Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
eab228d30981a5bae6cdd832b0f8965c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eab228d30981a5bae6cdd832b0f8965c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab228d30981a5bae6cdd832b0f8965c_JaffaCakes118.html
-
Size
125KB
-
MD5
eab228d30981a5bae6cdd832b0f8965c
-
SHA1
c7ea417f1712c58408a2ebd630704c7d03b62f0e
-
SHA256
f7d46b61132354d41f60642eed3b9b65272890e5429c866331969159c3350617
-
SHA512
88d99c3c7f02233f96902baaf1cacebf664dd697ef6ae0f85a3007afca6ea23d41e58ed12300e7e440347e42e5079778e011b3696ed6fe6c633fe93df770eaa3
-
SSDEEP
1536:SKECCCCC22222ZZZhhh22277777OOOOOi3mANVSuKArYin8AVFX722NMNQRmNByt:SbPOV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432886617" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6C8E47C1-764A-11EF-93F3-6E739D7B0BBB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000077e81f39e4a7c99a8775c217e311d4960bf5e5fcb8e3a9eca9205d3dcd972759000000000e8000000002000020000000c89981aa86e75e963398d0e19dd94e55463290e50458edb802de67a06092621320000000b6ec4ab0d5a96ae97076ff41b78a087e41580d449aac9ecd9096d1ff8c1e8fb240000000bb157e3559d6270a54d01f14171eb3a2c4b189ee96c4cb796037159241968c327e5e18642d9b58af310f6a1851198c987819961a67d7ebd9a3a52751edf51f76 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0496545570adb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 1568 3032 iexplore.exe 31 PID 3032 wrote to memory of 1568 3032 iexplore.exe 31 PID 3032 wrote to memory of 1568 3032 iexplore.exe 31 PID 3032 wrote to memory of 1568 3032 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab228d30981a5bae6cdd832b0f8965c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f39a1d608d63e37170400516c85c4ec
SHA1ed6b7bd9db96743294117d3bad81a18fc4d66fe1
SHA25659938280c4f1d0c98ae74f6ab82018fd58abd2fc8bdfb691a4fbb0034e6a74e9
SHA5122c8f7afacde6c9b730af196d81304809e2555fcdca3ba168d9d394dc02034ac90d4107771c5483160281e6098317a72c6e8b7aa4d683bdd626dbd0e620af7202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be7950c73fd31d83b80a4f4a53180b97
SHA19b09e087a8f61b2336ca12360e8f6e3c1ea898bd
SHA2568b6b1e17e5f154fcc41c4279e6ac3c0efccfd4625692a73e67fe04ffd8d92783
SHA512c2acf879ba95d28aa03687340345f5b3409f4dc414a7b474b90bd405be0e38a15c4440794cbece7e04e54e399dea6363755758a0fd209156a80005b6bf576ed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5678f1d63edaab805d154d93fdfd51c8e
SHA13e93db66ed2e9e5759968ac8287f5a606a9b0c3c
SHA256dca807c284c4bd301887f1e98267b5400b3ad1bd2ec23e30ce4b0597f355c403
SHA5129269f6d00f87387e7b8ecf8aa4abf7aba0029a5d89fdc609c1d7cbf147841094430b7e5706c3d3085017235a30ef61c1b33bde0df098fa9fdd9a02f5d9aa611f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53087387fecc943a32dfe148642192fbf
SHA1c2d5b2d61b1a73d613d4767826f5a8c76d02116e
SHA25674285e0dbff291b39318c02f031f80906fd118356def192dcb90c24e362cb565
SHA512b51d6874e92c29e60e5b515e22220664c560251d50328d8313a2b0bda0e5d59001c4db67055d5d8e14d8c0e1ef89243483e76ccb22320fb3669750d767fed0da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516c577da827e4114057130bd88c87713
SHA1c25c58364717ac54d8c58a3c8a7cc8605f782345
SHA25654964f7254c8f4edac66b78bf9e51f05d6e3f53f0ddc546018c9fde32a694d94
SHA51284d793112aa6c8e3c4cf2a5245c11f3154968e9fa0ae505828a8beecf74124d462790f51aeae6a09d92e1c3f04055fe463e0742165a9a12c3ef5febb7bef0f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d501ec7176d557d72b386d3885d78da3
SHA13b57e9ac550730b105ab9f5837dbde8deddf9ad4
SHA256834c89e7c2c12cc611bb3fec12f70747ad298ae5f7f165646b995d5030623014
SHA5122dcc4978d3ee27591097565281a2a6c2cd81811456ba6748661b76f768c8ab1fa533a160b1a88b1dc19ac5f14a3695521eb56fec35d93564118f76c72aa5ab67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536b1ee2735a65ae68c4d0231e200764f
SHA1df5853697a531a1a276d6ad74a999fb06fd20f08
SHA256efc80edbb2af47ce4b55af4d0ae04d8a3ea675085d5ecb8fde704376945a96ae
SHA5129a91f222a34a71da442314e8a955be38b5ff4c735a8f7d34c302830557035c0fcadab36feb7ed134491f0f57821569c2e0d9fc17c4f453e467ce9871714ec6e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54321df2044e8f7124c505d923954215b
SHA19a75dcab1433ed80dfc2f009f68e5c94fbafb1e3
SHA256802f71d3ae6ffd4ec20ed3bc5af96dfa9318ad595c595a35ad190637908578c0
SHA512865c586d452fc5f800a8c268194cf51b377b94b426eb66003eafdd3dfea28d603c4f9d93aa59a387fdc7e5c00eec3bb3d9bd33e47dcbfe21b3c90d37ae8c4f5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acffb49fa03ffba25a21499ae6b4662f
SHA1800d4989ac9e33d1fa346ec3427fc3bbd5d3bc17
SHA256c090f3638338dc735187c009d6c7b766779c31ead334c199ff39dd7e6ada3db6
SHA5120354f2f009302e935e61efad8cf106f4f0737a0355c8c46d45b5f0c86bbb77b0639a0d4ae5082ee840b2a966be6a467678e3dea776676e87de41b8c9f02a9df4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9916962af5964d73040018175d7c426
SHA16bae66203752dadeaa55714f031f077deca99641
SHA25616e07137ab35c9e1b7b24afae68fecd1ded450fa5fa8bc61c08e4bc3e355fb78
SHA5122c112f114ee59e9af9b4c350df317f1f9fe1dbc77e55ebb3aeb1ba32c92515945751d397c097242409a4a81230eece6c3d02be9879dfad7c0a039a925a57c1d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef8628fac98b6e17dbb222bbd873ec92
SHA15665fe3cd91f6ad69ec3dd9c212c56fb5283708b
SHA256e7df28452dea193c66a3aa768378a508a3a071e84827d7061653689983fda663
SHA512e5244b2d712d52f3a344188d83e3a7813bf659de9cdbad3ef0f1eb76008cf8bd08db305d5e67cbc7e4b047e2508e28720747ab603bad21261f5f8fcfb3d45d07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570f039ab0158741fa6ebf2014e902940
SHA1a0fb628269e2eb3cbb125945b647bddaf81d43c3
SHA256841d5431bf88b71a5247a8fa81dbcbad56452f13332a367782370dd3b0f11c29
SHA512046b533cf48a2fac9784e890c4bc1b5b039f2069aa1789b94b7577876cbc780762c231760f4c4d8cb0cf0d46b838ed5d954e78e256f136c9911ac6d42f5fab6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d3bcd947fb34f4877446dab4fffc090
SHA1e0d4075fe6b40449888add66c0c882c70448eca0
SHA2568a043ca36a9c8397f6236ca3e36a26adf9d0f69602206eec81f9a820f6c62cd1
SHA5128ed6a401bba4ae169916e1831cb460f1053bd12c9ae70c74b48c5104e673258f237dda3f2f4710287f56736513641d41fb01f368ebb6ac6d1169df9aba759d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8d9b3f3347ddbf225ce150b2e9d7ad8
SHA10ed54d5a27ce7fdb2027a384ea188966940c2cb8
SHA256d8e086fb87708adcf1ec11d57b6823a315a3e2208c390cffa56c849dbb578b91
SHA5126b2c1ff10718871da65fc8c4302cb887b8401e481d8aab74246e3645e7d2a10f390ebfcd0c0ee5f22f455f33224991700e9063b1b6939c509a2c238065a156cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e0803bda791dfedf60048af33c604a0
SHA1f0db0671ca29e5205ed013fbc4ce91a92391a0a4
SHA25671f6a1e18dec8d37df6e8260bb5a7f41e562a83c86f415b61dd1101ebf656d7b
SHA512569bcfae30254907ba5d4194539435d7f1a8ad29d7da912493c1bc821110da5613beb5a821447731e5d427a7a4fa34091b75bb7070006b9f441a1a09e8b3a2c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d070a4aed7392c8e919f53b2b245501
SHA1ead85612ba6e1ac04ad95f55a3ac3bde41db9d1f
SHA2561fbd37399a8878ec8342a066a4f2afa08bec5ce6f12a39511865f1c9c96af604
SHA51285205fa6860945bae912662b81a6eb762dd7be1549627560c6ba86d247bde017f9712497dbc913fa6eba7deefcfd5af86289089480e5ab972542ed61dec4295f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570134b9e81d09a83a3d73a5e3ea5d098
SHA1764b82d9552aec74b3bae30e371842c9e70c531f
SHA2561cf57f49b09d3881a64629754df10f0430add2f7820b22d8e163efe9656e656e
SHA512faaa46078e627ea0bcc3dfa561f3dc090a6c2ba608ba5b9611443ff565883c8ffbd5a5bb590e704c207425f672e2f8703fcda3989ed5723dca83f3b30830fa5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eef7444dc33882e1a450bc5a779b216b
SHA1ea786bf7762665635559202af45646c01ae8d449
SHA2569db9515ed7380276a27e05e5e938dc08c5a8a185bc27afb3f170c2254cd09e48
SHA51276fbca50b09c0f9218d895dfae9d9de88d318f8510f5b83ad4267a5e10ca606b1135bade3b3f85852139413d5d71b8011e22aa86d3e20c1db5395bbc8bffe5b5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b