Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 01:08
Static task
static1
Behavioral task
behavioral1
Sample
ea4f55ccf15d465bc87c14d3c9d1606e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea4f55ccf15d465bc87c14d3c9d1606e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea4f55ccf15d465bc87c14d3c9d1606e_JaffaCakes118.html
-
Size
23KB
-
MD5
ea4f55ccf15d465bc87c14d3c9d1606e
-
SHA1
88a865f87a953bb924669accbeacd460b0c8914b
-
SHA256
43c44d8b0e7e0c2360acea76b8aaedcaa5bb2825f44681a057799758aeec8932
-
SHA512
90294b5b296dc19d1afbd870dda608e02848c4c8757ec5ded95d2e5eda332b591944141b14b20582bacafcaf7fecce2cb6e27a516fd71d9209fca0cd26ce7534
-
SSDEEP
384:0jYcHgYXso/n+57aGA0c7iGgxuLwMKFMpqPPo2XWU/KSS0zasZJ4LpW8WAmjaNtw:0jYcHYov90c7e4LG+pcA2mU/rSea+4LO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e038c979300adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A565E4D1-7623-11EF-9A0C-EE33E2B06AA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000be2f1d2856628672fef5b202113302077f56845fe1885da6444187decee91cb5000000000e8000000002000020000000c1d7ce6acbc4e8c66c70de9eccb889da7e2ba3e4cc57ca7b42946efee5400f302000000002a6da87c02277b1e0972eb8f592652541be118663d32f4a7e190afbe017dfb8400000003588cf0e4d069c753f2548586c334b876c368e72f04a8ac76f24c24d13892f4f15263223fc46de77b0b02baef1d08d0f94c12f174da4f9dfbd93fc2fefb25dbf iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432869962" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2416 iexplore.exe 2416 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2372 2416 iexplore.exe 30 PID 2416 wrote to memory of 2372 2416 iexplore.exe 30 PID 2416 wrote to memory of 2372 2416 iexplore.exe 30 PID 2416 wrote to memory of 2372 2416 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea4f55ccf15d465bc87c14d3c9d1606e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2b5eb5c245c74fae282dd48699de71d
SHA13488e26b591eb42f0b18bf2e6414e266af5c69e5
SHA25639c52a678b684bafa0e7e55d93b18d0d07386d482e3a0cb0ba290d05f69c712e
SHA512e8a2371a2ff1bace7d3aef5f41f5076bdcd2e5b452c79edd0a969b798e07e27ed194373555bd185437a9719d6f49a289ce0d9cc114a3923a944f58f641b293b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4393f4afb878cd40d4edd12d1d289a4
SHA1a58896dc4e998b361378ba75da164ebf0a2d8842
SHA2565d71c5a828359ce46f9ec770b37e7db95f150cda8af4ed38a5285c27813a42a3
SHA51212925562af1f1e17c540ab93e5e90a0e0a5633787b5eeb15a9f9e908687ec1d7cddb3c8b6861d2c66996859e204873d64f9e08b60ff426c462b04ce8b6b08f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5332e617ca48a8ec7e5b8dd2f192d1e0d
SHA1593d1aa36758044b5f495be871a5ebc2d4984ebf
SHA2561a7290c0429cf04de2c713b3bac752fb26ff88bfd16b151368d0d42fa7ebe636
SHA512f1650a0b47089392e8cfbfcda1c36bf1a3c86c5c934e36403fd525c454d38d0bb4406074056814189b89a00f1feb8f316fee310f6e66e3ba29ddbb9754984231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5047a193c73e5be24d232aa4af1c28d83
SHA12effa29ee236c87760a337d473b1018f918d8ced
SHA25674be386fbaa81b7708cecba7b4e205b1d6023137d7f454df355dea11d0fcf2ce
SHA512d116be512070badab41d3a1731692de1fb077bc57023b12a22d896fba7d07485115fa7fc64f04a0032be36a0599c01b3a3955b528af93b26d484f97238dcabeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd2c816d1bc767301d05521d246e9b30
SHA15b2d385d47ad59a118bc331a5146aedea7e7527f
SHA256783826ed1003d6dfd579e1db6d83427b225e70e29fe59533b99b0a7ad695ad05
SHA512a289c524a8f7e6da8bc633de65ad155292f71becd774470c672cf68dc18febfaf1617e78f866724b8f047e337e485b57dca014ad3543ab03aea8fae280743661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c314c0a33057f5649d043051950c490c
SHA13214415cdef19e1139c2e675979f3d4e1510e6dd
SHA2564931d084ab9e3489d26350ce02ed974ad962f138428490aea53aba1945d2f4d5
SHA512eb6cb31f1574b1e55442c61e91a1d8b936e27106644183497968260fa2e46b7d420ec25e86bc467946b43a471c237af4aed24bb56bbaa16d4cd539be28219c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaeb621ec436f7ba771b331a4d0da5b9
SHA1bbeda668266b83e2479bf5e1e9887ee674d90e72
SHA2564f82719a0112bbb4215e0bc6e71025c11f1b44ec2b2b8343c82a2e50214a2140
SHA512deb2a7a1c6504867ef0e1d3e085e8a81f57bd1ae3e256c3225813990923fe1236da858a1088dcb0eec0e59ee0a849fb3b6e2c9aabe8f1112c0bd793ec397f789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503a7b059de87ce7f56fce0e24f6679a7
SHA104aa07fc333bac5ce72e281ba5b68312983270b0
SHA2560fcdedfe9f1c453553c90bd7639541bb8b07314e9f47a1fedae03cd8bbe3af08
SHA512e8fe68030d20e1d5f2fe80e1304094d9a98f38e44edcb16128a86716ba614455fd976f98d55f33fd24658c8356cdb31d7aa418e838b0d954704b9e7f2cd8c424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50713e39e72809fa2f4c6e409a519a419
SHA180e3d3fa07b2a4b3f919cc10b7da28621f4e6264
SHA2567011ddbc0020d48e98160a1bda8371399c9309044b6ffc751ddb85f7d61f74ee
SHA512dfae240715638e935b0eb8ce76ba3d90a1de86a5a89200cd35a21d43ab17bddf05eb773b7851e17fabf739611cd442eaa9f81343dfeb2d06cb490f7e5e29a404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e6230f5e5bbd92e5a4ee3afd5000914
SHA10e1d0148c40ec5010f9c0e4fd03dc194cf1e55fe
SHA256795a0499edd94f059703496a89554b5338c7e8fb34f2144194563a1ffabb4a16
SHA51225f2ac765f12dbf13b387e41dee568c98d40be1f95d3e17d4b7387c1625714373542e386240d50117adbe5cbc301578466ab364b708f2161f58dd0388fd410bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abccd56bcdc0ed109380e63807bc461c
SHA1c62bdea4ffb2a81770bb671e72e3646411a96bcf
SHA256dec48556eb0f9e610caad5f426e8cf07853eb489a13a0fad3115203db3c0c428
SHA512ae21c0a103e2dc37c0ea4192804f62bb5029248b8dc396b4231bca570cfdbdcdb021da37985148cd7a3218539a434585686c50b90fca60fccf21d7355cf08517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f94bcec94c9afc4c80d1826a9a70612f
SHA1e40d2172b393317e19c2aa4545f581a20d291af6
SHA256cc3747c4cfdb050954abb1c860f258ed2c8be767551d5697e15ccb5966dc3744
SHA512ff37237428525633ac06fd7d89816620f6d484bb6c636ca47a2fde49c0d467ee44a969ba38e191ba6ce29022ced8a6f6e4301a262808403a47571b0c10bdfbc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585752a1442c02a0258300f5d158c563f
SHA1f7934c932a45b2ea92b87dc7c62a904692f4a4da
SHA2562ea2a76c4708509b25a47b56e613264f097c14e201b8403813b7a105d9f72e0c
SHA51294333e5bb309978f8febf2ccaf3023c1579b4d7de0848b58d3679ab5f3aec001dab0d4c13668af1b03f5986598cb8ec6f2d34f6d0e49ff8798ae1e5a3f8286d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7a7e22808478edd941f8cf2e0efb99b
SHA14fb626c6b48cb5ffde629d5879b51754d31c75ba
SHA2567568397817d09e20a5fbe5cb46a3ee3d601bdc3332d2660e361930e52918547c
SHA5121d90b9a4488ef1d5870880939a0cc0a8e197fc6039b12a075188899edfeb0ef107be4932760fbc125edc9573a6a010518c4f7f0832dafdd48800895e7409c8d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adb78a15072abcabf302b3abd3c5df5c
SHA1e1808d4b56f15ed96fc59662f3362fa7c33294ce
SHA256515434fb80c9e2e4b0f14dc2bd1123f91910b876caa7fddf50867bb7528a7ac3
SHA5126bde02309c14f704411deba824212f55932b59c7ebde7f5101a1e83ea363ca21e9bd3897e0a2f69777b66e492033f01ae5a1a02c17be65bc2a65d83aa4366087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dbd2759abf5dc8008082799f57761fb
SHA1f2ef90a8432f3c8aca3c68eafb3d30eb55dbb9c2
SHA256df616d8c832bf5a8b8076c5c615621acb80c0fb974dfd744cbcddaf49ecfaa6b
SHA51201060e82519edf176aa443ce3eba503526118f1ea3117c4fda02491ba056728a11cdf27dfc61820f22d30256545e422c3d651f82586191af45527789c22a0340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beba7b15442488af60fbe845cd6c259f
SHA144740b0da41e03545c6fc9afab755b5c235c6e61
SHA256445be8bcda2a8975bcb3ac37c195caa463d1ae6712fd6de3ec460d6b6f58a52f
SHA5128a62cb09bbb3c3a2c3765c55326b4184592e8e2e0d6c468ebd4c63fb648939230c544032e0001fbe3f2361351f79fb159edd335f43ef67c162f67c81b163fb76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a971c55bcfec3b367d27c8423764617c
SHA1a603deb44d366fe423cd99d5393d0096299e5aa7
SHA2568d48d5ac7bd2ed59378158d6c6594517b150875839107c014019ffd7f579a583
SHA512331b87fc349b49933d1a28d266878681bab02db8967b1e8629268842b038d68c3fd6e685c1b76320e0f5ccdcbe02714f6fab58c2c106e8723de57b9b3b993a84
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b