Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
f610dd129a7253b347d97d8b9065e94a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f610dd129a7253b347d97d8b9065e94a_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
f610dd129a7253b347d97d8b9065e94a_JaffaCakes118.html
-
Size
11KB
-
MD5
f610dd129a7253b347d97d8b9065e94a
-
SHA1
81c04b346a6c3ada15294a927c68126783fb3df5
-
SHA256
5ebb6c7223c0391d464e1de8f1642d64984c4a3da1694fb6042cec03d482e30a
-
SHA512
787510e08f9d282ff94f63964783a40e9f6345d2a38652cb6624c09527f28ee90cd11049d7faed858f0658900100170657bffc5ce6d51896c9b6958975e74956
-
SSDEEP
192:CyiopXfN1u9eddr7IvaZwQFCVCf7f2uvQMMO2VeOMmMevr3s68X:CyiYj07QFAi7uuvJMO2cOamr86G
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F73507E1-7B3D-11EF-A059-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000f6d3027d8210a4bfe0605ed3ce24a14543ea7b6dc9887a0342b9743de1193371000000000e8000000002000020000000d8f9d0643864afdf85ea26d2a032cb660269d4d2a1a1af6334360049a0153cce2000000029089dcf7ae3a5c4c06caff1deabda9ff887bc5b5da0af254a38ac73ffc5d4b640000000769b85fc2450987e3e5cf73f00163681a0975dc76d9b5c62a159c49ded21021bc0ce35817feed993ae75e51b837678336b3b170c7a396986d85399c91ba91a5d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1033fccf4a0fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433431022" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2228 iexplore.exe 2228 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2332 2228 iexplore.exe 31 PID 2228 wrote to memory of 2332 2228 iexplore.exe 31 PID 2228 wrote to memory of 2332 2228 iexplore.exe 31 PID 2228 wrote to memory of 2332 2228 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f610dd129a7253b347d97d8b9065e94a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ecba81d69bd1526522ab6d112876223
SHA1e7bd126e3849576ef65f53373b322c24d661a006
SHA256ef64e6d444bf60c0c538819b10a33e602ada280b6846017040f9ba624157e158
SHA512afe1535c4301cf17545feba0072ab8182bcd100142170fa8317eadf5f983d700263131bb9d305347dae5e2655ac196bdc5d64c3d8e5e3a6d26b5426a9ac41500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ba5ebb757ea651a2c1e8edc2260f5e4
SHA12f522517685fd9720f06a8c9d342b1282cf62468
SHA2562c2af7b8921cf3d88bac16b9283f3000c1278c8376dd506252c5e070338cb04c
SHA512faf42f66e76b268ce676cbaf3a6119f86776f39e18dd69798573b5195b68c90af43f6e15e784e6e24967ebe1bbb692163aa8bdee0c6a0291d36d2ef687db5555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518ed8050f4a86cfc8a9336af9a185885
SHA1b34231d09f688e58ffe2af0b1846934705d9c5f7
SHA25626aeceabec25df277f82a371b0e94189ca89b916543fb4089042fe7f8806f444
SHA5122621429034716e99b7b94322723ecb34b8379a6f8c85e895d33c63d7f2472d8936366798eddd2827ee2fdf71edef81371bd408233ddd487e90edd95674da8b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529ec6554dabc3422faeac740ebbdf50c
SHA1386abe8fc1a4b88e18f6f825562a241a6ab2af44
SHA256135237f5375677357afbfebb5119dd2a1a0a66e36b127ffdb618c188e41ed472
SHA5125bcfef682f819a5cf6bc3b2c0ca3c6c7106c8b81019e4452fb9772327f1e7914dc6203c533f77bbd4f43f10668396baf35ca287a918aa24ca9f3af4027325fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f28cb958c3079b542b12c486827b3d35
SHA1dae25ec640483b44d9f4b59e6c5680b4e2005d9e
SHA256a07dd7462ea13eb232b887a16398e31a7e21d1e784c933e9077aadcac70b5daa
SHA5124928c75de99039d68aed137b75ca9d10c5c1b888c3fcb88d99989cfb55a9fd892364bba4d81901034e49664b067495a6ecb5ad163cdd6ff642c710f6020b7c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591a0d75c904a1f4d22aac513e51ebbef
SHA17702b278942d20602bd0b2d6c48986def451eb56
SHA2564e58ee302ffdcae05405cccb61d9e1a390415b660a4697b5a30830f6859ed837
SHA512b91ff4558ecd31fa15a55354aed2073db2e3c9508adec0def47d8c300404b1561cfd69692732d682787be7367675446a3b6807a4248bb9f2b3aa0b1edd531b52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bedae46d9a5d80f314d0bd6531d69492
SHA171585818a0d0f479b07c51a463c297540a7552c3
SHA25641731d5f0e2394e2ecbe3a854f954edf1c17ac74195903aee28d10c5d27706fb
SHA512741d5b88c9b2dee4844061586753dfb7df3d9b846fbf0f5e8b102050f9de5cd1188209fd527b853e887ac2266f19423711b3f5227d1438a8e56606a52b1d4fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555af3aa62711ea3a28d3a01d593ab0f8
SHA191e1ac87be73794f5a7d54520e05a3a594391a98
SHA25619730b532792ccbcdbdf5b353d8e6fabc8e5be9276cc2bc13fde2e1780463a94
SHA51212188204d680247c392c656e978efb1c3ef7591beb597b25f1e896492eb9901eafacdd760190a71062ac90b4f34fe7ffd69e2edae259acc67ed57866c7b47d42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c20e3a4f1e73cd264e08f7ec562f4ff
SHA19a028cd98f3efbf1a28b66ede9e15eea8d441b35
SHA25695e058af26b9a43ab15e9fb867cdf9595a2ccd4ad46653590b54dc8ad52a0991
SHA5121e89cafac10f31820ae306fbd262022953c1b902fc9881be2b34036309b9818d1a5f45a7593241963c01df6689fc29f9d03b72ca38d51ee9951ec1705dfad859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5214fa0f154365936ef7c48bb0d3acaf1
SHA1d56e0b194387fd06eed0f4b080dfc0a6e501db6f
SHA25632b31191c9694fd4c28d5c046dc0eb7ed7bc374a34519f4259593b3dac854a70
SHA5121e4dbd0a63ddf2315ca9495bd0134158ec584b645b886ef7465bc93a72a8b94da275a89049914f317bf48032ca03a031ea7432a97191210c417393ccf66417e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab4cbe4c87eb3d3c4b550f7ad69aeca7
SHA1cf4bf6cd70ef4c31ccc1a2ac1acc036d08e4defe
SHA256a068b910fe9ada05e5186b73300209e7533a69fbc64c93003f3e96a4e31f49c4
SHA51260dee567f90a10685ce8543ad87f9ffdc51a6a6f60c17f0dd8c48c33980a42412401fda985ee2cc7da08dfd162957887a1927d6a961351f2107ca1c3c4f63b36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0a4f82880af0b3cd800094fccd1f5f0
SHA19216ab46ed5e692412281335121e8a9c8f3200d2
SHA256e0ccb19bec3bf8f1ef2371b1636a6f46de0ab7aba2686f7b26fe65f3cdfdde63
SHA5120de0a0393a7adfbc926da9d959d9b0473086959632408e1ce8925fe8a1bdff7b8a9945f4ab374b7ec28264d2ddb906330071f221ec617345f72588c6ffaa3e0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a21b3070f20d3c58298cb99ab5b9d83a
SHA17564e302c5024164c49780fc88e43600bdbff3d2
SHA2567cb854ee6086622fa916c345a3770cdeed2c744e52c007727f5c4c3d43d3878d
SHA512a4766a1ce69c4b3fb76cb6895266de4eb26dd8b7d170f6d401e09809057d80b08d66023da1f400475f2def32c64cad7dd5ad9717fd70d7acff8594849c8b686d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57de2cf0bab6245ccabcfbd18e847e279
SHA121c51f37f119332b50c530ac0f37e63e3966197f
SHA256c8dd78047779d50b48208cc357b3f577391af6c5ef243ea988da91ee084f48e5
SHA5127c0db84f57dfa0651955a160a92d19fc1d9d8169bfd95c08cb3b71fbc1a73954e946d1199c3c6bac8155c42edb652b81fbdf3dcbf1110dde7002283cb23ecc4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5059f81b05f5eab386271530ba83a8390
SHA1513791214b707f2e413d04a88b3d010be23f3213
SHA2564e9c082b25e6ce1deaca5d643524b87492246a9a1865d5c51882664da0e4e77e
SHA512560bea11ab1cbc1468b716173efe474a88bcbeed5f6644fd04173d3449e678b87631689ad88c53f2af8ec905c9d1a4e6f6d513ad32b4405273555ed1de8bf649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529d76f4ef8beca52d9156e9ab7a52fe7
SHA155b629e50be82fe91c87fbc0f4dfcd42eb3626e1
SHA256f4f341cd5b2a6dec1152da47998cbe30bdd0aae2ea30a9ec2a80bff391b52979
SHA5124f9eb1e2614bd4a492f13ef8426d600d988e76c55bc13ab4e4fcd77b4b2e71ace616e4a6a61ded1b85c788454ab55576e0d336d5104f9a9f0270ec894028013f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57900247413920e80283da18203f9949e
SHA1ae34f89cf8aa847510504f397850a9fb622bb6b3
SHA256865e45b91efabc94c41a42e0a901a26fb5a20336f7322500a71ca9656a36dd5a
SHA5124e56e2dafd4f2235c61fff68959aff9340314fc91c359d65be378b96ea8df10aa4e6e7fce15421f4a6851d1eb7c02e8fd1524704b17f3d8931492406b4e315ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec30063d997fd3a0f799a77ac3bf305e
SHA12e2a760411619f8b7c83afb920fb4eac8cacbf8d
SHA256c50fef596204579308b26f02aa762b881588d5b80b568f1796034c9de91202a8
SHA5120c28d559c42f4608be23e9e72fccd1ffa5fa77baf587809accfed80b88738c5ea4583cfb2ab35a09dfae06e44d8b06e35d788533eb8bd48b9f79caab103e48bd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b