Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 02:21
Static task
static1
Behavioral task
behavioral1
Sample
f4f5ac7f6014e1d4fa7ba80f095495f4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4f5ac7f6014e1d4fa7ba80f095495f4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f4f5ac7f6014e1d4fa7ba80f095495f4_JaffaCakes118.html
-
Size
17KB
-
MD5
f4f5ac7f6014e1d4fa7ba80f095495f4
-
SHA1
71c96d215a6892b5e4e3bcb7ed9cd6177cb9457d
-
SHA256
dca59914614f2d44b366f105eb9efff55ebf9b262a66acb82e6ab14bb0a06dfb
-
SHA512
d571fde52ebc1f27bbf124b7f0ee3252913af9d19c6fa2bbf3e601fb3c53657e948d88225c9688de583cda7063913dd126fc500c0c10cee4416a296c67069fbc
-
SSDEEP
192:WRy60SMl8lVi/iJYVgFGEuNeoeL1CtUwpZCtnbxCIjQeFHgDzQISHESTXQkGQE:kK8lhGEuZtFpZCpUw80IoESTX1GV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB6302F1-7AE4-11EF-BDD1-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433392749" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000e37799a237d886caba0bd2afcc8491c35a9a36b927caf0d529ac3df9dba16dde000000000e8000000002000020000000b97bc595e0aa78fdcf28750a68d40849cb2bacf0dcb1ec96bffbd23caae1d75520000000730619fb67d756c55abc0718fed9e0d5de936d25d918be2ab97a0cf5a3fb683e40000000d14073cae689c27cdddfeb5d90351d8e1d8653a368065b1b3da6785b66ca52c686ffa2112039cf907899c15384f369949f93d8175c3ba489c80e0f16917e81fe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0498cb1f10edb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 560 IEXPLORE.EXE 560 IEXPLORE.EXE 560 IEXPLORE.EXE 560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 560 2344 iexplore.exe 31 PID 2344 wrote to memory of 560 2344 iexplore.exe 31 PID 2344 wrote to memory of 560 2344 iexplore.exe 31 PID 2344 wrote to memory of 560 2344 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f4f5ac7f6014e1d4fa7ba80f095495f4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557bc84c249bbf788cf702a85abb9663a
SHA1cca0aec34ee3e85861299c6d9517f7c711a87009
SHA256b495c32e98ea0a1bcbd2aadc3b4a43c3dede9f03851b673f780791098f009228
SHA512032fc669d00c3fdd7fd88f13bbb695c989c68223d3727e365138603fec0b9f73375a670d2362cd6e8b30bd277b5c8870e2fac6ca932bb3d6b3b2238d0aabfb31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5144e08264287f7ec75a2a7ba27a3a232
SHA15825624fc3d1833112589ae5246fcb8224b31a6e
SHA25659a5cf12b794a9eeb38a17078602f256ebbd589ba60199c9ca40a6af8de75284
SHA5126afe0f15003cc93ec1e6ebb19fdec94aea0f18b41fd70e9fb81e0b963809b95ae2b64b02c05bb8c1b085af909b26a172837cc105eb2877a411c4cca80cc2205f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b6798aaea3417e9db431b206b95d17
SHA1dfb5060901f26254ca9adc68fce3735876b5fc83
SHA256df9d0ab4b6e71e97bedc09905c1b73428238c7614854f933f47029c8cbcb286b
SHA512cf74f6ab63f271cc0e1d2f8ad216dd118330c4a1ffbba8699c2c5d3d2bad54d1b6ada13b4e34480f5423f7185b45fe1132c6c7c1cfa9397df248ca059333fb74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582c9cc1d8b4ca02155cd5c47e24301e5
SHA1b45f0c8657d06ae5103af65e35f7f3e8c5319583
SHA256b2581dc101c492c734fdeb1c377613df2bfc22dee9cafb039f417741e30e0182
SHA5121b7bae7721fe2557917befb0e3708bececad221159ba4690004bfb412aedc58f70e00d26fa6e384e00ecf3dadc1ce7ea4ec9e74a43f602be33eb6585681bb395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba8f92422670f65c43ea8f1ebfc0662a
SHA174c57a7144180700ac5d57a97ca74196c839b2dc
SHA256a15304fec9ff2b65f4f3f3d61dcba5f894608c4d9caac2072a38ba61b28bab72
SHA51262dc39ae646d90e0d789a10a3d609f4d41d5da2e7e2e8ccd7a45a86b6f5d78c4bcd672ddf2b77b7e855459368a2c0bfc6efdb842c1e01228ef87e347bb9fe3f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51944ff3b595164d19c9c2cf2d5269c00
SHA1832100567ff9d8b63a01b9e82f399f6500ee9a34
SHA256c96aae4070bdbbd8c2a7fc154b04b62d2e4455642dc18ba835d5a998b5e828bb
SHA512594629f771dd6e57a573bd4a38a1c0f7550d5a1fce89970033bd41c5884490bec9dea6deaa70a9e5a0c3910b038ae596ef8d8d5f30cb85da0f1aa841b403ad9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dac29b82208e2023ebedaca495829ef
SHA19651698078cea743233952d17a9601bf3164e52b
SHA2561d67015eaf94453a3ec9c5b8ef11f1bb63466e8dfbc244fce6f742f35dc1f4e1
SHA5120f1b9a43894f33ed2d947f02de3e4223763d0684c9bf31f2a91c30ae0553fe7721ab69a43a9465b23254e5bb9b92ee3b180d2c55614394f0c12ce511407a2ae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7343c52b03f2b503d3b218b987fe632
SHA125d1f8a55fe9e251773508422fc299f1bcc18a5d
SHA256da06a3789e2095d9b581d33427e72ced1dbf5a5d9914b65218120a02532cc3fa
SHA51233956e6adf386e80436dbf502860b140968bcb232ea320d24b9b1acf8e228ba6de335876ca5fba988d1bb01130f0105585c2a0cace589f6f7143de6761b08212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547e4ce2e75e5509d0eb779f45d10bb9a
SHA18af9cb6522e2449f200412bdab37263d68777350
SHA256751d07a4704a377953f7e16717bf9b0729f04352e795866cc88d971a8853a23c
SHA512bb8e4dd628714aeae7e1af7ed9e09d5f9cdc7745891a254f37ec78cd0d7ba6ae954ed825f11bd3cc0eaa20a7b24ac17e7cb121fdaa8d467398269572200aa3ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a75797fb84de5ed444e92c292d08673
SHA152b8d4a76f84ce3d86b52ed4b10b00b600a7766d
SHA25698295aa8ad1a0df0e65efbfa8faefa8d57d8a0a7a43d019cd7edc8bf63d0d9a7
SHA51236a4e27ba413c19b7a8f7ca8e08075b0b3af0d768be390691ae77f5030c3fe09cb08f818d85b2f1ff0a729f7cc2271e3eadd7384021319d62631dd92148954db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51738f26a4f0b4d6b67faeac07564a909
SHA1b5b99048c63db8cf3edc89fc06c75855d4412b04
SHA2562e7f6b8a9550e3270aa6e8faf276e2ef091b0d4e90a1686ff6f4863f7981f2e7
SHA5129d0808d961a5934cdb6743c1074f161a84277983a2604989677c1dc1a3bff1563c5467ba1f9dcede82a889dab4f9f1e6f76d4c13ba61a53468e0d4717109e5be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f97abf5ebeadeac11cd38874d2e56dca
SHA1810c2ae01b54c9a446298d60e2e857bacd26af70
SHA25637c4063b5830d89c384da00f1629f9b0b39579863653058fb7fa657d77157c5a
SHA51226b6385d561d38a9397578ac3ea12adc0ed3e199f0e849de3e8fb8bc9026d7bb015ecb51a564f2be4c47ffeeeedca5599259302e0632345a5fc947daf6bafcc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc99fa25636c7f95e0430ed847b30461
SHA1d6049b6a6b9503854d9b3271a5c604c7ad93e1f9
SHA256c610ff952457ea6f5fbde3ed5432deac39e88fe78bd4474fc96ef66cdc59334c
SHA512ddc4c4ef453b5140a89710cbdb06c6a53503ea519962996aaeb4af9ecd51a3d9ed96dddd25fa3e2a371c4d705d7245ab0ee15a5dab7ae20769a07d21d97c251e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546f4b9f7edf15e189de51a5a97813cf5
SHA1b014a8db3d9df984de577027991861daeef67a94
SHA2569bfa579c0599d37b0b2fd1457acb50ff000543d42aca63bce80d18217a2d074f
SHA512d0da093bbd2e56d1e9b961bf4c266bf21dd467e5a4a2bd2bc8a8a48764a4ad414828b4be13e48aa34a03a662d25e93666957fc66475ebdf6d5c49a77b39ababc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5395582e63c93b7736ab40a0a7c2d1e08
SHA169ef10bc0c55495effb86ac7049543ab8d06c5b9
SHA25625fc9facab47e5daa689eabca286a1f24eeaa53c79ab83f12cef68e328c19579
SHA51288e55caaf8e121085e865c02705cd9b8a44360c4838dca6780868341797ab4af914c21b24ce5213b3984220f172f95d4fdee9ec47fb3b083210fd6f6c1ecb330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f820aebb340fd4fc69d6d2f8baeffca1
SHA10c431f5769afab63b0c22953578ca874a13dcb8d
SHA2561cb5d64b4b6e887c7ff6675d24888ba7122cc99b6b4dbaac8062f1d896f9898e
SHA512914485c41795d3cf926af44dfb9b5d6d21a74f4edd1d8ecc066b7db10d7baeaf75287e5aee388c2ca526c4c26e8f544a7255464aeac87890077be256f9748c22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502d0cef44b0a3751e2813a2686d90197
SHA186cd7586e5b3269a9fd95e16cd69b0afca7d91ce
SHA2566a85c42b4ffbf0a3a738c0a11b9b1c0e47ece0ed8e610925cb638b67106cacbf
SHA5120f54c13e4a21de6b3859b25dc93c728b207022c18883c0bbded8fc9009f39fd5f10cfc15963093347a027b656dbd4f10b0cc30da514919c81ea764fa194b1b73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca8a7bc170f800f6109f374558f8f36a
SHA1480ff6b75c357951777925f3600de68828f0ef5d
SHA2560266f389957b3da0c5cf3efefea6327ce40ea58abc03fe55db7d2cc0ed47d0ae
SHA5127f70f0d367b43e6028639c0dc42dc273e73353897275b389aec7765cb89fe87f3dd7a83150b68dc79da7a8f96f77c842d9eb9d1c03dce3609fdf61c41e40e837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527bbc8117eb3d85731cba2d68f27c06b
SHA1ed991a2b6a2a9ec971ab39ab1cd7cc035caf31c5
SHA2564bc87f8237c539ce2ee265672d82a1390b71ae04e5cb1770159d06a670d90c14
SHA512d10189f8ce060c34e10d1cb2b93f03d22377ff5eaf7a4f906266533057e688d93d7be0407bc02cff4959a35658568dc16e65a5e3d4153a73f4f1deca54b3208b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b