Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
dd945ac6a88d202ca1ee7f77822f17d6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd945ac6a88d202ca1ee7f77822f17d6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd945ac6a88d202ca1ee7f77822f17d6_JaffaCakes118.html
-
Size
73KB
-
MD5
dd945ac6a88d202ca1ee7f77822f17d6
-
SHA1
812542aac27bf2cf922548822cbea6e80f17eaa8
-
SHA256
7f63a6e8b170ed632a134e7572d0b00df797823e24f5e01d036e7281a7a90377
-
SHA512
673a36676496d7b32fb4c63690c28609afdd427e095345912de04b0a37a6351396c4856c2588e374fdff9cab1460b0ea4d32bd361422501fcf342cae2d259df3
-
SSDEEP
1536:h3LIcwnheG23g+cIXP1Iho/eQJtsfD++GZxbVFknE5mW3crXhqYT:mKjWEYT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0bb93538d05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000ff245f6d99e282fb3f22c259ab1554219d41c40f458bc3a8c644443c5cc88234000000000e8000000002000020000000db35193feff058fc2d62c73f155f8cf542fad8735808b995740375fb35df838220000000c3886644ad7b8720dcacbdb2541f27c4512eb021cc3c3dae1744a0654686c008400000002c47785192cc761e4177df95fc77c0b881f12e3a1eb78524a22d0d83d24146ae78c0beaffa73bafb5e02186e19f9da3c9108f79bfcbed6447ec4ac182e8e8634 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F097EC1-7180-11EF-AD58-7ED3796B1EC0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432360084" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000ff6b6d5ad645bddf8ada06b67d5345ea19f2a4a514031eeebc6180f84497db33000000000e8000000002000020000000b57561039a2d2338af7dd53e7e5e8e0ce0c250f5775c1ee17ae22e74bae8dddf90000000d86755dab2a2effe7693625d522cb6a486db1e25efcac2cb0f91c9e2adf849ff44e0a2b1a006a3fd81e9257390bb721098f51772b4ec2fd85cb54a6ff975145c85d9ece4acd18b67fc2ff2e86b779ca196946e216f93fa3014a3c90fa3fc733e93c92519db7cd525a267794c1bca39ac1a60ee07c9efa491037ea839cb435e880190f45856dc9ac5a202f8be8c9928494000000052385e9e447c9bacc386e1b18769d3c3219268bbc1ffe1454d3e3166f3b195ccc3f90f4e8ce5a341a56b0f1fc40d194d81030d9645a92c78c07869c882439aa1 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2816 2148 iexplore.exe 31 PID 2148 wrote to memory of 2816 2148 iexplore.exe 31 PID 2148 wrote to memory of 2816 2148 iexplore.exe 31 PID 2148 wrote to memory of 2816 2148 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd945ac6a88d202ca1ee7f77822f17d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d1893a66dca90a06eb816bc8a9406d0
SHA149be023c6cf038725f88b756c199c12ab5934e8e
SHA256595fb899173cdad7a925a7750f8cb729c8f52c1892354874cf4e3f2209d9b21c
SHA5126a93086cc25ef04ed39ac41ee99a45b15c172b753c15544a2508cd3d5528f28774d32c512d96c6148bdac0ac1eb75d904b4e2a0f433b82c2d0ffa3e14afd83fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e2ed48cfad8c4f3027b12705e682f39
SHA12e07494dbc3f7bd049e7376a043782e911fb3b11
SHA2569a9d015c369753e8559f05db470657892a0116971c9401d8aaeda4761bdcd3cf
SHA512e0f374b0736513f4cea02602131d40d565475bf0d1147f8e7113e4d8632f717d96eca577a1438ee27cc2ca31424428280b1474cdce6e64767b4eb6069cf7a259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6d41f9676649ffa98440f5b3b73bb59
SHA14a353169e4b63d6dd61a27cc3e79642a242a694a
SHA25639dd18eef67b6599b6f1400d6c27a3f92fe853f2726e8f3ed463f0989757ad87
SHA512c70515c57c86c81dd78aea470f02eb068960d83673ee3b6df42728b6f586f94d4e21d6628b7ec31436de8d04e0b85b18157bdf7f30a0562608ca06b68f5c1f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf7fb116a08aa304c582a19bd6128d56
SHA15745e91884244a40ea50b90ab699a1a5e6a8434a
SHA2568a6b1436358db0c73fa21b458fdfe7c078964f43ea9eec2bcded6a47c28f6098
SHA51248917e9fa00e2cc0017028245d2f88cd7ddd7dd07dfb982cefc6e58ba7e040219b44d6b0c8ff018aa59e8850aab364f02860acb3f96b09e7d0a9f7232147abfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52143dae90fa9e4082ff9bb9313205a9c
SHA1146b7c9cd9e74ffadbe514d7177f32d1edfbb811
SHA25642b218ea6fcd0ab74d381666e1671db5d55cea50f25390bc8e75ab9091318597
SHA512be4e4a00f5315d518079c245aee74da3e8431bdd0d3dead103c75c77261ff172b0652792f5ed86a9452bcbc69f1c4fc0be807dc14b4898583a22cdc8595b1e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5997e3184a4c25aa2c8d99818b617df5c
SHA1f1832f90a9f61de6cb3072732f05913ae2426538
SHA256de6f91e2c3b586ca35487cadf6a5c090a0e85e5c32115164c45900f8e8414aea
SHA5129c94b66a3c8977daf861a6a903113916f899cf3864642e0563d0adb894549f44b0d6cd06fc382ba3cc808c45524cd3cf13b1d16a78c1eaf50d1b709a972412ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a4461deb66c0702d21ec66966fe4712
SHA14c339c0bec00ffef4b6246e9d5122e6460512129
SHA2566e3de88c5b87c7d789ba4926237af309601652e0854f6941e05520d3b3686018
SHA5128445aca628780f378f3d7829c810f8a54b67b7f56198b10bebac20be76459b0bbbccf961e871f72d837a8c2fbc6f64cd002a4103ea6cb3684f73e04829687131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c065bb25a3a152dce96ca16507f0a646
SHA1057753b2da1b2ae5d5f7c7a9fa58da4cb7d10fbe
SHA256519619359500fe84eba61cb5d4b02c93ef129190fe37a294d51b9bc21ddf27ae
SHA5128947af6cbc303614ca04013498719761e4d98960a649544e0b763ac97f62d77fcf82afe7d27e09a5bbbbf321515c18df45696cae4843f342005cc26beeed578a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c7db821dfec39d3cffc2ad83e655711
SHA1ea88c51f8a7afc7c62cd9cbb41937db1aa9c5c73
SHA256eb389438d09fac167d2934a412cb541c469f46d6d4494455a4e8a47d7df6b858
SHA5126258cd55170bee8240e1abc1250864cf4214d0aed29cbf39f82b788f90b1a95bad4b0ce8c9bfc85dc7f4d5494778f2967eb19249e65a18f29196316970de6d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e46bf1feff14b01902d2d1bfeb655ab
SHA1500f41ba5cb74c2efc9ab6fd6139381150fa712c
SHA256ca45721f61ea84ebb62cffe8f3ca05e461923e81144e7f3482722d76f8da06d0
SHA5128da4a9e88f0ab9474b5e5e009a00cf6b6ef9d46641f12e0fc7c4f35c5859338326ddba8c319778e4287aa305229a0b9b5c7c0f9f3b1eb45d396f15a8865aedb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5530cda7235fe42c0d5caee553c9c7863
SHA187ff23324e361baa14052f628ef8c70884285e57
SHA25610b4e37bf2eda12f2b434f046d163edea6b7fc00e8b40bf0b8431fdac2fc8033
SHA5125dea22dd46934e705320d48a0f007a7c4b8c63c84d8a54cb09b48223f507abea97a6b7d4f84de797a4747e997b23be2023843fa0d9d4d7c0fb63730fe1004428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1bdfab0884dd04f9504c282141f90e2
SHA139d25d8297ba045144bf66c76d39adc515daa078
SHA25670aa110a469befb39ae666a1fb166197aa248b1e57a1154e0dd796c4496b5575
SHA5120e6aefb7f9ef3cf8df7b8a33ce1122739038e7f5d0edaded2cca0e50ead8ff76c5f4678efce9574786b93256ad6f790ed81349e4793d9be7acdedc43b45b4415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5064be0e1d761cabb7b814aa9fa517360
SHA182265e3ee54fe50f4664d8933da10844a88ffdea
SHA256341d641de22e98548d9730b79cc779a2219b9a4855c012fc4e18ea313aec7f18
SHA5120e519c4cc913cd1eb451fe6f4b83687316ab297c8042bda89471c8517c8386266f7ece47fa74c203415b25752b58aba83578bf4e27842d43e3f96a27b17e029e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51def29161e6f09142d8a6ae5682ceb71
SHA1d56bed3376958bb6cb772a60f4c202f1418bb30f
SHA256aad5b2a9aa67aedc91212e5492724c58f8c98251e57b22723d886768b95fe740
SHA5128c46fd6853bc209cfbdc1f66c15d572924f23a273e73d45c0e3817cefcedf126edb97b28498b4f308c910eea7d57ce45e4d7171ea564d8bb759a053edcf6a4c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ae212927949653fbbffac6116bce017
SHA1f69f64309e6e3ac288e9013fb75f38ad787a8e1d
SHA256f9a805f9c8c72e22c3075d087358b74e922b1b5d5c1e29bd2950711d817d88bb
SHA5127a01a51121f47caad5f96e4d427aad0b6f02ae5f20c4c0ff0362a53c8855beb6911cc082e0fa8ac0f7dbf33a93ca1072ce846222b50fb9174336fb0c9f28a22e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529b6791dc2f3c0ddd677d9f3c382360a
SHA18e2a6f8ab79bf874bd90b86688b8eb55b0b9e7c8
SHA256e21cfde29d1aae134d16e38ed84c7735a480c374049dac2280f861623624ff2d
SHA512450ee9fdb0fafd61d13a84a1a1b523e1c9d1dc54d69abbfb13fb3bda6dfc894a28a961455c6cde48159b83d4280fba9c08b72636395299860b890265134d9999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf0b8696cf9f2fbf28d7057a5f4d9732
SHA1e4f3c916d5783c9e1daab1b8050b0d27c5f5b1b8
SHA256c2cea928160127e39a66aabc51e9868059c5066e04aed9ca50225ec7ae45ebeb
SHA5127c49c6d06ad8bd49b8407a88cdfc881ff4d6a26c15bb1874327b247ed9e6b176b045f25dcd22360b8813d028fbca926ac2d79e86687a5a1b0a416eacc4bfb444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dceaa59ce39de814635de27e8dc0f0e
SHA14aaf1e6c0b9a648d5840881fd8afbecb02eb8987
SHA256f7773e101254cc0a086d2918fc07b60e6b8a0e17775240a66b56401de196177a
SHA51254711744d260411457247d81eae04997b4513f7739f9aa6fcffa9a64844e755760c597177e2628fbaba43843483bb723c0b3135a7fbb6fed94df2cbbf0d4ce08
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b