Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
f70cc9963b68283d7c8797a6b36a446c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f70cc9963b68283d7c8797a6b36a446c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f70cc9963b68283d7c8797a6b36a446c_JaffaCakes118.html
-
Size
37KB
-
MD5
f70cc9963b68283d7c8797a6b36a446c
-
SHA1
395e44abd06570e86df756053bb311465e2840de
-
SHA256
83b4d13dce3ac4365f49aa7a386567b5882370a773b68062a27cb2ad400b74df
-
SHA512
4bd28a8fa1a847d43decf8753d3ada4ee4f0ba1b5aaff0504782fd929edf2bac60d6c2479a71bddfa9a838c71b70c4c642262cea6d95a781f471aa15b4c2d2bc
-
SSDEEP
768:ZEXN4kshIjeNDYhukIbRGEBgQ2dST4WlP0fjjPnX2e:ZWN4kshIjeeST0v/X2e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46ABF711-7B94-11EF-A1CA-D22B03723C32} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1045bf1ca10fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000a71af1cd4f576e2a6ef466dc152901eba611370aa06195a6b49e8b1423d8cba4000000000e800000000200002000000062c441ec56f1e6a1c91491e29248ddff4435481c7b52ac3a47497a50f8693e3020000000754e1fd5243d94353b3f966341aa13ada1789ae0f327cbc0c2e72b537095930b4000000056d9eb098f1e2f02fe6248183b26b170aa8b354c6debd2df669ff9b14e5e953c56698c2bc5f29c1650cde6c52653f7f784515746354b5f9ec64aef2e84262bf0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433468092" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1532 iexplore.exe 1532 iexplore.exe 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1532 wrote to memory of 2572 1532 iexplore.exe 28 PID 1532 wrote to memory of 2572 1532 iexplore.exe 28 PID 1532 wrote to memory of 2572 1532 iexplore.exe 28 PID 1532 wrote to memory of 2572 1532 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f70cc9963b68283d7c8797a6b36a446c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e0849f2911029b04cad22b216d1a05
SHA1e67f22428c1a1df6e1025407fdcca4a38019bc96
SHA25661bd2df3f9cefe18941897cb8d857ba6e7e9bfa7fee295393ad9132726d61948
SHA512a1b1ebfdf62894e25419009375742ab55a7d7eb688ea3558cb7a47285bf5a079572c74f84e50a8992541eb13565194c561020417c2099b7f9e92535ea6d1e5f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de7523123168b0cc7490694021bd8983
SHA189de73388ccb8bf8daa37084135989ee3efe60c8
SHA25666649b63dc87d3403abad0609c21a7c342fa6430c632afb81fc608c76f610b30
SHA5129cd47095b1fc960b8448b95c1e5fc175eb6719cab8b98a48bc529d4a048969a0159f48e8b2da397e561d13b50c1576bd6115403413881ce6a7029584a8945970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536c9c71561ce9e059f5f03550330a152
SHA11b00c1e1a3796d3534e018adb919ce7fe9a34d91
SHA256e4e475ba91665ad8f29c911eb82256baa3e846f9a1fb96a350d19c92297fc9a5
SHA5129e3bd254eb52e58d2123338eae345ad9e8b5037901e2754727642ab9ba302e6752acbfd50c78ae361a5ef41aabef7c0ef3c037094788f23441c0342287b8a281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c9ad3abf5f3a135d14f96178d367add
SHA1354d69c2a06d5b993021d58412af588aafc6c170
SHA256cf88b12a9867c4b0e5fea9ec44b3bc27bac5b052e5110e616700badd0b2ed4d6
SHA5128d591cfe611999028bd55d42beec5600cd5c5bc208a466f6f731faef0c5d5cde6d9009f8e0844bb76afd61ff4bded226506d988eeabcbb4c50fddbc9e2b0731c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cb9dd5f0842a928e98d3fa0de91c644
SHA170587371c9add88e42267cf40bf1ffd0d4b1fff6
SHA25684db1f2843de9dad4b5275b16aa18b04305448c83425260541acff6e79dc0309
SHA51269613cf387037224bb952c2d00d0f38671846e37758de3c85aa1ab05be719ce08611b7ce1e3f7598f203192fbdb4467691d670e0dd571aa125befccc49c11251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecd35ed3721592591b28b9ae27e9fd3f
SHA17b84e2c4dc875d316c944d3cf86ba5777498d536
SHA25666b3c145d74f8d7a02a2ea4fc7cd7d9844d17d991cb518ec5ec574001872e6be
SHA512d0b394b8d98220083446e21849504d89a0873d3b63ceaf1aebd2db7098b8c7ed675d5a9afee5101625286939b370e24c0df60b571fe7e34b6488ef9e415e9050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acd71605d662c43c0a34db63d1ed9451
SHA1d1411a7948b5dcc3641b08800de683d02a4b4fe8
SHA256f4fd4b6a59821504ae723f45027568981524617bdd43d685635bbc6ff8dd8057
SHA51265988bfbf090db88b56d284a998ebbafc4c5d7c00e41809c1bed779304f1ea03a84d38f60d4eb341c737adea0f446f7ba0f849b0f2695abed3501bdf1d61610f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593df291ed608f7bdef31e8c5bd946199
SHA1ca7fb0d4ab5022415b6affb7750120e84bce9622
SHA256b45a3e69c463accdf461907ca541dbfa87c1ac87beac0c36e31d136444e5e9c2
SHA5127951abfef6b1139efe66561edb05bbff889387707c168857d308d973168165c900f91a2f72fe410cfb617c1f01bbdc16dd5e4f2288fbd80064e83c6d2a606f6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5482b3d5195fe91e1c90e06a87ee2a50c
SHA1fcd1cc76e4369ad76340757fc3e890ea65910873
SHA256f97d8006a21865e5e8c1e00e200d138a23e41fbee133af08da361c20018de43b
SHA5123ef4c46e4c32f9b590d7a9d28eeced7bb858b55ebc4db7b262ef7f0ff71d41ed487389d9a29384f8d811fba9af78a189410ace6773868a1c611395a462a13336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e12d586d0746040b637e43976af24559
SHA1131fab0a73ab7d6a825913d64a35f8077255b01d
SHA256d75e6e592f9cbbdd08c72d9167e93bcd19e8461d55bb1e01dbc6f1a47c5a7685
SHA512eb08c0ef3ed8b955864ca94679824d0e26932b5318b307375e1b2664421bf52b7ae2274059fbbc7516df3f48422fb282e15415ce8a53fb9dfd5e16fe916613d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3c3de94e785e83bff9d476b9704c6ad
SHA180c95f3062c55cf6815fb8a3af79f851a8402cfb
SHA25634ffe2ea22131eab7de173fc23990698fcd4281f334428e19741f4b6e3729804
SHA512a24f40394c9b5ece8372a3e67416c23f0f80c06c73bb935c08ac47590b3cfde5f27ae408f13a7cb91441d485369979211ab74fb9823498ecced8ed0a97b10b45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d193730d256b6504fd8235cd97155822
SHA17717772f61e3ad5b57a204471aa413b6c0b442ca
SHA2567a1ee17855867e43d4d3e081b318cb150b02325e5d579e3215f2e3db7fe457a2
SHA5121e6d4229c65990f0e8698905a3a4146a16e61e06eddba36372369ef971547a9027958aba09a6f3cb6181dc2221cb69e906103533a0d76fd853c63c3d2562a376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9e4192ad411cd057c2da5e976dae6ff
SHA10d1a6a3f02e801e9bb65a1c6c9af0b6a75f2797b
SHA256e39eb6405951e0a781daf708c9176bdf6ce539b49b0933c38f88702c233964bb
SHA51223a437f8e6088916ce5d73da91458cb63eda7e8d2d6c2e9b6dddfc7e06c77bd3c03eac77326614147024351d438cb0b00b6f1dd22011c673d64fb852c4b88013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd9ba27c4a3f71f6f467711818a78257
SHA1f6264538b71112ce3d844a617ba4fe5ba4a920c3
SHA256cba7c58c06fb26cf873641bfcb5a610f18f263c9bc28b4b3d65d51d652dbe0f5
SHA5128cdcf2ed9224397132d24d4094d144ba817556c7842062221c04e2bf35d72d468f17c9686e921b8a5cfb06b44fa85c829a9c8146f308c375f2e5d5b020c4666a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5304d6aa383c462bc75b787437402410c
SHA1b144429bdc8b94b9fe7109a5e93a61cffd4b877b
SHA256736ffee5cb2d1de08dbc562e8f9f100bc197926549cda215b4270d1812e69c7d
SHA512ce947fe8b3c103b7eca816941f53878fb09453e1b41d0a373f80bca89718bf5c381405a41ca81a207259b3d0ca51d6d3a0a908401570640b014958f151a89a84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546e3c0ae26d09ed3e186462352d72efa
SHA15122c928a6a425cdc038f93b4e35e344c39cbe0d
SHA25655845aa06adda0dca652c0f7eeef24ee008674824e5cf852e21cffdf3f5fc584
SHA512abbb1900e0458c16889eac521abdfff72bb4946807a34080297d7d2184385810b35eda262aeb65412826d92bd77e7f5d8e6479a3b0d1bad06011edd0d6ac0b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eabf805d99dc21149ff339e357568f1b
SHA16d8c018eaa44c69442ca5f56c03e0a227e10bdfe
SHA2564f717897bd783b218501d571954dbca772b95f1abc8eddfc0d97615136c99e1f
SHA512212201e419f0171f2c0627863452616d83b4248ec1f18119b86f395477cc2bff082973dcdc4b1b156b5b32b8dd0c16e9a589fb3095827bebac435b3e62a98f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b27310c1b846dc6efd0213283a7dcd24
SHA15d0f1239072185dc33560ec3f9c641b1bac888ab
SHA256965cfd12a2a614147743b716ca1debbadef6b2079f056debd283bfda08436e1c
SHA512fb68f993a10bf8cf23c19b8a8daa0a337e88746f3927dde4cd0f667336bf19bebb886e32f1b0a85ea56344fc92c3ae56cd8fdec88566751ae7c5cf47e4f37d5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503027d2e7093602d77eee5f30210736b
SHA17078dfc221ab2123ae0cc12fb45b08727c14b185
SHA25613c097189f172a241460f2f90b9d5401c6d3c7eadc58081bbdce0f71066eb96d
SHA512983d7b3ec146d7063e21f327d83696d90eabd8d2f290b76e7a08c7e14be8e0085796180a96bbb514c971c6351d3fcdf7b3391b5a0af2fb19a275efb8cd6a5ec5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b