Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
e1656f4fce5ccddf00ca3559b7b30422_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1656f4fce5ccddf00ca3559b7b30422_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1656f4fce5ccddf00ca3559b7b30422_JaffaCakes118.html
-
Size
49KB
-
MD5
e1656f4fce5ccddf00ca3559b7b30422
-
SHA1
a34cbdb7aba7b62989a0275f932c5cac377ce37b
-
SHA256
24d67a4d2f17a7e0b748b68c486663932519f94eb182bed33307bfd6db464e6d
-
SHA512
e0cd38db98f4c94fa8bdc8b08ec1db30dc6dafd5d447bb7b9622fddbeb0d5b6c80a785c166d3371b6b1bfe3c01c67fbd774565ca41df0dc1ffcd22aff194eecc
-
SSDEEP
1536:5SEBbCjIoJfFK0KpmBFfppQHZp7SHP7tbFiFuYFHF2nVzu:nBbCVJ9K6du
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88B1F3B1-72FE-11EF-9E99-E699F793024F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432524170" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000682f0656e5922b22fe8e0f7b5ac0be4508f0894acdcf6e284378263b99fe90d1000000000e8000000002000020000000c9ba4c814e94eff96907ff3f71bcf51e3f17ffd9d33909cc00d75229786127f520000000fa476e2965da97eef425c2a9371219b5ce1888f882680d0139c52da2c959fd3c40000000d7803e9a716ea028e886700fe770a478d2c016f1c2c2342bb7c47d6e16cd55d89cdb45d23f1dc0d57657549315452176dab7a71c489a63afa7bb2c6f6f723496 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 303a1e600b07db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 904 iexplore.exe 904 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 904 wrote to memory of 3064 904 iexplore.exe 29 PID 904 wrote to memory of 3064 904 iexplore.exe 29 PID 904 wrote to memory of 3064 904 iexplore.exe 29 PID 904 wrote to memory of 3064 904 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1656f4fce5ccddf00ca3559b7b30422_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:904 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5576191affc3135b099888fad26cbdb1b
SHA144b800e85b4c7f3b108b9653d8d092f55286b33a
SHA2562e6983194149c2e053745c0f0676ef8684491c11a3010114ae18f78ea8edab00
SHA512c32a5a741d51492da366a727df81e4ad9388d06f74f670fd28185db70ad3e6cb7b94e214b81e4f903271c0a0013cc871d4e0574bdd1772800ade8369fd3412a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e59af455156962d9e27f6f0068f447d
SHA14984dd58054a2f9a8bde3680372dbd3c9f679050
SHA2566d2104d64b19230f0f65fab0bbeb086067f01cc08013b83beb4707fca921e238
SHA51262675152389c0297b954c8469fe5f5bc8b27ff87045d20d399bb0d7bb7c88fd5cc699a3ea2f6ea801e12f99ada7298a3e753fefb8e138cc5b86807ca973ad5a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a849a6d3ab424b7020d458452529ba41
SHA1e3a80cb6b19a541b972e9850c937552cb90981dc
SHA25633fa0932b3d5e99fe2f63f1dc5fb3fab1284b7cf6d2e4807529a5d77888ae6b2
SHA51252fca69e31565c0a1c6c204daaab94b53661b05532b16836d8655239795c7f5703a4f8b0fbdc4ddb7315919a0f81938e0d12ad3e67c5bc8379f14af5810872d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5741cbcd4077c05d54964fb35d78e5d55
SHA1535fc98488badce71717bd8f39b3dd67e1cca7cf
SHA25613fcc147ca58c9c25dbb39169a77abf565b3582c6ea2df9ca7ec76891dd130d9
SHA512a1e88d7d2d85cfff86d2e3e44e3b3456f1f1ce1f75895fce227166995d370dc915dd9497df6506a54eec5396a69ac3aa869eb6391985d5136b3d75d57edd6fa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bfad1faa9aa2c3e9ac6a50623ebce79
SHA17527d2df0d77c7d626f4023107efeed5779fa1fc
SHA256d090185be5375c8e45a4b9dd1aa5bfdd9352ad6d56f96a3bed5771944f0fda9d
SHA512647cd281f6fd53d8533da195014e31cdf3d92d5653c61a131c05c1b1d38c13788efe388550f3f968776cb990a4ed716946a719447d6ca4da78450a720eb5012c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f089ca5543872f9994ab463b18582660
SHA1811ed8d4004fe774fcd77f8f3754ea97c3d68e58
SHA25627652d24c6fe07803899a5a65e31d91d6406bbb51d1165098ed8e915026fed5a
SHA512f3d8d146709c8f10bfa8476ebdf8b7134a9c248a784ff7f269ad640168bd90b495c77e4491c10ccfa2f74260cf11e229553370be758caac1f14a5fda8d3a2c0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5059f79b844bb845e6b49fe1ed1639706
SHA1a640aa061bd37640d34a80c53d48ebd2d42aa9b0
SHA256e262b2889c5fbff027e825822e997448b0f12f4a4ab16187c34e80e4b32ea5d5
SHA512fc6cb3e3a2020a6edbf7702d398c57fc3b816e6b41a489e326f387b62d72dd056ae564010761fa4fdecf510f2f00e2dddfcdffd27e088f705cca7143ed09f3ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568d1fd1b7c9159c220dd8cfd3e7d9023
SHA1a4877067dae94bcf9010d4e60cd369383ed3df4d
SHA2564b894584bcf2699a7e9292eac2338f1a54d0aac36af8e401a6e37494fdf595f2
SHA512f12bbc1195faa949f0c022e8950222c32e32914e8157884b545810cd6c345f015b50cb90740e550289b719e59cd0774b6496f5d9163dbdf9aa5a6b6a36b292b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb6197878bad4614c9b9e5cc45ac7bf7
SHA1c8452657a0975951bf406c50b618f92629a1a022
SHA256999192c0ec52274e71908a7bff0e2c0a65a15552e6a21f308e3ccda9f80b424c
SHA5128b176590167a3933a8b1e78c7fbb6270e780e07271874bfc0b04984f170cc4c0a7a019a0956b2c6e466337ea331b5d5ef3381b75dc7db19859c42499243bde14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc4aa516235635a841150f7dbfaffbf1
SHA1489b210d28be0efdfe09625006942564abe05969
SHA256f871226d98fb95dc6e667e97669ba9d0aff73e553da22f71c4f2b06e41cb9ddc
SHA512a345ba949072e50b96d88cecf66f75a5dd33cc92b6f09b1aa6461cbc8cc9559d94c2a2d50f229a78cb9159b9140a79ac84053bdecc5c365bba1049d86476843c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab28512134c2b1f7f999657c1b2ddaf4
SHA15e397f2b1eed7ed12b1207a0b51fe25625edc604
SHA256975634ce738f0d705b3af4c962cbce9c21df4689ee15d787bbcca9477d31f646
SHA5120afb2815a2f44e7b97dfa52d3ab6755e461632aac5aad095177543bc83989e33fc5bdcc498e89aa73223736faf50eef01603e7670dbd9f97b0752eb12515764a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e33bd7030ab8205674a7ad0e3008a10
SHA1a3c4f150e6b3d486915ad88bf215c4f093883d39
SHA2561eda5cbc182ceb3f3b5aac2aff02c2b9c8241fd8d1c3b1a123e5f0a0f34ca7bc
SHA51270e43340a9d88eb7b6b57e4cf634681ec7e4febd7e9024b59a667b4f35aa358938bf6ebeb005e7ee9cf08c98772440f6e5093aa36ff7fff0498bfbc1f0484640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5027272be608893c38f8e57a334dc738e
SHA1b9a8fe5ba994bf7b7fe0f14389cf492cb5583b3b
SHA256151fa4cc3c0919b4b4dd964e79a48d312c82fdc8f052410d875790cb1b65c800
SHA5120acb6758fea6ab739347f576e774b033654446968488fa5562cb7ad52051ec760df698275ff101b6d4486163f957ab05c186bd3b6ad711ab12ef0c18cab91a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5632d91d96994f9507ba6624be5c47a43
SHA11871b03a35d0ed4855cd665a89807cb5d7b9d299
SHA256b31a52c3d84847119e7eea808ebe34dc4e7c88d0fe22d31d70ca7b70b5f5508c
SHA5127a348adfa4602c4947f71ed5f81e69c3be51940b04b4e7e17d4853472ff1c15465d27c916ebc8be2de8d59e75281eb4cd7df751e126d6d699dd1b48870030f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5676273b32f3539a4418d2645e40baa8b
SHA18a00779dc43910bccea506303e945f11a3756dbc
SHA2568ab0e9fb35212cf956a1145bcd0cf3295078a787613fe7b25670bec42923f7e2
SHA512977725018192960f4cadc6513cda3126c5518864a4c6210965cc1dd988111ecd45588c4cbee82d2f2064e3a811094668832fad63ac719f71e777c24fb84f69dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53270eef0ad81c2b21fd91faf5aae611e
SHA119b8e8642cf91623fe167cb97fdbad65d810634c
SHA2566dbef33130e77996c85e0a66a68ead1bf228705cc8add5304ac33ec86e8b79c3
SHA512622ee04db2bb3425ad1ab291e1a0d4b57990e8545c55837894a625f720fa53f399ae89a212b28aaa7a782abffc3f280f53b65aa2babe587cde84674f584fff3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531af117e0e82102ecd11f257dd8387b6
SHA18e7e9e5851069d092aba2798342f36b538203b5a
SHA256196af24d0c3de1070cb46dadfbf1f37add18e06dab47b9f8012c5ebbe0d35b71
SHA512df6e870e7e6ad8f1b3cd88510ab67c64275bf4d4fe85cdf7e1a0e7a882a84392b9c5c121c8a2410825f678f493339f995ac1252fa43eb35f8f61ce6c920951f5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b