Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
d6546f4f0122a0376d71b6773fbe803b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6546f4f0122a0376d71b6773fbe803b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6546f4f0122a0376d71b6773fbe803b_JaffaCakes118.html
-
Size
123KB
-
MD5
d6546f4f0122a0376d71b6773fbe803b
-
SHA1
dd09cdcf47429c0ec9e87dd9d4a167b8948e7a7f
-
SHA256
f9cf60c80fc4abc1b934d05594b6686d78bfaf6765359d7bacb393ac4c4a7791
-
SHA512
50009a88f7d930ff22abf8dcf48cf0de64deac0191f1f575b0488394fa21da6eba392e3a127f391430a4c77986ba41cb08d8e59fce14ed9f571a4f43a35f7f4f
-
SSDEEP
1536:va1CuQj5e85Mf2GrmtAwJg5QumovNF8vvGAXVR:S1V0ovNF8vvGAXVR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432047429" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90fda064b502db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000d0ada03544976ad929f2f156fbe9cabd77d7f7f96d874c14e413ed85b3bac00f000000000e8000000002000020000000cfa7ccf50d71416fcd7f3ef4accfc8e51873cbce4918b762424532468d2350a32000000056f84eddb27309e1982ff8e53aad5e5c4c0b1ee262b451e02f0b4a013da12a9d400000007b6be161a597fb5298daf8cd73f2fcb4633fe24e611e71ccfc1a79f82f17faf5a832d98892795f72c07ad14396b5acc8e1acf99f6986289827c139e12d08ac61 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8988E551-6EA8-11EF-B221-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2880 3032 iexplore.exe 30 PID 3032 wrote to memory of 2880 3032 iexplore.exe 30 PID 3032 wrote to memory of 2880 3032 iexplore.exe 30 PID 3032 wrote to memory of 2880 3032 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6546f4f0122a0376d71b6773fbe803b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6b73fd0cc0284fd3669a1aea502b778
SHA12830938d7e865f273893df8536a06b9896741874
SHA256f64ac407722f29a618d53461a6b045b1187d712fd15e887017a4d088834423e0
SHA512feca843a798373611cd72552db0b380f446a5dd8cf40d7f4a1cfd301e9bcdc5de606b098205827ca6e87da51a9a814cc6e3b78da6b6cfd79e07b6f5d29d15d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5995c63ed2d2d5f31681eb6cc2ba0cefb
SHA1d46fb1074b38db7362d1221ae53bfd28946728f0
SHA256d39bd10263ab7535c8ab55a8fc29ebc9895dde0896630de2ddeabb21f857ae81
SHA5120aed076d85cf302f5a38428b20a78d432e7d56511681fef5ad990bd5a7cf614e13b6e5af4720d324fa06cf583478dc9d7012f57a6e8382ad6e3a34b02199ee10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd5c71064f46dae4797401a838281122
SHA14a7489b9ba732ddc0ec2e41c3b67fd0825cbdb50
SHA2565b538a018b5737146b179a8bac26e224447d41128aa99e1836fdfb4a84ad1e2a
SHA5127e39bd1587c69a9eae0693b28134db81efe858c14f719e05e13b783d8b1aad2f056af7347164c5a063615eb0b95f16ff7cb0d324e69f4107de1a6d58bfc6629f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587b676b25d46d06fde38353066927a9b
SHA12816a433c5c83bd039a123119c92a8029b907489
SHA256b2fc4b87bd4d8616f063d82526ce1755af3c5f98617be4ffb8cd2cd66b9d4511
SHA512912ee396b5f876d97b6e496411f1fe7b2b7dcaef774052ce1f9f2584cb9c51e36dc6fbcf6aaf63e3c27f387d68b5bc39ee5f6e20847375e4bd594cd92c89d092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5decd6f4b3449ff9df2f25b64f5ff7024
SHA1b63cfb2a11e249974568ef12b91459f1e16b9607
SHA2569399a8df7b0bb1da0c271c35a04cc116cee4b5b00b3f555df6649b6779941865
SHA5123156168996be5a35e03cb625c73ebd4d70d785979b831d87e845c1e21cb47492d34a8e0d8ecdf1299828f89e3f0711d94a62cb6c022c3e8617cc8eabb5d0b83c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd89d54a0456f45425168ca7d7bc5920
SHA181c495345663f49b4c3dd926dd423c3127f4d647
SHA256a24cd0549342225c2cebe7a3c07e58a50dde1a9002aebae215422fb8641f1938
SHA512870cd6f93fa66a1ba488d0b21cd1a4e8126a47cc6a7f5cfd0ebc9604d49d3fc8f6ae80128a95b58a0d2b013d7323a7856793b4337511b3f61c99c8e88270b968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e5ee2eba74e877dfc18f68299f74335
SHA10a9ddc275bf15c9950a9880fc8593a8b23ff427c
SHA256e2992b615716ad95ed2d19f3c32e98573f703fe1113adf2445832297c3bbafb3
SHA512b37e5fe0e0db92b05a7fd04f0a4d840d20d67f271e0ab758664a0170ae624b27f5b06c2fe31433c3e19efb731d53c7c0f0dbecb1e09cd480ac8f409dd725e1fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc30fe7b63f04e76ee25833cc87e9af9
SHA18794e285526d26e84adfe8bdc4374d9948289108
SHA256690a55dcffd5636495d751c95ded94c9ac31ea0dd6251bc006d59207678d9040
SHA512a9f70498f4ed7bff6b40d93107b797e3acd8dc92ee40c339ffee31de656adfb0fa4f8f7ed758a83f638f5a777b0666a1d0eb5335baba64277a2f58c716af71d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5191a8bfdd6ed435ce60d318f65ccbe98
SHA12aa2de62d91db15c0a87e6c83d93fb433fa5b023
SHA256bb604dacff231e61199faaf5b71eee647dd0766c1a619161b2424022ab5b7c93
SHA5121d252d68cd5be6d0163c1f807b9b07f4672865464fb726f54f8050886bba8f5eb8c5fc3515c48eb9780742646056610d2e61b812dad789fef153b294174d41a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592b862619124e786bf25eba1cc4088a7
SHA135748ae5d061ddaba36f9f160a35c5a440441315
SHA2562fdfba1e7e830bd005fb823035d019120aba96c02152a171fa86866a8e4a6978
SHA512f04523f68afb1cc6bc9dce400282e0570e178f13a6e6bb1750060866066c5ace6b154dd872b6e45543e345e6e265ea78a9a4a1fd554fca1a8bdbce2002a9c967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b864ded24c0f4fc2ac76ffe190e9fe9
SHA10aac0e853f7fb5e07635a27ece9f459fcf78f1af
SHA25616a54ef2dbdfe2cb017eeb3cf36e6ab4b5ec385def5729fb90110a76ea438380
SHA5127e63d627e59400a23552a3da9cfc7c9a65cfeb5d0dc92422bcf9f80485b9bcc4f8870ac37bf762ce9471698dfccfbd88b5439db0d64b9aa5fc130135b48fb808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576a39d3c8e798f5ef6f1a3f4b82f0e1d
SHA14e5ce8db664153181f4a629b3fb104e1acfff6ed
SHA256fc4eff2fea7197c76c6b2fbb3273abcf1dde32fd94abe0a391f4a255a4477c94
SHA5124c6f4b3671cf246d14e30cf9b828842026849e6a5ceadf55f6b4fb558d7f11164667df6f10444c59d7fb998bb0380ae55894101d6a05e9044cb52a979071455d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c03d212a098dd98b05ae7e36a7988e2c
SHA15ba8642422538348d80dbd556b5f31f54b752c65
SHA25639feb8fa5253d0ef2a40db9b091959cfe0ab083dfd12c7e59c08d378f57b8e7a
SHA512accfea12205fb605a532f13c7840f05e3a83a9cfc4794d650f23552cd6c4dc1a962372045509cdda5b9ce6a6530314ae041d7291ecb6b3588b98af21acbcf576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e68aade19afcc3ab2107f486ca22a34
SHA15f0e2d31d387adeded7a48fc82ac6fed75276687
SHA2560f87749418f526f78db874cf8982d2f31fe63264a1aaea5f96318bf1203c2379
SHA51261eb66dc68f5d396a902d360598479f682228f7648e42ee82ca9ee71188381ce94bca4ee13f5f16dfee0544b68e3acd56c36aec899977bc82a8381b89a07e5b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc7b914fc1cd621d654048c13229abf2
SHA1838fd2461625ee472ae229d521e82840ad57c8d6
SHA256b40e9dde17d117728467eff236a268d1eb8c929460caf530b245bb3e9b6f26c7
SHA512900d83ab44e7942bd869e5bd9769fe9c39f7e50a57012914a897919cadd37af9a126198a8f8f05b98af7e913257214bd5bc655e76d49881def7c14b660078c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8d0b692e7630d46e7b20a840a1df37c
SHA12b7a3c6f0cd585247c13f754fe846972eff7cbc1
SHA2563d3c20b3b8b431705ecccd60c0158a1df6c844e55711a97dd38c1b49da92eb5d
SHA512bc3a6df94e5d5a9d4a5ede799b723d61ff8bf2380a1c3128d85db1edf53d18ccc08904d66f8ea9156dffaee856447dc621a3d13b491cf07a915d19d791498fa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c27c8c632e268b9208e7622ef980a122
SHA1b883bffe150d57b94a568c0b8296cb79e9fee8f1
SHA2569edb9c04d470620e098fb30fdeb81285d0bd80c5c7d4b19256b9c6b4e051a7a0
SHA5120eef7903f7cd1b7eca33049be13eed5c340c93759b1672cedfca157be17188cfbe76ab1bc5c0d1f19dc0aadcf0e32ef2202b57cb1780dab869f3eb37c96f0ba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d14bbe2731446c49fa1a3ffa02b584e2
SHA1331f504567b6b0903ec0a242461b7dcd5a789ee4
SHA25635dbfa0c3a645809f7fd84454676dc021908b3e86e7bab6e08a150d5fea76266
SHA5125c8a6cdbe180d2265bcf9cd371c11d6f41aa5ff5f359616cc52103f44c43bfdaa651d6c0954878c66105e8b3fa7aed91eb29ac97039b87168725ba1012f507e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59732d526bfce8eacef10e5e7a6124d5b
SHA12126f295612daacfbcd8c9b08f42d20a764990b4
SHA2568d67408e4328174a39aa4733c9b836a72cb1c68db857df387dad39dfd79eb230
SHA51287f5f7360ce5bcad497df948325090dac89498d580891a3ed7ad8425dad389c6aaf7fd7531a51c77e5d57e730342bfed8c11e1eb0f9dd8e24b91c0b95464286e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b