Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
ddab5a94575ac5726618524bd001afc6_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ddab5a94575ac5726618524bd001afc6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ddab5a94575ac5726618524bd001afc6_JaffaCakes118.html
-
Size
460KB
-
MD5
ddab5a94575ac5726618524bd001afc6
-
SHA1
dad51183c670fe1cd46281e1f722453fd7069c96
-
SHA256
a1d9043b4080d5abbcbf7ba669cd721d0956ebc05b1458d6dd5e38246a2797a5
-
SHA512
a843e2c1086d7cf6dcf69a4802c7d0adc8c2e1fa93a34e6fba3357a709c19e68a8b094c18a3c35f9df2ba777e0ae26b15a804cd4907146e7f2faede80b7dc0a2
-
SSDEEP
6144:SEsMYod+X3oI+Y1sMYod+X3oI+YCsMYod+X3oI+YLsMYod+X3oI+YQ:v5d+X3L5d+X3e5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3098d6169505db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000009b974f3ea1e65f530be164809f3f7e241fbee5e24c742700dd6a620052aeb49f000000000e8000000002000020000000395a31e9cf3f6ede8e1a6a4a9cb236644080b7d8255b084da2370a0f9c2b722a200000008cd5011a44ef00a6b932ca4734c477172ce69ff31644aff19c6e941c83441862400000003086f2d3fe1ee3f83481e1bc11d73a18ed8b2820a0ba393834f83b70522abe1d82654786adaa4ca72dcf199a90b0d04f3362585e678ad4eb9f918b0538c919b6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432363413" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3E1FA171-7188-11EF-838F-D692ACB8436A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2732 iexplore.exe 2732 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2732 wrote to memory of 3028 2732 iexplore.exe 30 PID 2732 wrote to memory of 3028 2732 iexplore.exe 30 PID 2732 wrote to memory of 3028 2732 iexplore.exe 30 PID 2732 wrote to memory of 3028 2732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ddab5a94575ac5726618524bd001afc6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5529b595407be7218258f85b64ba7030a
SHA1e872f61bdb97c4b546416ba57aec03243f581027
SHA25681c95f74885a06d001c89aa1accc3e7a5abd7eeaaefa71d5684242bb85b76cc2
SHA51211da4721c6604879f926d8abdb861bceb941291a0e7e2c0a349d468d69fca610dbebf379ed4f9e7364e82ce319c96d21e023276f7c7013261514ad98c1742d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3650c4dcc941fd3284987b8c93190b9
SHA14c2264e02a9fd65b02f5592aff3f21016ba65734
SHA256ab23a3b27f6af368c7df1067efd7f9b1b2645daa352226b55b34f9a396aacdfe
SHA512c5767290dd027d547462ac466a0bc95066818fc748fa30b45dba50e2834957a7e13cad08ed77dfaf6081f4695f3a8f93ec82a04119333c76df417fec2174c1f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb1daad8431ab9a00cfb2a8ac66fbd66
SHA13c0dbed52ebc29c728fb96da945371f275a7d916
SHA256c94febe92b4e7b7d66dee7fa141f7e66b94f3ce34c4358e7f2926b9da2ddb6bb
SHA5128adc3d3683c4f202ad6ebc118f94cb69cb06a2d34d10f9ae1615472d2a89edced013586ea7692b1fd6b645791b13e660542026a5599696420991dd52b4f5d0c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e77b7e25876be0e3c19d4730387a0b11
SHA195a49cf2cae60fd10bd4fe7cef6a520ca02fa1cc
SHA256ac87be064dd84c9db8dee219ffbe005376d305f9be3fd07f5d17bd64c31be2cd
SHA51225995863d8568ddc9ccd12b0440aa2ab9853aa86d54cb760e36d2bbe8c64a580b5427442dc59d9a65065a2007bf5cbf172ecb796b73a7d3014ff4ed7758fab8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d725aad3b5cba2f4733f0a49d21a3b9
SHA1822509646203860501e0b3d45b02ae979efb724e
SHA256d2ff0d5f43d3820627a4bc1fa60501d1349ae444c371ecbf23f529a368d493df
SHA51276bce7a1d76559b850d7e61c488d475bc19a5c460f00dcd8979d8c7cadbfcf851e5f62e234e9f17d96d2ccbd4b81b81c0fd1f8d281797e645070123348d75ec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7023d8ff7ad10e52892ba00fdb5bf1f
SHA10646c9b4d51cf68ec16b539db57cce89c4317d72
SHA2565bb407ca7824778fed72e8aac2e18a5100fc4272339850d78a5ac47c548c7d29
SHA512394b75c0a413a13a5393df091f3d0107c777aac68ef67341e8edb1a0e73eadd26e4811680aec0f747f6012a0a15be1c8b33df87502ba4c0e84f4b267b0d449c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9b71b79a99ea2d1eee82e7dec17da70
SHA14e103f186d83811a30ae21d613d78938b6a6e104
SHA256839f7d2b6247f41b489626ba701ccd1be9367eac2ad320b0a2d11e35edaca3e6
SHA51247a8e201c6b118767900c2e4ecd877916d0668f62d314e9f78b599993d9f30bc70dbc73e8d12786b4a39bb5c4e16a65f8d7380aa792f2ba2631bbd7b99482d2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5edc4a7138da2dc7096ab7d76dbb16d
SHA1cf95b629e36108a16871d35d9ec191b89db5b106
SHA25686de681de653f10ab16500561f4326d50e34f9f14b1b9cd09557bcd37660e04b
SHA512bc3525cf060dad3927d4b2672d21a1c8ec6ad55f04c6d7b3b5f6699c37980555564678598a67cf064bff5a695375a0b1c5518fe34388b6f74b872a858b84790c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4a4c22623751d6ed1a84103e1edc9ec
SHA1983a0aa7fcd7202f09c38a5a6cd80d02dbd357df
SHA256a288e7670e069f4ca76cdc68993c1762ef44073c075225600d6d092a02bbbe0f
SHA5129bc36331611cd8b9822963925d1295955e484f5da98610def32182bbde12c5e8c3674a8b36ac1d126b48f02ad260270765c2e468bf4fdb9f4f44caf064a9fce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a55a32ee882df00aac07dccbaaf374e2
SHA14adf7676879221aea297f330b5f8f9d578d368b1
SHA25610e1c992b2f6564bc4c40982c60967ff6c7dc71c88bec1a1d2b6aadb5ac81a38
SHA51267503e2d286134a41babba2665ad7fae55ab2b9df6957f5bbe5715e42596f2cb41b054cf6dae35f851c1507b944a437c3d6ade393666ba0c8157e38c7d6f14d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5234d7cd10f84891d83971196b303bdb6
SHA1bfa479f63ce973a36a065059aeb7e12ff89e2831
SHA25658ccce46c11da3eca8e41283bd441277e0ce52245e3194db0ae8ac007b664c28
SHA5120dfbe3d4de8277ddface64173675b91811844151ac2c28b6e2c2368cd3de63e6a62491876e82f1f54744795c295a96978cd1476263532e49501d9d798700199f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5094ca60507671edc75bd16e1d82ab8e2
SHA1bdfe8b64cb095ec4c7772861ce84bd3930f2c2ee
SHA256a90054673c42999b95a33f58b77f0706aeffc283de36757d43c346779db7578e
SHA512d82d47282508e066f949f7992b968c0dbfdce1fffeffd87a79342f44f303665de9525d58a1f0977e8a3b1427888726ce7fd75d3308308afe761961e3b0e875d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c05eb119577954e5ded869ef6cf7ef2b
SHA132636d5fe7771e9559d0fedd0e69f1ada4685af9
SHA25667ef028f8e9ce314c860cc580028979127095bc3a7d359e8bfee518c03d7ff2a
SHA512bd37b23cdb61e2bf2191ecb5e5345799c82d6c8933752540a97b37da1e554493cfe11d8b9a55ed17daa09ee6c508ba7f681a24ff83944c3a3be143963b129cab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e3f7aa373a3072fb638e6ae8a4ca478
SHA18ab80db8657ab7e82893c573acaead596a8e1951
SHA256deb33915f060c0d82615de888554e94540625bfb68701127b2238f63897e37d5
SHA512b99db7becd5c4f386281cb43e4b14a29cacea50be92b223cae030ce1c0da1102be0130df58490d4863b8b98d2535b0398f38ace9151d097e2dba26d33709d012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510d57ab6ab736844b430eceb949b10fa
SHA11c39fc1b3c5a7d6b2f1b4247f226aa69443aec7a
SHA2561ade47b1f13adef447572dfd0d2893275edb0b93b2f449014ba9f14db99961b9
SHA5128be79e51056c9d392fc37cd3f4fa4b0bcd7df59860ea976f55e32d464d8d5d55e50ac2df6540403bef2e336db9d5de5b127de43e7400079f9339a51baa872762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da9b2ff17ee91e68f1a579dd1ae3ebfd
SHA1eb47a7a1e4171fe6c6469dd76c2b22c4b1c0f209
SHA256c7ffb523d273e09e8b4a39d1748350c7d821ca34f1c73d076aecb7f263583cfd
SHA5129b63fd6f50442e2967c73f50c1e469e69f981192767a0e1758352b4bf8c864195f604a762e3e3d7322aa64e335ce0bf29efa4819914597872a2491df95253548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5701ec463c5b7e6e0fcd4ab5c3586cd10
SHA19e8aca01ee722c3ecf2eb8d663d0ecdf2b77361e
SHA256ff4772854287d77c5eb88a476c7d17173a5a26ecd012925757ca54dab41e6b43
SHA5126a7f8cbb100b52e6251436857bfc934c7e0d0109fe99955763c6f6aa029625c91e627f9344c6ca5bc91ff5472f9051a0bd75d0dffd50d081e6023678fdd0ea22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc7d4ee8930b55134e32051a56efe44f
SHA197ab8bd72d782374814009c4eddd63ccedd9a86d
SHA2566c6e244460ee66f4c49fdb9077e87dadf07fc68ae73033e4d1716c990587d384
SHA51234b50665efe90213685011dad8589cac7be159055adb9aafb8290a94dd13007a6995e5643b232a47fc02b97dbc8e3bdc10d265707335877059465aabc1798cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac31c63830f13d91e88824bd162460a1
SHA166e380c078763ae8f5f0f9b91efef3dafc66ad1a
SHA2564159f68f9418f4793b227298eabb3e519ac9a5e5e14762a9e9fd9fef67d3c818
SHA512e2dfad8ca3a35fd15a3bc89ae172454f8dc8ca15a01a64d4c9528a4419891ba7322c6254f4abf9cf453992a6ae05b673ff6af2c1cc6e3ec99a19f956da2933ca
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b