Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 17:54
Static task
static1
Behavioral task
behavioral1
Sample
de9be40acb9ff7c0eeac7af23de8d7c3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
de9be40acb9ff7c0eeac7af23de8d7c3_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
de9be40acb9ff7c0eeac7af23de8d7c3_JaffaCakes118.html
-
Size
1KB
-
MD5
de9be40acb9ff7c0eeac7af23de8d7c3
-
SHA1
aa502d752a1cc7fd348d34f2cd67526611255bb6
-
SHA256
ac5af8e4e6be83d0f82603a8417910522b139524476ffb5191dd3330053bfa14
-
SHA512
9606c782b94a67d3c4780eaa18deb2f5d994ddc52f1bc2f9676400680509640a43103f49d7189bdeab9bfb426e76dbbc2fa083ece7c5c99dd67a1825581d798f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1005890f0606db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000045ba7be4c2abb481c9ffee9dd46dd7c2b687d43fddc66ff6d19ec39a444ec609000000000e800000000200002000000025f24270784bebd9c449e8ef8990704590f9d46b19955f7ffc0bfbdfd7e09fe5200000006d294032a6ff543aad72176f0dfa6fac079aba3c41e3fd88527a62e65c146cd540000000918c18c82ef212ebec88366018e2b784cedf73a7faca861eaafbb649d0700a3d5c8bcda508acf9e228ed9a5312d4c1f3d37f04db3b5e553f7fc96f1ff51bc4cc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B02BFB1-71F9-11EF-9D33-D6FE44FD4752} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432411939" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2760 2644 iexplore.exe 30 PID 2644 wrote to memory of 2760 2644 iexplore.exe 30 PID 2644 wrote to memory of 2760 2644 iexplore.exe 30 PID 2644 wrote to memory of 2760 2644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de9be40acb9ff7c0eeac7af23de8d7c3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5271651a69ddc90b31233dd5836adabf4
SHA1aff393bbe52318c4deba406c7bfc6eb00e1c7e0a
SHA2567bd0cf4824ac3890891db31c38c1e351c889fdcc716fb630853a5d220e1b5b32
SHA512f122927d627a7d806f6aa0977454c2fe4fe4de2c72aaf426ba200aa8dfc3c3affabd3299029f36484f7e156b86cd9785015eb658b943b418c145a251ce407157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529b20013f6edd72c3539407d3801a80b
SHA17f6dff5bf889a9c49e74a974fdb9b1b8a83f82b9
SHA256867e5c8efc7664a7125e4544fd151d0ca4bf8f096d0cbddb40d2428e1eff3772
SHA512bcc62ad4783c1b12b37df047d4720bbf554e8145ba8122a9e50ba2b9bc2e9e9be1e729ecde72a16eddd12f2eec1000b5f14d872fc4f0ac7d63366dd2d5be364d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514a5eddcbec5155fb4f71f9ae5518f1c
SHA17d3504c7f9fd97aafe6cbfad65e1a62e3e7abdb9
SHA2569c146130756f77bda8476f224d84e8437869557f84da9e8749ec04c06c9ee33c
SHA512a9e70485c9c4c6dc2fcc89ff53f00cb8724ac7778e5e667085e1e2286be1739e2f703508c436867410778c07ddd526e7a62014acba76c37c5b880a2fae588b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f128364ce6b43312cc1af148ca782732
SHA170cf46e6d1b5fb951d84f07eaf0d67534c0f117b
SHA2569a45db81d58b3b8350cb375b15a66786c5f5e4d33b58ee6d33b4fae0a343f6ac
SHA512425abeb636ce6b714e5337e96369dfaa579225c48dcfff5934e9b44aecf5fa81edcf20f480cea9d2555ed493d73b77965568e57c10038a726da8ff52625d4eab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4449806bed330cbb701aa3befa627dc
SHA1637b89367009138814deeed10c8288d61763bbac
SHA256b9ae1e709acac7f41974b0eebf0a7bc8006ab7dca4fa83006361408de215709a
SHA512bf133a890c67b7c270b18c7c347c82426b7f12bd057b2d5af089cfe38adaddcf0430d0e18ee1e0bf1d7cc88bf9494ecc18a513e1dbefebb80cdec91abfeb616b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fff4904bac210dae810e5ea4b274f88f
SHA1ff9bde2775d9290b97c817c8a68f9e8a0f6156c9
SHA256f0cca7020965b094e66a0b3658aa4be608ee6960fee7ef72a24e60b96455b621
SHA512dbc5d8703f22fa3805ab20fa7c1da6e8c943e59c852aebe32a93f15ba0ba38dde8ba0e8bd3dd6fc483486bd349e94b300234510c9b7aa0c4c767648fde6ca82d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5526d14dfb68f24c0a6ff679287428b81
SHA198e2410570698adc5c573bdca15e6bfa1a6eb8d6
SHA256134b3695af01fc78afdd8ea678eac8e0d50ca1dd51f76745cb13fae26e125456
SHA512c8b34d192e0701684e728176a867633f59fd78bbfc179bde5861185086d9379c1528b7f378b148613e7af6b6cee8a2a74c5864fa73b907b707cb7d898de47344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5093e2ff2e43cebed19a4c0dfe6328983
SHA19efd03c1e0a921092e887b438f36694c1f627000
SHA256c9dc1a1901e20b8713c6434d0cf3e25b02bae5ec8560e1c96b5e07512e79eb30
SHA5128d9d404ff90f1834a5fa62b3ca77be10f9434f051a032a28655f8be835d6e7878c50a1dad65b468e55e8fbd30256fdc0b97e09fb804d3929581acf6b349e4617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c59f7bdc267081ba8a5c86db5c6d2571
SHA1b7ffdade820759d455e2947b8657f7b52b7b37bb
SHA2561a89abfbd521de7854546ced58f83937ac9f0b48e52923b95c44530c592c2d89
SHA512b18692debc51e78ed2c7c9bfdbdf1ae2b44cf08d433bfe9aaa62db04cb96e1125e899ad44a11e74a6ca419ce699ab9bf1ea589ef20d8eafaa5e333eb44b9e5c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5507c36b433f98b67570bd7719ec6c25d
SHA1130aad9b9472c36910ae3daa2acfd5521adeb48e
SHA256fb9b71887e8b38b6e1660a05da587e46d65672cc5402b9d99f8ebb0df4671381
SHA512b437796e6c24e20a7907ef3b8b0a94d89b0b555705ea36edfedc81b6692cb080e6fce8c96467fa6e72310b064491c2a2cabfc66d0c3506bf316b486c116da21c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50319a972f53196e38d525eb9fc0dd7f3
SHA1bc1fee22d5ce91a88bf8bef4524780fc2505df11
SHA256559bb0991bd951da1c698449a21f62cd7832b949ad0967cddac15e26d893cff3
SHA5126a189d801043ac36f47875b02b40872101f9b5a96c9a267b3653203f49edd935f8937c829cbe4096c7418bf8aa06434973ec313f149b06d48716b15a0f91279a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac8afe8a9fa512f8756d3ffd5c9a898a
SHA12afef99719e7c8e29d30b3ed095f4821d6451079
SHA256913afeb8230b7d56942392a8dbe0525eeabff5bdd5955a26c28c3f438c93aa5d
SHA5121f94d9e1d3608b2ff20075436c20a092cef3fd941ac9c6d7587d5d11d2c30ee6a15cb57e2bd50fdf7958193f67aafb4e8fcbeee21522d4b06b7a4bf6d2055e87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55098bbbba697f81a2067d8ae3570b028
SHA10d0fa4b1fa54bb39a5a9cbf72abcd62e10a262aa
SHA256134e8134f74e53b94f63f98664061018fe137983c8bde8f45786e5b6447aeda2
SHA5121e60a47987886873567c16a03b86d5c0cf6d8e6fdcb958705a13cc38cbf6c1a2ea083cdfc45ae06c43c97f82a36933640ca85ad5cc0087155d48bfea74bb7717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e24a9c3e3c3ddb6d54a29bc391411b3
SHA1e67dc35a8542f6a3c52d31637e1303e058192393
SHA256a365cb6c598c818015d2a0bd866d93859818d880c872189339c61409daada543
SHA512ce3d532021f4b047a81fe1fcd1703907746b6460c0fdc85cd69907d21a3b1c8fc72d98a61a8b3328cbe296c7fc12dd46571a336608ff99a424cdc8023411f88d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c48978bf8b189c2d7a175150d417f7fa
SHA13a043e9b5a2dde9bbdea6c5ae04f641039e9839e
SHA2563f3a4b3a1d8b1be35cf5cc92cc027710f2316e92c589e6dde39328632530f37b
SHA5125889e7ccaa305d5f04904d458da42c644bd4378b57d320a25d619420ee0057d0e7929790251aebb856ce0b32da58b0aadceb272811f485ee234b806640009523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad1c1a04d75320fbb2532bc67d83b361
SHA1cf33579ee886b195f1d21b174dddc43d81826a0c
SHA256891e13fd2a8c1e0f21fe9fb37d55c6e08471b59859519220306ea0944a4e1162
SHA512eb7b38556bb0c84251f399a7d07da73a832990e623de06e75363323b79ced6d6b7e3207b14218aaeab1f11d7515f73b7a1d8d1ca9cc13aa56265e65d737d1d98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587cb09d94edcf83969a2addc98b3c40c
SHA1581c26bd178a438e41e44d1db4ce982e38e9d36e
SHA25677019dd198fc23d7e12ab91de2ef6607a2dbdf9bc47752dfe2e19e7da89d0d49
SHA51203829d9da3f8544dae3fda38959f909bab693ddcadcc59d2f2a20641a19c82f6e46297aab6642654afd52e9baf00f20318c4f902dc2d865afc2b3d1548200b50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55541590fdb151e5477131b497fc83032
SHA189916230b05f6939aba6c94b530476c61e491ce1
SHA25634f14982959b2a9fc3791dd5ed195bdcbd3881a192cf9125978990145995997a
SHA512712a3bbf534f36c9ffe2d1bf2b6cce3efa5d7f18bf50f540b04a63710aabde045381cededa7752fa7d3c2ec8b0ffdc17e77bad21d1683ac912f56538c8bbbedd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f1343bb86e6ca71c2972bf20393094b
SHA162ee9ced05df859e685cf29d0a22711b327c72f4
SHA256622a515f40350bb0c918e820a087203c8a5e10f2f542bd2813ba248b1ee21046
SHA5127f574f507845bb1a33a22bcd412a5e3c907cd350fd44d08266865ff484ecd3dfedd71f438e884b470918259cc55d4328a5ef9b241cdad105decfff983b05ca45
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b