Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
f6b76d6b7fdcc37c16a261a971c93a0d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6b76d6b7fdcc37c16a261a971c93a0d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f6b76d6b7fdcc37c16a261a971c93a0d_JaffaCakes118.html
-
Size
6KB
-
MD5
f6b76d6b7fdcc37c16a261a971c93a0d
-
SHA1
a8a98487132d8d9aca2ccbd0533b834aa92962c3
-
SHA256
927ba6f0285a64ab5cb8d7921e2b1c10b0261ccee4e5c3fbe3cea2d6789d9356
-
SHA512
e1dfba271ba2a3b113e87adef94a412aacb17ef494dab6f2ebc322c08534f8f49f777411cfae067633b8eda16e1e2e7f140f0e40f34e9fdb863060fbfb96c83f
-
SSDEEP
96:uzVs+ux7q6LLY1k9o84d12ef7CSTUnccEZ7ru7f:csz7q6AYS/Bb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{33B579C1-7B75-11EF-A7B7-7ED3796B1EC0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07e600b820fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433454747" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000f32aaaa050faa8763d6bae114ccb88452bb92e25572798c9aff23c681e988c97000000000e800000000200002000000075f7c1862b27e5f7d92629c4f150c5c0db2bb8583b2cf3a6d552d49d3870eb8420000000e17fa37e921938d83c2dee918153431bdc1ed4712ae1c4c70d2fe1eaa2e26b69400000007e9ff3d3c88587f6fba116c58aaea42a6c72a77736c99cdd6a90482c103c2a4b6933ba2e8571ceedc890e6b87ca2f67bb193d42f2c2d2405da45019214ed839d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2464 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2464 iexplore.exe 2464 iexplore.exe 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2636 2464 iexplore.exe 30 PID 2464 wrote to memory of 2636 2464 iexplore.exe 30 PID 2464 wrote to memory of 2636 2464 iexplore.exe 30 PID 2464 wrote to memory of 2636 2464 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f6b76d6b7fdcc37c16a261a971c93a0d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2464 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d85469c6bcd669090e030ecfb65838db
SHA1ff776e5c5bab22dfd7688a544f12c8f2ead42791
SHA256f7b991910a1e6a39df7da68708253aff5fe7da0be59f288c7271e7730a4ef915
SHA512633cc9f361945cc055ef2993bdc9ba05767fecaafd58edd590a7295f0b80eb5ec057d846b92083d88a277bab4848d846c4f1fdad2c3b0743f643444f27b6e68c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cbbfb375c708cc2422af1cce4866b6f
SHA1756b2b473810b9430c6c449b23d642b4c7b11699
SHA256625301e9f32b722d8124de4581afc184f0b280ca4166996b6ce4149072ff1ea2
SHA51274259461f51a7322c6b45d3d6c77127d4e1179f4cbec21ebcdd51ff25d53959b7615a5e1a5dbd9f315dfd5665eb86eb204242bbe0d55c2bbf977b06acc7292c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f7a137eff814001290364e380aa3e6d
SHA102a74fdace2e30f0c04e026d6c950134b4a087b0
SHA256fa3fb61674c4d00e00dd096d8b91aeadb012f1699152a4e761dadfba2ddfc4a0
SHA51205f5a04e031a58d40eec73b88235c64b007d020d151437f7cf01b513083cb8fbed81cd4b1202eee23540968f1249a49309aec09926c4248e37d1708ff4aa9113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d92b31507d1a2f4c226e04030dd23b6b
SHA1a965a561d20aee39bb6819dff9ad10b54eccf6b0
SHA25669e1803f67e75b416244686eebcb08714b2d0042cb16323b4d28ad8bc1297cdc
SHA512c70dd04343f30c4160b7e086c853786992ecd76ee3aa23be6bb7d6ad8842fe86f5e827303aeae0d7640f5ef24463c5f43fec790a3c496ea06cd29d0b7d3df4e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c0a963003981c2cb7a70ec83b82e9d3
SHA16d4238c8a476361c5e1515824f6afaef82990c7b
SHA256b1a3c50140dc10374f25d252704610db07b3e47782f5b816e4b7facac7b59373
SHA5121696a9a43628c86bea5ff28b6f3d96fff8455444f851e96a8b5f7e3e04cb33d0253b12c7839fcffb2762b8d5624e8b2cc5a6f9a42b5bae9f46d2a4c25879da87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f615e39de8e990c99ff5b71f280780de
SHA1c150b1e8b2777fe99c8b42a21df9aafce161aecd
SHA25684f23dafaef42205d54202e3a162abeaafb184a2c338d5d098676089b2838012
SHA512b78cbe4ecdfb7be47c82a70fbd67e8bfc7335dddce7b26870d625036502f735208ee6359c63bf1454c9fe16ce099222104af1111dc4fde5ee978888795d1bb3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58802dee68fe0eb86bbc994d7268f0a7b
SHA1a7fe82c0cdf50774b58eaae660f875262a906542
SHA2569b0275cc43e585e2ee42deae22a76b4ab68bc1981a763178ad41b9ede93f36c3
SHA512658a09cc09721c0a681a48250564c4e59b933c53aa399f81477d3bd0d38d8c6d225f09c439a203409d97901d8f19df86bc6257a0833cb0abce721d500cc43815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b68af83eeacfcc1daa09d7832ccb82c1
SHA1f6f9c506a7115fa7f2b32829153b04cf4b1a5bb6
SHA25622f22a74c8a062bf1659bd788adab209fab8ca819bd4e6d5fcad78fb269a6774
SHA512699a9370dd591a1469c3a1efe26ac1d90eaba2c375c55c5f6fbe980185deaada72dcea32a82f5b98389ae2ea39f7e9fff4a68da2b63a23837565c570a1f888eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf82aab2355daf21cd38242f30dd7ed6
SHA1b8cc4f2256447983aadebe159eb447b486fe9094
SHA256eb7afc94c3f682f61236a6a8e05af05126f7a6b74cda0c9551a61cc6bdafcac0
SHA5125406e99c47cb5c5dd1109ac939ecb19d1bb7e2085fac63fb56687059bbd1c2755828c797678709971d1c055764132bc712b2239c95fd66356e8da22ed7c6e721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef93ed9526cbc18e3b0522f469c14d48
SHA1a89690adea50b50b2c16b040472fce180001e964
SHA256f2c42768390af2993344413f077f0ca7dc18ea3d26c638315982c4163ddaaeb5
SHA512dfcf0812b81c2767425eb3dbd3868ac5bd405ad50159eaac73558db460098e8c2b884a840f0933526d023bb528b67d0759f7f4106e8f1e20bb57ce496378c45c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd5e048c32b90124067fdfe409ae465b
SHA137a3396182047e1fc59193044b217eb602355223
SHA256324fc20b552e6e8e1710f9d6e435909f768ba2f95b511a5c623befb38862f984
SHA512e347eb14553350c8f54fedc11f7f2c019f9a19d1fc6dbc76aea25ba65ffa0af7a046fe46ba49bcdee672f48084a88e3bb09ad3acc0bf30d3daf1f37937e2f347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f7b026e291e202d78f468b933b6c87a
SHA18333ca7081f4411dbb37912260b34cf7b2dcf478
SHA25671399decd9b1462f6b53e073a217c3fce520220cc3b233c91ae51ecaf284de00
SHA51205ac7073df49096bef1406a09bf26c60e0689daf9876e9cfdd123b23f7bdbf43c5ce175bbde3dff4c46d54ab069d2c5bcec5db5bf6ce3b18bcad671ce609e013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c3c721223aea36ff55c5ac49b74021f
SHA1aa47d9a382acc89ae7c307c691233c3526c13cce
SHA256c38ece735f9600c971528ba4510149ff302a95d0bc3831823034edbef84fce15
SHA51268cc93c9dd3aa3169ab824c360ea624522ffd857883877cb0b03bd0d7a8ccea44fe65e146e63ddc2483bd966a177d3396b4f66b47ab4f3a4f117378cfbff9a67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cae07b58ad578726f04aa86c74b2e02c
SHA12743a0a4833bcf1017a63edcedd0b30454f60bc8
SHA256c71cdf01881d3cd3fbd75f9a62eff0e1fc783d69bda10b46e1c6c58f9e6c0328
SHA512f083e8da6747cb758b2a4fca85e96c358b5c08b834deb4a64baa6b0c307030cfd80daa64f0d95908bec604cd53cbc7298ee3225a4f1f607284a2f5513b521bcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508dc23fcf6a9b7a909e7d5dae389ae0d
SHA1a3951f01e5ed82186add2df88198b33b5430f800
SHA256aca749c7d5c6af4a307e28590c5a3a7326c09c88b9d82f58695dc64adedf49e8
SHA512aa6be05f80dc39c62c44b7d9667323d98c0aa621ec5a3c076ba1d7bd8706dbcd56bc3788c236134947952ad002648f94c59c7c284d48f2ae2515b767e01d2e18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50485fa858bd8d5b971fd32ff648daaf5
SHA1455148e3609c760942719ecd889a402962ff1df5
SHA25670e383609619eadbda8c2287e2aaa24270e0784a04115fecd621ca30e1c62a70
SHA51245aa7de419d34ad77f8b378be970d40ea619714b3529e889909681bed2826880c7e219fddf4386e1e6ce4331cd011ddc17e76a730832c6c7ee87fb47f7e281e2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b