Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 19:23
Static task
static1
Behavioral task
behavioral1
Sample
d6f37bbbcca811105572f8e1934f8c4a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d6f37bbbcca811105572f8e1934f8c4a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6f37bbbcca811105572f8e1934f8c4a_JaffaCakes118.html
-
Size
6KB
-
MD5
d6f37bbbcca811105572f8e1934f8c4a
-
SHA1
9d78be9318a014c0bfc0213695dba7945910371e
-
SHA256
c92ac411fd6f390b77915d7248bb66ed6ec8690c69cf5e5a3dc4c60a6e7825c1
-
SHA512
738d104944faac1ae0bd7cdac113601b1ff32244399743f7b3ce4b0dc0907a63e3e19e07bf5268ba595e41c58d372daa0e91c425ed0efc5a629cd18e5253364c
-
SSDEEP
96:SucZSE659tkYEjLiCqSNdozpJlyB19Oygw:SxSE66rqs/81w
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000d24c2e241a8caeb01d0a0e5aeb6d345380cc476427b0d48a5ca8a50116c1d7af000000000e8000000002000020000000e2c84fa5b774d43ddc7feea398b63d857d34ddc2cc073d6600413f5c650cb960900000007c4bc9a98cb917b7f9a9eb58e21629afd751dad7ba3b365c2d8c3c8d025c841b5ec80dea4d8deb6b0e3bd3e34ae2581312bb37e27e5f9b1f2005de640079f6d4c6d1d66b8eda053e6a26caf72ca0d0c75197a1c1819b6e05a3ac256abe77dfcb57bdac39c233f1631819decf556478f08f8211b579038b4112c56bbf046ba3bb2001ea905bfd5a53f6c5d1c21afdf51440000000fd082eed2e95f4a5d22f5d6a042d90348994b2794206188f2d766dea0d09f59f4d08deea1132b77d1fb00fe21906b40202e4659b13520f4ced2ccbd253a09979 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0167edbed02db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432071691" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0510D971-6EE1-11EF-AD51-4E66A3E0FBF8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000002950098ea158b687548d76dfb9e1f27c57ce84eeb4b93cb2a87889f7c90f5405000000000e80000000020000200000006be6337c38dc6b98a69cffae4b5c1e4b14b5ef20b0e22252ad612fdb1c1191d7200000004b621f7d1db14453b7d3a4f9aad3e7d36e4ad4cdbdfe8b3389cc6a604a0bd34440000000dd488fcd58df829867dced71553cd8a1687ec5edc4977bc51e613e26f1e17ff1e641e1adc3993ecf24f9b529daf95d0e28e17aa0176c4bfcfd455d60fa6b0733 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2528 iexplore.exe 2528 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2056 2528 iexplore.exe 29 PID 2528 wrote to memory of 2056 2528 iexplore.exe 29 PID 2528 wrote to memory of 2056 2528 iexplore.exe 29 PID 2528 wrote to memory of 2056 2528 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6f37bbbcca811105572f8e1934f8c4a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c797bb88b7af2f7b9d68ab3486fac677
SHA154b27ea34f67f7f47cdddabed102606b374c2754
SHA256a013224e409beb12be859193c93644ee573a33902bcac79813881f36d37c1841
SHA51235f1d66865be0fd45054dd795c68cdf23e8d6c149d5509e21b91e09696820e0063835fe872d046579550cab2fc23403c17fe0adb342147675ce5b93b2f30d528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583ac74a9827c738f2efc93161fad494d
SHA15e06d030f7cab96661cc94412afe8be459c11800
SHA2564cc9517739d37574ffd176166b11fabe2e291099fe1ddd5527891de171e28587
SHA512be3a734cb121d108528bd3ceb05d0bc1a3d0c53dd1c719d7846353c211f9a93d4ea9fc86711a114f8583690cb973e477c13bcaa87bdd8fabceef4a62dada3d8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b16ba492b4c350c462dcb95f80ee191d
SHA1eec1eada7da601f38575019ed04d9973753564e1
SHA256ad9668bb655109a38ecf75e8faaad1be453f77f7d4d5431c48d111a6f75307aa
SHA5125baf553b033fc0030073351efbcda49a0a3d78618593880c71aea6f6d1da2b11e1e9e85c6e38bdd2432902af635678bae60537f4c2a596f6ebc56c4b4a1034b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5470b966ac1b6e1f85e157080410617a6
SHA17db74ac1baf51b78cf1282e562fe97045a55cab2
SHA256a82cccdd5e138c76eeacbee72d4f35fbc55926daeda418f5d7929a1d32594437
SHA51267458c7650d60c15aa02c79980df9e87d7dbb58219a4c35380e716f17eb81ff5812007c2346e39f95d31e3aaa68fc97e68b8540a57e112d869ff4d4ccc7f7686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2493c59d2b09945b30e8c881cc1153f
SHA19120e407c1cf2e5828f2d3fea3495b0cad785033
SHA2566c48f73839aba6d8eb1ef97ee546cc9823ebe0123e4a1870c7427ee963154529
SHA5120290c10133f0bfbd2d30e684fb399b074ac15a853d9db8b1bff58439739e4847b639345e00e0b19535949aa5b988907f0ef51a2ce712bbd5cc7b02604c5843fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d83d39cad02698ef2aebcf3ab18a424
SHA18fa7120cc23f2afe3fab23636d40a955c729789f
SHA256798c57a512165283b326066d62946f1beb755f1f2b8322e12869cb379774c54e
SHA512559ffacc42d2ed1012f38fa684eeee88b7c947f2e0e2dd9090923bcb5883c1b81e50de4ada3e367045d9e2c7be0e0bd98bb800c66300d7de8e57c9f994db6d64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5604f18b5ed41877b0805395fe02f712a
SHA1861ffa6728626895b09fadd604fc267510add0b5
SHA2567296ad38cb357b0011c897eed33a97bbfd7d4eab3441c62b796099d13a9edc8d
SHA512871ce81897c37421c794f12560c02466699070d00182dd427c6f81796effbec4e4c00e7b63232db3da2c1a3c01717bad17222c45733ff3cda7d8d340ebc49ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a382b9c1c0c06da02cafec8890d46318
SHA1f600fd82f69548d82622086af2b6ca1fc6cd71fe
SHA2564a44d80c361d81a7f5b95da8786ed6cf760b8cb2718c35aa722f49bcb7450768
SHA51265f6f6ee77c366d4cfe1bef10b9760f6ec0b6cce2418270a3ba5b91f1bfb61b1bd58a6d7ae4899a610eb440702980a071e874da95a1f29ba87373dfc72bfb796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5f6ff85ee7ae900476a1e2bb24cfc6e
SHA12e6d32507f3aaf459e179527ea4d0ebad0055365
SHA2560ea0943f1a1524d814000b982fc1fc1c99bf290668a5541eaf20aa554020fb9d
SHA5123a048061830463f6c9ef2740e3687f71b27bca8cd76018ed33435921cadaf1dda1279d00db965121f4a457e57b4e3541509302dd27f77975ea534887a26daa2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c0496ac7f6c35230402b9549082a20e
SHA1bac30f6a86dc43349e3df7620cfe2bd7452972ec
SHA25612494e8dbf7e479096b8477fcf935d03ad5830a7cdf74f36925c68a45b60e11b
SHA512405f6ead231633a1063d5e24b967737236ff3a53bf1c93d57dd42b1adc77af660dc3c39e78a30434556cb1a800fe3fadad63610f8eeb1ccee31895dd63c89b85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bfa897723a2bd0a85b63f09c8932aff
SHA107e2c83b0033c18bc02300268558a92e5544aa55
SHA25676f628a12c834b3c5a6e87e3d56538317994fab74060d87998263b8c4cab5a1b
SHA512698304c2846f803d3742bf1de2c3873af1de6885ade77aa20a426a7ad280d05f94abfbea348a9d7e3d84694b73f6da468caeb54501b6968f0d831906d281b64e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5035d7da455545f137ae2846bfcbfc67c
SHA1c4c4bffb4ee554f0f2044f7475b6d0dad55ddaf3
SHA256cf65f9a38df42c2fe8d58c3df60c184b1a0652d724608f869b6800c0dda48bdb
SHA512ff85994e1b3e4bc88a8eb457e640dbe1f4ee1ed9592692522a1d9f8dbd3e98dee7ba57ccf45a8273f94c1c318d9982be328306ed4258cfcbf3469e7d8cc9157b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52756edc138942fb1af64b40e208927ed
SHA1bb89bd60ba625a8b9a372810a5ef5ddcf29a66b1
SHA25610475c90400ee43649eff0a2509f9202971f77842f7777090d2b9151cb9344c7
SHA512fffcd976dc9a0a0d055bfa53c1f22ca69a95627f2a0cb1abca9597bfb5cf731b2a089920fe14fc98c728b18a394333e89eeab7c19dd85c76b180db3458771773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572cea66dbef6ca8d0a446c7d035c8760
SHA1f5ce60beb889c6ebcbf7c237e091993dcc6e7b30
SHA256cc86b9df5efd7f603996dcb3e11ea06fdf999be19c92bd918ff8fb51a45bfdd0
SHA512d87ec02ed72fe91c5a5642194a354c349532773901c516332920dc317e482ce0e61502d07273d1ff1b29c3cf51f3168bad9142b17ca98434902d3534d8a22dd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d07c05aad03ec8a942a7f56715db0c7
SHA1a2bd09fd25b36048b5eb3948ab83fc7bbb94b3a0
SHA2562916b61cac83fa94b04a6ef571313e4ae4fc9f78b48c121dc18c32df2e0bce04
SHA5128464fa57ed2d721e3d96bc0bdff0530f22a2ccc71301d6e6534976bc20527bb374494e0dcc9d6fc8085692ab967177bf25965fdc95592a04ee84df6646a7760c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f64fea03108fa0ea8c45a8fce1519ac9
SHA1d3bd5db3e72d41b59f77c91ff21264268c67ea69
SHA25696993b29e4d6de026994d94883dc6ff3a1893cd71be500033046856214e29af3
SHA512e84efdb8493175b906a56d7d96c433c4712149e3c569dbf063c21b133388cc5405b467c25d6886b431966e081ba29af80631f8bd2fdcdf4e763bcd3e51910df2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f89dea08258b5b6f13685252d58a7aa0
SHA1b91f2cbab0bbba9ea42ac6cc54e22add27c8bf09
SHA256b63733b8090287fff4a7b05a698393e3d2dc8a4570626505d97ee990a3b5afaf
SHA512672961f45154dfa1e1c19e936c9ef95d070725acebe7db1886aeb57c9ba5513310d49c9d2c13e09481710f59dbef543f5ea6d7bfe184ecbc99596c2ae85e093a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569334f088049cd2585720c497d8533bd
SHA11c684d7f47cfc4abea4ae3b4df2c5b69ab41ce98
SHA2561088d643074d926f2afe32f81b8fceef79bcbae2bbd75139aa7b021cedc2a0fb
SHA51269b327755cd79d342e1faaef671051c856e0d37045e52fe4ec063c60cbb97580dc711294d14a37f9fa7b46dd4d07bb42bfee48cb40ca11be4316d88f3b69011e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b