Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 05:32
Static task
static1
Behavioral task
behavioral1
Sample
dbe60cc2369490c4bb8efd5ab9aa3953_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbe60cc2369490c4bb8efd5ab9aa3953_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbe60cc2369490c4bb8efd5ab9aa3953_JaffaCakes118.html
-
Size
12KB
-
MD5
dbe60cc2369490c4bb8efd5ab9aa3953
-
SHA1
61939dfd463906a2444642afad161a8aa239f61c
-
SHA256
49f91594f5e58075e3e51c7bf4a8456bc768d7bec38c1c05f8825b52d3a08b45
-
SHA512
1242faa9e92be4385b770a18858b1ce8f25f7222ab92fbfd3e76800f9268ec676eb0b1d6874b2c6c99c3776c1b541407c290979ad39d5a454cd3df8414521a05
-
SSDEEP
384:k1fE66qLC5kxepDOFfyMtMiv4nqe2lfie2l9zB99SBXN:h02chl47NoN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000f4d9cb9e018a2b186427c2913f8d7b3130c829d392a7dc6fcfb04aca8eb1a794000000000e8000000002000020000000eb5a24cb57fff2b810abbf6e5644580dd00763842c2dbbfc8e9f30c71af9cfa420000000b55a809adc0385e046178c7dc9b40263ea61b9c7b61809e3ed54fd92ccd5532440000000573ea8aa79892d090e7fff333259fad2976e88aa00b73d29fed9513d4d2f55fbf18ff98edd84d11fbdc7ce2a522a836a067facca22c2193494eba2b408699dbc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5DE5AD31-70C8-11EF-8D81-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a96e32d504db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432281001" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2772 1728 iexplore.exe 30 PID 1728 wrote to memory of 2772 1728 iexplore.exe 30 PID 1728 wrote to memory of 2772 1728 iexplore.exe 30 PID 1728 wrote to memory of 2772 1728 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dbe60cc2369490c4bb8efd5ab9aa3953_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53598443f42c767c29331d358336d6893
SHA159e7bd2d4bbd0e654b930b31ec52168321cc7349
SHA256394204faa2cfa1e2cd88a953e2b3c155751fe8b06361ada1838e8d19325c10b1
SHA5126bf450b07c9e6754f55a8b1ccd0d01d8338aee59ce127b835acd95269dec83027d4168302ef0b0cf221f54ef25bbba0588ecdc193bc9fdb4e3303ab6d9170a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be5f8e375e80e00783aedfc865125d4c
SHA16325799ad8015d59d5899d79b9ad4a0023bc9ac1
SHA256b59de624d5ec35d3303a7627bcfb8edcfa76eb79ad8443cb12476f7c5db2f395
SHA51218bc1b0f8b0cd675df6b0842c94b9e0af9e6b1948fab8f52446a99bd2b595a3032d92108eb485ad5dc54596f4aebc87637df5e25619f6e4e5612363d4fddea07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535eb1ad89822b3604ce96c071ea123c1
SHA1b965a1fa1357918f21b0a2b9713e0a76da454e4f
SHA25632da7b3a01b51e37f0a74e1cbfdea0731beaae674f6c3a7c5ab95c0337546326
SHA512e09e20801931ac767cc3f62e3bfb2fe90383d3e42d0a0aaf0ba1077532ccdfc931a0fa13805f84780a2456fe50cab533910bc6a9de9eff295a4d66cad9455e89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cf60fd242a7a73005ca9cc447c3982e
SHA13cd72414d535915f3dfbdb42e80fbbe0063c2843
SHA2568997c81e48547b520e443c240cedec4cdd3eb97e13ae225c18cd0c679300191c
SHA512fc843a2710122f1ac6fb43c6696c9f94376ced8f3c71f59764b31bd9d4683593e9a310179dc4624eadf99d30b1149dc181e97f547409feddc013783508cba528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b090b2d7665fe002c9db1b3a69f07216
SHA191e56fada7a5aeb945346f0230712cf2d314b6fe
SHA256d0e5b3b75e17489df4ef1ade74bd1328eff10a995a6838392878bf4889c50d9a
SHA5124a148d851d48efe090d33927ad893b980459d1703792ad824b84ab42384253e29de6823657b4200d592f582eddbdeb3bb82b5f4d0ff3c9cc6c598fe035b561b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af1d6fea3268c82953155e93087dd9f9
SHA1338367010064ef9cbf6c29a54961e7e53205185d
SHA2563d1e1bfbb398c0cb8fe384de59dd75928925e60feacd6ee08ab5f9cdcfc2dd54
SHA512c7414b9ad474571fe61d824a11befcfc8b0758da51503b084d75aa5ea1e0804b016409700109bff1c28500a5dc58b91028e8fa890708af4f343a5c1c18bd8da3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f44bfc2bdc0e7d491c3ad9391220ef24
SHA1232a8c4801cf7be9213dbed137ea26d406acd151
SHA25608b80c6734536baf73b8562607481193b9fdeabf2f0bdab55d298fd469406066
SHA512514524c2db94bc74cc03be64f8762917d5721cfe768a8734050397998494cae6d9bcb117ea30ca5f68c21ff32299a9b7ab31bc96f98226a35609bb2b9f4cd746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5836ca2f21728fe1d8d92636b81f41dba
SHA10c9ff2a4025a96333ccaaab946344ee7a4cf0664
SHA256215e8c691a2156f5833cedf5c16c23829b1649be201e1751ee714b1b30fba5d5
SHA51201a303447a2a29ee3a0463e5019ad9204917d97c6c43ca3652c1c1388db93b2f8372ef405cc9c3a4439d8d9d2d988f4d18c034c568ae9c9d981e077d905bb021
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2f1148fae1475444789e3a2f08af3ef
SHA14de71e0bfe3a03df4e050ffa6bd7117ff5620eb0
SHA2568d324fbd9ae234b45e697a31ecfd3679879d023b5f6d8d53d2c549cd5b1be66b
SHA51236910e24a0088b038d946944e26abbd455ebe10864d2f6014109b1b6b63fdb1e1188a2bd35645b29fb3d5ac44094c50781a1b64a8d624635f50b77d2f72d2672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596eaaf7ad59e8056738284943f23b2c0
SHA1a12d1b7b01bdd9039d7f993bc83712e91f09d749
SHA25680f188b0ef2bd40e69c2851400a05adda854f2359fc1087648ad465937e9e22b
SHA5122eb3cb64e4053ec1ba25cc5abb608ebf1ac7af294cdc99adb30a713bede0e1fff8c7441d683647e54244a9316da3271a0b11b39463a8adba4aa9fca457c214b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a9b56a97b5bbeeb8408fdc83f862f17
SHA1e2d7594de0645aec294e3ea200b468872712d641
SHA25683e4b782c3809e64510912f8e8637344d35f611354172561a7691b5c79138310
SHA512f097ab073530f8dc8e9734422bce6524b3535e783b02d0e621fd1b2ef8575b1dd55b38ad16fd40db3182d2610361cfa3a639e4b875a3a55593b2d9c2cbb6ff7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595b0c48faf1724b46051bf5261b35097
SHA1b178acf9a5737048bba4de466776544842719323
SHA25690f12815f92682a841851e8379d23382d74d4a1dec43b346b9b031154fb8a2c1
SHA512485d3f0b834aa9d95f9f4365d04d544a7b6476f25a00f2c3f89222d9349831ba59009578bd78a1d4ee5c91b48b34aaa9c6cdaac41c68d563adc45447865cc4d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4f11acb376b4d819fe89f4cc67b45ac
SHA17558d4abf12ef726be848ee7a0c20c0fec1270a7
SHA256f0dd10f9c07e6d69218683b631da9544419df7b8e68afecfa08e8057301350e7
SHA512f2bf16225755d6d7f66ac4667a9f3beb3cc3b9462d3f539a117bd65a9274482dcddfc3b7a9bb847c71525103e0079a687f23b01bfbc8968958dc9c0c2e82220d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5737a6d5c9d266cb64a860d68d55b0328
SHA1f387a99b78240340d361df565a8883c3dca6c48c
SHA25648322e698aecb97d7f6992f7e33c653bb106ab14aa6473e78fa07c275de67804
SHA5128a5b09a671bc1f184262d414e7ef4e098f66af1de3453338edd6a97125729153d116b2c312e449f1f8a6b82911acf1f5d25b9d0f10e375e6b2bab9669687a7ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf52cf041aaf79c67a21fb790baca99f
SHA176afa23e7a554d5bc6be7fbf4d7ebdadd7f81257
SHA2565f9c08e5931b3b2cff457174faf4ad9c2f38b8dacb2d75ccf0115dd1924e60d7
SHA5129c29181036db879ff9df0a0e163394d016af1dab6ada78f9eb2a15f4a3ba481ee7b9fd2cf265528534528ff3b390fdf1904edd625ee4c8e0f173f85e18e2dd12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7d45b3e2e82f95d362821cfc0f23043
SHA1290bd8e91a6b7087e935fcc9a4085a71f38aece0
SHA256a2dda611f05b4b0700ce2709bd6a46a1f4869504e280af91c4bfd0770d1438a6
SHA512bc6025bb4986b62af4a6488524cf2361b7ca44b864feb4c2fcab5a84ba30e2ef83e00dcadf76f11fb369615ea42a09947bb8088054e22ce60c69e549c38d4f5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c43585ca6a5cd22795673d45faed461
SHA18b43647ab5923dfc9fa2f4533bcef18728fa7c7e
SHA25618937e0833a6f6a243f72ffaec7f5436bdc6abe7031177dd6c2bfc224d7a5c87
SHA51219bef4b293f662999cf02d8833b6fe2cbb34664d75bf1084deecd133b2ed364f052e2ed77728c61361625a4f191a56b2fa315bc86ca5a692b4ea214da3cc2930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582734ee1b830e3706f0ee4a0db5534e4
SHA1237a149c8fd1dfa4a23acd5ec82e64da9429aa73
SHA2567b7bc500867565cad0cf33088dd8ea3051ca3ba21380a7804116b9a5136bcca8
SHA5128613c566172c8ca63ce66c8aac3100a8d5347a53696d587eeb6a65a003299fc41a64905804c12fd011b860570e8e86e819ffa5a089694179e2cd0cd4a5c147d5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b