Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 12:11
Static task
static1
Behavioral task
behavioral1
Sample
de494324f5fa3056a0c6b7ed7aba6a65_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de494324f5fa3056a0c6b7ed7aba6a65_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de494324f5fa3056a0c6b7ed7aba6a65_JaffaCakes118.html
-
Size
2KB
-
MD5
de494324f5fa3056a0c6b7ed7aba6a65
-
SHA1
d9b5a15b4f945b73240908f36a58cf7fd1b7441c
-
SHA256
3c0cf170a60c8f757d11a29ca820962327aa303de36ca27485b2ac919e27fea7
-
SHA512
d632d5501a6fa0c505b2dd1615215da9977c4baacd9ebe41288994510e846a5497b6eadedb4d36c5f0d8b7f5ec3372a8fe699a966b1fec2fe2b5c0226f0f7499
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a03d9b14d605db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000022cf81e2d3f36e66341e1dd97eb48b9dacacc0a49bcdd7cfa393f8add617c7a7000000000e8000000002000020000000dd305543c47df2e3be9ed2ebf6d2a0daf8dbf73749c1deb9440ad7f24d5d306220000000e523cae747282ecb8198b7872818e9fb93666d5139ea451f6f05113532fd989140000000ba058210530a6661bdb45c62faf4f7a67a2607134e7703d80dccde6c64ad3e335377dfedc1151db0dd42c0c53c1771a85392659ef1a272079074269cde9a0a08 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3E785771-71C9-11EF-8002-C6DA928D33CD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432391330" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2288 1924 iexplore.exe 30 PID 1924 wrote to memory of 2288 1924 iexplore.exe 30 PID 1924 wrote to memory of 2288 1924 iexplore.exe 30 PID 1924 wrote to memory of 2288 1924 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de494324f5fa3056a0c6b7ed7aba6a65_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ed95ad1cec8820705c8bc576549e550
SHA13fe6c2b67712debfa2909c0b02ccc995699c0c5b
SHA2561e4ba40cc07f5cead6bb186e369864fd11ee92b1e39632505e163a797a102b70
SHA51271ee919c8dbf79814400a5c165526c4b6e49c1e042d53bfac92fc22819303a8a1e5e3782b4e0d79fed01766f41188247ac2ccd71a46df9374f494b1054fd1bea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5065f78aba06df4e25eaf7231fa3be201
SHA1f1b13118d884d9cb9cdf64947ced01759d5ac55a
SHA256506b5beae3457c26de23202b6a24a5f156e83691688ec6795b6d4007d33f21b5
SHA512717358d499b9bd0d74ef5b035133e6cbc41792185738e18f125e9e670689d263b7206fa29f1ad6650c91ee036d7ec3ae3ac39dbf3f05c9067b9122d2e329769c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4c2db42f7dd661ca980be69e3e5aab9
SHA11691587b474c41ffdfe44cbadf389b594b944e19
SHA2560f3183f9225e17be5adf3534387e667fa27ca8f061bf9123b8034a2ab28a0af5
SHA512b46d0cfcf3fed3f884774d728974428e994745f576a242654ebf8240b6433c43f36c41182a707c9dcc2b1a77e143eec233772395582006a16438b3a2f5b4324a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d34b5c770cd9a6abc56ad48ce790dd95
SHA1e8c4fc697d5ea7c285a4d11c64cb4159fb4811bc
SHA256d81dc55c92b099db57a7d0f5b676eb19a35a8ec30931db5d1601a61b412a95b5
SHA512afb07cebafdbb3efb691416beaedc86cce6afff389eb034c3ac4edf25d2d368635143ae4a7e61637332e387f83f665c1ee36cb9979067a0a86d1eddc86bcf87d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518dddee6c5d66fd1d0b2f630b862ec6b
SHA1a22969494c184968e2ad23e4b5b33f1893b5abfc
SHA256115b3015d1ade606802a7159fa6f55d8a5660f9aaf31e26e68fd36ce2fa065f2
SHA512866c06246552d7883e40d82da555e5cf7abdcf857a960788eb878976c8c2e21d9dd49c00aee0b5100fe07388569c15c9cc08fb6dc6454b06e15a123b4ce07651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0839d93eeeb05c2b4af39172484c3f4
SHA146fc8f57cc03dc877976c8db741c6db4701050f4
SHA25625492ac869ad5ec39a5685977f39be7b47045a6d3f251f09a2ffe1fc8bc2a2a1
SHA5123539d516433ae60d54346e28fc8767a1f9ea1dc901fa3bd61e99c91666e081cb0e24b3cd9dc2bab9af1fd962b858ef0c562701e447e15923014980c9950adb0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcc7dfa514001bf19a1e47c08ebbf397
SHA1a621c1aadb4de9a0b22df5916abdfe8aa8d73ad5
SHA2562bedad516dfe56c4c34540ce1f2fecbccefb67ced0e92b0185a4a6e25ea23d0e
SHA512d2636069707d7470c5d0620c8a42641fffe5e07fcfa28ff9a39831075cdae1685d21102202b1063253ce953e88e7b6d7f005e6a62335983443d28db66a728d87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54405b9e781b5e298dda2f1fdabd6999f
SHA1f2d886abcb94cfa1c7ceb49060b00cc601012ee3
SHA25658fdc6e924cd7c80b7bd3b4814a2b8bced72c21c91abbc3bc2f016035d2e7250
SHA512becb7013dc1bcbd39a068fd863988a346951bc3fe1c703dbcbebc5560932ae1f93900de6c37676da3c69c8150430001542fffdeb507e40bf41fa467243dd4c92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5473d4c55833e7e3e1321a1c16d6524f3
SHA12ea752ac24e18d28890ade7c4a23504af1176fea
SHA256b1f77907bf4266f1f1cd9734390b9045b903302fc5cea55edc0967847b0ae5d0
SHA5120c85392dfb97cd39aeb3afc6aacc04daa8c6be211ada6ed9c343aa28522b03aca8160693aa5708a4e1057fd70aac0cd628ad1490225be71c1c805a2d42b82deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5915c5bb98c72e691f1cb9006c3d36b45
SHA1e71d1a99fa0f93ef0a6f6d836e7fd6d290282ea0
SHA25623bd78cda6ecab3d7519ceb2a41fdde7f96bf5a95f1cdcdc0dae9e307313e152
SHA512f5a730ffa3a01d376ed6d128e2f91d487b418061e4e4eb4d6e628524c60f0e8a0bfcc485bbf87d379fed235627b0ec7b5d220062677745dc40a54bb8365df2b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506c744819bf66a5a9533f913fec333eb
SHA134b89d83d357565d8b40cb4d65fb44a3c4a6d48e
SHA256c2a0369994337db5291e20476d8465d53b5fa31cbe4545d007518528f3d13243
SHA512e9d8556fc5348da4494e2486d5c0d9496c03dd556ee35c7cf4206a8bd8ceba1ab74722975889fbec6e77bd975cf6f4d3010a18e18cc46a01531135fa092b4db3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570ed7d1b98f86a57587adc9e3efc1528
SHA1173dfdaf15eb53c7c8d870bf3c1adde008af85be
SHA256b21c791f493465bb14801c340f1dec343a591651ef6c43db8f863911071ae784
SHA512bfaf649afe940924d16758bf009b82f75e312fa22fa3d7d4086264d8017a974e5565c41ef236027354512f2fdbf39f81cad699888410c19b268ef2693fd3bde8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542e7610484a3c2110c3fdaf81c35610d
SHA11fc70a32fd794e4748c64e606e6093fdd15ba759
SHA256b4135ae273469e03ba86047c1cd6cb1b26b177676a8cf1378ac9a12a0fd68e36
SHA51254dd353602df931fe59fa9cf9b91ea9a3ec38583bd168e2871d226eef5fe132778b830842544420b6e13c8b6cfbc1a32f3162d255522324be1bb883fb43d47c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558c197b20cd0e8972716d25e696468eb
SHA104a210b58ccb7289e0045789d3f9d3665387499d
SHA2565b68b822edf2bc1ea6f6071b6b1dcfe2f68fdc61d8c2fb715402c478663e6e88
SHA51238f0213bbf4571449a117ffb3c21a87d3851cf6ed9f3c9a63871a620d136db2023a4fbdb533c513da2ea31ddb44b6fd25b7c40b96a43b61225cf73266564cb66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7447c2bd7c1229684af3fabb7ef320c
SHA1f2f13dede9fac83e38b105527e3077912a65e6a6
SHA2561b1f56ac0ba14a1830a2ed23c9f2fafb44cb05d200ac5ab75ac3b798ff9ed659
SHA512957a4aa924a06e9b63021734696a24074dfddd756c23835a91d945e9391e61e05f9214eb8cb446df4b99516abaf94241ed3c44c3904781cff51855765170672d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e1d6ac2bfbb68ee3ec43c3379c13949
SHA15053cecb6720f449bdfa8fdb922ee3bdf7a96039
SHA2563744d4cae50e1d5f1b45c1d200ab11a4374d680fd4d74756c1de16bb2dcfdc0d
SHA5121c937eb3cb7f4170cd5004d385a56844f24b4c214c713dce885eb6c4c6731b5efc56a1bca2d93701c63d4e03e395acd738fd74774a73dc3ca1e8d596c5829eff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5432f6c44a2308f7eab1481d4e5226c32
SHA1c1cb361a27d25b173beed3b2c33b3365e489bccf
SHA2561c6b66f8db24fa5274f7c42a885fda6b9df2a760c3e542bc59d3615f542f0751
SHA512202c0e63a0ba798b1c8715b2aae8452f147384d5eb0a4ef97c6847217c4964e8cd0cc15a2ea2d86416a55d4c97ca2c178938a415f0fa86039f1b4c3fcae4fcfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ff1de16b25ff203e39ae71255883681
SHA16008e8b91fd8bbb5449f2a8beb02db0cbc01e22a
SHA25643fd62d1c20f579008fd853b7b04cdb30a3df9ffeabfdb4685d734a18db21d73
SHA512e658ef823a564f3418c112263c11c53a97bdca81adc618622d791bd02c1cc5758937d00958ee453fb78a2b067081cf5279e0eca533f8766dac8f70646a552b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efce15899304eb6d77b624767a3bd5ef
SHA16be2cd0f0695c373b00675c3dccdc1502096eb79
SHA2569f98ff687a9bd9dbb59c4f91fec3ca41091d9e1454d392bad3a737f3b0ff420e
SHA512911b0232f0707f68c5e698b00eb8643700348baf49e87f803523bfd9e322bcc5c64864a2b65920387e043e3b5135a0830d43e3b9d96c6d018b027e26c51d8ae3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b