Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 03:26
Static task
static1
Behavioral task
behavioral1
Sample
f99f412d22fa2945049f41bb499bfb45_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f99f412d22fa2945049f41bb499bfb45_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f99f412d22fa2945049f41bb499bfb45_JaffaCakes118.html
-
Size
189KB
-
MD5
f99f412d22fa2945049f41bb499bfb45
-
SHA1
dc3cbeef66583d41820297491675a4a31547493a
-
SHA256
81c265446e2adcdf966fe60abcc0badd633f5a70c3d5c53e9740a7bd33070a02
-
SHA512
d9dd297a530c16abb1e73861d0470e2c4da7cef944c8b5f1b8319f1146cf7329943f4e2d26997b60629de3d97319e34c4491a7a94da00049465a323952dcf4d5
-
SSDEEP
1536:dEmNGZqnIYnyRZWS5ogpuz4fQpp1dVWHGZ4srV2ERZTxAH8XiLcZ3xt3VSmFgN:1FkyZ0KNGLcZ3xt3VSmFc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{397DD261-7C80-11EF-B40F-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000c1a1db1cc6ab4d0913f3e256784cbe86259a4411d475c9f3d3fdfb9e366f4833000000000e80000000020000200000005a1d4ab0d0b4312b58d98577ad1a8e22046063c9a86f77743ba012b2078d6adf2000000088c9c0b53c18fcd046246252ded5251a871c2a832c9f40ef3a497bde303594f5400000008a04cbaf85b164fc9392aba6f80595c35e52a16b367e47953565332bbdb47202f7416b6ddb94d0c31193c447df64f9389be6813e3f8ab3f728dd4fdc6d105ae0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433569431" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2019f03d8d10db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2572 2388 iexplore.exe 30 PID 2388 wrote to memory of 2572 2388 iexplore.exe 30 PID 2388 wrote to memory of 2572 2388 iexplore.exe 30 PID 2388 wrote to memory of 2572 2388 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f99f412d22fa2945049f41bb499bfb45_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57732d2e410d15dbd38ceba516203b4b7
SHA1b1c297060c319d1f8a214fbbc4abf84447cb431a
SHA25671d03a0d6b58f37aa897966fd69eac4ecfc2481dc603c34c4214bc2032ba0a90
SHA512e06b970f8720f2ba578c343e8b7e814f8ba8f4e0f30c8e0d6acdf3d9e376b46ea7a0dae6654bee13a56a3bd3435cb5b5b1ab34978fad800084930c0cb7bf719e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c0c1b307b81fe1efb8323f7eb7c1918
SHA17bf5c29b861e5fe1b551d844b2be178add444c68
SHA25611812ea553ac2a2a6f417f7d7ea44588fcc0dbe6770992942010f20105055768
SHA51221c663adf1ee5437a6fa6ac58fedee4aa2f4dd5d485af278e2651a0c2716eca0e4fd03b95421fba9c302be68e129183e529fa9baa2f6f29afdb4d0fe6cd13145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a37299311bef8d7694d800f0d0dac78
SHA18d56a93a4c4062d478f681fabb431be6cb06b314
SHA25607aafedc437c3c87250744dcf8be02f2a338bad94bddafebe6332d1bc384b27c
SHA512a8b4a6e2df2be5010ca0d1e3bab62ec85a3f91a0bc476042db0e6911c23be066b6d501c802a6d06ca60b646422866359a5b4bea07c09895efced0854407d26ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd2a27bf0a1a65772c1f8325c090a4b8
SHA1a0f7ca35856b2bc26a4178b58d739fce34bd16b0
SHA25673836b8cf84103a23682403df1c28a2c52189e56de4631ef9223d9d03e832615
SHA512a1cd65151032af56cac8b2e066ea9d1d4e920401609094fc4eb1f6c7baab007ae68a95c5c3803106ace00f0b49e4cad8597240994cb2d68daa8e180cb789d470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c87a3d0f8b7d995abb8fb140b644002
SHA1c60cb27fd44ef5670a93c2c2bc810bcb49ae823d
SHA2565a9ea7eb8b1b0161b0047a696a126b66224f739e52f4f219d4e71b932f16da1d
SHA5123a8a14022667a31e001948b32b180d772e4e1379ed44690f6093a64453afae67d3e00d566406497a2a745ad40d5e60a1b7896e7c97e23eb696dc2908686169b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b237a03d0bb4aff4d09cc0879f90528a
SHA19018f660932f1cfe8c9f3cd1277703aaca4cbd07
SHA2569d628c519d7a3ae805db306307af4b1b3e241705579949ecd22697efcb1cca5d
SHA512be1f2cb37d5224d66cc493f9019b2513530c9faaa8792e17a356e0e9bc5e726b3fedaf0a005ea5f1a18a64db63f718ab4fb6404ba3746d3755edc376ed5506af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511e26097ec1dbc19e528a46d4d2e5ff1
SHA133f4582103f63ce9e41a8dc89404cea01de1b397
SHA2563a75a73cfba8c28279a47d41fdac101c3cfef67480aeac403ae8d9fcf61009e9
SHA512515525fb30ea8e75980339867e7f45ea6b92d6ab00b1db6b410ff242ec2bffc7674a2fd331f38e459b1cb13711e19ac90f588d4371bde68ed22fdd18a885aaa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2fbb2028be15caa528d2a1448841bfb
SHA185cc4ba8a772f27b6410bd5cb3df76cf34383bc5
SHA256e093076f75179bb6d6954cae80bbda9567c391115816835aedb166c29fca84f2
SHA512da0608f86a5024f2606144c88f1b4dfb9b6fe0c32ab6f74e14dbece5f6c836356a168f23e7e02ae129a1cee5e94378c3ef8804150ca1190e1356bcf0f31db04c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bd1e00c99da1421b74a5da721000ae3
SHA13a793327a7fd0818c2635295b517c3315aebb5d8
SHA256806755a38f6b694113f9048d7de276ede1926705a4fa75d5da0ed2be3bd3bf69
SHA512cf6bc50dd32051fae9ab8ec683c9795b78b28b414a8e8b064052d5cfff2677c204f172773637aea421dd2217b6c02a39c60aa33165024a422bd5f56ddda38cdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da23eb0ef649d06cfb39027c6582d0e8
SHA1739bfc44a0b3feaf8457fa0ab80ea42142d0a07b
SHA25616f820ef334f781b06351f73e1862d3a19ea8e89af8b4dc284083de139b003fc
SHA5128d95cb5cd52b00040e358b419ac195dcd5555d2dcb0b809189f121164a51d9b802c841e837fa261b8ea6620e92e6540e72f09090572790e6ed377e850570a8e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ba02e466e0902936227a23d0d2c45f1
SHA17f2f05fa444dfbae67f28edfd0346d808bfd69ed
SHA2567913dad376afb29cb52f9f3a248a1e27b69def27259fd4dcf60dbfa28f68b71b
SHA5129a76c3552fe53b2e9b217dc4f0d0cc5ea68e633a1abbf1743f9a47b4aeefc033951801573066d284a2f4499098d5b01d042e2bbb7db8d2dc4f42d97e6123c935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514700be44125555a20dc2074ff029727
SHA1e8fc99839182ed43c99b8411c871bbbb091201e7
SHA256ff58bca2dbee9495ce92306393847eb57b72d13d1edbd1e2d6955963ddad9648
SHA51210ef0ec6f69f9635174da34ac1eb8f2941f16509f19359cf2969dc3ca7061fe7e95675427f01c29b307ce9150abdffdda3e66fcf18f67fdf434b338b68395603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d385406ce670034292f422efe2c6cebd
SHA1f6e286a35ef3ca6717220f36ce32a72a3bfba8ce
SHA25680fcfef76959bd7c1943499797c6758f8215a721c56477c6a4102784e427cdf9
SHA51243d7e7958fab3463869160757c387a96d8a6126ada00c53e669ab615e818be4813af0c9e9f720891d59c285c22f85b20df7560a51679765abb6acb0ce22a5706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d93df702d2972c9dabd2f9799df99907
SHA195ebca62911b733fe9f5e21208fece1c697b9e93
SHA256d147bba814db856bf8008344468b3f11996f6fd0154b891f8716fb5514ad5fcd
SHA512d2e0b9a0e6b04aff97704ecb9bba1c51446690a160ada09e2cbeb7fc8094c41c71438121d906e85c24b3a621f3f22c517c024f15d04d865e835e224cae26b2a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2919e030fc40fddbf4d3fc11c4f0826
SHA1d01ee0859aacd9bd14016c410c5e1f1ce2c9ff57
SHA2563077eba8a2ed2b1643a8cd7336727f583ab753055a22542635733d09eaac4808
SHA5122cebe82dacb32a3d48904d42a4db97aaead64aa2406cf0cdd6f21c397fc620f5cef49ca7a49deb00517e4c9468f9a0fead369ccec4b061837587c01b86f0c674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513607e42b0eac7f36714d5b8967681f8
SHA1079ecb6426c45e4ed183932b02a5762e31c81678
SHA2563fb090c4da90471f8ec04c959c0ec8da6177b57bc0e88da5fb00c661cce6d21a
SHA5124dec98c2739a31b9c9219b553c89e0558b2f0c5112de6deac5cbf0262635f8b0602506170a6fd257fda76e717f6b659c406ed73ec2bb67eb0d7d4638b38fca4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5193927ce7287828eaea9dd4444224e81
SHA1bce47bac906c00bfe0b323b8957e8f3e0c07136a
SHA256700301e145fc49f0d3620da8d1a70f1fc5265adb712dd692ede0de8228d07b89
SHA51262edd560cd528437c86bbcbf92d9ce8c9564cb7b6891ca1c3e7bce06229f279064c5d23d3eb1882b63b2115483e3dba3367f004293b2cfb5c98c7de1455b23cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504ec3608a323aee7b332f5033d7605d7
SHA1d2e11602466bd29b622821ffc55bf9a1b008e93f
SHA25687ad1c32dd64cdcc227143620d4a1c82c9f640636388c61e1b1c9011460e920d
SHA51207932ac090eef34e5bad45011f99b72bee1ea370c947d408a379500099933810ff580785b5cd7cef76dd78ba5e01c71828a4a0b028dd0ef37c312c65f1234d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592bfc4bc54b269ef114d2cf41a599c0c
SHA1bd1eeacb8057c0b9278b1d33cd0d62e884b9651a
SHA256a0c1f5ba1a2ef2ce0099f07aa3a466002631a206149e7d7e96573f44f74c38e0
SHA5125d89c1e867d4da46aa20e3682955929cf11cddc2e29315e665eb3262ac3894c3a936d33e31c8da7fcf3fa6daf437d521e7844ce449cae28dfbe559d0dc4f71e6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b