Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
f60d90a10c6b86d6a0138523647b69b0_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f60d90a10c6b86d6a0138523647b69b0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f60d90a10c6b86d6a0138523647b69b0_JaffaCakes118.html
-
Size
65KB
-
MD5
f60d90a10c6b86d6a0138523647b69b0
-
SHA1
0ca5dc4779dd62be00f32584419c57f6ae8cf587
-
SHA256
7bc36291fcbfa2e55af8306ca001243ac8af00404790b4bee42fe036fa5ae222
-
SHA512
5a8a30fc7ee503637d530dc448e5bcdba91f139c3b0ba5ad806820f4d090bc8821b6ab68ef75883edca0912bdca123c1eee2a9e26b86a9468d54ed94720ccd28
-
SSDEEP
768:JiagcM8St8tN99OIsDojkUfffjFoTymhCZkoTnMdtbBnfBgN8/oyo8QFVG8sG/IV:JCCiTNgec0tbrgae+NnzAC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c05e9f8e490fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B866ECF1-7B3C-11EF-8920-7AF2B84EB3D8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000d46be56d62819e356e05c5feaeac5157242ec3c824a9090c66258804e910b656000000000e8000000002000020000000dec71e623ecc28758b68787c9c0db71862732d06ab88467e5dabc1199088cfab20000000afc2e0b042eed8264e0047348eeb92b1d1ec2719e7ecdf0af95792b26b9060f1400000003a30e6dd2c98ad290db02f551a3c0fa301ec76077428d80d68d78ad659916e50b78f699a51c3382fa982074549aada8acc92772c3b4c27d753aceb7e6976b769 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433430487" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2300 iexplore.exe 2300 iexplore.exe 1656 IEXPLORE.EXE 1656 IEXPLORE.EXE 1656 IEXPLORE.EXE 1656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1656 2300 iexplore.exe 30 PID 2300 wrote to memory of 1656 2300 iexplore.exe 30 PID 2300 wrote to memory of 1656 2300 iexplore.exe 30 PID 2300 wrote to memory of 1656 2300 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f60d90a10c6b86d6a0138523647b69b0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8df191be6428f762f1c5f5fc4d4e4bc
SHA156cdc886c903a2ea198a2a057ddb5cbc33ac9654
SHA25658b502a7b8f350d9a964dc72f4b3c1eea1272ed937880c3b14638fc115258849
SHA5120d5be04e92f881ffb34e70b7e3e88dfd128fc12bf2405a082ee0af0115b61e6e1c5d9d306226da290e2caf5c5fa8323df496f7a75d1baae90cf0a7960cdb0a77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3ff4dba561a7f06bec0402818056826
SHA1a1c9a2b4adb61f91fa7d0f39361df4dc6ec3a299
SHA256b8e9f85fdcb1d13a82a822bc6a2d7e5080c2c9d633e712831890759e3f24d8bc
SHA512c28112d7d58f6fe5c94188302f6cc74ec9397ad4bbdbc895c93be11d87894c0b47cde7add5ef7bd75e5bfefc6b3d81277247b455a270d487f6a987217a00b589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b309df37f77bd5d26a9ca5375fea47c7
SHA1e4b12262c5ae91b192071a88d8a7cb76890d71fe
SHA256b538372f836ab260eed09add96659ebd7cecfdaa6bca24b68bb15a1300333db5
SHA512808f63a879105c58dc787c1c54b329c3cb184274a29e6f6a3ed87a2298f2ab74488b73a37a0a49c11a8466eed0dc8fcbf641f1220b2057be840b4756a22a390c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3450940807549d536a74b95c72bcada
SHA195a1db14538bd8d3e9ba680fd34a95b7413b1eb6
SHA256ae72362793e3e22372e16ccff2d54a328439bc53f4729c1462b0d1d63c0e3a3e
SHA512ec83d0817eb8d25dda2fa8e59e211f9cabcfc2f1d6dd24233ecf066b8f96b2518f339b5d36550f77bf842e53a852bfae5903291e3b97955f2e377aa3dd7f54d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5419dbefc11d263fb19f5970807cb095e
SHA114ae303999756dab9dd624a5d076d710892fff3e
SHA256df0a183b582548a14835b8d67c1f845b037fa7206447eedd7a916e09d47534cf
SHA51204c23c569cf43d5aa0e4cc7d72cff8905d69e6e868b7e61138cea19382fe5a20d72e9f91223c1018703924c043816cfbe897fed6b376a4fd0707594d5e9b9ddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7a5dca626bf58ae4c37f014857af5cb
SHA1dbc55d6d8c16c70e83b51b7c5030907fee56d403
SHA256d18c3ab7aa10dbc4ef28664b9e1d835e353e82cc4fb9c3ffb37835bd8b566f24
SHA512e11d781b5e9509be18b610fd4e36fb136d2913d417f725995baa44248314e5a9085826a106a18bda1b9ba3edd319b6de32465026447dac56daafd90d1973f8c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569b34943f7236e50fec26c20da4613af
SHA1e2499b0745935c6faec1ccb145c9d787b53ed7cc
SHA2567aecab141def3c9ff763e5275bfcf6e1605f2ba6da844235fe9a1f80fc7f4beb
SHA512395a20ad3ea700b89849ba619a3bc6f323f56cb596cbc5e2a7c4cd42a24bf944dd2e4c9fe9dc98b61c96d66f8c1acbdb1da10e8209776ea70b3d600c1327bcab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507b9bb5a0596b7c8b34749513081d922
SHA121cff8c2c46601fba11f6b81c268bbfe3540298f
SHA256a056e67dfa23e0fe46194b2f285e40172d9d8141af184457c4121ee4b65ad545
SHA5125d89a24ef96ec3ebc633c2bc42dc2a15bf4b4ccfba728c64ef43d36ca24f9ae142b9355093a716266f447a1b2432311dbfe72eb85e6d1963e859831a91a4a2d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50790571baece52549e7ca89cb43e919d
SHA1a7534608143f41e84e98b1ac4f182e5f29f04f2b
SHA2568ef0663cfb03117fecc42f41853781c62a9c5fc8b77948e6cc102d933d817cf2
SHA512c11e65b63e3ca31df8e9c690a8e86fc8a71de37f7b31463384629f67171e549a139fe05779c9e7d15a79b989f6fc1b066caf64c50c7b490f3fc87420d7b5aa3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c2b6b211a26ce378a9210ce5c64bb1c
SHA1579f4adc526bc6472d64ea260029e75107f14e45
SHA256d5c4e0b471400bbd93a90c5350e61e5a967b032b89dddbaa6d4198267f545bc4
SHA512d409a3ee438066a2b820b1d86a58c872721baf02b06b4af5707b6a76eb9766195f4c93bd9db72e6a2394049fd8d5125c8dfcd20e1b1879f495b6028d94ea92db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5166b77b1ba105443aee44556ac9367aa
SHA161394273db4354ccb6f791ee29ba2e0c303f9106
SHA256de53a63607d12e1c1f91ad0d4a6420ede0a416bbc4172c3d8e5c1454cdd1a856
SHA512c74346442a00710f51d55f9a685ae5921b7f0b65f541f8d29207e6f9111ffc44e8c930640b1084c646f9d6c9f9a9d6f3707cc538be89584841f390fc585e485a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565d1bc2c7cd633ab5b5bdf1868f0a091
SHA13bd30a09e27351e8e80ced00618864d48aa5ae27
SHA256f14ba41122cd62d7f4a99dd90f4f92d9934b5da8b56c338d519d855f3d0ac463
SHA512b70ccbae6af7fc8f60f89d2c96caace3cc2cac6d235073f2a788c8585147a1d2953c57643d840b58cc5c0453b40700d2cea91233d5d1233efb4f8335169776ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559e3772d046aedb6d05bc5ab508927e2
SHA1048d7f959e7b626cda3e94bd9a5041fe506209a2
SHA2560ff8a90f60bd2b58ab9fb954be876dcd36a5b6537b624993f970665b982c4a48
SHA512992569669eb1eba2349c0f0e826bc5283ddec2ff4f6807ff35b5388fe85b0932b1ee6b25084af766c4e9e3caede8ddedfcc6646cebf056b6cbc5591d01be8375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb6f99616ea735dede19eb4b8432d698
SHA1d171ba16394310aa47fcbb606812a45cca9656e0
SHA25656dab273ce3370ef704fd4e6c00075506e1296ae06f4eff37db9a4dce0028424
SHA5128cd2083b16cc53b639f8daa9005c972a781a0c4ad777313a14bcc9e39adfd1fb5a2731a4649c2aa79e9a733ac90777ceb7226b4646422ab7bb414d8f4424b51b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecea6a27cef38210c1c897bfd2a35622
SHA1eb3edf5f08d58402bbcf3aa000722a2b7d4467ce
SHA2566ca82281faa23a8407ae80d98b43098d18097a62257824a6d79f16a46d3cbfa3
SHA512a9c53cce193cb41d3351dd5046bc66d8e4670f3b6c498bde454e87e5a982d53455e6755117d92029a62995147f18679a53c772348af42132bfef982f23af5119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cdffab01abcc1942cd660944028dc41
SHA1bdf6103cf5be0f8245acc1ee26a5ad5a4da5dd46
SHA2564dad3481166eca5943918900f5163eaa5836671dd227453019adb87ebea82337
SHA5122fa95b53bcb9985b032a6a4e3b2c552c439c40c36b036b61a299c2353cb4bbcda25126809667c9a6cdf71c182fb2ca2792a1ed39fb0eda527f788753fbbeb1c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e76edfd194627605c523a230d3d95812
SHA15017ebcfe1f34a2a2ed75aa1137528468c7b6c69
SHA256face34a35732ccd523e406cabf7a42e310a56f5e3fa0cde32cc7994bbefd2a79
SHA5123bc44280a6a51ef369b2d8fd00cbf20e459f525f54aec941c191cecdf0bde51594036937ee44af65eb4be5dac3cb71271dd21941219935cc922452cdee7aaa1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e107c74cd8ffd386fba1dbc51b3299df
SHA1a48b94f56ca55a5e220c47daa223b2ccd87d5d09
SHA2566f60087534ff32e11aea2a195937d0a098258d0ba473cc8616979b0ad77aeeb6
SHA512a98a3a5e1a73b2691efdf5e113b17b3fb1f3f68ed127dab0a50f4a085cae0d759f004022db6f6895c5a2e146c8d07f68dd376b1b02216cf199c8aadf17850669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c52ecb45bd960e41b3070731a053f49
SHA15a3efc8173e26d7351396dca139f2019d9cc4a7a
SHA256ec3a1670ad9065345afcb9a244cc579f35edeef69b04988a04059e56c9b234ff
SHA512da8c351fa7fa4b6e92556e1147021dbac8fd5958daf2a3fd1fc0c0a9e663e1ce49c17eefb1494268c9e693f52c41aa9d45d1c1d5b2972129f0905ba98c939c48
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b