Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 10:48
Static task
static1
Behavioral task
behavioral1
Sample
efa0d71ec97d994a48a6071eadf3011f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efa0d71ec97d994a48a6071eadf3011f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
efa0d71ec97d994a48a6071eadf3011f_JaffaCakes118.html
-
Size
39KB
-
MD5
efa0d71ec97d994a48a6071eadf3011f
-
SHA1
16de63e66e378af460583e9bfdb5c52bce35a0ac
-
SHA256
4403f975ce073d4df192ff3af3ffa5a6e13388280d874af564100e6d9d34c258
-
SHA512
5491a912da2d89446f674484088feec25a3be86b784fa0a121df524756fc8d13154081b96fdbc5a310d4ef147f1a4d2e4806875d7c5f5f58adf48f5e2caffad9
-
SSDEEP
384:eu6iKvo0lNW3gJxKb66iU8ITHmFKcy1rqGKq6/A3MlaGedplIMLGKEAdmO9Ex5pJ:qlPJBTTsqD/kOOL8kqL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433077555" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3021a8f5130cdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000c426e9fa30bcdc67a6e670d4827bf03b7aa2215cd4c5e66e8c8a4b63cb875ee0000000000e8000000002000020000000493eff6ffe1ece1d245f6053bf92a3101f033d9dcfe539c778a79f67ec0ef8f420000000e949b3e29bf86fa8c74ce6395f732f4c4c387fdf325f9533f248436dd4c5ecc84000000054151f13ccbf46afc7b91faa6d78025c0f53a7e48923bd7cf27620bd6936e022d944f37f83ad89fff6333ef8a2cf05333e20860d22c8cee0d85f674fb746aa1e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC771431-7806-11EF-B36A-E62D5E492327} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2268 1732 iexplore.exe 30 PID 1732 wrote to memory of 2268 1732 iexplore.exe 30 PID 1732 wrote to memory of 2268 1732 iexplore.exe 30 PID 1732 wrote to memory of 2268 1732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\efa0d71ec97d994a48a6071eadf3011f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5575e60492d762332b598f356be62a523
SHA11022bb9c86afeeb53d298b212a12991e3001c8d4
SHA2563c7a1073b9967facc2af3bcc1d660944cb931e4b7512d15a40901b926fff77d8
SHA51262c1b0fbc9f55106825f750c27f7d676fe16d58321ad82e45e96da6b3e876a5dcd3aaff5735bf192a08e3c8b1d8fe64b4cf8736371d602138df7f2df0771ce49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59860d39e78adfa788c1f50bc05c57cba
SHA10cfc774bb078887bfa6a985aa0b959fe8c354803
SHA2560b9f45f676b00d1960a657a2e9703830aabb717814837c7cb6883ffa90578317
SHA512230bcac6dfceefd87abd2eeb995e04ecb86cb50432834cf296334138d5fb9e4c433fef723cd7794fc4766f9592d4c97f0535b65a21e7788ba12f55bb3b758504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d8ba174f53ac83b8347a63b9c306047
SHA1564311c1c57b7402a293f7b80679351ac10e4f36
SHA2567d7a7443513cc816ec2e4aa91b63652e57df0bcc41de58f47655549cfb16ee77
SHA512d52ccd3ad91effbeb8f43a2f55e2bd543dd7e9fd0f794d21ed94b4876632a5ec4a668c25942126806760b70d7f8823379abaf2e27f520d09813cab29a6b45873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0a9cc69ebf7a73884d2cec8fa5e3c47
SHA1bbbebb1e318cc5426f506a9b59014a2a5325852c
SHA2563b3f1f566d49970eb85af257000f60e7e8845cd1dab0557562661187ab959824
SHA5124401ae088493a99a3cbccace943949f0e4053a8ab81ece012d191b13f964ee68329c36deb2bdc01e9b1f67bc8cd5e7d258813172943d875be7d4f6e6d042fc33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c7b4834733ad581a8fe25140cba11b8
SHA1a379f6fcc46cb7e437afcae31b031a48a4ff001a
SHA256d7133fda505187efd336c8b838990adbaf140d9560c6a19cb66fcac59dd8925b
SHA5129225749d5ba81a4f1ec1647dfaee1c665184e035986fa5402e88140f8ab7717913551823d57781879b8189c1f9ef6105bf5e197c6c3a2bc89a03667da5ea9a2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b90725c9930b6f2968e443b610c893ea
SHA1c7a13b9631cf9b0c09f72427f8c3fa355f576aca
SHA256049af54fe585db5902c60b23f0ba6faed84156a88dc926847b59fcbf4417dec4
SHA5121c03ffdbaa1aef30abe20cce8fb9756f8a692cd22ecabfe11114f58812619b44ba49a5a162f73f04f89a34f8fab8a910ac55af80fc419f847a45de7f5fe4ceb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f45746394cfbbf3a3a7990ecda5fcc2
SHA17374dcb41dc7788f99da97c05560e10879fa30ba
SHA25662c91a4292d723339fb44b7457ce9bd29a02850224df9b6765f02e427486344a
SHA51298c4dc94b78cf8ce3bd9c697a4b8797db305531a6f44030eab118f6c5d90b387186c0a28998af96bb7bb0083735536aa9bc7bc2d04e838d17c054d2aa6e952ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58237fee5e683d417ba61124648df0677
SHA16b6d6fce2785183084a95199121d984573b61bab
SHA256a8bdfc7bdbc89c4441284e372ab9ff230cd4fb1ea57bb39f7e7b216e0f0788b6
SHA5126bd1f27cdec02d433a7c603122115c9c95716872afea16ae677c82e2c10d36e51ce11fb2a04d4261cdf51130c60a08897317b0ed95e492df3d25391f208cbc9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5629bfdd1e5c37546a3c7d60e138d512e
SHA1ded9233f9eec3de3175c9c409e1923c9ace72340
SHA2566e988398ecadc0894ee576d80e77be15e7243212ea42cf4ae024b0d0b2e6f10a
SHA512603d65c4ad0898a053fcc6defc6c288806ca16e08226bc009e44a1eeb58c78060498bbfd2bb9dd66536a019ea4dd8bc05fecac340392b016167f6db750cee052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b4be8a6d181fd2756d8331ebe5e9420
SHA1e993cad00af547b8abfcb6b8a148b8ebb42125c5
SHA256a4824d92d75b1f3df1950eb8f007fd61b27e297c6805470191096c0c0a27b5e4
SHA512d1d95be442eb52d96e7ed8f92325853f6393fa6e3d2c52ecb892c911e57f364d42ac2f3527f1748d65826d6e8735575e894050f082534c7bffda37e31ec3a894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f50b8b6065c8412003757a2e1c378be6
SHA1aa2aed57dfaf64f67fb88720cd905b8f23b1a162
SHA25636c13eb02d08190a2deec2089d87efd280f74e3962aed0ef5561cfb55cbe5354
SHA512da3f1e1d9624fce1533f88e4a9f51102be10066b2eabc45fa1d820f573837efb858b92c3e30ee4b5e9add86ced895e89374411e7246857b6a57d370cef6ddffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6f8b0a6c9dd21df5af6c36658f2512c
SHA1d48aeae4fdabfb877778815031fe20cc44f56bc9
SHA25644eba5b9fd79665dca06f50d273d0fe2b1f97d53d80b6d43f49439e3cd9a5927
SHA5121c396bfcb4aea15c958c10102e459e9f3e3f8ec17d2dfa76f6339f74b278819c250330c60f36eb74b654de740b12072629fcd84992646380be8cd888f1b6eff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e9822e7d5e19f57501b41473fe6f72
SHA1680fe79dd5b5e7b850c92c8b7b50fec81709fd8c
SHA256a8b91c81647f95a19eb92ca11c9be44a942b18c79ac3c414cae3e6ab275696e9
SHA51279aa45b523cebc550e507cf657297fcea1875cc9547799594040d1e128ce691757be8fe01fdf022485d694ac5c47187b16f38325a716344945f099f41d50bbc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe6b2ab328fbe24d7bda95206af932c3
SHA193f715699031d9032f8ac9a1977fc804ee9414ad
SHA256fc664c7eb788a9613892fe29f2242cc256b47a8d138de2ed4bb19cc1689396d6
SHA512013711e87acbbedc004bc8ae61db412feea0522bce759af271cb4aee42a6f136a08d0f3ca47853f67399d63a03668983f7f5b5249871ba9ebf940f88576b18df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525201abf8e53e15f409fb17561ccad7f
SHA1ae947416d7f7fbfbbc0f478722fc421b6e19f987
SHA2569da81dd51db6f09d87f00d87e2d1924877fe68551d630d3a82fe4ce95402f018
SHA512efaf43ebf70c2084f0ec39ba3141a0dccb496ecee6c848f5671319eba4f9fd193d545e1c718c21576fac83aeac41ff615df7c08987cbf55677d7f0e2be1ed8ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57013b048150128a4fca89424bcb8bdc7
SHA19b262fa9cb8e04da35dab5886837886349b7e15c
SHA2565a2d9f946c310b40edaf603ac30a5e24f8d43029835019e3baf1b374ae804c0a
SHA512b6c94b96f1d9d49536fdf4d86fd270f9449b9325302024079b8c0a4db28c8208f49d1f7419611cec62b04ceb26bbe86939808b1807585a27870124132d0a85ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589909e0a11da5f124d8ba9b6f9789e2d
SHA12919f871b5a5a6e03e1d2f018c73cfa0845d3a61
SHA256c145977e48da79a798bad89dae4054a0c0111d087ba0c0ecad7c8983f504e2e5
SHA51293a3d49aeee87f67f5210dd134ecae0dcc5c23171aa3a3e2e8b8f96ae9020876f3007386a45cca369b5bad4d3e66044ccb006416387e46a1e21e9e9189bb61af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5497b7aca378ce50c2346d98a11cedd5f
SHA15d07470c8382aa313cbb1e8f6a1d0df90453ffcb
SHA256fa2de66a69743c7c66f1f509f8a9e817ebac7811c5ff7b91d56145e616977586
SHA512bcc8fb9f6130d4d76c5dddf2bdfc0301223e915a77001b678e56d82a0205e718098aa313b746afdac93e47e8edebb65f6ed8bfef3b5d683b10703ea0016a33ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cec5495bba04e0b41d96f3eb23c639c9
SHA1500836a7d3da4c3f7ecea607b4b0f897d6b0482c
SHA25652086e9368b8613e933c76a9f5a6d79eb72ad168349ace062c202907519732af
SHA5121b7af4e19cedd8cd2efa2953d8e3f6de1626d2eb7a5dd98df9bc60c1f3543de15b68d7aae1c728d40ed67ebb5c8cd4b6d76a3b46fe64694303537ee05456a35d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b