Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
de165a9203e4d3a4100abf0ad88e10ed_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de165a9203e4d3a4100abf0ad88e10ed_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
de165a9203e4d3a4100abf0ad88e10ed_JaffaCakes118.html
-
Size
21KB
-
MD5
de165a9203e4d3a4100abf0ad88e10ed
-
SHA1
bb6fca3404b06b66f52b51ca6eafd6a8a5cd97d9
-
SHA256
a53813c8c7ee68034d26685ea92402a09eee10a95e1bf413523ddbeddacc5cd8
-
SHA512
e140c3ffb273a0cced339db2913a1a31d9ad8945dec3ce82bd7daa9f3a0f66e43071d31c32401047e191a36d9dcbd4184bfce3ab0568e2722394ae511d607786
-
SSDEEP
192:+69I1TCez3k0IBog5u1mjw9/GzIzTvhrM5/uEPdhserZUL/X/GW0n:+3Cm3tIBtu1myJ35MPUIZwbc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000b5e14b60d70af794474b5ad573f074522a679b7e8701a19af48c78e21ea5446a000000000e80000000020000200000004d51d06d0e2d997866c01e907a7c875529d911f22e7caccaf98365b9e38f258a200000008758e993847aaf7872630ec0f484031717ab5635f9980d94d5911ad51fe427db40000000165d561de3a4085521b5b01e81a5e4b95f5bb60cbd432e51ac4866fa31ab7347588bd6cd35d4ff796bc41b45c766b33d9dcfa2a4e4a8bb0b9d029b849afd99eb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10420bdeb905db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{07A3C161-71AD-11EF-9204-FE6EB537C9A6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432379211" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2340 iexplore.exe 2340 iexplore.exe 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 1800 2340 iexplore.exe 31 PID 2340 wrote to memory of 1800 2340 iexplore.exe 31 PID 2340 wrote to memory of 1800 2340 iexplore.exe 31 PID 2340 wrote to memory of 1800 2340 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de165a9203e4d3a4100abf0ad88e10ed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecde7d88524dc2a0439bfa6cb8e0a694
SHA1dc14c82ec78aeb043f5dd7dab8f39131c5c7a937
SHA256725d64b83f083e7068ce52af43a7c1825a4b5e88f6341f15ab199285cc13af7a
SHA51210a9ef829003ea3285a8d514f79ed45c719f3fe9f2dfedd97adf22985f62e8a5d90d152b0f3331a9c62152bc2b1d9d753156d9617dd94549c95d750d28995f22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b4f30a5150f2cf5815be3312645a0fa
SHA15fc4bbbc1e6c8fc04645ebcb5ac60c3a85b6e9a7
SHA2566924b51bc62903cc9fb01433ea45e5d9435ac65cf3aad9840d30c3c6223f5651
SHA51201b70bc4501749b7922f474b30d47d1bcaa0d96ae12697bb9502728fa7f1e4e878538cc057d039925bfa259b6ce89ec5bbcacec98f214c153da10b386e4fffd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5568a34d78807c1b40b1c6fb0f3363c
SHA12b6392b53b67e6a1c58823ef7e616b7279adc67d
SHA25627b7be85c7e50066b1c45b6af1040dddc47bdb7f9d3e9d47938410acb32556de
SHA5121421b9a79f93d9f6f57f6734dd3b6dc4f0d133a611e2d1c9189c9d95b8574b4ad8d109048bfa4cd47c66bb961cde5e31f1a92a9dcf35284b61d73d5f54250f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab46fe0b8293cc0c8a435f3b6dd3ba31
SHA176bdeb4d1990fd8cbfd5cdf0088942fd82f53f52
SHA256dd35d710ff2e83e5ed9ab07595745edff786551381da5b364119098e90e44c8c
SHA51234fce9b9a46a3f37400b064741c19475c81befb74e48529ee7254901fa71c0eee3570caf6d84a864d5cae1cc4626d5facc61cdc136d7ea57185b587edff0453b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5918eb0a82f80687b0942640886b7843e
SHA1e8d22a701635b9c180b43f4dcfcac0fb69ce1f65
SHA256a09285da260ee45d12bd627118c88ef14094b777fa1b73d412712f1491def20b
SHA512e41d185b22ce2eac475b2c4dcbd80d36a0c1ed0b45343c60942042e9a04ceb07be1c3ef50d7b7cf4fc503ffbbd5e18fe375db52447da5a70c238feed37d45bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be7d5b329c03aa3e5223f6ad2c1345c3
SHA1cae57902fb233e9c5ce0c8088bde6823eb6e05dd
SHA2563c0087b0ec635d08e79a02563cf54564fa5231e74f76b874de163e3405461a1f
SHA512b6d2dab8afa8fe9215eebc59335f9bb535911994d991211100c5cee8190dfb97d81af24a9bcf3667f8e4b54a30ac94f459284af0fbcd4545062bc3146723ac7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b91cce87525ee38b5bc4c34260ab13da
SHA1e3fd7ceda2f7d5718764c9de1302d94aebc82d94
SHA256f2f4d097eb689bd1a4fb664b9ea3158c6f0048034690fe66349469166323f41b
SHA5129fc80330d62356379a071c06bce98dccae7f69cbd94ea788086c5d7a2095abd356aa38bbfc52308b04cba5b73e7c19931e3fcc7710588793bf5908579edc8212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a87c4079521fb2386076d9e7b048f37
SHA19f4787fb8e4698d27f44e9ea8fb223fc1845911f
SHA256c2945170961e8d6c8580bbdb983dee8f785f52f8dc181eb66e82036181c1a178
SHA512da11db63c54b3625ff31b82263c83e3cd1c9cf31258d9548707cdbaf3e8f8428786e8fe7b0c0baf24f9d9a35e12fb7408759e1478080cf8abd397364838034a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a37bc50eaad2ec5721a6135bad4dde6
SHA16e42df58b7ce3b498bf91a82ac0f001e125fb84b
SHA256978cc044edd1c49bc1f6d7dd37261773913299a17e96c13a213e269313dc66a8
SHA512d484bbe6d602e12d23dbd34a4ce67d00ab1f5ebc5e0cfa804a3da2e75e9f173174e68b8adee311792996b7ae496fdd42712df0e8bd328eccef1323811c8a2a15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac7fe33d600fb66c5b0efe055b0144a0
SHA1c3aab8f6584a65b3e3f76c4706840988d94f8f75
SHA256e446e6115fe33e9709723cbd3326dae04f2d70642ff08563949e64600a778f8e
SHA512bf127256d3564b00e207928619d8eaea9039d36ff86933ccac8fdd131dd39f6a0075e073a8ef449426c12bf3ef5e79b53e586917f4cd1cad543cb1d3be4a1076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea4c5e1586956c1e9b742eedb57e194b
SHA115d431c50cdf8c69b82e1d1fc0522a99816f2f65
SHA2569dc2bbec0f1d1adc6e6cc7076daa83aa6315c5eca7a3c08d9109663a1cfb1ad7
SHA5129bc446356e1c3334394979ef9bf04794e12f634b17bcb1a93ce40580098a3c5fa8651969d7c72c38ff6c6f8eefee257954836bcb442b321c0a3cb689f6255261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506560744a015660073fd53560be4bfeb
SHA1a1bb90d57a1897e8bae447e5491a7c9447ce4f4e
SHA2568be021c63798b207243fb6d350f545bb7df7927d26ca9b689a2fa80921465908
SHA5125da495b78a06e2c7cb3d662b5e059d9c7dd8f640813f400f26b9c48fca6422e58544a93f938b336ac8259c901df50ebfb3bd1363418890442f418691563ee87b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d94f76364dbd35146561f1ff6839abf
SHA1d2590a4f18d7586592c30b3b4cb634f922fa7e74
SHA25695d5ea15b71eee532b07589126eb00c4e89f883d0e0689c66b2c8314778dc325
SHA512717c97e212d6d80981a9ebc890982c66b11ea5ad3341554ec5c88670709526b0a312969b0ec69248848375c845dd01f2cb5e14d1ce3556fe3b0e1cdd85606460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d2245ee30d35e905cc16ddfd93cbd76
SHA10d27eb40df984317976a40cced1201acf28cfe1a
SHA256be2e861d0047228cff87c97eb984e5771507c76af3914f46e19be4ff03f33440
SHA51209c64e128f1700dcfca1a1fbe4a860800c8367c850c41ead7646e3df8b73b91196567626c1e33bb2064685e745264f9136f4d35342268cd64aa7856c981ccb7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f990b998bc74c902b681e4e708230d9
SHA1b301a2b70f4c9107d22450143cafedb74876de89
SHA2562cb59c2d219bc0cd658c06514952f950ac27fe4c56d1fae4c42cc2e335e21f05
SHA5120f4a65b4dd69f219ab209b9ed3435b3f0afa42614e5c47b457001510dc54413723d437085154fb12a79974f193ad1d73f86b4f8f91b11dbc58185dfaca481774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5289ba6e70ff3e8f53b94d571d4fb7de8
SHA1dba5e04b1b86e90c8850826e8b56d2486603a515
SHA2569076233b27ca9bdfb81383f01cac27cd1da0067670b1f82cb500e3976470ede6
SHA5120d22008ea16308953ae73546a3f92ca05eed65f92255df4f56c8af2e2edfe76cacece061251a3b02f1736644569732f288d1f12db8faee7d3c56840b01ae424f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1cbc89cb34006c45680d4da8bd86f05
SHA157af45a1142dc500c82cf032673e89115dc88a9b
SHA256145fdfac480a0d6352b525d70979a7939d1cca49ec38b9a9f92cc190cfc33789
SHA512a2bb0af97b740c4c55e82c78dc601e7b4bdb0410f38d7dff0a5f4fa78c22d76d90c2a8f5574ed86758c69590df4e36fc7e3d23e345eb3585adc168092a5a41f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5724c8757ca825c8e60ef8d342b1b3c5a
SHA17eb82bf7070ad1143e52630c49e84982f3f5de6b
SHA256edc1fa91ccf214ca7329e4e0255cce86a170ec77cfb3ee82db315f1145e1e8cc
SHA51259b7b53f494557f5d327687569df9b27f48c4184ead39ea98bbbe9a751a95d327f4accd0a9be136bed285daa83e330fa3c2cf8352784e7628c4596ab08743cc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fefe2c69a021ba4d61f6c1ff8afe20c9
SHA17a197890fc89408b9adc142a37a7211b56063a48
SHA2560fb2d309b4857e615253df40a1bfc3600128ad8ed92e79835670e296f31c7235
SHA512494ed275438cd2d763d6bf2e22e2ed065ce339711d85721f6883f63317f953b8fc1a859913a2e1e031dc9c1c2a968618b62c7e712694c672b8f27af384817952
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b