Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 16:13
Static task
static1
Behavioral task
behavioral1
Sample
f029c41a8e344024b84b28ad240f4653_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f029c41a8e344024b84b28ad240f4653_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f029c41a8e344024b84b28ad240f4653_JaffaCakes118.html
-
Size
125KB
-
MD5
f029c41a8e344024b84b28ad240f4653
-
SHA1
849054907f372c809b063928d5af93bd53dbdd0a
-
SHA256
79c5befc02ab43ea173c1636a8a5453462a2b6f4abd872e62678a41ec22d7f99
-
SHA512
5fea8432d23b61c70cac05664b3869ea0389ac79f373a03c5b54088b007e9af2d3ace81b63822651672d5580a1835f399734ae96e6e44eb5735971c82b62adeb
-
SSDEEP
1536:/vw5iBvZlZdVty8jd/Yzc8ffCA4FeOdbt0kZbGVkcz/452hA8Ea/fKAvJFHI0X9w:Hw56vtdVtfdxDQEa/fKAVPhijWh1+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433097083" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6D864FB1-7834-11EF-ABFC-465533733A50} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b04fed4c410cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000f6c465b0fc92af75e50e661177e8a09d0bfb519501502c3ac1adef87e0bb3030000000000e800000000200002000000027d2708e3acbdd5ee8033f79a4e3e5a2b9b7a3d9c27eed74f7a3e0ecd2cea51820000000bf3588ff66c5a907bae3b5fc65b58878f9486771747eb2a8e715ccb21e811c4640000000cf0c25a9512b7060f81add544030962db2b4c20436038acc7868483f175b075dc952813276229b12f450f06d98ae78d5f3dbb529fd1d4fcccd9dc28e101d263f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2796 2176 iexplore.exe 30 PID 2176 wrote to memory of 2796 2176 iexplore.exe 30 PID 2176 wrote to memory of 2796 2176 iexplore.exe 30 PID 2176 wrote to memory of 2796 2176 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f029c41a8e344024b84b28ad240f4653_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee0edb16c7e03dc872bce0c8be317bb5
SHA115bd014f40f4f2c45bd21efabc719859933adb82
SHA256489c18100bc51e16f35ad4bbbc47dd0a4da55fb0c9ae7f906d74cfc85f23e118
SHA5122604bde8bf2f142e0012210809a0e03cb9e067d81468aeb43292b7ec0e37eaca3dabacff94880f3292fbb2b20cfc2b3ddb5136f14eeb87ffb3f53b5a73b579f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57800e11e5ea1c9fe4131f9258ec5bcf7
SHA1e267b8c0cbe463519972ea5af52d2f2144597afb
SHA25618bcfc84087eb1b1c4c1a958f8f67fcc9ec6435d6d6ab9e6969a8c7a32eaf7bd
SHA512a1b8ac29a67977ce0514100721f1d44194ced309b2c9f8e806fefb6f7c5e386cc2374dad23357bf447e6e1b3006e3cc82a1b44f6756d7289b7fccd66b54df628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aef224ab6d43e8b03b6ccb08dc81b94f
SHA13f142fe492e473eb29b113a20384ce457945fcf1
SHA256efaa3cd7683c60456dc233a1e550a407018b870b3d1637b1be8e874476dacc37
SHA512a647490c5fc24f2c9fc0fc9d0c61bc42ffe3d8753f4e6ba5041d6bec9c76cdc18baaeba6c223339455c74b38dcbc34fb749de2b95462b85bc6b0485467cd438c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559df6c488b0c3050738dd645b6515a93
SHA1890cf131fb3164c5d18557012466df4fd26ab415
SHA2564fdcdd896cd594d6f85598bffe26e2e1f4a027b3533c042313010b986128a4e5
SHA51244b7678d424a56953a5150d03dafbeb37c6d9c588ea85b7c36eb4b79458976dde8989fa03e156655a8ec8550ddbdfe95c2e0572abf8c02740e2b10c55b273830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ae7decd8925a62c5e70bf7ce1e2e16c
SHA1211f5e4b9441a91eaf221438edbf074668256648
SHA256fe95c935237186f3e7ac694bd6c80ad14974f5c5110fb56ea52e4e1d28057a1f
SHA512c93b775b82daa1f90dd5308f7b696800cefd42df2c1fea49aa55a2ccc3beeeeef9c43caddd1a7c113996a7b3495c8adb96f658348127c9a7e338930727fe2217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527c0fc5d637a44eb66c12d7075b9fbec
SHA1b2f160a01b71fee83a76615f54463cd24c421a0b
SHA25638a56a12fec3ebbbc710319eb92cd8d4b436eca49713e75115f5785506373be1
SHA51216da7509966f181173d79ca3d2a57888b2eb347d0a791747aea9bde3626f4ebffca590ca3173ab42669008e9c41638699d07c1f14db0409d6e2cd1e0b5ac103a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a73190789ed8125893d10377949c40b1
SHA1c5fd8196ef00c7e8cac8e282612541d348bb3048
SHA2568ea71fd86444790ae22de5725d7aaf213111a96530867aa1888b289799cafd2d
SHA51222e9c824c9e8e1da6829f85951c84bf5dd5a33d19a8ee4f73ab89151d5af3371b092b1e7517d8b2188ac7ec753746f1420233906c0fbf0785ceebe7af57bb940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543c0d6f5f8d56233b68a458dde3d4066
SHA1c4bcceea28a88a8f93cdc9700872f3d3508702e5
SHA2569b90e6a93b5e1f7f6dda8f7682530547252464243f1d74bf6d26934f904f0247
SHA5127f8b0a9262152caa0fad0efa5e51b8358bbbad9187032cc350a48f45eb5b0ed8e0cdcd3c4dbbcabbff38924c69706fc922280a9692320bd33b000e84336bef1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8ff20aa4683c8d0736dbea6b78de8e8
SHA1c65f87cb32139ce00b292cee267897d2e7172ac3
SHA2567a46ec313ce8cbd370f32616cb7793304a1876d4e725252e27b171f1b82dffa8
SHA512d0e1b9475b3a16d99bf578a20c71bdeddc6a68dff6cf7a14891f97406663542dced8d19ce23d905ea3a46c1f9c7da10b6ac0b11a862235f4b6fa20c6a450222b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b2b27a551353783000615dc9862c65d
SHA12a33a70ed03f2a42b9a9c1da9a17ecacc7c6e608
SHA2567ed22135ff249c12a8205ae7072ccfdf8dddc1de60ab3f93010ba831675da06f
SHA512d40cf01ec7a4775623d2025860737ba79c4d6cb2938d40dc274af1eff876d701bca10512e0c162a43e4f30ad3be2f8d60dc881fad9480de388c1124a551f50ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51225bc9e27f4464ecf66a934849f02f2
SHA1caef21d9bd91a8d3baa193f230abf148c09b95be
SHA25693ba4a545a1213f93829af79a93030872645830220c0c5abb2393ed4968fcefe
SHA512ca94023a813ddb12a3d3897cc597e93209b8c94ca7ac19ff8c703641f5986fe93e3007df7a5b7de41b4cc30687aeecffc26d9c0e2c24deca9c9215417041ab5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5076bb7e0fcefff2ff5c4242a403e2e51
SHA11f37963b0637e2e3f1e4a74b976b21f6e8849b74
SHA25697f17d9cb40f1e6c0fed3c6526bb7aa87bb24ba613d2b4b4ece53ebce73c4e24
SHA512297398bcd999d11091df6388898cdbf4286021c1ba2236240ca60701a3cc271afb0dac17f97e046b454ee39979f4d4d0e05a60ce4546096f85b3a795076caab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b42da1e9ebe0c24e8c8a17b072c3039b
SHA119e074dbf5141d9eb922692161decc654a872dba
SHA256d1c406a79bdae905732ed7fb9159ce8600b568ccd096f399ef446e7389e7c3bd
SHA512cb4493ba0eb4cf17737359809eb1eb1fc02edc9df12f5cd7d2e7de429de274819dc870c8049c85092f9ee7a6b9e3b41390bb3e547d2c21c99c63334fb8db9c36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542b59e66739827619aec64d75945a898
SHA1a721941254270192b803c3fd7a56dc5f73dfb92f
SHA256a76ab69937f4e65b22a9311c11bbcc595cf32676afe5a23e25dfb4a0561ced90
SHA512bfe91f209e3abcc187f21f9aae629b9793c6c4dee2331db702300e32b827eadd5fcb3b7e7167d137a0dbb6deb66023538ca1726273dbf761b819b45c73be01f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c49f2d2297d3aad44a5286fb6c76751f
SHA1567068a7ff9bed4dcaa018dccbc4ef5b97a1088c
SHA256c51f7219fba48dde871945dd06aab31af72e565aaceaa547637b517d79e07cf5
SHA51276a64b556806ca84721ca7415c3079f942355e7474f71d2333abe2801ac89ba6edb6453d64bf94bac62ee255aa02688cbac0a690446eaef46f7372c6c84754cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c44742142ea0c0960dce31d052d8fbb
SHA1d07460aef05b36277efb68bdcb351d14e6c8d973
SHA256b47fba85bbc390fcc1be3016db30e5bb48668d70555e180b59ad42a9464a4d46
SHA5127816b4637a77aa468da13ae75db8c677b2ac3359c373304b8793341d46eda3804aed9d54e71b030b4cb7a03274b126260e8e58281d33f58277a8229638313602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551bce7655ba7333e23f369962d133b04
SHA1d6db85ad2765c95306055f4f144d6f09b51c65d5
SHA256f68680a910946fab9161c920bebf9e14949ab89583115d7c34b018638a5dd1ca
SHA512cfc9dd1eab2e552a0e856a181a096fc697b3aecb3a062c4bb961f0f8cd3fc340e290f4d470c60719b2d6f6361b39e049671bb9f10375a87bf4b3d36d67d35e47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c760f3e21dc69d0920c6862dff9d7a8
SHA1b099a65b2e6f9bcd2df26b4b0ec0d950669360b3
SHA256008fe1a8b89ffa070fad2477c4cf51cd014a2ef3e50f831b3980bf98f3b97f9f
SHA51288be62b3e55501135958f2ad8896cf8e39fef243b7341a52d49b78f7379afdda70c08b1dcfb8954e4c996d434435a91b7724bf7a7e47c70acdfdd001ffb2e7db
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b