Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
ef103d184b0a33b4681c2f59c3d60b54_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef103d184b0a33b4681c2f59c3d60b54_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef103d184b0a33b4681c2f59c3d60b54_JaffaCakes118.html
-
Size
26KB
-
MD5
ef103d184b0a33b4681c2f59c3d60b54
-
SHA1
498af31267dc1b0ad93127d67d50037537d553a8
-
SHA256
63f55673d38f05b5b031ca4d622980bad7d60d631cbd9e9ed5905b6e8b849aa3
-
SHA512
8ad72bcea0a81a08107a8dd86aee0d22ae56532ad82560fb889d227cfde7a34ce0ddd56ff84c48f905e4bf976c190998cdc5ade3abfeec296fd685520b9a9aeb
-
SSDEEP
384:3pUTpeBwCUDOdPFTGE1AKPWmX7h95d2Q2O/qcVoCyeEdncL3F8l8bVVk7:3pUeTUDOddVLb5kQxX8vdcL3MYVO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433054601" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90a8375fde0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8A0ED201-77D1-11EF-A6BB-F2DF7204BD4F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000b55d21d835bafed25b7d6c38d0ad8107b27d780c2264a1efda98bf1a545b807f000000000e8000000002000020000000dfa247f029b5c0df836709dc2b75281736feb39ec753c57043f4e96be146c40620000000db99dfef395a64c0d49bf79e4966f73ab6ff120d410b71476e16836b8f71f70a40000000ccca4c2ecd436c3e17b25b69c8b0755a82aa3249ecc15d45e1cf2afa4a98c511bb90a23817775d65a35eff24351f2e586019fcab0d2a6ce48fe58be24b9f68d8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2816 2168 iexplore.exe 29 PID 2168 wrote to memory of 2816 2168 iexplore.exe 29 PID 2168 wrote to memory of 2816 2168 iexplore.exe 29 PID 2168 wrote to memory of 2816 2168 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef103d184b0a33b4681c2f59c3d60b54_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5389317c6c5c819061ddd27e9ee8235d3
SHA19ad3355cd53fcee7c92d1e783047c621086b4f36
SHA256b2a8cdb1cc5d9c8a72f4a890ef7c18df42244df96d4c3d725f67e1051860f95c
SHA5126e00120ef819667744d4db95d301e1ea41a2d5e80300a83143370c8e97a5abdbf6160c44c2f590100b81cc7f11a314e6fa58288302276b5fb5504d46cce99234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1455741b39f287891057138070dfc86
SHA180c8a288b64b85a1d931cbcdc46fc04fdd6b14e5
SHA256eb5eb08e00ab591005572b41bf2a5e8045e600ba91762677421d2bbf0d12295d
SHA5128c4c25b6f13b2cf57cd852492c5b061fbd0e07ec650f8ae8050158745f7b99e851c8ff2e7d37dc26da48e91ad825df24a20a758f4567f520cf435402af289632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edf6de5d9b275e5930542f48114bc5d7
SHA1893341d6808f97633f3531b53bcd12bd730e720a
SHA25629efacb42fdbc2f4a14536a7499a7ba9cbf51572571967f1906a35b85eaa36be
SHA5127051793b5ec552588ef118d12dd7eb871df6e0af7b1b20a2b0dd385669720ee15aa58f0aab71e8448a3b4313b378e4279aac82b123769f75f6dbb35e4bd7f6cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a71d883ff3adfb1baf50e074dca82871
SHA1609cb75a863a6e12d202f36d4d6322c99ddc0b2f
SHA25622e5830549fae1eb31e3c5b84542067ef69066a1b2131f1279536df373981dd9
SHA5121962660a2764fee3c745ea0dca9ebf92271126b474ee925a1e65edca6b24e599da0ae81e3a992ebcc5c04a376f930b6ec64e1a79de886919e13f0137350cb6a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5015e526d2af4e9a8bcd7c7f8f4a5007d
SHA18eb83bfe1cbd9e58f1a54505066e7e7a455137cf
SHA2564eeb193221582305bce25ade2bd538f2ceef2eaf4f5ed8bff03034464883da6e
SHA51205c932eb4d13674f49c5139d4dc039fc51c63859080fd1fb2158599f104af450b7408654ee883a06dbdff4fcaa70eaae14647fd6b3426905ab00bf2b4c883c72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c61eac7bf83275c993bede48230270c
SHA145ea998fda70680fe349efc4c0f7e819b0295f85
SHA25673234c910e6141bdbec3eb6826acab5398505307ce3d9c0a76c46da3f6269500
SHA51217991cd585c51b8f425ce07fab80494b9153e030559cb9b17235013a2794a7866d0648facf03abc5f59e6c78fccacaca921b2b06939da666a117edc866ec8512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59287dddd11c0aff5bd249ef8aa9807f4
SHA108a1a77ea8b4d5474e71c829556e7753978babdb
SHA2564265ee65a93b09fcba8eb5d9d3c037960af866d67b6f7981973a2873c2289cff
SHA512d059a5558a8bb6522012ad05341b7fb74f964e0b432ed2892f77f545ca88f8434e5083889f2610c615c386d09685df54064993268c467bcd5244e9b85930846d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a4edf04b41e17d940151e050cf05ffe
SHA1000382afca06a6e76a5ad7d5397025571d3a82ae
SHA256af0c9b0cc78b6f1b0d8de4f32a73b4d811d0c81e0f8d2bfacb4a950e25c61b52
SHA512557a83f391a5c6e96874ba6faa3e60bb3818ee7338785c32b9c43d1024c6942312f2f5bc990a6cdef030e1e94e13e51d6a3f497068ae654248cffb8cb81be3a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcb2b67bdeabbb6e2781507e0db6c074
SHA15ede5988121ef6b9c22dba07952c5bcc710dba28
SHA256821e25fc11a33da979cfce8025065c2c74d7e65192f301ea3a057e4dcf2d6c89
SHA5122b3f1206d826afc9cc8df50aa00431432ebd74c46a10ef17a9e7296f58918db4cb0778bc627b5aff4b7c8a3c875816f0e0bbd7d51eeb10d8ff528dc509891baa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54783342ac4f52e553a13f0c5a9cae733
SHA163e03b3ec2616294c232613f591b42ca6e51ddc6
SHA256a26c4745b07e1fd1d3783cf49b4e0d89c2737e5ce04861715325de9d40a4e771
SHA5122348bf6f037e2d5ba2d0466fb6642e14ee032798db2d48fed3eeb48817d38e41a05dcd36a042c1d29767ac3df36b2c35b05b854f4af65be6abd1de6589aeb24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3f1d876f61a1ffc1956e2255106c44b
SHA14dff4aa5fa5bc95c5f1a5123664cbe81df78be79
SHA25693261029976daaee3a61580082e4d96e4b7e1678998211c096e721742020ba99
SHA512e6c41fe5f08821a4ac1c38584ebd1c521f60e1f07b179b83b90a1ab0b32d102e9a14ee23d119ae536a1833e7dabab540d1876964bcaad5debbafb98e6896c5ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569a50ba391df16fc0f443535dd326602
SHA18d15c3dcdb9fd5bc558cc8a8c645d04625a86dbd
SHA256a12e35fbff32dc55bbb6bac22ddbc37755326e5150a280bf4511074e84ca093b
SHA5123f42035f621b1c3ae61aa8dc23c2d399064421d641006057078c7971e128c2f828f0dbaeec42507285c9f4f7bf8f314ba5ecb09b8b916b5d37d06877e11d96f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f3a85cc029f747c0ba8a3c9e0e71f80
SHA1ea91f6f291e9ea1775846a678b4f8ece8d06591b
SHA2562b58be36ec988c5129ff9bc9f745bd6b760a7f28322ccf070d51b4c649f9e20d
SHA5128d27daeed0964f276c0ffc544862f06f520303cb5cb9c3141e81027436e52bdb635b1eafb7b54a05214678b589ae592283ec5a8e213f614a66a7012b8b5fb589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58888a592fe12c61c1f98754c1273280a
SHA1108faf574d6f12e70a4672dd5209b2b5d747f160
SHA25614f9210c15d3cccfc05ff2a1e3fa3c70b7db98043ffc20dfceb9532c0e282de4
SHA512333164357decc416903d689e8a0cc3fbb6db80b644c4398306becdadb1d5a6a1af63b19325f478c21fb9f86d97ebc9ac1e131f5619a8ac2b3c9dab0aaa4891fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bab793ed4f9b4f4197c173316478b267
SHA1177e271633a61de75e700a58d07d0d05dc419b0a
SHA25672f32ec7266093024c8428aff29e1b27675392d6526a117240c68c501acd8fe3
SHA51269489223acf4e9dfa672e541ffca4cfedbddf7b15b8d27788926bb2f1b408ee805fee46bcacb6701d790a5492b2444eaea70bac4e3b9fc4184ac2f01555466d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c6705ef99ca2549eb7321a37a4654d2
SHA187a24500eb64344d834fa309e04871d1307ccee3
SHA25653132092dfcd9bee672036835ea12a5f9b6826cca2fab8ee4f532d2abcbefaa7
SHA5122202d2d0dbd8994ab134a7950427f01282e60518a8680ee15eb0519a1956d256db3585071591385ee89ca8fdd5eabb4950d6e228adc7a033fc1dd19425c6d18b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541aafc1ffc513a98b96afa343ff0c771
SHA14b5c67bcfb3628594d76eed062f2ee579a4bbfe3
SHA256ba8755e9ed6c2d77a7165ac70f74bc8661bffe38d00993fd129b9c386a4a7772
SHA512d44072f10dac1145b94e2f3d08cbe4f1a6669635999645acbf569f267cdb72c49a14b3180864812540c59321bea5e160cc9ff87e29bc809a85ccca2157d8f8b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acd4dfde1aa3adcad032ab08ed518ddb
SHA13a11aad8c80b0c23db6b9eff75c8d779b479059e
SHA256c73794ee4ae80e5ae61adf5873469fd8e8c6a5025025923bb25c6898aa984cdf
SHA512ba7d9db42160a01f08d4abb73c32d336945aff3079e014267cafb222c115cb9e6920475adca32f3db0a359064f53675ac96edcff017bc95906e9922112fd810a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dad579393c38e709c7f2717b23532c0b
SHA1e60feb92c0a4067dec5c863f63e5552ebcc4a21f
SHA256c76f1b45a4eca16f9a90b5273e41958a34f87f6e101d6b64d1234c22a9d4d507
SHA512189521badea2d1b4475adeae1cc242d571e9a0c68fd4f0d646a87711fe8b56233d2b840212494589023b7e71055767ae249846b1212222cdf37ba7c655fa54ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b224ad60a379ab96fe96ba56fb9cd3ef
SHA1afb62c3086b0a206e6dda8e444116839b923a116
SHA2566d8ece0e1fcff2b3ece661710a1333014f7d1b20b5906c4b6fdc41955e3d10cd
SHA512d139ab557afc15fb01973f4f5747be71eab17b5d16992f427a2d9040a5f00d031242eb077fa73187630101e3a5aa96d5ce87892cb3052cf53a84ebe4f102c7b9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b