Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/09/2024, 00:25
Static task
static1
Behavioral task
behavioral1
Sample
d7554135d5ba42fcae062b5a235e9041_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7554135d5ba42fcae062b5a235e9041_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d7554135d5ba42fcae062b5a235e9041_JaffaCakes118.html
-
Size
13KB
-
MD5
d7554135d5ba42fcae062b5a235e9041
-
SHA1
394fe9f56e903712d000970db0514e21ade4ebfc
-
SHA256
576515fc8f0bc06b22d24bad05f989b4560104cac1ef73ae4b2b07f8d4a4004f
-
SHA512
229dd863e0c16fce64d90505ed135a295c77771280114030415e09f4ff7f60c055a18f387e4ac01fc43c70c02f14306cbf449fd4eb4048ad72e2204260a000e1
-
SSDEEP
384:3c6qPVfPXnu49KFrBNfwtOeqxRXEzuEm8VjmFP7R9k:3cXNfP3+HxezuwkQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e00008101803db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{208A4A41-6F0B-11EF-81C1-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432089772" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000053f31740b998348874c829f8097a27ca30ac5a55eb681d4b2d45d4424c57a237000000000e80000000020000200000004e648a2bf206a25701d451da6e47bb4f8e2f875e2f58600f15805c28aaf12283200000008271b07b84d204985cfe0f105d5e93ed174d2aed9cce06198399e0252b2c8fcf40000000090f62f021d67a095618340fe1e0007e8511addc021bc8fb48c9975204278803e33f6c9a4a5ff7d5fa9a27f1e2e8679bbc63f2b3d8b2bfbcc28daf505c5fe83f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 320 IEXPLORE.EXE 320 IEXPLORE.EXE 320 IEXPLORE.EXE 320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 320 2420 iexplore.exe 30 PID 2420 wrote to memory of 320 2420 iexplore.exe 30 PID 2420 wrote to memory of 320 2420 iexplore.exe 30 PID 2420 wrote to memory of 320 2420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d7554135d5ba42fcae062b5a235e9041_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb54d5d46912849bc2a03c8dfbe6f006
SHA150bfedcc08f62da610ea3dc1db6d40385b542735
SHA256548bd5766b2bef61a1f0ed5cd29dc2b6f8180824a731550b54b02f25c0d9d956
SHA51227bcbbcbd52c997740de663dd6d96c8e4854e6f7d85ed43ecf0555ebf82ae3f60e36f60388371fab73484731c73715da13a9bb26f578676c014ae104c919db27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58206fa1db44ec9a75f4a7c584a7e1d32
SHA14112a9172e24b3aa91f1654348e51b1a7e32ff65
SHA25676e3d8d7a1a499e0d24bed319b1ba7767b0a949f22da0ede2b7d11cd81c24dba
SHA5126614040123b06fb54b7792db110c30d2175946a2c347894da34b62bad469d43f0617c9e7772b06850f6ca41419aa9af5d37bd44d735cdd1f7bf8e8ad386531ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f6a8b240ed14ca3deba9f434b228869
SHA1366af1bc0ea9748dcc5be564378892702219e882
SHA256c042261f2d2036bd11852c19d24d05a720855ac2c8392d40e38c40dc2468fc8d
SHA5122c70a7b38fd45fcf624da908a4c03819602496a7146d0f8c339b2bdcb064ebaa29e94e3a08ecc6287175a89df49262d3cabad829066cb8163b8eab669fe254b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b12f1cdc58db1b87f285078392c4761
SHA1a5448ae71a6415245f9a2ccfd222bf941c40c183
SHA256e9606e8972a33874d3f56cec9c0a70a7f93df2cfb4a326cf0b411d2502a3c7c2
SHA512f7e4c0e98367461f7681a5e1116aaad9d8c2ffc54d053bec1fc3afdb5380df52a007a521289393c795dd24706e0428b72c2cbdf3731107b3a8092658b4ab44a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52630002fe99210e6fad8e137a0662d55
SHA15962b4618e5b696fef8c603f8818029c60542d53
SHA256fab7eb31726d7cbabdd3a8758f79eff7fadc90eb211282cfa2458bc6ed4317bb
SHA5124f5d6505b11f2f089e50650bd5bf16d60c557f0a6a3503d1d6ed421e51104194f80c69d9f5ad243d25b7cc69e5cb6d9346dbda6f951789d3089cc2defbba9fdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dec09923c27fab121da62f8bbd8b8344
SHA1fba03d83ad71eef6bf46a953890c4d0fe6587f22
SHA2569a4b8d381f3199dcf46c0df69bda756becef38deae1156da309cfb69c45277e7
SHA512295a034b05e2b4752a0f55acec3eff375d7a118ceb18be365863e431ac7e1b28c190a46c252052d8ce50d81e11cd15b853f489a993941411d014d37212852e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58641ec25136d5db766aea747ce9e46c5
SHA10b2f553d7662e945286cbab1d83f913d68738403
SHA256d7ddc9448573cbfbe12417c2d94891b4f6846666942e4f8add614716b3c07286
SHA512f483582e8928ff57662882a030c7a037c64f4952487104f47906789c857377cd631343f53447b40752cc7339ed7602752e5412e2ed56ef9e7df0984037217239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2159ba11bfa252190b3c7f3f4500e75
SHA12021e8560f9d258f6aef686b475b52acbd2cb2b6
SHA2564c0831aaca9a57246ede4000ff459c749ac41d401c1ae5673435967958fc6f4a
SHA5125524953cb28bc70841837502f9553b9a184986764647e4882e1dc54534d7672581c8da279efb4ba84bcc89943cec319f47bd38eeecd0766320cb71cbf1edf8e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a4fcf8df9c95a71715c48188c06eb88
SHA135dbd92980576d7e20308487102203b2d96674da
SHA256150ee165476a286c9d6919be09837ae3696ebb13c33dde6ddd2131826aeb1eee
SHA51238c6f2240890c6b0983c6b48c2b2885178510338af6e75d3c1d4bf7f78bb03c57b59642958511fc44c31731f45df409f628dbcb4bd2f2d9e3b3f6bbd45d280e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517da4c6416269ff0db89168d68f7fbca
SHA16097d8ba4b1fe3c789e8a7f4d4b6964d6df080c5
SHA256234827d9a8f0098dd7c118d36c5b9a1f9934cb79fcef7ff2b1d2c1ba50fcb33f
SHA51269db3c0e443724493fc30363e4a62ac289df6cdd48bf016447e05cd648a865abafb4ff449ae0e5abb8f2469761a221c81534a7a758916746eb286b403aa28e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b79c5953632bafc6b6f02d06b2d89d4
SHA18d0c4744f05d487ffbe2ea424da0b5268f39ba67
SHA256901c9b362d95ccb1012a96b4add1c135aeda904f5da245049eed547935c7b11a
SHA512fde97247c9bd7c3ca6c953c3040d67956a8d8f014378d6e96d3324c094acd06d85e6bacd86f32c0398b52588186fe000bc42033553e42aa832ce7103f59e5e84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5908d137fd4caa7fb4a3abc5375d15320
SHA193492fdadcc1fc6f0609e7fd388b2b00608c3b34
SHA25619d5633cb8bc705e4c9a0f999a9c78d16c2e53afa93a15c002bcb0280e94bd20
SHA5127a41eafbc872a362cbcdc7c268758c88c9bb832c4daaaae616b1effd8a21da2e53b7cb18f8353a3e572c63d7f7626ce01891bbaed20432f8bc57475f19fc7588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513b3a541c44ceaafba5e61c3c24498b6
SHA16328dd2960b2b1670cf3df16c8d352cec543e73a
SHA256f6b3a35bfed3ad2f0db9528013a8d4a080bf7bbe8015e8a9f794b2118ad1ce52
SHA512abfaf212964d8e02974ff7537dc5d7140b35cb6938c97990ba32087a5a1e16ae238ebfb1f540fed9d0abf080005ace456cc0255622955c49cf9c27a33e00e6d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8ec386e5c71a4e25d9ce56e06a5dd6a
SHA13b275ac7aa6f6affcc84dc2d84ec025c2c6cb07e
SHA2569fa5e82850f9975c42fc96c3bc82e6da618226616d008923b7c78ae5a983a1dc
SHA512802f2b05a5776f52b0a484e51a3a4f7e21c8aa2cc724732a8a226881a63e921e25ffd7f9a2795ff42985eaeecbcc7f9723ebad38d72c4b82d2e2f423d5efbe29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c2d55bd727e926965620497097540ff
SHA1345bd1f4b15c2a31ff8572fe4023c1053a711ab9
SHA256265ed4448bdd13a104dbf025f43ae8728bb6b279e0fc93a0dafe32d649f6e168
SHA5127b804294b89e938d6f1d45800a069991c08335ee686b726c81f810670d1dbedc56eefeb0c812c00a4478a25a43762026091c6f2ebec6580eb4e99aed0c4c374b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5dc419492f5ad2e2a454fbf439fd4b5
SHA1dde6d31b769f1b3571ad9f78411a1befe12f5d55
SHA256370f93929c83a9884e1844d2c2d4646966637fef01551b055fc9cb03d0bb0d0d
SHA5125e36afc728066e37edef738816122ad4deeca8e75ff2af5dd9c0aa9d30678278300a4c1084dcf1d66d4f2e4dd9d6c1dcc30beb926f18d9576d3cba2f2c302e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6ec1957feee786058bc87170ea775c6
SHA1ba74edccb225cfe0b36f2bb2b4c31371bdc78a73
SHA256aee67699cc24875b22987732dcb45e79d471428a4b86de412eabe12d384f4a93
SHA512143e35a0fa3d8104745ad53f49b149829900809cceb9e0e914febcb9763ccc0136b151e5a9698c967b2f4db787119097ad503a7069bd33e285a6daa5cb1cac04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f084667eb359c31da6c853259559558
SHA13e483cd4c75448c81d4d8919e0f9d4e987852a10
SHA256bead2d45731f592e6300e120cf15579a73b06f53ffe511a434501eeac5d024ba
SHA512fe36c34a0ead8e75e458ae6c599e7936a24575734e5b5803cb7a6baca0700ef4380d9b0d31cf332452122eb2c6d6471f520c83d9f105e26c467699feb7951d24
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b