Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 11:50
Static task
static1
Behavioral task
behavioral1
Sample
de44c426b693fedf6356e6e87d73299a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de44c426b693fedf6356e6e87d73299a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de44c426b693fedf6356e6e87d73299a_JaffaCakes118.html
-
Size
68KB
-
MD5
de44c426b693fedf6356e6e87d73299a
-
SHA1
f475166ad4040c668425f5723b8f05be62ee6389
-
SHA256
cb5c56b31385ad52e81cb0efc97597ab1d476f3ba7bf8f8fef37b5a1f22758ae
-
SHA512
286fc5a97d0c57e5fd1c5821d9c47f61b09c4dd905fdc250bda1f01752e80f61fb9cd69bfb75da7550796877af21163069fcd008f6046212a3c0afca5b42c6e5
-
SSDEEP
768:JiI5gcMiR3sI2PDDnX0g6yuA5Nm0tmb+oTy4qwCZkoTyMdtbBnfBgN8/lboi2hcc:JGIec08bvT/4en0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c00ff728d305db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432390082" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000097c4ec737f61d57adfcb7729eebc34dc01f8e15f6ddc1a849fe2175a7fd49970000000000e80000000020000200000005a4f96211cf9d1c3b9a5545979ebf39ea5f9d23f523e75efa733566204d92bb1200000007bb5ecaac351ab475c55bd7492df3862b8924f11069266894f8d9360f99b661440000000990c97e269aa01777c6ec8928ff828061fb47c1a962f91e3335af68344f8918eaf1f2330e5595be853d2b0715f58f700de40f9cf439907b1a73dfb768fb88403 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5448D001-71C6-11EF-82B6-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2736 iexplore.exe 2736 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2740 2736 iexplore.exe 30 PID 2736 wrote to memory of 2740 2736 iexplore.exe 30 PID 2736 wrote to memory of 2740 2736 iexplore.exe 30 PID 2736 wrote to memory of 2740 2736 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de44c426b693fedf6356e6e87d73299a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576c50ddc781056e5bb35d3780d752ef8
SHA191a48a360f32a74846c618a48f276118a0a213b5
SHA256689db1198a62dd42ef6159d73cdcd049a4708c91e23e64cfb079e3053c157c13
SHA512783759a07d211fd882e9993d5b6e3ad961a4245a73252123030e52dfd69b8a86699008ca334a3713acb934bb468c5309302238a9c2b5621ab07c61b06d8cf69f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5395f5043f6acf254b1a9318ea1734682
SHA11fa19dd8c22c662078516d9e6141855f4e978854
SHA256116cd304b4c2e6c96bb081eaf4ef915cf9951e79a5300368bd310320ec498af7
SHA5124a1894253b3103353be1e3b6aeeb5bfce7195a9d0787e388279b550934a24980b15213fade1e5628e3a3f8c79bb45519524c799d153a5291f48b087b0cae4817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7030d2854a6977ea1309e9b464ed965
SHA1f4aae89e5ec389bb922d4413b2dc62d22122b465
SHA256ddb425e4dbf412ce46d3a6274ee619b8965e5bee96417918116a1a9e90767387
SHA512131b83f49bb4f6bed838400d60e72bef366fb73ff752abca826f87bf4c4c3f05cf7f1bcfb2f8e7c805c476dfe92a79d5d05c8bb0e1a6c2e900ec6da2964a922d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b067e75c819c70d90d086ede72f54fb
SHA1cef2b698f904a178c36d80fc2a823aaa3781b4a9
SHA2563870c58c282045f530f0318d45ea23e915c38b49387d303f785c05b4c291973f
SHA5123c6897dc4abf3c52255601787691f7c841f03b412ad7b36df1bd3ef25370eff2e367965fd750eec7f085d0454424b1c678bd0cfc598ff43fb52365c907ec6e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd10225fa5bf4ee63e173aa3eb5c27a2
SHA17a5b52e33c84bff83b8a3a18ce1a6de7a72d018b
SHA256bd0f3960304e9df198b531ed114e484de6f79ab09bee4a185a7adce25a455bb6
SHA5121585a252a9ab43b1dcacd259fdb6ce6459ec883591927981057144f1ece110a7366e0812da7d160539fdd81b029862ef48089ccbce77c3cad72580982ed48a59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519653e2e24adc8ba593828d78b36ecbf
SHA1fdda04a3b5dcae0250641744549a6864d45081e9
SHA2564aebe9a2c2ddeb15bb971d687953ccd3c211918e610bb048db372c92a85b37b7
SHA5125932c602d550486cf5c06d3d99c8f2294edb0dcf071c24c1cb18e1dc9012f1f01346c79cf96e6e39e2811e2a7389a19a95165c2a63d3ba89ad1c02a0cfd58f81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fcd55a64a068bb4d17e8d3e04fe90de
SHA1132663865e8a7bbd2592d2e9cd5ccc31e942e771
SHA2564dd68c464f09812bf2ea0566ea3616f8d89e463746aa6b4757209d083a7554b0
SHA51261b97477a83a10a48342d70b61014774858044cb3164c944a9cddcf2555749e5b748924ef349d95f3ba4af1dd323b6e98907c8ef86bf506206867e471ea422fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579d9ca96927c3c44cac5fb109382c988
SHA116f98ae38eab976ba2715a7c7b5738f2cdfbe52f
SHA256c1be458df86948c8e41a57ca402255d8cc5d12332d8eb487086dd04b8dbd3a09
SHA512c94572f37389350a3d0029c05c74b0585a6b6fb52fd8781d839838b2befb7a41680ad88840087f518012fc3d6bf53a709ed1c60e24a60f296642b9dd6219cafb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d96cd38bedc7dcacdb76f53a5aa7cfc6
SHA122931f288f8b249bac74216975f17a6ee3b158c1
SHA256849f1bdad5302d94faf840bfd48ce8e5aca7aa59e0f3e5eab012333ff847f97b
SHA512067971fb3073f6087b53c8982936c49fa9f3d99f30a03a658ca2e567805803475a11646476d9052eb6881933dc85d05eadc73bfb4f5fd1a6f186a1023334746c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5052c650afcc0ca20a89fb3c4aab4edfc
SHA1aa4059450c82066359527b36148a9dbe0ff5110e
SHA2566c0dd710df79bab4862bf02cae0275c79dbc91f700e71900f71f461c8e2f5e3d
SHA512e1075801aea780aa69d73dee0344ee75fc8aa3653baed2c1abe55c4ccba494c1b29d411c289828d87d5d8efd208187b788f33ed7d94e50dbc457bf0f9fe87647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53676243f261eec96a1a5444c875595ac
SHA1124ab452e63fffce0d00d9f65fcfb8c7a9cf725e
SHA2564d4210f9923d8edf6d87a00b07a1e61d9714e03264db6a9d588dbfff62fa7e9d
SHA5125bba075631bdff0992b1ecbcdff6f90d3ddaa3933055fdc6c063f073d1033c764fa1edb3b03f08c4af5e4be554c93c3da4be3d03e649fcc01941094fcb3a2068
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c8708b26e286a4524e8a0c6b2aaf502
SHA15db6a72391f45ca7f836e12c0c5e530d10aa5db0
SHA25658b860671ad6fdcc313af9aead25b2bec89e500a6fb95c56cd8d0a101a099c99
SHA512fc52afe628eecb3fa6883ebb1f0674d182fa8a7af4f9607c7c9ccf6059fd43440fbec073511f616d6eb600d4515b2dfc1f268ee3619314f82486014db125c260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a175840d3825246292a110c9d23dae89
SHA116912014f412bd5220288f474cae436e96191e3b
SHA2567a3a73d6778291009eb6267fa219b499582f07179223c4c02ec5058579d71367
SHA5124d2da8bbfbf5f1c78cf857f10803581d06e195abbedbd7c7add7a90cab2ba5b39e520237da0dd0d489ce048573f688fc4b6d293b44d2c083f5086c248959db15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599b49129da2cff179392c53c131dfef9
SHA16d5d5ff327911597c89e74679f85b4954d1cc1c5
SHA256339c877da5abb55ed0befb791ac6ff27329656fc383d08b21bbea2f4d3727e9f
SHA5123157fd04498330585630b01359b9af6c78687c42d3ff53f5b5f0d86d4a69f9ade092e6f681e90029da8a5273b3029bb3b0e002e452c98e7035406afeeca2fd08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa7cf0f128c160ec9e3f164b0d354b69
SHA1bf6c0be5b1a6c954883d1d69951cf0cb250b6b9e
SHA256cedeb7e3e8b1a60ca30e0a2b926407c75d9ca9171c96db4b78f37b3609f01c49
SHA5123923abe54a9a9a3909066a0a9df191e80bcb92c9e1c960edb0764858674afdc2e45eafd2ee9a463d12144312e7a5281dc47c322fab6761ed55ad11ff77483e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f70b226738d93072a8b645d0bb5a4bc1
SHA18a7e579b2e33f7aeeea0c7414e198a87d71f3a26
SHA25681663f44028f631879bd6a112a79c75c42b65ad6fbfc8839bc824ac92981a993
SHA5123bc80a12a8ae5a01d2656fc30e94dc1b837049dc2457546499a8845d1ed0e20869a19a6aabeb801e5509218c1955ddbb58dca9edfb83aa84371adb134e94db16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b238a547edcc4f595f7bd934feb9f4e
SHA15f6c152058ef0709192ffa72d73344baafc78847
SHA256cf1f553fe9a0dbf57f67ee6191eb4f6147f59835975774fbbb3bdc9062a211d4
SHA512451e69c47cf6d0fc3029ef3b6bc6014dcbcac1c19186e174356ebe2fb01807f83f4e803fe14f6adcb1db9748dde4043447a84c02eb580e437d6860dcba2e27a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2101ef62940c84cdb328d2bc1eecf16
SHA146e8d9e2132343472f3a336410f8623796e9fabd
SHA256e59806ad7e4d54c0ec5ef364e5da6bb7e78a4b93b8901f88e046b589b89023d4
SHA512b27ce374952211b2bb298ea4f0469a374e46f70ee850896495454eb8a87a570fa46f9dda19ac5b1f72a52c290efe664513123da58606b3488276b777a02d2b2f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b