Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
f4ed9fa53e9728d06e3e04e6e1576a8e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4ed9fa53e9728d06e3e04e6e1576a8e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f4ed9fa53e9728d06e3e04e6e1576a8e_JaffaCakes118.html
-
Size
229KB
-
MD5
f4ed9fa53e9728d06e3e04e6e1576a8e
-
SHA1
c5e772d6ffe8036b8d067971212525a7c3faf2fe
-
SHA256
ae8f37ba4abbcf632b024edfe51ef7477ae69f4d8afe04d944fb4ff1b90f7a24
-
SHA512
1b4fb2b1d51a57c2a34c06f0f3f2f02691809a89bc678873bd552a759972fc855d05055484c74620a3997c76b3f2fa4b4c30c695d81b922f55239030e1a95b2b
-
SSDEEP
1536:d5lWNZ0Ffh2c8ZjUg0Np5ZH4hJpUEkKUNZSeGeJ48Zk3LHZN8tBdjxjw8/KN:tBxxcvmE9N8tBdjxjw8/q
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e017ec18ef0edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{160923B1-7AE2-11EF-B30A-EAF82BEC9AF0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000022b20b6fb587258ef37e297099a824413755ee2eb8db234fd3f54e3f7066787c000000000e8000000002000020000000c32841d4f67db9627a7925ec8661132799963280fb5b16365888021de54efcd82000000070dae5392ea76188e5dc94459bbecf7435563c3312a1cd0f13d606c3f2764337400000004e4c132fbc99782cc01208a4b9e2d57cc66c37e091b284f2593ec5c203af4eb83acd37a2d5d739b4c714a73c328d4236f8b324ac36bb0bcac63cf915a13d9d0f iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433391560" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2996 iexplore.exe 2996 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2740 2996 iexplore.exe 28 PID 2996 wrote to memory of 2740 2996 iexplore.exe 28 PID 2996 wrote to memory of 2740 2996 iexplore.exe 28 PID 2996 wrote to memory of 2740 2996 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f4ed9fa53e9728d06e3e04e6e1576a8e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2996 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543493518e42eb6cc0766f5a5cb16dc04
SHA12821a1602a2b641510d32e5163853dd5908452ce
SHA256b154b72ad7c74008c713e4788c75979cdf76f4a0343fe22d808ddfcd91baaf41
SHA512ce6d0fcbb5f46111f84c56f066d758d3df450dbf0ddcae28cde8c6cd721d44edddf6915d35f558cbcb1370460d6cb931a7dd33209f067cda6c23490b1d1f7675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdc012684c2ad4d94b98e32242254ba2
SHA1a79b9ded55d30c898569c33893c685598757a856
SHA256eacfd9396f075b8b9d8f628466498c7b8018aa866a72982401a93cdf2eee8b93
SHA5123fb7caf0d53ace963050e1eb82a9a4db2300a557bbf0a91974939c645d5fb760897d73c40f903bf33a8135891898af6b7123946abb4e70a3ae680cc617ffa5d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e8b570d63e4a3f30d7cfcd8223efa9a
SHA12f5825b239d28903008b624c971c3b6155991768
SHA25638a01eb273a0e69e8d9f7f3b7344774d286b19456e039c9882e23248bce744e4
SHA5120ec0ec3634f12e18c567b3c7508820a7461c24e2b35cf67c3147ad68eca4034c86237f62dbb0c97092bd31938042a75b355f4611a28cf5cd601f5bc54798e374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575e893b3086567ce40857a3140023f61
SHA1d0e0f49a1489c08a99e7cf5fe17cc0c308162920
SHA2566ad4ed2f6e00171813ef43b095ebada80a52cd9552088f70008dc761b558dd06
SHA512b6a148d9b72048292df86d0017b7f7c29121e3b97749071e89be500848051a9a8abae7bd8dba033c4e1be5a0556615262d8899eceffaecde52378b67006f5e7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3b2220e164fe9c07811db22ca998cf6
SHA115f25147d932e38783e22f9f4686176e72c93f00
SHA2560153e5c8a3b924e0d7167fe93949c0476a6f961408a75b0ae0f699677ac3a1b3
SHA512e91f237bc214d90ce509bb466201c325738f7113aa54696fb8f45e4e80bc483fb1cba7be22b480a7501bd6f722a8f609e26ef4afe6c4e868461ff68675995593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3d0e21219279c2a1bd68bf17bae4c14
SHA1f81476dae840738effc446a6df47f6aa008ca4cd
SHA256446486b31a1854f314a856018bbc9b41eeb16c4a94a0fdfbff9ccb45c8f2df9d
SHA512e00ff79056aed1d0ae13dc7cd16102ba470f011db1413819e01ab0ddf64ea8d3319f290432a036a42c501f1576b1f5d7556207f23bc7dce8432e661fb73e8a1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5674a1a2c116eaa1665e48fae9c0be4a5
SHA1932d9bb9462367bb804728c61d7816b4f41cbff9
SHA256278d9f305920f867c0f6d08754b7192f4df605d181e5cea0e74555921c20dba6
SHA51269b92c365198b5fa1b7226f30c8d550d58eddbfb7b4efc5d4ba3a3ba097ac6d11d162f54ff21d33c6657e1cccaf39b051aa0f7b8d31b2013d764229650d70442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57908a366d2d4ccf6bac28bd0d407067b
SHA15d71f85d2af37a868ea72b876a105ba8ef786c5e
SHA25608c23d043162ef85d6ac9f37668b605e2c9fd16d3e8a6aa5cf5c00dd3a7c61e3
SHA51284e43edfebf588fa7bd7f29e8e88fbb12a2ea4de28f4db30c1bf52ae470dd15df14381128bec591090a2187475bf5781a6554a4c259ec370615dab34d7168c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d29c0d8a61b7deab4fd283001b37812
SHA18c2dc3e31e06ec081efd1d0b51384636d2d8b5c7
SHA2564e02ca70f6d64df720447ca3b2b83d4e62662dae8ab8a8f17db4cae1a9a77e4f
SHA5127677dc92f6e4e882e50830f90789a1643d1fc85b7b50334d8f4754cc2e907fa101bdd5827b07e3966b974b8e59e69fe22cf5a0e54060ba6652fb07991875d24e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5808310e69f85f3798d72252f86d4b918
SHA18419deb6c9c24c5a4f9e620b193dcab3046f702c
SHA256b39717b295264906d8075f8610afd909553c25ad681dc50dd3cff41a94c4ed9f
SHA512ce0aee9ed1ccf0a5e11fa92e03373b05f7e9f3f4710eb793eebcec63b0c02a11612820c4806bc5eed08e594c68fcad1a83d6177839540cabbff99670d2265b6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5442d61fb0851a44fffde8628679d81f2
SHA117f222f6dbfc00444467c7d53971daf922078a40
SHA2563f817033f1212fcdb8d9f3c2d3b41f3a84911e1cd211b4543579a1d42d3e2892
SHA51236723439ff401bd0cc7e8126b2126fe345ade4d2976256d02800bf1f4409eb82db199f51ad0133547ac83bdabced6d1a138181f8d7505111aa55636b1847a81e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576a78b3060ce4ef0ebd224b01b345647
SHA17754be8ede9218383430e83d556329d25640298c
SHA256ebd2c30e5339de700948b843afbec38dcb735ca36fda11cbdb7dc17463d7a576
SHA51277793a1373f0914d001c587b85467f0dfec698838ec8365f211e562caa1e1decdcf1c5e3ddef18c536ff39db073550bfa18bd1be4bfcb371cc40ea7c35c3794b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bfc685c49ab1dc86b9b5aef56f16bc6
SHA15b1747ab162a1eabc3418bd8055ceee4621b33a0
SHA2567ffa2f0aa9bd5d521a9290f44f65f3d22df58f7b9f9c254d83170815891c49f6
SHA512f1e499abd78bfee61f0d551b6df9c3a68cb135cf8486044c232a74b711e76add217add7b04ae1f09b22f09ae7d0b9efd8152e1d101ed637899a16aa5293ec708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd0ce36f1c065b91695a3398d3bed6c4
SHA14ff04797d4b81bc8b28df5d1563e235339922dd3
SHA256b275cceb0751a383635ca9c03d0a0645840c7cd17c939e4f1528accebdd777bf
SHA512250abed0bac8c1b27d0b9b5515823c5024882baae3b87a55f11cda9b2054d458a89bee69c359be03f4cc2ecd279673feb587295ff136f1559c9aa68a9a28f449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549463a725bb4dce1b7d1ebba8bf71d14
SHA101978d5d82594e89d031e36c2358cfca35814699
SHA256ea7885cde7326f5f5d718f1fd5f5199ddc9fa26e9e963e6ccdc2b8a13badd483
SHA512f6f6993704f12c531a9b7496f929458b385b726f6c005e976deb5e57ef72c57b841feeb6359414921d0bfebdb399b8aa3252ddf15706c211610aa6a934d064de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581d88b56f3a7353f407f4e477334e915
SHA1b358de92a54f9103ba98de16e1fba27fdebaf0b4
SHA256d8a85feb0a1610efff8f959ad86f717b1603683f865bf9e4a8fcedcc854d131e
SHA512d1b77e936e2c2b97c389c1ebf52abc49c98298e348799e25b95cdccc1145bbaed86cc5c5e8e9ebc3690bb0722f6d6bdb584d8028791e9398d806fb5080e92b5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d508ff093b4a3ed18c7b9717553a69b
SHA13eacef68c02f24d63b8990b5887c8a103a947704
SHA256d7fa66df3222e03a66a9210662638a35ae51a209f913ffa1a639c2b9fab95d9d
SHA51253f0dda9057f2bfdc40d0a4288e465a98aeaae51bd414651395877c4cd23902f7e44ae4d93f98854d21591be1a52b20ec041fc33050ab2ed37f102174fc1a07a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b54a4e22017d8053d703aa11e027f053
SHA1900e50a2957f4dd37cfb7ae6b0bdcf3ae6a79a7a
SHA2567903c1de306944e5133d83c0ba01cde22a374d5239cdff8741ac1366e404900f
SHA5126eb92c6b7a09a28ceb2cadb3f541288359424cbc3132cee0061f601c00fb759b69702c3a099599bc1336cc62f7d07ea2f470c6c4c3536a9d15431b93766273f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566b9f7ef490a1c03d66945e5f3c30638
SHA1ebe1b6eb40823df86e519329e5399590816bd8ef
SHA2560750506c6068f7eb14747b001b18360affa86b963f8b47b87573e4908f6ae5f9
SHA5122e164bf42615a8c405556ff814ea0c70e9eef68b828d4c53282c7deeec166ce9585852cfc92b50a1c739874a9474ce7607e1dc0f440c2c916b3d8b316c61765d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b