Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
dc7f01036f46e0ee9d788eb394b46e9a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dc7f01036f46e0ee9d788eb394b46e9a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc7f01036f46e0ee9d788eb394b46e9a_JaffaCakes118.html
-
Size
17KB
-
MD5
dc7f01036f46e0ee9d788eb394b46e9a
-
SHA1
2eecffb0b0301cd4557deadf559f49cafade6637
-
SHA256
5850d1565a4ffa06357b9fce570624e21cdb0161463ea4946fceb56f8288efc4
-
SHA512
682469e117d8b476f437bc767ccd65f48e2103b5672e62a65fc3d33751232911013a03b27e1648882c0399139cf83885924ef350a9e5edd2f23e8af62b44d038
-
SSDEEP
384:fqlIcMt64IkGTHqOdD2yaqt9/gRnsw8guLZ:m1HVgZkxLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432316070" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000008df069766730dcc71e0e56db5899cfe86aca7b68ab9ea3a6c654a7a2fa1668ea000000000e80000000020000200000000d9eb37b8e9cf8cc2f32530cd687c5fb850936709599587c84136eedad02fc1a200000008a68eb128fbbcb195b8870433ed1ae730994b68a053e7ad1eda89b11abb936d2400000000c3b67071ce4f1aa30b989669b1ccf41d39ef250a1534fbc421d6555bcdfdf90050d2e7e62c109b78d4f26dc365a0feb5f9c37c7c45b21c154ce29d1c95ee56b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a08096032705db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{04121121-711A-11EF-8E5A-6EB28AAB65BF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1292 iexplore.exe 1292 iexplore.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1292 wrote to memory of 2292 1292 iexplore.exe 29 PID 1292 wrote to memory of 2292 1292 iexplore.exe 29 PID 1292 wrote to memory of 2292 1292 iexplore.exe 29 PID 1292 wrote to memory of 2292 1292 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dc7f01036f46e0ee9d788eb394b46e9a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1292 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d8f4af5f1d7f2ecbebf1eeab5f76fa9
SHA177a4b694440cc6a67f750cf0a1504ef00d3026f0
SHA256df9238f49a76741ce9d16f99414e6062d2e4a07ad8c9cb2f886958107da2c4ff
SHA51263351480344874b677851aab73c468938243b80b9e75548d15710b7059f67616601bfde710b509b369d46c0511c42d54419c05ee2f2f3c0bbe5548578f55bf8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59df3270aafab2e0f700070ba344f0113
SHA183837dc54db57ae47699b6f64534ca058784bead
SHA25628c21d6b896720ae9447dcda8a1b407f46289ff489f909061ccdf4a4be23060f
SHA512956c40f659ea0c8de316ed40c2bd7d49f735fd56af5e7bab7491811b9bb782fba1a71a3ea81f180f947473f5aeda1c55905bff68ab044eb66503b578c60e1328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559f4f8f6cba158faac47a254009f6845
SHA1628bc99aeadc31f8fdba21d348d05cededec07bd
SHA25625ec10797b416882a15063eea5b870d7ef3e4527b6c1041619ca2c09064acc73
SHA512ca2be8dee89e77ae03ccac7973fa75350d0e682ae51008d6fa8fb89a13705be30ed2f21fd3bf595ed6cee8f024c8d8291b2746e5c94acd54a05d4660bf314a77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a2f4153c4222f30e6d48d40483e4a8e
SHA13d6ca494bccddb41b650d3e4b2c149bbd8122a5b
SHA256c869a4f6a4ec8c948186a8b0a61ffacafd4612021c3d1c641033f93f40935ba4
SHA5123f30d0c958f74ac1ad719e79d3cb10f17a540f3995c078583f9c513c0bc8dfa985aae84372d3ef036be8d2905f7cdff5f0fde223a578793d2dd6b3bde42dedb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f1bbd2ac64ad10f085e40eb64021fdf
SHA1e784b1d716e7d1854a0d193cb7aa3a881666c9c3
SHA2564264b916902c4bbd3b040d8ece8f0abc699ec82f023c3dc1011dbf9cdb473bbc
SHA5126bc9f1b8bc820b57f0bc1cbc59829af0e92592b87f656a08c49222e6ed3e84b9500272025d2e869daf88a9856d75fa0f1ace99c99b6407899f5b30106d25e06d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b077606410ff67a7aa073fdbe4e05d3c
SHA13b8cb32281da5ff6bf16ec254bbb8e15649df7bb
SHA256ba0aa97963ef80120baaaa145c3820bf56ce58f531e46822ab3090083d855c91
SHA512f4301ecadd5257ff1281ead9fdee45d7628e9463c73cb27782e1547259542dc598d2fc0288d5c713cc57544bcc45c6f1b8d5405cb322a3b966486b57e51fa5cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a52f2511c9167f30c456ab37473f1005
SHA11ce5aacd034e82f7f6325d653fff07d6f9717b68
SHA25680796104df4a5ae200e12a6793f7ef6a54470c76fc77a614ad06706305456343
SHA5120a866b2d4dd10e1ee9cbe97bd7b23cd9db4402b9a04ced9a7d2072857170c30c2bccaa3496b10c71fa3e6eea5a83a5a0d55829682d152580124a5f4c8253536e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb9a9c3bab848aa5ab4d9710a629a8d
SHA127827fb1c60c2a021bd94f15e1c79caac7ab710e
SHA256ae7a1dde21c96a90782e4032257bce430dc21afbd465b1c5ae662c4239227df6
SHA512f090ef47048b856d175b5c27da0c6fc0acebe21405c45106c06272a01b40a261068a13a399fe6f4ece9e7c97facad5e7ab6b5b116731551446600bf442b9519a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5939a0a5491dfb558503ca907e34d5557
SHA131e3dbcc5a4ccd4f0b38b69ab02b9494de49af87
SHA256a64f95f0a3cbc289455ea9b604e04c3e777129365df9d110532991650341629a
SHA51259f24af2a11f2e64075225a54990a4c63075f4807fc5d6164c38dd9e80be4faa164b9a126187c7ac84bfb9b21038333fa5140116b9a66bc41db23c75b603e969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b96976bc235031f575cbbb3c9eac10a
SHA1d2d181cd190a58fd7bbf272e7bbe4726855e6f19
SHA256be01971e8c162dd77f2d5de21b6817cd166be4ec7e00cdf7af9ed35c311f7517
SHA512208775e0398c23bee3b9cb9bb844ff7280b12ede3fec4ef0c2e2e4cda13539c0ef763c3370e4b4bb7a132f8e7815bc69c6cca159bb2d180ebd1959528c428866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b695ae969d3314c05547d800807fa98
SHA1c52c8017a3ad0b1c802f1afef94314a001267351
SHA2565a614c770aff0df090b318284f5c7535c3de5110beeea1f0d1df74369d18b783
SHA5129afcbf5b692475d562fd5e0961c2fc6f54208f6e39149f8a9fbef3e4221ea900c09d5085c13c280a6ff584dc8f42ed15ba1170cf48c59fb4461da5e4ff06886e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526bab26f643939d533a22e7c6badbf53
SHA1fe7aa37a4b612d4295735628799134792b3d5bb2
SHA256e54992f6f63429499d23132598fae7b606f5d2bd99abad851fd567df3d0fa9a7
SHA512e645e03603b3c2171ab3528d9f840021e11d0cc466b7bcf68c47d45d7fb89a3635ed860257c2fc2d7e6f3e20595b68a9685d9414920be553186436fa57d5df6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dde3cf1e4ecdba4835347f17c9c5341f
SHA1785346535eb7a331c6ee03814eb01828a0d12d47
SHA25643a0c1a027daf62525a92db2d0378edc91f8197a8a35999199713731bc7539e2
SHA5124407bf4b3dc9bc1a7f1d2bfaeab32d5b3bffc9a6c6fdef077a172d121e457fe0ea1fcdf3810b9759970bfa24b8938cb6096ed5cd442d88ed67bdb105f1b13740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5392d4060f8b21e323e6c292f942492f8
SHA1fd8c1313a6655e194006c2902e7c7962191bfc6a
SHA2567cc7a341e7a360d0e21744d974a638198444e64a1d8e9473bebee074bbeb5fc8
SHA512a46b88eacb050460a1f5c5b1b9185a6d15eba403c24ffba5a0bf067120eabc957df232a95b093592592c5d3f9dbbb67dc397ecb198132a9e0b8d724cc54fab40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e629bebf8df5c149339c8ec2a8bcdbf8
SHA13276f2d6dc048789f8bff382534d5413764b7d03
SHA256bc88ac6fddd5b202240ced28b0eec7b710eb542d60e4e1b354081b73a0eff016
SHA512c4817a85f406231ef7ba0cb10967ab2ad8fee6a671d6bcffca1cd82966363bf0db3be370bca621d822e16f95bd49d1b17086908033a9a18fc5a3d9da96282e78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fedc83baff14d9f9b7730cd80847d024
SHA1261f3d351b1575c5a84ec7552bb85c224c1fc51a
SHA25645fd50f9c5cce2110277c60b97cc79f30a3a6b74e1805cd90eacfeb69188bf6a
SHA51212d4b9acdf0cb09605979c1a3410ea20089413d3979c387c551b84c3a12b956ebcf15ae9d785b1582c320daf0a0d62601d20ea20691ce1e848e275319e04bc3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1475e858e7744fef6df40537eabae9a
SHA163355fbf6fa38e8c4e2578adfb75e299a807f2a0
SHA256624689c502d13bf781ffeb24990d4faaff90fe46f7634ec06fcc602abf564e79
SHA51201d52b78a9246d5998ad3998a7ab15d20ec45c96e02cfc4a21384402b246e32c256958aabafdf2907eee9da0d69a6eafa25d798c98632b43caa3b6938b71e647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52488be64191af1fe561e953d18370b46
SHA14ac4089080c3cd4abfc25525918b791586167f4b
SHA256571cb047040b3c1f9855a4df55534d4c3d1bed817e403c9c48a68c0132427e8d
SHA51291e56965cff396986d8bb62e5940d5166105e80d43c480160bbe450adfdef894da3831bcf360139da98b0cf9623bfb5a278c15e8dc6959b2f8844d38250f1ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577a7029e2a228efa536e2a035e08d9f5
SHA12fd77568a55e1d0fabb72197bb788db002896c2a
SHA25627f340c7b175b4ab10e79b3408354e088b622453bbffb9315040b24c6f21e43e
SHA512bed9f1c180c1bd7818acca6150b42e0900440d761f14d1f9ed1f5763d9dc59911d2c200ec91a4e7613165f4aa1fd42a1b7c3327b79cdc3353b9bac3bc1ce0c80
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b