Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 12:26
Static task
static1
Behavioral task
behavioral1
Sample
d64efb7d7dfc376de0d9ea40745a9de8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d64efb7d7dfc376de0d9ea40745a9de8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d64efb7d7dfc376de0d9ea40745a9de8_JaffaCakes118.html
-
Size
1KB
-
MD5
d64efb7d7dfc376de0d9ea40745a9de8
-
SHA1
708fdb614f45a3c39f7ea1a3460e7e6142b415b2
-
SHA256
ece537fad3c95ece98f08491f0b8ae7996ffab719ae5211b9e2b3fede18129a1
-
SHA512
6df7d020ba29fd5e0114332c6955f3970568fa428192f4f4a0a0ac19f3f7c5f891010f9aba342d0490b919d0f33a84414b6f2e23ec62670baf53ba953c61c374
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000f5e559b0551bfeeed091bbd5effa10390886804ca147627978024cc78618fc96000000000e800000000200002000000014429f01cc2f8e5910dab7f17a642c0cc9d0d1af9eac2081618e75dc220542c120000000f17cccd56ff502e8f2cdc88b62ec48861ffd2dd31c82ea056e56e4ff05e8b9834000000095c617257cc491f4e0874c82a2ee36b014fdb1d4cca16eb7353ef93f8bb1b4ecf84b1d2b2c7fce78c7d78ffff42fe9f74444e8d06c06a464749488b580dcc318 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 100dc891b302db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432046655" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BB993831-6EA6-11EF-AE85-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2888 iexplore.exe 2888 iexplore.exe 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2996 2888 iexplore.exe 30 PID 2888 wrote to memory of 2996 2888 iexplore.exe 30 PID 2888 wrote to memory of 2996 2888 iexplore.exe 30 PID 2888 wrote to memory of 2996 2888 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d64efb7d7dfc376de0d9ea40745a9de8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51acdb0a8053dafe200a53ec42a51e4a5
SHA16c41f98904855044047b320640cddc4248fb82c7
SHA2563433aa2fdb9bae57b04fb2a2b37e556e760acf909a9a113e5c56a069102a5182
SHA51237dd61a65b1e577b60cb3a5238b8f9c7d1c69c8c1e693b192ad468504438ca30ce230038a7bb90c6360464dd8c32eaf91df4f28d98a9f6f1bd13a5993a2cda3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3c3895cf72f7e3fc103c3795753ff09
SHA1d2d5250a4b055e986b2c84fb35efb545e6e453ce
SHA256264afbc659255c47e8d37b132beb80a12980dda83cf057121feb2b4446ba0897
SHA51212a07a8d1ef31909a5b744f813abbc4cd6eb73e4beda24ac804499737fe43cde7735b009478905a1e447a63cc54afef2af96d9615892b43b8bbe423198f50ee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55614e909279248978674e14dabdbeb48
SHA1f1b91c59ad354ef28a89c5de84815c180bdef9d2
SHA256ce59552e0b556f862420a6ff15173c4b4fb710905ed53c959305a5250c8714b7
SHA512ca73252b8876a8384864f40df81e25463d585c8b7ce3cbdad8400bf6a3847f4c70dc5b5fee89a53cff56bec8c240ffd40e1a1e78821848b6a2fdc45a4ac3243b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5663486a1171f40688c57744dd6811ad1
SHA1a60da1e6c155013597de1f9cdda67547f27fab28
SHA256808bca1a05df767f048dafb0a4e0c18f14adf2769a9c461bedf0ab95d996345d
SHA5127837dafda68e469728a72adcb6d0cc3833c023d187099cde0fdd8e9639aabbcd179285f0a961994778ac41b8df449aa4f7993628a528313062a304de31064a63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516cad7b99a8db14e076d8761b1a6ffae
SHA1cb65296d94f1883218b270a43d66313cf129f7f0
SHA256d4f83f9953fd84d87bec8c0ecbe1ae101f496d5fdf18037868aeef015d593627
SHA512972d9ac522b246c08c74b2b64b60c44667e4f70b4e14ff05baf92b53e578d9517f08934a349bbc8f422eb290378f920bba404e6edf547dd36559bd4de87c46e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5264b14385aa46f2eef03b68f8e84bc24
SHA17447ae8dc4a6a9c46eb1f0fc038cbd1e1c2beecb
SHA2560b00f72ffd7b3b2e85478fc7c756bc42fdb44469c5eef6baa95901865d8caff0
SHA5127ab29eb8d3221e6c624ea9e72e16a47b4a4ffb44adc30a90a84192a41085fcbc6d7d34b25ecb349ff119843eda7d2b0e3d1094f2e68c6a7b9befd153c82a573d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5775af38e683e2b025f9cf4ca66fc6875
SHA14024546ceaab0cc70fadf4c9da0081f76dcceb0f
SHA2561fd1262b68a6c006f3479b1aa8846f83fe5987b6fc3dae23bf939fde31334cd9
SHA512c17c745be0c80fe3dfd1303192886002f8fe489933819832bbee7ffd1c07003605168807234e9f1d2abe45170118e55bd56602193d524fd70f696ba9b314b78d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d914a7c48672d87c4fe74c59f95e7d1
SHA1654d938f36dacd197252899b9c892a3b4d7eb5fe
SHA256cc3f9ce2ff513d08f47afcb9cf7cc3a37863c9c1a6cc749651258284b80335a5
SHA5128d1f3d695ee68185ef58728000039523391679a56d050747cff4bb34a74027c13bbcf9b113feec33f47c402986dd7fb629b351088426819a3b8a8b5d5f6bb04d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca4e658efaa6fb56bc16b4bc21ab8ddf
SHA13bca3440385db9715dbe5724dbd096a8002e630d
SHA2564877e4df96d3ad9c56788dfe9f132141cb881fc16a108f033a1de8d546615cc1
SHA5126b224c8bd97cbf85025716fcc352efe93e7d9c46ac83453cae28e4e5b5975725d6ece3631253c777669b34fa99d2a4c64159026103ccd01017337314386d60ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7326c5f0426799432c7ab98c8ff0fcc
SHA1e8558e6c5cadb3396936b71e5afea460263a8ac5
SHA25608882e202e8899981e130dd273bd8e1598970930c6dec311bb916c7a71b3915a
SHA51264c9cd08bced7d0c8dab1fa8de4036d4c65865b5209e1bac5ac3d22810380dc389d7cb808a51a335b1576b6e8590dd383d4f397d7f7a451e2602c69c218762df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da48aebd1dacac3ca5d0c703b1a13190
SHA1bb5507f0aadeca644fa3b62c0bd7aa2e31097dba
SHA256505a60ab237cbda0383486671c7fe58471d223fa4d0c1b67f666c91ebdf73941
SHA5120c509a642b290aec30463fc2f035e5bd3401a46dcb4705507b264dc0905d5e0ce6bae84b65a220ae22401ddf40125ac85d4a3e796124563a76f083b5b817bdde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535cc37033fa41dabd89d16fd66290d3a
SHA1937d06494025c005628fc5edc136bd8929a4d5ae
SHA256703ff4f2a02f9536cb31ab74df793195b8d1d247bdd38160bb9a526f48921931
SHA5124b9f09752901833114062632d511133ab0ec3f7039ff889ac37e5dd236312827f7a09b79e9108018bda9fb79cae7b383568da1f0e5e526a1d216117a7d553992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb58a9ecb3942dca30ec114bb81c91ef
SHA149cb3db70242a7559965d4da0d05000309abcb3e
SHA2562861f1bbb8a590ac77647308372c94b539ec742c0368d8f3db0e33219aeec2bc
SHA5127abbd6e05405e46323192fa802c22da749aa9fa293d9a59b9762952a28f425dd115505714d137f82c287b6157b7c66daa177c192adafb54b4280d792f6c55476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55078f7d02449a5ade5c1717ebc982b12
SHA1329c61a6cf05734d2b389be47da66696e63b34c8
SHA256de5d30963d2283cc3317f130fb9be48132df5c248388921551eb87a18e719c6b
SHA5125af6d034555913cf5354633cc29e481f44ca38ec9e1c1da2c37db68110281762130dd158bc1ed0fc66acb4db529a0dd4b7be18784775c2f37ef10e062bfcb717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f684568ace4db2c0cec26cf2153fbe8
SHA1230569515da22baf8125d5a7bb81593b08c1b25f
SHA2566de75d6977af018a80eb93042c15814c30f1bc07b1ce520c0fb9c35787a0d962
SHA512ff6f60e0d891f400516fd79cd868b44373b7646d50afb350e71043c11ede6d5052420b8e1a8052b6878852a0577e0b5df6b71adfa145ea96f61a1367267e5170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5021450a9248d5729f274f9f648a89546
SHA1aa6beb5837500d27fecc0180c7ae81c0ab5929c2
SHA25678650efe950aa6860b3a43447eb9cd08d6afbe0df2fca3bcab60c4c6d194e9d8
SHA512549d9ab335290f634b2dd82a6025ceb9dd473d76adaa10ba5f955a50cd3268da9506e45f5299b95dc973422335e10fb81e5493ab08291bcde95f4ef8dce55aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57818ec6f08b44b6c47b307db2e3edc5b
SHA13bf05a088c027816d705a169d5641422fa3e0cd5
SHA25686db688af0f2fd021daa2882ca88ebec0b087ac4f7c04c9e9477c48e7bf53142
SHA5121da66e1e528618f44d62d2ce3a317c8abc13ea76b931b76829290773383bc2bf1d0e7706c71fc7539b2cad84b0fa537c13d5cfa0e4e78c4cd18e09fe3a3bc0e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eb1d2386bbdaf7b057a94e861c310ca
SHA1b56c84ed8b2c934c7d76246f3f99b3794cf7a096
SHA256437dbd31ba4c5f205c936057e40f4580cd99420896163f181a9f63dd3b16213d
SHA512b63b90bc224d517123b6bb3340171101d4d776843f29bdef8f4164e735a961559139515edbfc6021183886c4bc5d9d0a36a57a8d76d426f8bc6497cc95b4ad76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc2b3192d8db420f4cddb64b6c996bec
SHA13bdd112a7dececc026c5267b7222c1738167e852
SHA2565ddb9adb11f6d8e96373452b527ba83d82e9fe1343535ff2abe53685c4ce6570
SHA5125adc66a8216a2f77913a47ccfb30dba63c80f98ad18d5a63457682c3eaac56a7e3e07bb5dba62ddf055b2a9ebd913e5c7cc21e82982a2fb465149909b55edc48
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b