Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 22:23
Static task
static1
Behavioral task
behavioral1
Sample
f6f8f18e5b12732419217982aeb5faa2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6f8f18e5b12732419217982aeb5faa2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f6f8f18e5b12732419217982aeb5faa2_JaffaCakes118.html
-
Size
6KB
-
MD5
f6f8f18e5b12732419217982aeb5faa2
-
SHA1
e5a12a28e76a7db45dfa12b3154aa27c330a2627
-
SHA256
146a638fac633cb217e3924cbd05d0372b422f0129925fb1dc70d4ccf5202dcb
-
SHA512
8a1a434d069938692caa5df25e88a9e49b3550eac54008d8fff6b29b1bdf7db144fca756fa5496c67ece539073a062f6ac4cdba40e916210ddf85f0b46d06fcc
-
SSDEEP
96:uzVs+ux7J0LLY1k9o84d12ef7CSTUrecEZ7ru7f:csz7J0AYS/zb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0553a96990fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433464859" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BFAA65A1-7B8C-11EF-B2BA-D686196AC2C0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000a9c525d961a6facd72606d3b2a8ea47c7252b6292c87f51761a574bc22b44b3d000000000e8000000002000020000000701008c87f5ba8732399ca95b4badad487bba42f66ff79bb6afc2edfe207d79e200000003d634f4f895005cf6916dee57b8010b8531a3ec6aba46d87bc1ad4ee866cb7ff400000001eff1e412bb525b3b8c29f0af59f92dda40fc809681a9de440ddf0376b405a97409aafb4bf4223127c386527dd02ec02c4a0d94c1213f22df77867ed520e1ec5 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2360 iexplore.exe 2360 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2552 2360 iexplore.exe 30 PID 2360 wrote to memory of 2552 2360 iexplore.exe 30 PID 2360 wrote to memory of 2552 2360 iexplore.exe 30 PID 2360 wrote to memory of 2552 2360 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f6f8f18e5b12732419217982aeb5faa2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5cb76575fe51fc1d055e33651395b7c
SHA1004d76382e4270c4b02adcf53fdf49b036e053cd
SHA25629bbd72ad8de7ac024f96f248667fb5dc663cb85838e97e32029b0a48091d445
SHA51247b0eac94bbf804add2866f285502399779d5de8de683fbc098358a8e6d2cc9922bb5738db4a2f48c457193e0ac5913c22de17282233d4c9edc622657b3d4ebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eef2945f521ccc4b9eea250d5425926e
SHA1590d9491aa5879a8a05ba12ae93ef17d2cfb865e
SHA256e78e0957371f2d29dd3ab59c7bd5d495ba2c10a863a42bb3bc48c5a79d2b15be
SHA5126d07dbe4988762f08cefa8ee5d8bbc7b85421a15d84049e3c79ad2b75d07704b2cad996aef88ca98ea4beb11f6ea871570b998115ac4827d6ec8a2594da8c335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b0d2672683b2d7bfe15656836ae834e
SHA1c14e9c197f164196ac6dcb679516e44c6c590771
SHA2562298c3fb9fb558350f9d7d289a904a9b13ddf9277ddf6985ba021670349c5f67
SHA512f28bfe437e91a338bd44bc082f450b381764170f2da957e58b8660da31fa54310ce464c0cf18be081494437e82686ecba28f994f6cf6e0773753e38c70d3d705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cce06667e40cdbc89778440beb0948e0
SHA1abacbbb5d77dec7abe93569ff7f705bc8d4634c5
SHA2560d401641785ba54a7e7710bac3935d32a08edc93506c4e1d38e8fa038094cb71
SHA512b332ed5022bd10380b474023e0ca77ff211b19b8fcbfa9c7e946e133ed358bc7a876c34241f69c30e3de2269d4f8dbb973a0f30a543161399c8447c03d79f5da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f1adf2265099e4d42cfe80e3b106ef4
SHA1b0c01d0e71d34b1cf432c23ffaa0f06e5abf4fcb
SHA25604cc930e5e7fe4b1b793b5f490e1e621292626138d307fe4261f1daf65e5f4a0
SHA512fc650687bd6b3e44b74c690b3e696f3220b4c1487a5f99ea72408e6ef59973df33e64ecb2b19f45351898da97f3c1e4e20c43e70f479fa2eceefb20e98707b49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e26cb3483f6fe2c36dcbd0446523aa7
SHA145dd2a07395f07f0610876266fead1e2c4a6f61f
SHA256114352be20ae8cfcaf471b76dedcc377525daa3563169f2eb898dd03d0bec4b4
SHA51269f219aaa22f4b9e17ec788572bd56a2151b00f497cd88cd74f2b0b5a088cd8459ec56c28bd82a9640f03a8ec2167bb98e8ff5d7f4ce01c1cf3dd578190ae0e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597e0c92dc9d4a31d8a83ff79eaead485
SHA180d1a79e1315ab307a04532a601e181f672cf1fc
SHA2565352c46ae96d460a0a3e8b95634243182eb05c89acfc131f86876f498b1c4c7b
SHA512c4cdb182a9aca4f81c28248c53b2f498451153b8fef5cb865a7b5a2cd921bffc2f43d3fb439381a7994cc8a8bdb18542c7414e8cbfcc26c859e91c7cd772bd4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5730cdbdc0c7ff066870e067d3971487b
SHA19b022fb0afe9522a5a5c322e68a47243fbd70e73
SHA256e20d53522d919b5ecda95aeed6f720301eb69ab1a24e8eb0b4d547ebdb191fe2
SHA51291f21a01b1b099cfa9732437ae071971a05e5b20eb9a3f638244f3c081a85ab33af7a1a4d556550333a9c71a01ab298f85b3c9bfc3b666532684b46e0a635eb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55109f970d9a7f669c68c4cb46cf5f677
SHA1ea8939e7bec5f5a19afdd293a49b7a9436c5267d
SHA256373fe0bc4139fa2a07f0b48a1193138bd8eb9d938d667b1fc33825bdb49b440f
SHA51215231499fce683e1dd5a6899f7692cd73d86e92e8118793ca5e371c0aafb70b16e0772aef23d9c626598ac8a63464bebba1b76254c5dcf12aede3e1f272be7cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ebd5de4c6376a17ce19d61bdf58db9e
SHA11f564a0e670371f74a0170d95a405050ca706fdb
SHA256b11d7669b679203b30c0863c543f7f988b4a29d7efa48c432a5c854b97434e8a
SHA512c5876871f9996651591e5b789a1358ef813636932a1185cab322e10fe448acf3349cd4891b37cee7574607ca2f529a2bbb2097d2573bc44f34bf33dca9b906ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5ec985df82ec51adde0af6ed08c7c6c
SHA1064adecdee7653d5cd5d46ef82df923a0ac58100
SHA2560cf4ac689d987f3daaf8c5ff52db678c2aa94e702af5bbdf2af9fc9c541f1856
SHA51245a44e843a50bab572d60ed8ddf5d11630c8b0203aa8dbce72af694d233b7a52afc2919b3de2c8e8e427d197d4adbb15d8926e94a0ddc411ec430b8f1972fcde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5283bd4196085d8b987d3866f0fc31973
SHA13635eb9b8b96035a91b1b46f877e3ba914beda2e
SHA256c0d19adf3f37f1c92293fcea8f49fc321c15b4cf24ed489f60080151cfe748ac
SHA5128085770a660bd76f4b9d0db5a039ce9a769456925c7ae3a17a4eeab29b7889a8efb3e4df8b76004c1be6d35df3316b1b6ae3f70acf12759fe980355c536015ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55264cb38e5b349131aedf7f92c702acf
SHA15ca39f703d72348eb464f579b16aa7156976ab44
SHA256fd0d186683060246b2dd31705fd586f3cdf638913e5089d9fa551fb9dde70616
SHA512c1b0ff41b400ac650d9c54e7363d58a0fe16a1f14304397225844393f25e30d8fc1874b18a3c2f07d352fd1e7ef3fc544a3c76224434e8e8f3a95da0a6a2effa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d17e6c688def21743abbba465bb012f
SHA19fa3774c6abf8a68b36272e321dcb7460bf8bcc2
SHA256057f04967aeb1e83d2a3879784441b53e9d5a1f98b094f3d5c73442ef750deb7
SHA512a24b11c58f46aec9a25cbb263268de9414672f1e93360c826d30dc23709d763fd54c658c2c1d7ba000df6eeffc4d83b7ea52f5f918302d593b3b58637e710cbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55806a2b92e003b6c4a135915543dff7d
SHA1e3cd4201e318f64f772d9b54645fb7ca591adf44
SHA256b0cd3bc384c8068fc36c5b28c75dce580016713dbfb636cbf635064ca06d2731
SHA51278dfe722f367553ea139936756dcff3b1277ed76e12abb1af3a38d73bf56def2ab1eead1401caae0f7b9e603c123cc14d93ae745a3ff7f8f8094ce348d483684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a130b0b6106c3f363ed0577319ffb68
SHA16bdf19f2a7f20ad5b098a738ef5ebd2a56a04a01
SHA2569de66f41d4c36566c43399d99074611ebc35782e013bd8979b6f8af72dd30737
SHA512921e6eb24202049d0903ea72e4aed618338e45953992591c13c5db3688296df08629746a5e704ab20fb5c6c658de3e5980547cf80e7a7c7038b26591f5711581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4a39cd0ea85722a96a2a1ccaf6ec787
SHA1b2ff3bad3614117514ac95be01aad57ffc1f79b2
SHA25652653c503594a7ca356592ea7221fe70c3f77c6e6ffcf58921bb6a541376dcdb
SHA512ab87da6d019682ecad753718626510e5970b77ae15eb218a71c98a61cf0a578c9cfb2f065931acf966ef5c97197781a120e65f2644150f39b42889bc0dfe4338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ff64a6b636eef30f60fa77587105e56
SHA1bfb2adf29262247458e8aa43a2b212df68ed94d5
SHA2569e0f7605a485234a6a067a41f0d5e9ebe101ce27a6d48c0a820b92991713aa47
SHA512f25c81a0ac950a91017c57e1d7adcd9f547ea0a3f594f1b7ea7cd2310df5f253fc83d7c6f39e4c06e97393276e6565aa1fea88933e93913af77d7572981015d6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b