Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 17:36
Static task
static1
Behavioral task
behavioral1
Sample
de940520333589639a6657aa40f45573_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de940520333589639a6657aa40f45573_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de940520333589639a6657aa40f45573_JaffaCakes118.html
-
Size
461KB
-
MD5
de940520333589639a6657aa40f45573
-
SHA1
a4af29240312c7ee687a29e243c26827cbd7d0c3
-
SHA256
50956e56195ded959ba61fccb2998c24cb632e0f582a66215ea6a891e638c049
-
SHA512
707ebd8ffd467f9310d411d2c76d657998c0a260c916c6bfb051340429188b179002facf105804221fe1cbe1349e06fa86da15a61b527ca8c8bf74a393cc7e2b
-
SSDEEP
6144:SpsMYod+X3oI+YLQfsMYod+X3oI+YvesMYod+X3oI+YLsMYod+X3oI+YQ:O5d+X3U5d+X3y5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000031ff9389dfc65cd24257392f12abfcdd68994f134635bf4e50b7486c84ee31b3000000000e8000000002000020000000f34c9850b564e494b4e146caca84126107e7c925dd0a8aa7094ab456a83b81f02000000078546ee64628d8966b0733d2ebd6d587ab2d3d221853a2e21a40792f7a75c88e40000000e87a8594fa401c09c48383fb5ad28de0d782ceeed9325848d076f791b091aa0bbf78fca9b3f13fd3b3d7db07ff11d8377c81f9db8bc8b881159066dde13be9de iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432410855" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B4F52951-71F6-11EF-9630-523A95B0E536} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90b12a8f0306db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1792 iexplore.exe 1792 iexplore.exe 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1792 wrote to memory of 1664 1792 iexplore.exe 30 PID 1792 wrote to memory of 1664 1792 iexplore.exe 30 PID 1792 wrote to memory of 1664 1792 iexplore.exe 30 PID 1792 wrote to memory of 1664 1792 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de940520333589639a6657aa40f45573_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1792 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9ffddc87ecce8d42fda6c60340188c7
SHA11e1627eab957d1b34696c8b5efdb9c188cc211a7
SHA256455e37e0d65a072cf29048c6f0a3fa86e9cc4b88122b346c91496ab600439c8d
SHA512447e97be9c1fb88b28e5ec9650dd7a8a54ccddff1b6f11ab55eef05a5c2efc0d23f0825dc8ca8362012ef824f07035d2b414a365f57733eda16ce9c63613b22d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550e9e82a8f0f1e6c2ac1b7fb11b560cf
SHA107973591b51d8b8482fbb2d05b3ad4c758fb6f11
SHA2568ec01765f5bb5edfeab4d3136e66bd5d916680be2e9541b7bbc62e98de4a0b2b
SHA512cdd8dd05db6af0a3a0cd785fb6278c3cfd29c8f9f41fa374ba7be7f968311fda67213a38d63944dfcbd91114d2dbda89947c33aff53ba877618f18634634173f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b31dc11468eff3dba6467bf708d43cb
SHA10c3f0e2d94a991d28af1f486dbf2dcb26bcc7681
SHA25653fb783680808e7f6ab547e3aa646f3d30f89cbf94945fc61e53ef408959e6a6
SHA512b21cc90c639a521e468bd613db1a5b9bc8ddb0d363fabdee9e824debf8ad0498be4ef29632fac5dd2eb226ba5b8a1cbb5c1155b7d54377a2989153fd1812e117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7d6a4ec91d1d2db4ad9d92a50b5956f
SHA1f02289faf08456cb891225e594fe8ebbc6897175
SHA256889eaa10b8b93014ecf0ce2b2e3fb8d9c6c1eb68bb40d6babc8b48212985ae09
SHA5120f69500d130761702b42f51bc64e2104d7b92fe73959c3f61e85512fa9d33998ed9274d737af0551f0377c58cf2ee3b75555a123d4a43f3ec24e15d1320044d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5660a886ff1bee4af28a375157f47eeca
SHA1aae889869acccf115dcbb0319b2d5a51f622fb6d
SHA25677a4505551c675e5f5a5beceb6433a0fcc28f124c8670b1d8a59188b73489e0d
SHA512f4c99d77184c5ff6c87486b19de643b207676347ab49a5488dd4b9c5b49a5aaaa896e002de15a9be60ee729a3cc654658870732f75eeeb71f034df4eee2f6264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee7c94052ec91c2058b613f431816ddb
SHA17029ec6bce33d3fd5626b3658c2ed6a104434eaa
SHA256310fb654e6880f30efd54a887e6d9b541dc98e1864d57dac3e85e2eaeb8e1dae
SHA5124fa602a6b3828a252e30ff49b0816b3363f765be8b73ef794a52538cfb6c9710bf8de82d59a50899a05ebca8145a4417313b2bf905a0364501edcec20654482c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a1e9637f5b1f931a6f4f64aaa1fdbc1
SHA11218a1e3a8392127672b833d0d73a60db5e7a473
SHA256de63c403e13a847c025f384a413aa9ccf0b4a1952b26a817c06baf3038582cd4
SHA512550b05e4acb3b47dffb7728ae4db7dc176a6a62dcbcd07d231dd279f732e0531f62dfe25bcbe3bfb76f0ffe0959fa1f0ba42188af156082e35e05fc7f9598eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caa26a24f81cd011fa5911bc6e70c9b6
SHA111400c4ad0d729be92e4c6bf07312aed8ef41d09
SHA256bdf3a226c193fe9c553476ae05822e6cf3d2666e42319139b36d806e630be46c
SHA5121fe4dbce5b485cb9fcde5bc00091b7b82cccdf3368ea9c50618a21135b3006241ca5a38910132a0f567ba25ac30570c63f0cd6964824a49b955d1e50619c6c46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcbe556ad7d031c39474a254d7321f4a
SHA164c45ae361fcc6ecd06e20b4a6202be6d1dd4d00
SHA2560bb1b63ae9b689eb4def471f7c372789b84958cf9f79b70aa70e60ba7f51b403
SHA5127db4b352f4cfc92c587547c4695919a6673a8fb56dd683b28120779360c4a65d2b70e6c66d6fff4e5322b7c263fba9fa5742b11cea83c8e899a1ef26e1f93a4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fa2ee7e1b018fe816c09212d7723de4
SHA1b867e2a73dd16ad6a18ca8c6c80795f5bf405a89
SHA256deb107deeca99d66aa1f07f7cbb2f1f6d1eecb9ee6dcdfe4fc69178a80a252ad
SHA512ce4e8aab9e348ffcc92d6e4dcbc76b6d1f7ea8f30346bc99aa132f45efbc30b1118bda2c231a307c23df34b4e5973ccd17c9b6da54f0a2840a154a0a36e19a97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580b14c0e750eca790e7588afc961f9dc
SHA18ac15510150189b3a3b3bd776d7b638029576513
SHA2564e0647cd4bed2c392276a9537c8408cbeca478267327d679b502f7c1b4fa5319
SHA512befc084b01ed731213e44b778ffeebce166d064ab5c124dcc34e15af7fd81ca94e7d930a3d602a44d93a0f9c9090ae514137f3580283fd35c826d776730267e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bff3bad0bc2dd13352a573229284b8d8
SHA1625f5f86567d3c6157f71f19d2192b3a5436ab46
SHA25681f3c3fb02c8c68e49b49cfa5a7dc889af340b6fb1e8b389ba68f77776819dec
SHA5121610b6cb671a5fd42a13203e92bcfff95cf610ba707f7e6b63f5b7671e977fe9c031f364192b361b974a90658254edc3dee5ae837456f965c4777df78bde6d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b57f024c1d675b6c9bac140f6c158da
SHA1461c4bf186dc9171b165922c15910f4ae2fef524
SHA2561a5ecadfa77b67c7a2a23a215a1df9baf3567ca7132433de004a7098fe58df55
SHA512643a9c8ac7208edb0d85da8908ce9283bc34ec813993fdfdd820251d43d0eedf22971f3cb1cf78890bd415c556d5ffa2179d59e0f479be817edcc5598393db51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c934edfd4c032b4497fb0369c7d96168
SHA1b2116ae3d03d42367c35add05e15fadf45241b42
SHA25631400527a53308e8626f4f46c08eb5c5bd557ec873cea2f3bc272c4be3f6dcdc
SHA51249efa63991b3f82ea101100b5c646b26fed2a25740e3c2a96026192fbbf1b65b8c7a5139d43ccdf7dd7c6382812a854023526f874495e28809a933f1741f4905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed0b5b81dd8e6bfd7d767745285bf03b
SHA1d431e23114d8edd12bd4404a54467f6bb38b1864
SHA25617498b7ca91072f0f1d06cb7e09bdbf226d8c2cf0e857bc8b2afecc8dd2804d6
SHA512917ccd186c30605cd2417fb79f221ebd8173d188fd680a72c96086ed624ead1341b05c99c96f08dae9ee060b7bceca1fc1d67568d2edfba1971c5331a1665c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bf9580e08fb8b73f80fe2d39ddfacd9
SHA17bc100140760f6283d70284ae3e81bddc42db21d
SHA256c694eac4380606f32113f95d719202fd350fd84388d667ae328fc6992abb6277
SHA5124820277a9d43533a14f03c15506a18369435d9137747241520a3051cf0e8ba532a6f5e08f725e0c07c807dd2517392905971ee7ed9d6923114287e9748abe905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596d4080acd5a189dc01dcbf43cdc9688
SHA16ecfb9629f54eefabc744eb4c0aa69aea54bcb5c
SHA256dfd7846364d5e3170a5220275935d2be360aa70cab8075ce7cc7aa2ca3dfde67
SHA5124592c9be87f30d9ff1f822828fe96cd6d1d33bb0508cc238e4320c4e974934282ba55dfead00c4b99e08bf9b9bd47eafe8c688f559a90ceca156d30fddf44cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56de7a3c0d5c42a1950890add52be7e68
SHA17e08cfaf6414a9e23fead2b1bd653ffa2d90a3a5
SHA256ff5430a6cc9d1a18fe144b96b27e56f0966d4e83b4239ecbb9d6b7803dbb6942
SHA512161f04d012f93637a6d57424ac32c53dc91c721f7568b56e6af0e981dff8c7d8f5bb59b48f583f7d1b5bab0d82ae8d1163f1fa5a60f92b589780fce63d74430c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa949c4116698b1a30d9cf9053fb5d62
SHA147310ca998569454d46f8552bd09b5953716ec37
SHA2561b4be9516fe565b2f2e0d539c3eb1efe2b6a3d70fc23ae3c1264d5b3b1ee5d34
SHA512ffca976be682d223135cca2da98a9573544dcf634c12688db322161acc6a3e820989db6835cc9e402b77d47826f6faa5266196ad79a1582aa1bb7301f67c6946
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b