Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 10:48
Static task
static1
Behavioral task
behavioral1
Sample
de38ee99c25403c737040e08eee45e9f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de38ee99c25403c737040e08eee45e9f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de38ee99c25403c737040e08eee45e9f_JaffaCakes118.html
-
Size
2KB
-
MD5
de38ee99c25403c737040e08eee45e9f
-
SHA1
bad97c2e51f68f38214472c88d3eff76efa499a8
-
SHA256
e5fc48978b59c3674f6cf2df360e3cf037637e021e74a8ee35bd10d472a0c729
-
SHA512
caa5ef819983924361b22af4cd63cd20847161c3109231106943f70ee054b1810d2fe4e3f6eacc489fe409ac32cedd9bd984c3bc17098a982b275d77d63246e1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e06a6188ca05db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000670b58921535aca5f818148e033d26841bc92b738ee281576cc3806358bef6a3000000000e8000000002000020000000b4ea69851aa84015122b724eb5e91e6f8d6ff72f62b0749d9dba2da9057ad87e200000000179054cce0f36faa5e295f0ec644de35c90bf745ac75412cdc9ec12b5196294400000009ff440bf6a8f315025a1ad8095b8211886bdb62cad57deb842b5fbdf05dc8d519571a7c86d75cf13b2c663ea6d009dfb031268115827bd93389317d8a4411c3a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432386369" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B18379E1-71BD-11EF-8EB4-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1840 iexplore.exe 1840 iexplore.exe 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1840 wrote to memory of 2116 1840 iexplore.exe 30 PID 1840 wrote to memory of 2116 1840 iexplore.exe 30 PID 1840 wrote to memory of 2116 1840 iexplore.exe 30 PID 1840 wrote to memory of 2116 1840 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de38ee99c25403c737040e08eee45e9f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1840 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c122521691311ad5564ef25542c44a3e
SHA1d93eb4f2772bde4f158e5c4f6379709aad913681
SHA2565a2bf758b6436e78c4e1b9fd1640cadb82c656c6542d02c331ab8b2b96df51ea
SHA5129252ec03b1c09808215c6048b1e3f30a8575eaac8056d42d0c9097d9c5785077d8f5a794a098603035ba1d3ff291de9c495d062468713345f0af725310ae36cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5de7d7b0dfe5aba1d251b6d5083d0c4
SHA10c3dd3c796002dbbe96b05e93aab23e7f0dffec4
SHA256546f02ec23589f437a8ab5ee62e5b0ea1f4894278b990b164f13da6dac855c74
SHA51224548232c029d0aa4f2de143868c8dab3e7c83e007f3e4e58d3d0bfb9f19e4637978af1078eef0c99da4ae24a557da9a32e2f8acf7b6a1c7d2715207b6fb5513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a74ebf6a5970a441787a76aa5bb0e97
SHA123483313b958da6885381ed8a21f7597de99378d
SHA256105c223fff24d188d39cf331e7ed7fc197a4474d471d8dce1bcc4c16b2428637
SHA512671086c417af50481ee50e80edd61896adcec3052c261b99494b2b3c41dbc5ff59354ad24629321f0d50fea99d151bbff51a2a0d969f78d1cb10e094e0cb3dba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5425ce3bdfd06ecf5c735c1cd53c30084
SHA182c03d343e775ca69fc8edeb140e710f8e59a455
SHA256d446e6b5508caa71c1de745326a058232ef19191070dc5bc6fbe2b4f2b3fb8a8
SHA512136d583050c6ef93efd2a2cc0b4c85b5f24361f26c5f4d95afc26cc32d01d3de1970d6b8375170bb207895a074d907fdeb7a62b889688abb5b7a88ad7025e054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fd2362f1f23cdec8faa446db6c66c76
SHA1357f074dd799258271b78dd5668e5a3bbf183624
SHA256be853879d878281722cfd1f8c6b90a3ab6cb0f763a9691f17cde64e789a36cfc
SHA512d439ae5cfcb092c3ffe0d294c7c95af6b42481e9ca8d204104f8fa8b6180a49ee82e788ae1f6ff22af7ecc9c8b095904932c4e9ee7e1a90253ffc252bd356cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f3b9747866de38b90134dd968a85cf1
SHA1244bd1ed36687b0d9805bcfbe88c2ea469b7ac6e
SHA2565ce9dc537242e38eafa048ff0c194d86bbdfc6a484dd5e09faff644ce57d9134
SHA5129d7adfa0a07e7dbd3347e9dd677d26b5d2a1e0b488bbb4a598d8980fb3b8d5584890ed2f2edb8ba0acbf4edcaeced9b20090727cc175b9789fa9ef4c513b3fb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5621256944e46f22106f49ca63b6c9b26
SHA1954c2658e33739ba1b1ebd967d6edcb37490dbdd
SHA256e2c5fdb8130edf407616382e39a09c37ad2797e17aeba644135a962e1a10ca27
SHA5124f99222afadfc209851b14a8ead9225e65876a720bfd0de1909dbcf00e92993095dc1d6dd6a1e400891cd5f90e3e9a249f5ec9c866a675981c9129d4757e5c4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9fafe43fac5234d6d1b06ac99f7f6ef
SHA1eeec2a303cd8861f78b4661c43383f8ecd1630e9
SHA256298c8d8b7c956a43084a41989137fb0d0c677599e561805edec3b64aaf10a919
SHA512e6e8674e19a1d448326efecbff52b0a5400ed92f889a7c40d76e931f64f6d3d84b8bbf76a33d13d4803bb839d3176c2a91a1dec7e5e6930bd8841f0672e04fd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d44f4bc2f0adbe462d1d0c53e6e3c1b
SHA12d57b1e32a6492993248be5c93e0f997c950438b
SHA256f13acff222ce0d3c8ad7c354db1cf4ee2bb1ab26d39480de38fe0e345cc192d3
SHA512280f6850b72b3f7803ebefe4fa2121ffe8ecfecaed6b379eb428b6d18721d520c2f1842955787179347ba28dd79936539d241c6480209c53144d32aee753085f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509474c17135c6ba747a97ba43a0e1197
SHA14cd2fd8c42b7fe1bfae73e2023714b0237de3245
SHA25695a6184aa07e25ff4f8d5ce88e819b2e47a5c07b32cc20fa68aaa38a84fccd4c
SHA512db41da69c83f765091cd815475e8a2279e85a9b9a3e4a79737fea2a20539666367a4d8d5104da86e1043e15a7f5c567007450d077dd4f9a206ae45ecf796cdce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cb405a201f184b6f5003c5fc30238f8
SHA17b04db0f220e037816b147ad97ede5aed6fa293e
SHA256c166e8f9a6af5d3022aa92912872b97f220392f6317e86f679a72b0681c15cd7
SHA5127b44842cb2d1a98adfebda786013cd8ea3832b7b8761ebedecd2f93e4ab7dee34375af6d1499a748d90a2370aa7bb039d01edd12b44428c6dc68f0f209b76716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c419dfea117799987e6677de3b2ff656
SHA15ba5ac932ee3a00ff911e580eed2a243c85249e2
SHA2569812e6e194e91bfb9c2bdbf43363b8bf88910895b98d5d680c47f0e5c627845f
SHA512c32c776486bed65434a3645e706da5c82cb12c7749b38fdd795882346875abf2d3ba9388810097e62201e7a74197cf1c0548daf8d5ca18d6b6e2d2060e5ee8eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac60e4b21d3c24b4eaa0971c79dfdc2e
SHA104e71cc11763bed4ded35a09e238435fe5e91a2d
SHA25655d71da1702004aefa7de9df3a8d10a50b7732540380ba23fe0bb4c1680c1c47
SHA51235242da7ec3c9c58a3abac23fb7d03c1c7ccfdcb9c47f119fff5cca1e5828c6bbf9545e81ea9eb7f59fbaee4aa2a8f6ba455c5ed0f8a77add1c4b4002a8dc703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54352af9311b3010a2bc5e58827c8d58a
SHA1e377f1a205c05e93ac40879c447e633e25244b32
SHA25618bad03e1fac1226b59fb43a4e580a036330a538a82c7014dbf58b08187f1218
SHA51261e80f6f62e6992002b9c887bddb25ff7af8cbe5d0f753ec9f6d6bc6e411a847fbc2226e4b09472c8ed1c1f0bc7b7a2fe7d30c05696c2a39181bb13c1dc3c4ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e207a10d5f53ffc0a62b460e6b95b113
SHA1bac09e9a80d13882ac15817dc2d9e0b2a55919c9
SHA256d9a50ecf090556084f6c6bbdd15f472b741bb9ba0a882a3f58b9a3c309d907bb
SHA51223d0e76115aca2f679bbd7a41c494373b6ae169ed2ea3fd3d8f133b51c5691cdcd24573277886da79ca3d6fc1cc5598abc06498237b3299fa2899282cdfce798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f883f1062442e650b435d4349d089115
SHA146e0fba50105a56fe805cc02316ab1bc98c508d6
SHA256a122a65efc5e11d968b4a40c16a24033c57b051eefaed5f223a598506742420c
SHA5123750a75daa5f09da4f770bc67308cfee56cf703b6591542698385ae12ddebcf85e257af1d6fdd20528f66ba9f60bc9f0fb33111095c41635a9c38b4b3f01200f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53544bc0ca6b09ebe0533285f80fab1fa
SHA13a74827e9d6fe6966a9d890fbd27a40717bfce6b
SHA2568a7f15b6a81460a34b8db5da45270d1a53d0c8eef6dbd1ae65bc16045968078b
SHA512aa28d85343545b4565602ee343113fc7541a682e1ade44fe2fbb3772a446271ec22fd54d7d07fd19a3eb8917339f29d3617f3630022cf837f5093dea1e2060ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b53118fd01b4730f8e934b57e260882
SHA17a1b20a764aabda3dece7971c8c70bd259c8201d
SHA2566407f01dbab4c0975fe7cbd4c0bb4da57353b58dcd45f87ad7010951a35b6b4b
SHA5128328ade033046634e715669fb0862e76ec5d1f1cdb99823176bc127d1c311a7e65050ad12ed483ab55c4bba62e15951ae3aadaffb3ec5ff56103eb0ba1b4be5a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b