Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 18:54
Static task
static1
Behavioral task
behavioral1
Sample
deb3075f24248dcbaa04b390370dd940_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
deb3075f24248dcbaa04b390370dd940_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
deb3075f24248dcbaa04b390370dd940_JaffaCakes118.html
-
Size
65KB
-
MD5
deb3075f24248dcbaa04b390370dd940
-
SHA1
c30c208b3b9a28e9a41b06ea8469a34508dbe99a
-
SHA256
c6aae34b5ac1fc8d7270a045df0c9ce6f9a830760f5f49faee26e9ec80d78d16
-
SHA512
aedce28248de2c68d88d3d87704fad9c4f8dc815bfaa2c12f1cd3c52e211404cff9c045f9a0587db79e07cd86d7e2bdb56864525a326437fe9700fd184eb218a
-
SSDEEP
1536:sAP4JMwaHpVPpV6F/c6V6GVSBipH0s5Xs/A8UVjJew6VpVv3boTVCsmwIVuV6BHV:P
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e054dc610e06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8D47C741-7201-11EF-ABB3-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000056acd275e64e7eb361fc60ecb222d014aabc1a26c0243d4a8ce686f31965b7ec000000000e8000000002000020000000f2e3eb67aaef3a58810062f1c93f6546ae38497dd45c5ad47973c25861d3b0c920000000f93e5083bcd99800f9ceaf48d982f2e0c3fbe7493cfbb7662d735741a46c26a1400000004f397d2e987380bcd82835b380b685f5d432c4da585ed75cdcec11b3be2295d95bdda5fc654dc61fb458a43b1f943d9f5c88cb26584da1de92d498d94e68e7ef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432415513" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1992 iexplore.exe 1992 iexplore.exe 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2120 1992 iexplore.exe 30 PID 1992 wrote to memory of 2120 1992 iexplore.exe 30 PID 1992 wrote to memory of 2120 1992 iexplore.exe 30 PID 1992 wrote to memory of 2120 1992 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\deb3075f24248dcbaa04b390370dd940_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0cf1aeb5ebb93c2f1b71b0ddd5fb006
SHA1eebef63a67da9e0581f322785a93cbde606aab1d
SHA25600f39c3a60a4af23cf210a3835958e5449006616a0be01f6967799b2d1006052
SHA51241e4f3a0dcc271af701d6de872bcfa106b8a50b7771e0d5890621e13133de1d36d75d2654924fe892f8ce5ca0e31f461f4748d2ba3646a78c475113b095bdcc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f871a2b5538e905acd3e5f1722eb738
SHA11b2d4802feabc2c8c8a1da857ea0101726ca85a1
SHA2566909dd33f43ea64642482334460c2bc936d55d7462094dd917d6f44f8b741bcd
SHA5124077db5213a3d5d2b924022d4092d58d99a689e31cf781d8927dfc5b4b0a228d3f8ce5807773ece5c645642b147364eb7706a2fa5d3c5e8784b6beb5959e58e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acae0faabf6667c98d32976b5e5541b0
SHA1edaa109b40b460615c12104a3b8334e6d4b40b7b
SHA25666dfa6ffa7d4ae1d9bc2fdf7025fec3c0a9aad3abc0ecefbb2425337e8d1fc17
SHA51290e269aea713d5419ecf0f3748471a872d7aa71471c232e90bee8662ddd567f10975c6150b444b676c933ac0a926f470a037e0699c8f98f9f1bbbbdfbcdf775a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5472ea7df68e07c464919508834d8dcb6
SHA1b15ab892c2ecd6ca1506ff3c55a98f5b1397958b
SHA25656da870b40cc538fd115bbaaa1aec0af15e79bc290dc31ab95ca5dad0a3e7231
SHA5128cde056302238f70c5059b2e2a872c258797561e27e1633d71a801d49aa416987ddf5e07fef85a8f1cc9154a958777105871f75ff843e83456532a3384c2ccf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50755c14b8012202dad0798a9d9ffdcfe
SHA132d19eeb1dd377dce0bca4b4fde4a740851237e0
SHA2562f9e5be7e94cfee3180b1c0fa59c79524d81a5e4edb319a3c3ae2588b9cd85b3
SHA5122250f6bdb7e69817a96634249bcc391fe4a2303210db22d4b6a3fd8281417d61d5a2d1c95ae697b5a9baedf808e73eebf0ac39dd3cefad6b83a9d3a9c7c6a148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b13f8ce7f369029108fd14b406b9397b
SHA13a9e14a42efa6e643af8289e55cccad6658a0a64
SHA256277ba425ca02bc0dc814799f209ede5c759676b223d3ed38a8ed5b3f25470e18
SHA5124d1ace3fe10c612ed053f1bfb45e9ebccfccc94ab466a8385aa4393aea600246fb400c514f6b2b206b345122293d969714b634777982aaf11ff2a1cb5b7b1bbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541c8deec6c49856744c68ede4e7bb427
SHA15df8a2a33e1e12e7056e131ddbfedb2288b3964e
SHA256930df50870c4e3a9e059f6e737349e2eea407630cb1cea889e2b30d367a8fc6f
SHA5124c5f867d93359c46c5b7bff0f835e4e272de88edb8e048d7230c94f2dcfb859542df90739d8a769fb23104fc9e30bc9ea13c8197d60b085dc3e4e6a1c6b237c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f19bd14f5299491541426d6bd0383e95
SHA12b4ed1fe3f6dc85625a77324a689c9bc31e308fe
SHA2560de12495274b4deffafb6dccfcc093e3fb5075a48ec84a15593d6fcd24c485f3
SHA5121999b045a394b143c1dddb4d2fff865630bc54a4dea2af25fa469db153cf9b464822e03d0340e6dd26f42535f356444a9634408769f5507080ce6c957732545c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f88190f82803b7936312f6a7416c048e
SHA1fea6f68fb6d4e7ca347c05436aee333b0a1c1eda
SHA2560be33eb1f0a4665cb0b260052130d27c3ae5cc078d18b7a1c0a1df38a368bb4c
SHA5123b8c59b7de01a467a8e5172a20e573a0831a194b8bc3346c7c856edc98020121758b29df91e6c8246266520427020f642b3cfd837a8f18b6e8ad930c988a12da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e23dbd2717c187ad8cb7de01c159845
SHA191193c0aca730788733044aee2f2d4ca737b7371
SHA25611bf6b9bec2f15323a7aaf55bf2cde2eb5ae2df832ea48d7d3e80fe85816cf83
SHA512179089ea7780c4c313175af708bb94ef610ede0edf92032c4a97fe1671db32a98e4244ef4ce84a6b7bfadeb6ea873180449d2cbb389d43e1a42d6b85ec113297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d82d88929c1be1e51c2a6ec052e098fd
SHA1dd402985c713738dcbb0b4e1bee7a802b2b513f0
SHA2568149a9e2fc725dbbd7fc2a6e54947cab7ef5026093048dcfc858892c009eabc5
SHA5129298a1bdd1e8106957cd0ec765568c5204082d12888a5774f7dfc9225e8b9003d31eae9060bd2cbcf738780bf0af6cd3976be0260e70c7316c898ba944a34819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55710a99c8660d398a3833e003dc9816e
SHA1b941d1fc8b79cc73b0689b4966b01d46f7c12a14
SHA256afbd12922204c863327a5f2e858acd7dcf1e13ec6f3c014cf22b76efe1bc8c64
SHA512c799e66787d72b5df77774edb504abb17dc29c9c9b0ff94e46a4e58eac3002e98ffd27e1d6c005827eebea432595df34218b484d4e7aa174141a296537b8c4cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c04b05ad25a1f1c548478af7b08f90b9
SHA1de739adb28b22b6b3bd0e4b63c5afaecb7fe4705
SHA256180ac681a444b0f1ed156d37e0e1700bf934e939b46a8c228a8d2f123fbbadf3
SHA512cd2b7a2e4af3053b94e53a46b439c7d8517c658d52a23dc4e62123838ae64070466bc87cbde1507fbae165d2545caceb0c3bc5de3424b7665f5a50ebeef85181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a126fb1612312b2b6c8dde1be41e79ad
SHA10fe27f0d649b5d9fcd200e9424d7ba0459d3bd09
SHA2568e6d7d2b25903107d569a68ebf9f236d9404f8f598fb1ecc26a32a30a1a4729a
SHA512ae0be8e16a17785f92f8830e18082dacb38276ebc7c018249d9e15c860cfb178f7ebaf8a5dfe2e1ff62e12703b660088e6fa84ed30b1c7084ffd1328ea9f3832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f44927f2f496836c812b7ad90b9933cc
SHA1daf86d9bf0bbc821d19ef7ef6944311df88319de
SHA256c877975bb0923072eff2c3bf510aeb1ed45df4df830e4fd846d0ba820ba1d999
SHA512b37f01163eeedcebeb1f8adaa2886c305fb7be578ff152b4151e606686f2a61a04232ce3535c68680da3d30fd2189d91c4c5b8b76b98ed7433ff6fc57479491b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f800d8ed7cb2abf2fa87cb3736695072
SHA19c5972d8f406c362eb32b39dde6ee72ae444b62e
SHA256d9b3e7c34cb264d60a41c8106506ab2c8cf6ecb29b21f47745d9fd943db4d9f9
SHA512d644bb739ab2a794526e245272d6f2899520c5061ba771fd6794b19123ecd9cc1ac90b643a26b9e2bb789f51e8b9a2f9d05df280141dcfd75c2c62f9f56e33a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c7436712e34bcd75ed87be31a6a1525
SHA113d4eed5dd6e23d44387e87d46c9adeb7acb4dc2
SHA25624d09f327a33f42f90247c59f0095100baba99c84d73e6ac8099e5812360b9bd
SHA5123e65bc9cdd795751f4d2d752c235c8f50218a6db44f21422e321f1877211d64176d8cd97317e8573831ecc929cc61bd466c681f41c9b22ff888c08dce912882f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573ce51742bf45ff49e7dbf34db5766e7
SHA11deb0f209383778cc78e4486676b133602df32fc
SHA2564e50a3ef14b95206674f631bae4b6d9cb1756af100a91b330a4a3e9431ab20f0
SHA5126a1a955d177e82643a931fbeb0327afaa542e871aced24b6ae0b13a49ee2357c80b357130c4e77c97b25c867298ccc63104cdd4c58de62b02854979c08307241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f87b850829d884cd3a7ffad512276118
SHA1d9a47cfb7b2ded2a5351d14cd2f77537ff9123f0
SHA256fe4d94cc983c6ca607804169df868a26026bb9acc023f94438044ee2146801a2
SHA5122dfd2057e0383c6d2c3543863e42f1fc2ae1225e448b51f9d60ba7e1234e4aa246197d25d87b4f147b86a6d2c6cb9d439b8cd6d801d2e73f14ce2b2e7fc4c85f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b