Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 12:13
Static task
static1
Behavioral task
behavioral1
Sample
f5fcfbe44ac773fd2cf1c92353b92f9c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f5fcfbe44ac773fd2cf1c92353b92f9c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5fcfbe44ac773fd2cf1c92353b92f9c_JaffaCakes118.html
-
Size
15KB
-
MD5
f5fcfbe44ac773fd2cf1c92353b92f9c
-
SHA1
243cdc1f4b7610572ead101fe1fd772e2a2030da
-
SHA256
a2c4b4c85e4acbe538ccda675a207820903c9f88126d40069adb92d48600c04f
-
SHA512
574a8084cfed4a685573f8b973d2cfcaf1a278ddaa28997e86f7a61227c37c0bc89afb1f51e11c444ec027141be951294fc9d6d62c6f5d357515bc3beb1f3b7d
-
SSDEEP
384:km/peY0SedUmHIlswpk4CKIgdW7TighHN:km/peY0SKUmH5wpVCKkhHN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433428263" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8ABC59C1-7B37-11EF-80BD-DAEE53C76889} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000009b158b63b9c52bceeb7cb626fdc0ba555c0f536bd2799843a2960315a291347b000000000e80000000020000200000006846e25bdb6a62b262608298e96e56c6c9fb6d24c94866eee370a6c953739558200000002636c7caee0cc85274346176d4d3e7a0bbc968916856be211b302c475c588316400000005da3ced295b97a3f9f93c0490ce89349a16bc894dc418888a431ae6b2ead4cb315bd29a8c13d906c720a8a9ab9b15c4e481debb06adb9555374da500d7b979b7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b095f179440fdb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2092 iexplore.exe 2092 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2536 2092 iexplore.exe 30 PID 2092 wrote to memory of 2536 2092 iexplore.exe 30 PID 2092 wrote to memory of 2536 2092 iexplore.exe 30 PID 2092 wrote to memory of 2536 2092 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5fcfbe44ac773fd2cf1c92353b92f9c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7f03775f4fee5dd25588041ca9b17cc
SHA168ee9872de441428868f8c7da309d8118c222bd6
SHA256b904691a0d640cbc4ccc05e4f1d76a77a899fe1a942da3dc054d8e10b28f13e2
SHA512874c18ac58027e1f90cc98178e76bd7894f08da4492b86a189feddb9a9538a63b21a9c1adceb3349f6d95fd94fe3c3e6cd3f4eeefdf8b8d448bc5a71601a8286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589ee006f71360378777161365452b2cb
SHA18f222166f5db55e702fa709dd66213ab56de88af
SHA256f2b7a8bdb51364af4c05c54582563b941be05031e985333da3c9fea358aba27d
SHA5124936d8ebd972b6c70e980389f9d91c23c790a64a3170dbe5c54e6b14db621e27df967f9a5280279819f23d3dda37e3692d8a8b1cf46355c89343a1aaec758586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7f47f653fb424ad5e37af916b196a6d
SHA1996779c16e03f0b4b5ab1265879bd0b234463eaa
SHA2563032b3bb79deeac2d37506cb535f558ccd1d58fe465f6dc3ad89fc23d159cb81
SHA512c2f690408b227337030e9a19e11fd8624c1b133b3a0d12c13d4e3d045f95ee3b351b3e1f3d64600f6f2ac1197ed1157366cd3b69a8371fbf51f75a17cfdf7f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e6d489a1ab2d8d3dd82ce7976b6837d
SHA111cd5036a5645dc727216d2f7e1a2b655c9d31f8
SHA256885388a8a45484cd3bea88df70d2ee741a760ed957e08a26fcf2181c441a80b8
SHA51203c14e30070446a08442513c50799e49fe8cc136b43f22ff850c7394e95cc77c46df34f8cf12389dc7bb45c1b8752c7b536ae88717d39cadb0a37fc6275e8017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2bbbec40299ea4b328d0c4c6b57acd5
SHA12b6700e4be878a7d4a6e7ee1008071b3be5ebbf4
SHA25665f4dcf057af2b582e1d408778a8690b113e3be42b1fe9d71007cd6f8c5a4160
SHA512667fb0de0c79f4d1a9c8246d3bfe65b60cb13d61133b215f4f8319a652e01291a6c0f72419b493453a49da6cabaa79e812878a7b93c1aebc175c305ee6e04d14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5944346e95da63412374b237257842cba
SHA16fcfcbd7ea2e1b8d22896b31a0772c90b7e414d8
SHA2568870058bd3762c1ddbb6d956ec339fb657826890556e7ba21da36d13cb31ce4e
SHA5124a1bb2cabc2481e39b99140e0bdd527749193ad766faca4c09b63d158556cc0ebfd0ea3c8a11066767df4785aeae4bc922775a029d7591409bc79f0e839728ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565e84bda6433a6e3d0aacccdd8f4dc99
SHA1cb2e4e6c57b63b0d828390c6abd4514094eb1d8a
SHA256d711b0368dd886a38a6dd48d31591621b56c7b321e9cb2070c390221ac1a96c0
SHA5127289a55549838a6b01d9a518143fc1319df9e5b67db6ad6afa0a86e49d5662bd1fcc3dcf479d7fc7304f1b2ae9ca97100e7de747c23ec71ad26fc413a68a8d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3d47735075a7be69f73d6d962195952
SHA1d25da8ad39ce9df6b54ea4bfe0a5f0ba993267aa
SHA256031d08a876f448fcc786c0944470219f49f1c49174882bab220e623d55ab1a6a
SHA512f454879d8e69056d550ef15e02a2ad5b5222bbc333aaa5ec50e5ce41e680e103f1fcc42ffed5f9d213eeacae967e5c5147e525c1001aba812a712c2adab7dfe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7e2ca49324167cf8588456fb67dbc35
SHA1296a4fab2eb3f64b795250bad284491a8aff4286
SHA2560475cca0c76d954a630cd399ecca6cc7bc4d0ede6491c9fc4acd5fdde3ce3c67
SHA51286f6fa47a4e50e421379cedb64e5d6a6ce069b074664266c3044bd0693009819e109df614dc2fb60b8a5b61a40f73ce4a865cf59cd90ef247ff038e83cf5aa75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b49e2224bdd1238157b29c08795ceb3
SHA1902f574df3b1b0f57d73d3d6ad7b23b6881a1687
SHA2561c5a0cd98e646bc51e897859faf72d3abbd37ad6f079b511f7311dacdc378971
SHA5122acedcf491e24976e0425b775bb814c474171ea02e8c9404c16320628eb5e6787a16a9b578ed12d116ff7afa8c9c6a2d207bf5f89de47fcc3dac88bed2e93d6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e69002842def1af73395bf1790cf07b
SHA1f0e3cdb55e36367ff98bf99179504fdc102b8358
SHA256729af80d36d1c92b4e41876bb8b44d94cd86823eaf40ecec559b7e3275e3791c
SHA5121ecaf788ddb3787d339fc322160493b963ed7a49d688d2ae68dd167bfb84c1ae58bd50bdda47d5ba00a63a7ee145ea104875f2bb4ce14e0f5de33bbee908f61a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c747a278378bb5806ab87ec1f987d56
SHA1285fe876d22ea09fe7eeafca0cb6352fa4f7c2e8
SHA2562574fb747e4cb5eb90c1c26b078ed5dc34811024746b65d17c8a41fdf26a0d69
SHA51297b57ae3c83201a8f970e4c600b647af7703aaaba3ae92da39d9e72019968944f086ec3b330a964ee92f6812cb3a55cb591c32bc488324e7f1c8cfcf315aeb62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51800254eeba82c29ce856f1b7c1e2595
SHA1fda25cdb6acf4c47cba175c4740cf4ad921b97d9
SHA2564e770a8da366e6e26708065c9c881d9f50cd5139c164e9876688078a9b3945dd
SHA512eb370c683f097428d77864a6242321bbbeac783269158f7ba2d40e5cc0e7d478e2e6a2b4a00825f3c3a3692d9cb23899d0e1e836840c96d898119ed2df6a8a36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579f91b33eb89de0b08d26620fac3a86f
SHA1a83a0a630e40df42c6ad6ccc2a6445d23c643ba7
SHA256806f2554379c2c27e49576addbda103057b5a7ee13e130faa52bc8de18ac22d0
SHA512dd1797581cfc7d094b655aa98abc918d0b7fa71121dc2d80867d005f1a2c2c755bcce9b725d879664d445d6e91b9b47170af0345e16af5d8baf0bd999bfb6206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fdbdd560c08a2af0621d7aad3b58d0f
SHA1d30fb9b464508af4b9574ed3ff30573915c83a6e
SHA256d97760242740d52b35be2b81c21daf2ff23a8afdc9cb43f77e4ed6f8be1cd365
SHA5127d2eb657b3b8747c716edeaba0d86af4acd864c25541407f8a058b6637c9b78ec5f325ff4466e650a1ea4dfe4f8fb9e030fe7c427066ad5e8fa028a2dbf44937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513fe6da883bbcc2fe1c3cc9f846276d2
SHA151d5fe6ae1ee4e99333841645cad365accfe27d8
SHA256b3fd71b34762793102cec09a66b07bef4c2efa1ad4cf1f4ad4613403cd32cfe3
SHA512560ea68f78153a82a0383b5c665e24484624ca8a53eb0f67d620b648a1a4f2819219ec3da3aa5c54f41774a81d80bd60d32774e1835135df787622c851070860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bce13892b58437dfe745fb462f1fa863
SHA17e392b5e8e97721004b86ef8eee1df907aaf05e8
SHA256bd0c3bb842e9650c4c834cbe9d29007bfab1f207013868612f3936665805abe7
SHA512344fdc9cbe089b09b142dda036d84e00075743d5f573b0a0648601d808d462f662dae68ce0f8c5ab2b9040f8e6e7175d132094e73d857162adc2d74ab4041f12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536f7fd546d09d42a152a0b4dc69fb464
SHA1a2af0c1f13295f4abda21d1c1638bd50b08e9d5e
SHA2562e44c7c1eaeb9b0342adf2a8de5410ad023a61dd463c7f24f4424052b6c8d548
SHA51218a5c6af090fbdd3d3060444b24caf91e3d8cfcebf52665f9155b4033a82af8c6bb60cf0e88c102eff3819294e5dea369ff647b623e421a4e05edcb65a865181
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b