Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
ddfb4c51e9d26c18baae77c9bdc074f5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ddfb4c51e9d26c18baae77c9bdc074f5_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ddfb4c51e9d26c18baae77c9bdc074f5_JaffaCakes118.html
-
Size
41KB
-
MD5
ddfb4c51e9d26c18baae77c9bdc074f5
-
SHA1
8454a6e8ac7f0d92b6c799ce12de8e7b02c84c3c
-
SHA256
2f07d95730838c5d5e46a4cebac7283d446d15284b598d55762f198f1380e7a2
-
SHA512
306074c61d0dc37615e2ae2f82879eb9f3790d4fb08abf72a9fb09122e13cf631ae218744c6f7e4043d8353997fddbe63d284918165c5e3227360f2413a2e083
-
SSDEEP
768:290qJGRcC3jINa5CuUnnRp0CthhN7EoJ4uz4JqWEFz+tsAY5IC1Xyd5jOcrS5300:2ZGRcC3jIc5vUnnk0UwMcObR1E3jEjFW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432375356" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000000289111c98725dbb8d5a3cb6ccd384f81499f17fa204d174a7dad1f782ff1c2f000000000e800000000200002000000033681b5bee71f1e4e7862271f1d819c8a6592323cbad50e238f387e5f8167af62000000017b21d32d0834c0c15e4d5cec05c29f8155fe351c7723ae9858123d750536aa2400000001092d0223a31d33c400a209474bf82b5e63ebf4134e9fd7aee62e1fb852a4eb5a01df6073c3cb78a5326e80ad84f5521b9c453b3b6c4179c8be7d46b3af2ab46 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0D45B4B1-71A4-11EF-8CC8-424588269AE0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0af2701b105db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3052 iexplore.exe 3052 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2836 3052 iexplore.exe 30 PID 3052 wrote to memory of 2836 3052 iexplore.exe 30 PID 3052 wrote to memory of 2836 3052 iexplore.exe 30 PID 3052 wrote to memory of 2836 3052 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ddfb4c51e9d26c18baae77c9bdc074f5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cd63cd68e64254e9ffc3ba7262186f2
SHA1175c76ad749bff7f6ab5223ae515f45a64b11db4
SHA256f9a5f59b4834062dec96cb0fc67fd0b0e07b4148bbb45626906803fd5b5e73a9
SHA512b861a1634d59146f1b7960d091984ac2aefdc243e693e9904c523ed4cadedb283f34ef72190390a2f26fc5b2abc222335487706d711a02be00f5fbb39107b3b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571c8739a828d1179fcd88767e373e5a4
SHA1780676cb3c3bc97312bc1eda82ae105c7c6b417f
SHA256934d20555c55ae72d014917ebd8e9f50dae89c9a5fe93f7b342d95af9dd8ca9b
SHA51260f1c8848927429a62c402f4c4ab26f7f3a99e4218853262809408516521a13f18495fdd8e4baba4e475d03e0ae7db8ae84c3f47d5ec6363c9cf05c3e7deb61b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8ee2222124bae88a6721fd4d2b5463d
SHA18bed1b14e6a1d800c6886db261144bbf08f45dfa
SHA25640c6526bb8fade064eff044d5937f9688625f726ecc6d6f6070779f312732228
SHA5125f43928e41982864ebb933eb0d542163dea82d9de85909d15f1666daa7186229102d707ea0ae4712f8e616dee32011a6ddf68d18eb7d6d2fe1b650dfa239da65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5992eb7f9e3e4e49882670c562e2cc2ee
SHA1e49d5238edb5594075189f11c64fdfc805a5df03
SHA25696ba0e0caeed64d9ccc4353ad926fafe164568d43b5cef6dd2ca273d1f48e4e2
SHA512e4a764f659ca0b01be32879107815e83920bdea0a6f1ce21b90ab5595ff69ee1a558300d720bf00c8577a6a11062886519bc4bb592933c298bded6335bd65163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d66baa4b5479f83d64a88d09d5fb9aa8
SHA1665ded0cf447ffab6b22cc817a295d953068e24d
SHA25604d284a27c934a21ac5350b21632d56b124c26ea7cd032547272b72e2112173c
SHA51291b10e878a453b327077ae643aaf2d7692a87357fa685f7a75400adca9ffbb12247ddd7b1826362f812ab5a4c1703b22229cc19c470f2472152e1c8b7a4cb70c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594e863bc8d60166edce9df0b336161a3
SHA16809435642f00d7d2d2ce79ea1d69d67401bccc4
SHA25670fc4e7be79fcde86a765f74665984ba5150e3f7684ae682d616a800fae7597c
SHA5120bffff2845bde583051bf1f51317310066af560679946e8e46d5e9fe5e1813ab2560521b0ce9f47b252ef8b81ce64ef4dbaedd1d04aa7fc5c811028b287cb267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba8d0067d822a0403a1d84ee8f548c60
SHA1930761e388584af56ad2dd9a24ba93f6e5ec1dd6
SHA2566622fe9152124853672df5e91db0020003b0f9e8deb1da7dd664995d3048d1ab
SHA5128020a9884a948a5451126e510833649e58d222533c684887a37e7a6f802f1f15e98009f25a004d8c118c2e06d0e8399bde35ca3cc5f8cfac90179d5608ad9f23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da698cc712928c33b1c8761a0d2dbd84
SHA19ddd19bc97dbd11012e733601b845540a5041f0d
SHA256d45c0c3823f943d3347d0204c83119aae64fb0b99cf037ebd47fb4d7c017ca69
SHA5127cdffc06c5afc6c36ee357f7bcad26a9c67d6e7beb0f246ad1b5be3964cc1e96447fd1d5b631eb0976942b5829cd8588b4a39cc4d5b45e6facf11555ca797ad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5d0adef1785d7626eb0ab48ae0d1d63
SHA1e88791c37587b18caa873d969521e85c6df5af7c
SHA256f3dfdf4269a84b36d0a32d156cc06788c25fabfee999ba32682213bbdd5f1965
SHA512de5ac34a8314ccda99b130848accadb4a5a7e83cf2594416801718ef11b9532867937b62d1affede8fdd2498871cd96579e85479f8c20bb2b0077c06294af0be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d646dfbb019eb169d4d7e9b1b0cc5ac
SHA17d42dd09a46f946b04418cbf7f8da6f743742c3b
SHA256d1043ae40bb71c1c48c6f6ca581de0400c7a51c6e81aa34fb9190d026f848e28
SHA512645ebca5d6d45dc732daab13f33f4599ebee43424acceca9a5fc16e310cb6e24c04c05fc9274b4f95119207ca6489b275e61d4a48b77144ae9e4c4be4aa04add
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580dd55f3ec6156fc50fab0a5d1da77a7
SHA1b6a794f8f47f73ce7aaf7d4886a0deb0c6f9872c
SHA256342a0126d7235b32ef5ed39c66b9fe79b352cabe133cdaea88aef63c93ea93c9
SHA512e46b76ea8ba231d2ad66936e8bcb21b5b37b35b34d54791034150708110b2f3edd128d26dbdfd143f4745ed369a4bede50e2e9423b80d6bd509fa0934f3f0c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5677f17cf415dbad2d8f1e7010d4d1c2b
SHA1a4dd44ab07d6017f54c4b685681e4296adce2d55
SHA256d72cfc28f7f8989f369e679ecc6eb9617097582490ac9642b05e93167abd2d2d
SHA512a4962f24793dbbde45419586f19bafc9bcecfd288699ee97e758b2f883148db378199be50f52c832af3c08ec512204668f5ca957c58a425e4a9cd9adf281a2d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb80a65f5d47dffe7563bfb18287d8eb
SHA1adbc179f3856d610fc9c84a2a0f95f9de8558fd9
SHA256b3063fa98212e06d63305babcf719fe4efd2d3afb03b78a7880ba7f38e1f0e1e
SHA512811252ae5d2c897ea29269128ba42cfeab64b305e052e303d9481fa1d2efa46bf2ecd1da465f214ef95adc5c376d297af076d37811c999995fa000064ab7b3e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee0fc8d32757cdd413316d148b4a0fab
SHA11b7e7a1c87e8fe74bfacf5277b25cb976c4035f2
SHA256359eab325378f8957d152cda7a01cc1f7cf3f51d498fbddef1b97e1effa04f6c
SHA512d7128a06558138eeada90956834f3502a6dda5d7f1cd6c423a5f32aea187cdd02207b1e1e11e38fb5d60e4245e4d90b4bcbf5fc39b7b4b50b51ec5fd223fa46e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb7337dbcfae979078ec2b8eabf1502e
SHA1fb7f3d28366457df406fd58efa0236dd2ae9d922
SHA256933d1738c7c04dc34da2d94e0c9699368c3ce069357ff5bf189a840c4f481f98
SHA512a19dbf1d060fb69934b9a514ff75c51ddeb9e0e1ec7a01d4704f4135d7b8c1f550e8eb254dbe24483d81e8442d5e5cd1182597dd3f1b0b896a6ebb2e82b66c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f71a2a300b43d71e71ee8448bc185d09
SHA1f582cc0c2921f70fe09591349eff791d5391fbdd
SHA256d4c07414a1a000f12ad8816b8ad48044be3fcbe9b5925d32ab65893fe2aa04d0
SHA512571175fab40e423f3184abbc12c296e7ff24c8ca0578fbe4b15cdf85bb008db7e8b9a60d60956a47e3b48a6b07b5a00b4f6a57df1e5250e556bcee02d5b8ec91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5869e85cec7809df52326f3234c9030f3
SHA1ec5205d4214b883db51e0f7cab2f99cfdf6fb357
SHA25616ed891bdb2db7b73dd4489e5f42023aafb025b71ce798edecba4bfcb3a9061b
SHA51255c7d13c321c338b6a037868fac48cdb9df7c7f00314e7d73cbbf862212ab4a133a1a6b01a99dc51f5eeeccb7c2f9ff613bb7e2e2aa9459544713af7c2ae8392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a37649e6450570251eb4ca5ceb2fda0d
SHA104a27e129b4b758a5d72c09a24acc90866dd17d9
SHA25696564d512a60a1c16f48b93ee7dac09d0637267e872abdd9c1bd05a8e12e592f
SHA5126f1593f65dc6184eb5ece542294f3d4730c048f9136bb6b28b923b1b6e83a6279b18c92c13f43d49315d073cf02eaf229f1e9f9b4beeebd6958b5f5e2038dac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58498dc94f1698bb83652d7a183d7334d
SHA13b076a4492c4a60355da297482dfd83809419b4f
SHA2560e880f639b517a60f42cc8136ba34d7c6d9d0938498da9060cdf2f3020e9fd97
SHA512c4be747b86a9f47dd8c333cec1cb9f1679a19562ef648cb8cd3ea7e4323c143a076d4fa38bc26c1183a4c14abcbacbf594ad692bc0b12ec3482c9cd074bf3e21
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b