Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 05:27
Static task
static1
Behavioral task
behavioral1
Sample
dbe47c33ae4dd9acf2333d7b9f1e0098_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbe47c33ae4dd9acf2333d7b9f1e0098_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbe47c33ae4dd9acf2333d7b9f1e0098_JaffaCakes118.html
-
Size
73KB
-
MD5
dbe47c33ae4dd9acf2333d7b9f1e0098
-
SHA1
4ea3c9996b21ab4f61cca9ad11e9c2f6435c4930
-
SHA256
34edce485de38de698cb4342a676312250fba7bd71f9a10b85a68b679ce1d101
-
SHA512
521eefc7be2d1049edecfdf5a00b219b7d8af66a30f1e37eb3c062cf2dad1c3f75e217c9f479519ce09f603acf7c5126a805a06999b020292dc862c3db0c9ded
-
SSDEEP
1536:zt/h1dc3eUbDbSOlWb7AHaerASZ0nqXUDpTb7b5W4fWKW:vzc7vuOIYFrNQpTb7b5m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000003e6e3e8468f3ed6aabd77e16dbe7f1d8152a1b20edfc683fa3dee39d1f6320e7000000000e80000000020000200000001b4840d8911d849bdd52f61aea537e1d6a14ffeb9cedf5e84024016b842a24f12000000023f11b2b955e8207afcaa9200ed8d6b975949c92a47f422f36dab9c49f93598c40000000e072502b5be87f63724f655ed2ed78ac8df50da3a3687069b0e45ead4f4b3c44b2c9ff6faa03a0c8584643ba38ddb649d0f68783e1b33b25a03aaddf47d94d75 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C085F4F1-70C7-11EF-AD4F-5A85C185DB3E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 200b2a95d404db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432280738" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2568 2364 iexplore.exe 30 PID 2364 wrote to memory of 2568 2364 iexplore.exe 30 PID 2364 wrote to memory of 2568 2364 iexplore.exe 30 PID 2364 wrote to memory of 2568 2364 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dbe47c33ae4dd9acf2333d7b9f1e0098_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c7fde2d6ea5c9984dbd6bded9c0f2ae
SHA1d4be1d615321b0a54241dcca59a183dce4f36cd5
SHA256ad94fca8b86bd881d2881cd870d596f2dc1a89f2931c34796d01c1fcd5a12192
SHA5120be34cf9082c0ffed0372098d1870f08d9b678c5b5286915044ed156628403210bb984b3233d345fe4c00d93f116d7a62f5c2d058cce49a636b388f8a6f6c96e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5458f373231619eead43e42ab296ff743
SHA13835c175ba8db86492f80dd045a6ba891a382a0e
SHA25651266dfd0791566a443976597ceab3080fd9df33b55ffb99ab8771677d6ad6e0
SHA51282d2131fdacb0621d47229490e867b155d92790b284adeae72b2869b303ae50c71330d6ae7d125751ab9096b9c125571eb2a831e926c621028abbc511efaf356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562cb64d12a22ddd9e743ad0b7e1ea411
SHA12f127336c25fb41f479d6adaadaf1192302073ab
SHA25629c39154f1a3098e35ec539d5b5dbe7404b4f2cc8499dc199ab565fe2d5cedda
SHA51280aa3c706923d61db79f68f36cc61df9bfa26d6e4e408d9c6a228b11ed786fad07af6ea160c34eb66cc7299f48e314d23db710312176511e1d045e404f2b1918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553298ae7cfa1b3fcee4a0279f7e3062b
SHA1239d6e7531501ac3a4dd5ec00dc7e0ee279a0bed
SHA256167f27939c63158bea401ccd59b43f10e779e9333bcf0d53c2c8e82672276178
SHA51288e8c3e50594669866d4d5cfaf3ff90c189520b46a916f807e8e15e2e0b1fda3dab740d602b5f2070d433a1e60c0115f11d5c61ef0dac6e84874857bf7cb78a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad7088b1bd40ea7329090a54b230bd49
SHA1b41e093730da4036512383fe9cd4fa45618d4b4b
SHA25635f410d3ddda4b94374fa73caeeb4c28c7db0d7b3d5c20058d9db5bc8e08b3ad
SHA5126ff9d0340c1bafad9b29af0695df684ed1cacc50beff3c834b74fbcea4684a49dcdde738ec78f729f026d7e06ce15ddd0b397d35eefefb016cb7fe680cd46d1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0e7197eaccbcbcefd84311f5c6a797e
SHA1efe088b95ec08e2ca1003596be9f86a3c84c1ba7
SHA256d9c617aec34c4114019deb78425c6856ef0babf538c1546585ca63a8a0b6f3cd
SHA5120c83497f80237e577ec79a49e0ea525afa2ee2e80475dd0fad128112dcaba1ff6dbd87b447d155165283e2fe979504907ebe49b16686ec7ce697c25612513710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e257653f7f70cdfccd67054851cf4db5
SHA1aeb5550ae3952f851dc240b82f8f858300574a30
SHA256c9a39e3b95443a8df097421eb8d14b64bd081cda3b78a5ae1c75acffe752f88b
SHA5123f8d1539ce06ddfd5f6044db01a400bf9b5be9132c09eed1789fd646e964803450b2ce549aeb22d77191113ae99f3bb34449b6a0d990b2c39cf0fd77c097f10a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee8b726adaf27998e529d652900e7f47
SHA14a655dfb8968d0224eb18a2b83621cd4771e4897
SHA256cbb6a229bfd2a64ae169e4dd5b0a214fc930a2db1d2f0664563ab46df0ace2f8
SHA51216f5c85a398bb3b2c1ac8991f37b7def41ed4e53e6ead9c5b4aafd4924ec51773b046d485207e44698d6376d786036022206ee6b259b8b386ce3f67cec20088a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaaea9623ac9632adae8930272a16b08
SHA1a365a550b9ce25d7667829b585cdf68f34c86b4f
SHA256c21a2462e3a0779075bf61e39b4eb26d3b8cc75a4563df602fe57f5ab1382a7d
SHA5126fc37e0da870e01396f3e84c8d7005361e8ee8ed075d4b5e5ef386c548109afa71dad76ef01775a6e309564664d51dfdb1bfefb0e466f8f15a4a634ddb3a7387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea394150721f0793d661d7915267a26f
SHA1650fa6b376b724106647d0228162ae9773f130f7
SHA256643868b6bcba9a611055be326574a1921f260970216ae1329e9c3f8edc3ef789
SHA5121444791def8fb54f4e13764ee1237d78c510deeff732e911c2f180073a1b7d22be3d420205be0a0fbad66830ae8de50835ffd2c6fded08c453f74bbe13dc4e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a369e55f2488eb26bdad376837f9325
SHA159750f584e2b116993939f87e365448129e7b90b
SHA256cdb137a590dacf032dcb65ec3f798534048f21c5e1b592cfee4b66568ab4cb0e
SHA512e4fc5e2d37d5bfa03f94058ea919085f666cca1040640f8152a3c8ef0a72420a95895650bb23d5da87f2bb649ebb3579994360671fccaf5616ea8550e54fbee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b8fc2b1a0662ead3fcc334d519ecf23
SHA1a12412fd0a8e3a956b9f25097e32e6b2b8b4e651
SHA256f65328ab26dec473d6ea4a3956ddc9f8ac522901eed0857be6e0710c3cf3a601
SHA5123b12dcd6a2045f695b170d72552380c4f9feb916cd464d7f01acba30be77840cb0713537426ec780982ebf7f424acfed3a2f7d0935220eedaca10a71bb5bb367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab349143da96218a770b070ffa2fc252
SHA1d5f62d793359c7514f4afec1aceb60060c997681
SHA2568230f2dba3d1b53a0606c9f16cd50fc36d6868caeff849399a1c5c2e98eca70a
SHA512fa3b3666262bc379cc299339e17a9aa679fbfd5a4d9c0c7642ee6982aab7f0b256b47d682837d09bcb6f80813910aeb2cd67de42dbe7cbd9ce3123efb31519f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553884982d2dbf5d05992a9ab7c9aadd5
SHA1a72894153c3880f4a53ab63ec2265f6938b7d7a8
SHA2565ffa17fe15c9ed164aa0339dc55ae70538798dec9f894a51e7653218e39ff46b
SHA512f2752794aba6727065fe4b1195f3e4d9a562cda1cf8e89ad55e70526e5726125e24161811867514df7da80c8169f067cd5b7cfc387ad7252b2c27ecc9752aa00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5162083f52a9c0783ee1b8a4ae059706d
SHA155e683a48eec1d98d97403eae1d68516c48436cb
SHA256f3b11ecd8bfb1d53bb61f1b4909600724bccd36659a753bd8c22e30c2e5ac749
SHA512f3953a2a06831948bd7e342efb0cd5ee34dc1ec3a9fffd07ac16f6edfefc1faab233d8006d0930d3017103057f09cfa1736e4a0806d82fbf570d39b44d4a4599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534e251b31cd8bd3b2048e2f3712c5a14
SHA19a24e33f68c0cb4c2d309598d80e91df5f1b5914
SHA256b56ce5e78e41e5953cc0e714b1c1d72655aadb788317d754534bea37b729652e
SHA512597977df9085dc74c67dc5ee1129f69a7ad0ec9a48504654e3ca398c9df0a75d1511d84d260fbfe058eae4cf35259c39d965209300ad31e5962cf85bf2af6e25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526724b7cf9722d2874497ed695785bab
SHA1f18d95070dd75fc4a2a9743ae6b6341776ba472f
SHA256469a49b89bfcfb0cb308be48c1de84bbd2024b224fcebbbe4b63f269087625a6
SHA5120cdf29177953e8cd4699aecb798a756f1a0687c9c0ad2960eee888c2c083c49eff72663b307e3321bc24134ce95d761ce9b2e9021e8c813a32fcc4cb77b05be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55143bdebe83349b5543f899edfb56030
SHA14a2f0c072b3d20afb8396113e23c1ad01d7ce5ce
SHA2568fd286d6c60e85c57d62d9d6b12507e475bd81fab2e0368956861e8465005e8d
SHA51225abe3889f127583065a41474652ed7fd9ca140ad1f9da663768a2d1749b074cc2dd44429c2f4862270e7addfca76ad1208acf460b1a31d9c127537596593e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57448f4ebd4300c8bec41e1176cfa99b7
SHA10c3885fd8f67820a58baa1890bed448dcd87459c
SHA25667fdb64f264d2e09a9209f0ff7a67c754de917b49a3fe81708564f22c62f3c20
SHA51230ee5bd915a67a3ed6219d7ed9994cef6e1a73ab2ecf4780d25d3a5b57f6f437a6bf3a5a4a29597dc504c30bb24904b1a3b0079e05f076a793fc54afebb77a6b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b