b72b9ad594b4b1e87ab472c7e33b8605b935dbd6868f5bc06146fe58cebceace
-
Filesize
14KB
MD508945ae37c13f948cf25587cfbcb10b7
SHA1365b5e254e61dce2bb0fbe18ffdef46e0b8e3ea6
SHA2563b179868936451a0ca9faf7fb7eee3c2a0c71f4204b610a26a75bad9ab996cc4
SHA512984fdd0719d02957c7bdd29e5751496b0104f40a238788f62820c0f61ebfe76ad778c14727839238adffb3a2cc1c80249119e4e83b2c6ef579bb31fd2f82dfbe
-
Filesize
578B
MD5f1d94b6266e272944680c3bd3c4a02cb
SHA142cf5fc51edc980204286e9ee2865d20a21c65b3
SHA2562deee1c9ffb6cb962ff376d40509cc53df7369128e27f31474bed83d02b47903
SHA512cbf78b038e27861db2a239167c90c84ee01e170a4c0e778fc0af17eb4e6950b12285da12dea762d0f4d8687fdcf448cf3ab0bfa1fea8bd6e6690e7612daccf40
-
Filesize
578B
MD5992d996b9259e5c19c91d20687c2cf4c
SHA174218b3482e7d8ac0f5daad9ae4195aaff281a65
SHA256a80982b2f56b16b19cea8419b288979f96be46383663b1d5923df29c2d7f58b0
SHA51215ce5559a42af11544e94581fee2b352a7aabbddb9e968659b591d2960bc22ed9014ad4eccdb046c8e800af799916ff0f7d545a75e187d470de11df0bff951e6
-
Filesize
578B
MD547743c380ce59ff05ac3784e1ede6b34
SHA15e747da54a77211b69fa07109a4eed655413265d
SHA256231ef11f1df013f49f3c9c875b8eace5e6e2cb404a35ae216c98ad8ccc1b0d95
SHA512d835ec0f3cfe39c6016849a6d0593733da4e1aa5529d46c0f1262f9b869fda8d6e344089278602748d9bbe975478ba75e6c03d47934a6fa3b93e35fa689730cf
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
229B
MD5232cf60894b8470023b90d512b810364
SHA1ed33fbb9a591378e308ef19c3185ff3304b5cffd
SHA256162f6ba3091807a966380558236d4a95937ff5462d1ab3d6308da85ec29c4abd
SHA5122d78fbec92bf6d66045d02c264fc37a1c30dc3f1632d0270e09456ea4087185ec5e6b38d5a25bf1ff22ea6dac227a1d3d2111994a260a10d4d1ffeeaf081aad6
-
Filesize
14KB
MD5937d251b891af39c966e0b1345c9b3e6
SHA17ba843fc3d332674bb41d2bcbba03a8e05db3580
SHA2564a6a27c5190103e5ad3c82aa9afb4cd87a46d49310d3f78ceb676582c049ed86
SHA512e5675ad69148ba8fee19b4f5e5f07ddfc8181706a971245d99d0ab322d89ff611832a76ebda6d2a0c064d896fb70cac53f9c31696ae8ab93b35df71dd59e88a6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b