Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
deb950cfbfe5916adcb6f8c186a43208_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
deb950cfbfe5916adcb6f8c186a43208_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
deb950cfbfe5916adcb6f8c186a43208_JaffaCakes118.html
-
Size
53KB
-
MD5
deb950cfbfe5916adcb6f8c186a43208
-
SHA1
99a957817aa18a7da959ea5bdd4d1500de369e88
-
SHA256
43545e0073cdcc3f450b138ce9bfa10b9a6dcb101ae5fc1ac2ce91f9ef402db2
-
SHA512
127cac356f96881606cd4b8b1196d3209ac45b2b4a5a2525378fe0dff767f0848ca6ffef3fa79990a71513869fdc518271310ae34afd271f09168e6818fecad5
-
SSDEEP
1536:CkgUiIakTqGivi+PyU3runlYi63Nj+q5VyvR0w2AzTICbbbo7/t9M/dNwIUEDmDI:CkgUiIakTqGivi+PyU3runlYi63Nj+q6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ebb07a1006db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0FD5CD1-7203-11EF-81C1-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000096890d66b62b644f55b09a3a90e73af9391635448b9c61e275485a18f3405ff7000000000e8000000002000020000000304011bfcaeabb8f0b4be387b2956b420430e66c0485629abf8663a38f2c136920000000f3522557631013f3611e6a224ed21db0b38d4767707b7c2bd7b63d390b86efed4000000027ea83c0bf5081327168265babdc8eb7b1cb022185160f8898ba5cbea0001d36a9d9e8c91209a1d4bc0c1bdd18af6e83a370f4048dff519e74cdae3c8ad20653 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432416407" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2572 2420 iexplore.exe 30 PID 2420 wrote to memory of 2572 2420 iexplore.exe 30 PID 2420 wrote to memory of 2572 2420 iexplore.exe 30 PID 2420 wrote to memory of 2572 2420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\deb950cfbfe5916adcb6f8c186a43208_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0a7233668a362622eb04218e85b6c1c
SHA1d62927cc022fb21ed654de090f93c84bc8f03ee9
SHA2568ee9e4a901941ebb5a5e8ec8cc9a89b8a6432f3a824bfde68a8ab83689e0eefb
SHA5129c96d76dceefacf9caa4060fd19f587ccab66e5961c35caf98bf289f6c26f55b45bb5463a55ca7e69f30b2dd8739fc452d3aa5c7aa4731b6cbbdd969a097a461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e884342e1f8d8dbfc1ed42125823b79
SHA12cf26588a6bceab34fc8d3d32d1f8c97060f35db
SHA2565f98594bc39371e84318623b490cea1c3dd1141cd6292026913c7f174e4685a9
SHA51240c8f7b948bf374bf101d894ddfa7d49f463bb9a10dbce67313142bb458eef67b4c50619ec3cc1edc2774033fb12ce37a452b18aa6eda38dbeb299e73f8ecf0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c701845a322ae1df010babdb5458887
SHA148d65a456002cb53924072b84b06fd32d29ad014
SHA2560ab869f5835da34d7102d55f9df3add69f14ebc2b088b82d74f54dfced55e9be
SHA51280f5b7eb867b0aecc22db504963a91d18835057a81bc40a0d2084c21e48eb8eb13ad82712ce44c1c5dc2707d783d00d5fb1a95b29fa20931f905abfda47aad6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c46e62b9314f8145ca232fb8c231a715
SHA136c09069d54254b98324f7798cd12250559dd763
SHA25628aff501cd477a69c34b4d4333759e8b2be8afad049686f09cc080b4113aeb1c
SHA5121009662d3df2f63cd7dd2038cd7520bec9897fc3d6a6b359dbc3f3c537f8dae423255bdec0804c122ae141a6620672b8f8c3ed618136928a8d293bbf0013bd1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58601c2c108468185b4ac1ad0cf01200c
SHA1a1a76db97dbeacb5c87ec4d93a99f844ec32b23f
SHA25687f6720eec127d12ece800b97973431e8724e98ee52e230afdce4900abb742c2
SHA51282f4ac66196daf87415d54de23fef9bb3476f30084c1e9fefe323d18fb7925b0b8e6bfd2aa403b30fe60487d708c9efb6a68856b10ae03b4323db533a8093937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aef0e344a7f15bd91b9ad4055365412
SHA134b181580cae3dc7cc6c043613cfd019686459e1
SHA256b4f18b154b3a53a7b3ea696e72deec9c3b48a30d4f8b5de4845299b683281c90
SHA512292c11085387f3028be1a49649b417e9307f2add4e1293aba5c92d9d70a3f58d9f57d088d6e65dbeac9adcdd0129aa9551a6c542d7cf469a689484de220dcb92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589335b43a51e5e1fc42eb03227dd10c0
SHA11d63aaac5bda3bacd218435a80a6b4d09b88b1ce
SHA25681cb80138214b0464f68755e689e06b6a93ca8d28d227aa437403c4dd33c9c23
SHA512ae239b61f49d41b61225a0652af3e1dd679d37f6bcaf31f4492ab306ee334845dfc428b89c6dfb93691663df8f629dd4a4a86c02fa95dce812ce4c7ef0a5bba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5032ac4fe089f7629d5a3b26ecda897ba
SHA11a9ac5c9e5985bd7b4edfdefda10d0436f0cb8eb
SHA2564060c9975454975878e3fb27f359a97c8a9207ce55c339b6a49b48a4a2c0ad67
SHA5123a5da6e4a65e4e0512ea0d4976016102cdf621fb755c4a71c94cc5e54ad0a768df8b12ee359cb2369c9095424aecc3c77cb353835c941e13a38ee89ecce489d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54812b3a23d01e41351fbdaa8313796a4
SHA1ae32a71ee52a83f9d12d6ee3bcdfa20c2509c767
SHA2563343e97484188d965b4a83684b8b4a477c90e781e0726811d67923880c553caa
SHA51289bd6e567d0d2a17cbb9825824ada2ce120422fc29601e16391476f3b588b968aabdb085d47a26ed919a9d3f738ca66287c79cf75975926226ac19bfd22cae2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570d7cc3439a1849637a0f8467db00968
SHA1998d0a50976a4b956088d0c1da8c4a8bde2101e2
SHA2561d599fbad361e96d27f16891a9cee6e7028f2cc21bf463567d3ff32bf23249e2
SHA512e3a584157c77a94a584e964d7064536149fed7fbf3fe8fd0554a4190e14e49723df26ba3c8d803c081e602d46414152a9ff8a32a5375c83a2a3469b2ce9c43c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f8718aa382992f7b304a0ca0073e6f1
SHA101b31aaa6a1a20c19f9c547243c6fc0a8358067d
SHA256b731c9249b2af6117781b530f11824b9932336a582a4454ef98ea9019386ebd8
SHA5121e4dc51ae9ed5b50dff14994a90de058ecd877ded243c80c53e86f617dbd9eb61d751f7d609e70606b0efa265bc5111cc06ab3a1f21552c6a44ca3a2770f3b4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6fbe3bd29b1da3c84275513d1cf317b
SHA15f8bb00ec5a98e218d99055dea4992d2719daee9
SHA256d7e6f1b794d8ec62e016df8ec80221c8a532717f7415100b1d25fc9ddcacfea1
SHA512c03bec0aced5a44d630c1f6aa57806ede5230292e34b5d9a7351e7b0acb687b785993b855f0fec869bdbeb34a01146100ce3dd604ffde462f394e9af0a3d659f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7e9bc4b9ad21acfd848ea2b76c8e377
SHA181c4cc09468b10619b7a5026d99f47fabeb3b539
SHA256d7f72f693970e742275497a896613ed8133d9649479bdefa47496c2f74fb4788
SHA5122b97c13f029cecab9f224c27cb9deda61e7b376dbb5f25f7885282fcb17ec1fca42e8991001994fb972b591945d9384a7ab49fba369798c2bd63d30e335adc69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f34c74ada82fa62d743cb468b6f78043
SHA193cc7ba8753f6757c2f5dea13871778a6145fdde
SHA256c9ad5e3c39c389da1dfeccf341d7cfdea30380c1eead94a96108e42b27918f54
SHA512fc4b34acc5dae100249d1c51c7cfde942d75c7b448a5a23113c83c49e4260ae2e0caf5584329381d61f5b76f0b7e8df79b8f93ed57adbdf1c79d8b4a0ba66601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b04d091ad53db09b32406b2919b662e2
SHA13885ab5f24319523a8229cd2d14510d527a1e5d0
SHA25655f39838ed9681bb3a9a0bac69a15185d7ab816683065a74bfa1536b56d8f88d
SHA5126fd059e236a325357ea2ed680c594859b507627cba43be711f58e8b035db23f3ef14f31849ce6908c3b87a63a49cd48985c165821e0b27e0e5d323ae5c95f929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a21964b42597a91a1fd5c730aa8be94
SHA11f80eacb297dc3541ad8f2fb2a0bf0efcfcec904
SHA25651fcc623973bd4b54440b87c805e3497c9d54ea72024ff9f49b0f89723e447ce
SHA51207482a35b585281295962c6047125aee26abbee99d051a6c918bcf352db8a181610121cba098615c940fe98ca7f18c2f243bd347f24611fc0d4d3f066ed09151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b84adb149ea42a00f23873687a3b49aa
SHA13394354cfff0f4bfad9ff7c456e731655be569f6
SHA256bf0cede538c6b491eff105e1ab255c4e2d5e93223b804f312ad66ecc4962c2fa
SHA512efefe257a25d224b3e4cdeb06bae225c151542501987f4e54f8201af6c87923efd2759b21bcc3272b3c23b167138fa15bedc853bf6714d57d4d9ca3430d56374
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S8GI6B9B\normal_post[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b