Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 05:17
Static task
static1
Behavioral task
behavioral1
Sample
d5b5ded000936b0726eebd7206e3232e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d5b5ded000936b0726eebd7206e3232e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5b5ded000936b0726eebd7206e3232e_JaffaCakes118.html
-
Size
61KB
-
MD5
d5b5ded000936b0726eebd7206e3232e
-
SHA1
d937c53126105a588d24204c570720c384f965e6
-
SHA256
6085e6f6098b6789eb6fd210414dbf7ba7af136703290d6a7732ef0049ee701a
-
SHA512
374bb810b3f1be33e54d8e12abaddd226426e07668aad32c7d841ec5a3616a90e41658214b74efb7dcab4e18c7793bcfb0807086a3aeb91ba9c724c37cb7d124
-
SSDEEP
1536:DgX4WRpQOWmE3xJT49Vf8+Wp8JKi/AufUpOEhEwF:DgmOiTImD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432020926" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c835c27702db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D48CE941-6E6A-11EF-B4E2-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000eeb1291c8b3c9f3616e7d18b96a4d093632663f64e45c895f883b24592a54539000000000e8000000002000020000000d9b372a0d6b4851c6cd91be9a6f22044cd5ccbbb164d141b5dae3bb5eb90c44a20000000fdbd4b268b6c3c83d9f7c215c4e0c01530bd7fd0620d18c3b83f7a94e0734d324000000025bfadf7623ee82ecb3e4901197507a3080434ab1946d13bba4b3a88f7483f722f28459fcc9d7d57460993fd40f5e1ba21ab0d4edc34ee12687fcdcbe4e94330 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2676 2860 iexplore.exe 31 PID 2860 wrote to memory of 2676 2860 iexplore.exe 31 PID 2860 wrote to memory of 2676 2860 iexplore.exe 31 PID 2860 wrote to memory of 2676 2860 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5b5ded000936b0726eebd7206e3232e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5500957425955e8e4c0f26bf676fd7ce3
SHA1d378e0f9b5ad99cb43ea48deb6177c2989b7a759
SHA256676b44c98fb00b9bec69e7f1239375aa0034f9d26d6a25985fee5e9d6568859b
SHA51284fda7df454ceecd9224c6ff4d62714af2e8a1ef1d34788b51d4c7f84ffa8e6a021acb8142d5e1a74b118d7c010eadc037d1f9ff0facdc4d8b799acbc11a06e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ce0e53ab780da5022b3f82d7a246e41
SHA1b6045d7a9fb26bf3374350b36a20b11af93829cd
SHA256058207adb8ad87fe5e84ff9bbd2b1c11c8fa921867b2993594b2738d05a4b459
SHA5123516df97195d41655fc7369110bc3f358c722897166d78256659e5b0a4b1a2f7fa49ea5655f76350a37917bbca85656cf2084b3473a3db1f0b22578006f37ddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c5ac63ab858c0773b6304a9432a74f5
SHA119cc3aa15ddeaecb6e548a90ee99b607e904e001
SHA256e06131cf47f038ab080d3959d246d32f4038f5c9f80c875086861817f43560ef
SHA512d0820ca518938f9043d17f928816f6e91c11a41b8ff18b2ab2d3111d1d859a1b1475a77578c24804388e6a04b526fc993884044a9d98e7d71ff8fae618189618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d912bae958333a61fa80feef8b8eb0c
SHA12d3a0eb4fb80c042a3213d01c94d544fcf4dffd1
SHA2560576da5f18416489bea3b127e417c0d44d79e8b5e48e86acfe2796b4ba36324a
SHA512f2135f30b8684e5ecac802614f1fa252a9ad0425492b0a35287efe2c32be170715dbdc1021820bfe64341c312a8d44631424ae09beb039fc783023f67d870f27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5705d1dc677dc43a09b026bd72479a6bf
SHA16818664abd250f06ae4f6b252d954b9e487f9e53
SHA2562a22115bd742fe6937b1cebe01350733138653a196df4619018d1cf56c7bfa90
SHA512ed233daa1b212e034822d8c2efdee725fdc668589da891ee0961dd83da8a0250f08b616c2ab77029f40358ff493e4aec630921594cc9a85d0741d1542a088b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e71d2099f44360c192620fd2281e20e
SHA11379f9d9410d0af56723f240b61d6323d6948261
SHA256a7d91677edf5ab1c45f69cb4f1e6fa07892fd31f3ea6aa9eb2346d3ee7465677
SHA512c5fb0c6d51f441c6b456d44da667e3a1b701f6aaaa5ca8c5ec144c734964b9c7b38d838f4a23c93d512447668878875f1dd1f2c3e2fea132d6254a00ddf721e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547b94e5200bb9c6b60bc576ba2d31678
SHA16a127366015357324cbb89887f079a4dd8fc0362
SHA25642d9e593ec2bc3fe19abfb8566be703616a45b580b6d633b98146681b29dba69
SHA5125faccaf4ef2579cfccf9ff62d242f2151a43c9a6ba1e12de478d027293acbb9ada6a76b3f4470637e4de47bf3dadc417b8029db0a574e2c4018bca6483b2b260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cdebd0235754dca68bac207ca65fa50
SHA1d6b79c75bbf7c6f6ea75f497589e045f5270993f
SHA25654d2c638222da840381d561f874effd4c8a076dd1549443e4359c837dda737a8
SHA5120bdbf2511c348c3c050fb8942391452ba1bb90ffb45c51c78c69daf6f73b6c17b62ef3f3ecfe71a7e8f3962079d180750c6b0bfe584b40dd49146f1fe1ad8f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4b5ddab95798a7aff7343f356d87c9c
SHA1976580e463ac0145c109514981b284675f02dcf9
SHA256a73ff383bee888b4dc51e15907c62bb34c0a4269811246ce04968d95f75f39bb
SHA5124ac4863b6d74357ef009fc7259f27c3b1b15f4d2f76ecfcb69fda34c955ca11983648677b8e34c58a1f4f9707796fa3fe4ccac8d03e6546d5f2600c0a5180393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5820090818d9a20479a92389745420935
SHA1b947923072935ae8a40a8f1d395a626165a65e8e
SHA256999a84fea7d4b6be0b3b60b8f24c7420452c4805f4e11bfc47fac9a8f1dc7620
SHA512fe914e3d7197d1189518308ee0d2b83a23efe8cc56cbaa3d634900061fd3c4729cd5cda88ce24b51253c1d77289cb58ecd06177f3bd433217e227893f08a2817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e394c46ed702171ea2ed76016506004
SHA19134f82e30ebf2341cc351ab4a3096f30af4ef13
SHA2561bf6f176d6c5a00566da35ee441f44f3c48855fc9dfa13187ea3dcaad5d7c8b9
SHA51246af5aa93285fca64eb4cf4275fd5805cb5d2d23362afc6fef538498ddd7dae2e36d4c2e2dfaef479e9b7e6c8dd5ade2ab8429d1c22eb27de67330508f4f8ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5180f3d83a0fb38ee55500034415b2a88
SHA198f553e9f5da7055a360baa1e49e53e71f7a104f
SHA256a122777e83e045c092180ca833a6a66fa950c209217852d0b283a49e3ac995bb
SHA5121a1ee8f767becad1bf1403e1839fb2e92f5240460ed691f296092888c8d1e63d02b87e8e8fa1afa48f9dc42f0625d1d646c48d73edb2d07ce1b4f91b19cec190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2dea5bd93ffdc317858bb2aff9ed054
SHA1fbe00fdbc66c3b6897d36554ac89ab138676980d
SHA2566406f716b6b702c90ebdec56a92ff3b93f1a4a21433107cda41b33c5d7aca617
SHA512b7f52b636b1ccded2ec560b86d07abc0ec87cbd1a808518a3641a749a911e33bab9b1fb8d99fdce2d2b1967baa510c2a81e5dd9aff2719f34c454cf882981bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cfcf8f61673f6b3052c1d522fe91f62
SHA1b74d403c039ecfca38eca57fb5cf125c4d6c16d1
SHA2561f6a55feedc62fa8e4cec1f6d20d22a74c2af7dc80eaa47fdf9a285115eb2abb
SHA5121bd56818b4e69233c613c7423da915a8676966afe4e0169994c2b5e4c174bba62ffb181e614fff055fb1c6a5577b4cc23161d26c70bfbf095138a1dbf635c680
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524ce250df9b45e54550e53e370674d0a
SHA188538aabf65cd8eedeae85b279ee1f57083ff9f7
SHA2561da5d197e1bca3f0121a09ef90fe04c028e8b89f3acd66b04f18937d6fc21c2b
SHA512de027af875bcc983e55cfc3f147f100fae0105e7f371b3a5bc116e02a16ec842e201c74b3ad9dca8f3a5d547e81e7dfbbe0a399f919e1db9de1c3772d66f3ffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae3d24b4795a48fe02d1bb084d8a9116
SHA1445c2c693f6c82e264dfa7ad52c1d3a841757192
SHA256027d8d118479e2fb35ebf1cbe412a354b4f6b83740848664f7230384afc6f88a
SHA5129ce8d25f8a6f79aa3b41d5511740bc753de4b5845c9939520a316685f371d4c1077952314d1f5943193d82701d30012682b35f8cc61ed063636bbc776f549524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b15fdcb90edb11d647e475f43b278a7a
SHA1cc35662e66cec8cc9535a7cdbc92202ae1ef3761
SHA256a3380048b2fb17e7275b57c9dbfd6ea0da3203c4af34d66b51889bb9cbd3d244
SHA512122660061ac20790555cec328bd7db2981cac444d02520c87db3803da630d6502979636fe70ea85482a2dc66ce6934bac0a523eaeb4c65e457761c29416e147a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5512d1efae5500270cf66df8b9bbe3e61
SHA1977d6a6da57ef5ced32fd2b1c8c84d7713876f07
SHA25674f4a330ad82813fe03f972083232e5cdfdfeb16178c52a2107df5ce6a16272b
SHA5122b608d56600838415bff002474686e0091930b9e84a8d3a108337ac14b0111d2ef6398135e95c3ab110ac66bbe4eb5f2ee199d2236959279f498e49ee7b09f1d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b