Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
db99eca14f80c5bffc0f684910ee8bff_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
db99eca14f80c5bffc0f684910ee8bff_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db99eca14f80c5bffc0f684910ee8bff_JaffaCakes118.html
-
Size
44KB
-
MD5
db99eca14f80c5bffc0f684910ee8bff
-
SHA1
80444121924e98cba03058ed5618c632632f7e5f
-
SHA256
ff27aef99d577b0fe6bd4e2207cf533362acfa86059a8f76c504601e1c612cbf
-
SHA512
9100dedcebf7c1d7b7d35157257b41b1f8a58a6cf9bc947170cbb1ddf95cb2730923ffe0a2020651580a3f77fbab4da986310e40aeb9d12a76dddb2e1567873b
-
SSDEEP
768:ELWboHUCV6o2CiodaweJ+Qvof4b1yUECYQz7UdAlInl24Wqe/8a/qtAWGV/fL:SWboHUC12nodawk+Qvwa1yUECYQz7Udg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000324234df7a3e190b3caba40caad303c3a5e5094d83009e23111a381e7b012cda000000000e8000000002000020000000b2c7b9c80ad1741327207315fe0c63783927ed7f3e75c1dbc3fc03d047f591b2200000008b5ee549f60fea347bc97d2fceaac25af962adf5325b0b1856d0539dc745e16440000000514c08b672cf36e78b3fe25d0d6b94e72bd6b4aac0ab657fb21e88a7076b5d21df64f5b4a7ccba002f1ee53828a4349e9805f3044923f173f1ad45a667346d91 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432267473" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a08201b8b504db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE05BF71-70A8-11EF-838F-D692ACB8436A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2056 iexplore.exe 2056 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2720 2056 iexplore.exe 30 PID 2056 wrote to memory of 2720 2056 iexplore.exe 30 PID 2056 wrote to memory of 2720 2056 iexplore.exe 30 PID 2056 wrote to memory of 2720 2056 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db99eca14f80c5bffc0f684910ee8bff_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbc99679e394b8a5d34f819b1e8ac39c
SHA11d046df2e42791a92df42a06a95d461aa964de64
SHA256d3d0dfa2b662de0601353b069408b17aacc289ef2586cf787c41b8e9531eb541
SHA512c0f858b831b94b6d8efed44d17dbdaa0b85e941464abdcaba6a248a7b4ef1b3da88ae7d919d8dfc88f0caf03fc1fd060fe459b7fb8991aec24b2de3318fd5b3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513aa9ac86e61448e46cddc6310b9e4af
SHA199717153c664a07ecee11877b9b05ab38599f85a
SHA2566a658e82e65c9d7d36696915fde8fc6043873bb74ef77c15ddc2562cb7e81a82
SHA512d1091e4f3052c49445fb1510ba68a12f775ae7a26778ccad9ca922a19317fe6c10079b35205413710e14685742ad0098001ca4a67b0ea4453e6953bea44d1ca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1ffef3dabc7a631175aee882664bf5e
SHA1997b156b8adaa9ef239f2cd4efcf769c9646bfe0
SHA25643f8d187a5351b40f717b00a2b2eae27e6c996c937297a6fb809e3f2b9283456
SHA512818b5b97a1a9f12ae5e75c4fbdaf0bd4e067d11051ec256e88deaf3e7d791028cd9004f9d1d1e8c00607247ea00c87317fce8f71123e42e70a5f1c1cc4014df0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8049674c9beb22fdd75ad3f181aa070
SHA1f32b46676de9bab0fac7dc8893a794fe4180f87d
SHA25606753de874682ac62b1e822675be0e9e540237460b96ba04c1fa5fcdc129a8e4
SHA512ab40426fb5a228740c0811372403b0242314233035b87ac6de373df6210505041b9fce4a49bd8c3e260d3dd77159eb328e3331fd359c350e6a71ade6d8fd444f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed3f4094f09dea55dd73f8ed64cbfe85
SHA1d256748d5ed4e1488c42b28fb4d13f4a6050bee6
SHA256b79bf2d0343a45bcc8a57e04770316e58c764218c94ffe31a88c51a6ce027573
SHA512e7fe7df00f5b395b9a6aaab73bbc728da3bf303ad166214efe19e484a0677e26b9f1bd99a800edf249f7c7275184c6834b840209f6cbb10d366607fba15f7471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519082c4804db0e14bc642183082f52cc
SHA10eff32ffdaf49dbae4662ce37273c83c4eaf7dcb
SHA2563468fc49d457c735cdde397a01a3b79c1b042756263c7eba132163a8c90cd899
SHA5123e3c696ec3c15b8d5224cd1da892953ec95b23d4a18150cfa208e9d418b8efc2d6dbb4c9451ab5555ea7afc94931cd81e9dcdd941d974989efdce39d563d5074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b485a08a1d77f27e4a97f2aa1a557bce
SHA171779096ba561351cad3b76a68f547f1d56de3ea
SHA2565f6519f732c8d2b88281fc6aa23e2d54f43f7f3d02b734242f5175cf1102a639
SHA51292a5116dbd28ee7a6515be034c8418cde7476d5576312ecb99b69dd94219fad86a8ad0f8dfcb35c8c1e72ce69a9bd49ebf745becb43460c1662600010dc487b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ea366c012c4d8dbbf96723e0bab76a0
SHA12e1685649afd86e571c51e530814421975288360
SHA256afc2c2dbc441e4d418f82d3a289e52c95e5391b70b9eee86c0d1ef77facc44e5
SHA512f4c6e0be8d9a4d3ab9aa7001631e1a01d7c2904a07cc2b36ba5f9e2da00f4b7936f23a888b5143f97e99465f23ad8a341643bc3489c3ea22b9e68c75c07cfe77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521d452ed4c05f41d04da48f7dd7e0187
SHA1ecf6f796bf8dc715be5ae30c4b49180910985145
SHA256a5ec71187533e599c50a16f7aa8d349c18a10f113a753e2d90e14539cfb493a7
SHA5123e3e5736499df55b0604e761c96823b2774bcbe5808dbb9195b0c6a2b38b7ebe158a1aee718cc1ce4245bd0ead3d94807ba0de3a39da4041f5f5eb4b7abcf10e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e4913c1b4f8b7ba9a013965813d3e8a
SHA1115380814a5c9af0e283708fde1b6b17c93747d6
SHA2565e319bb645cbf5c2772c80047b1533801920ded2cfebff18184943a9e9c4de88
SHA512bb00d55e490a491a8ed07b4996bb36cac9a3e6bc5c8171611ff16600518ca2afc77afd0a8cf1e0b78baedda0743579961faa553c92e951e58492596a0a83f0e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf89b78f0629ad63bbceb2580d9a4541
SHA11fccc1bdb0bf7ce4dbca4575cbd02e8fb9290aac
SHA2561481d6d0621542925eac9ad4058b438ab211b13a81a63f00b0f123fe5f39881d
SHA5124bf0da2518a8d8ce2637c21adec781f95b1a1b9def02abef12d3c1640bdbad586b9d5c911f85def2a3b64c5415a7a3c8f8fba40797f608d04e6b52d666cb9a3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a93383816e02fefc6160827960debe0
SHA16b00b49ece80185f5b41399e627841eceeb5aac9
SHA2563550fc36abc23733e00be7edbdd3d0f27efef8e4c33f4ab582eb8ea8f093b127
SHA5125369f62f3f2065b963de53056518208ad924a6bbe69bfa13cfe328f201e15cd3972226c0524c229c14606e9206121bbe813026ef070f458beb8685b3d53e96a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543e5dc6b4603c0c2e0d8d24ecca3daca
SHA1450a70a17af9d81355aec4f67cfbd5a9bcc7ec00
SHA256e5e1e1b31053fe8c1a170273abd9f4664e4657b48294c6a4a26734e50a7fc71a
SHA5128f8b647c6783012226b7f216c72c7cef537b17ffe3660e56c7deb6bad6022462431b40a646074d3abd878f7b5fd7bb87a2da79e91880aec3e651ee77ec3b17ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8d86f4cfb1cff6195059e356acf335c
SHA1064d127e032f23b569c353729df71b1ca34b2c82
SHA256502f31b82a23f56a34ae10ee24cb2d13a9ad52dca06625d30c51280e91629e82
SHA512601845ea169fdbe0996493c1d16c0dfa89a6df22c144ea2ee7ca3dd5991da2dd20a0d9a9e75b2a59311c063a15eedc0da9d6b87e9c3143359a644f1c2a757225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1808c5db5a22211a045a8e4576a9d7e
SHA1d16a02463c3d9687568d77d5d9459bb9b22d225c
SHA256b0fe315ae5ba60ea990c63ef4d357a0d6abf4cb3dc2322a18bfb75b5041a5870
SHA51269b05bbf89b371ea828634abed92a54d52755b351910e13b29c2624d6a8a06bfb83f824a287b8b4113d67431b9727d070c68a819352a4a8726b3287a8358e2ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac08bd38d6a77d7e6440d15bb8867a03
SHA11f675e4875da7e2b6a21d016df9aa09cdfbeb6b3
SHA256d6cc4ebe4a439e4ca74ebeccb0b368cbc766ac4d773ba8ffb84a8a3719459349
SHA5125d0c30f6c90b624c75d6f7f56c04db443bcca47f7d6bb73c3ad63beb0273e6b6f20573f1bcea3dd05796160c546fed1f629af270be52da10031ae4f58f7438ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c38473faf79a4ef20394da9c8ac23dd
SHA1b88a2ab52b81d8c84afe1f32769187778c6b3808
SHA25645102d8e06c2c1adbc3524a3544a48e9b3dfe2425a483d6c843ccbca77f3e4a7
SHA512a89a1f9bc797af5ae5c2219b36d804e130ecad1c6e11dbd5608b610bd4dcf5dfd584ce73290b9a2887d7bb5484d1a77e20dc2b3c68d642aad6a3ece1f5cff1a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583f6e8126bf2193908f08977ecc76ada
SHA1a8eecdb82b420f692ff02323ce9ed0c5d2eb2467
SHA256ee06659481bb1c1130b63cbc2bc0ebe09359ffde01910828d96b856088f6f300
SHA51215807dd28af697f1414be493cd268ecb79ec3ba2b9da19099fd11a2ed868de49df4f42f0b39c8fd719843b1da2b01791a27b9f3a60de37928d65378c28c22dd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b09a1b54146dfc5ad81f26f73788146d
SHA1c9f665ec28138ec0f34a207c45a5300540bb2f1c
SHA25606840205d413a2c61d398f98319994f978dfd19512f3252580770103ef8a9665
SHA51209282587f619ab4c940b36ba9839f8843a7e7e1eb387a1e8dcb1eb3e3b61f4f0d7125fd3363ba2228db69e9133464d371f289404ef418fdc441881bbdb5e09c5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b