Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 05:19
Static task
static1
Behavioral task
behavioral1
Sample
f9c944228b2c8abfcbafeb20f41cb463_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9c944228b2c8abfcbafeb20f41cb463_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f9c944228b2c8abfcbafeb20f41cb463_JaffaCakes118.html
-
Size
6KB
-
MD5
f9c944228b2c8abfcbafeb20f41cb463
-
SHA1
7199b3bce353c1e9b67fc09c8905ccf2184be634
-
SHA256
d51724e03873103d625245fdb4f536109444388be8d23ddc9be3ede86fe11d06
-
SHA512
d1d567cabf15c4b070940e8c3b6fd222d30f568f48862d33eae3d2561c8d4a9316a63ca9a1edef767615fd6216912c8a135d912ec1bb0a5f389034f9c06b7951
-
SSDEEP
96:uzVs+ux7eHWLLY1k9o84d12ef7CSTUi6MCcEZ7ru7f:csz7cWAYS/Gb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 303cdfd99c10db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0336F961-7C90-11EF-A087-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433576212" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000003f23824cd2a0f95e470001a366149a7bfacc25b46f6eec6462117abaa7d8b38d000000000e8000000002000020000000ac2b9bed5893613cf8b649d8a9d5fb1fbf5803aa8c863483a849919f0f96064420000000b9bd65eacbe4bc15aa0a49ec05f6b6baf466a1d62f8084f42d32d3836eb732b6400000009e943279ac0ffcb2f58cb229237a548a57dec726b98296aee880574ec20ddd44a16d3910232049f1fd43e07accc5f72d46eb1c18d91a7a14d0f5f1f09baf9e5e iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2100 1732 iexplore.exe 30 PID 1732 wrote to memory of 2100 1732 iexplore.exe 30 PID 1732 wrote to memory of 2100 1732 iexplore.exe 30 PID 1732 wrote to memory of 2100 1732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f9c944228b2c8abfcbafeb20f41cb463_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0b63db089b175899ddcf16d8683cdb0
SHA1d6e4d7b360e7f962c61478e95fc4cfabab551b5f
SHA25692e52b4e3156ec415fd79ffcd2328b8c67251a2dae2fffad8e72d86631d50293
SHA512e05e4fabc00579e4d83522f0168af9700e3325d8fb56242e8b59ff0d209a0aec8308e70dfc77b24a1f9e2eabec63011ddae1a211d0e220f89c2c2d0c95ec113d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5636f8c39e6c0affc92a2a9da2016012f
SHA1bba92bde059e7297913f92221582064146b4891f
SHA256e9060f1b4a9fc09a38624e0fd87b81c76c2685bcc175de9b851efa89755ee46b
SHA5124d010b6571c6d994c1a35feb0667ecf9de582c7de428148783414814efea77d6be8f4867cda8d3d926ba66d443cc7039fe32871537da739036f657858a524b58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ad4ed8cc46b60dd60cdf8ccbb64f95d
SHA1ae0839af3534aa4b18cb5071412b2d2bfa8def0d
SHA2568471d74c72f2344aa186d42fb51f0e443484d73a1c98cb6f491bed93ce4f616a
SHA512b3bd90e9f8c2fd39769f49a92efe789ddeae7da270b207fb6af5727be57c1c2bee79aaaabbf6195d81459753d1a12e6eaee35b7dcc56815327f3d8544eeddffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dd4bcc9e27272954ed2e9b8503c3ab7
SHA1bf498ca3b88093d878f4662cb6cdf11908fee36b
SHA256563c2b78312d111fe5a5a985c8f1586f8ea02130904166b60570f36614bd5d81
SHA51205ab6748ff83c8f0ac3cebb19a79924f20453c01c0a22435a0e5bd2121f709a66bb32328c5b135be8b8d9c38581eab11bd369ec284a4e3a56670f6f023d0d624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52156a62ced63df93c98e189a0101e457
SHA198e6fbef8cd25432d6c8dfbafba98b0a77041c53
SHA256ba8fc88331e0dd3de8e2e2927c9bb488802699d2d78ca47a09f1ddeb4ebeaa0a
SHA512451e0d7ea1104f2c1ca96df0b8d063143eb75580471ad2a442a6c79a436c9c74658305ef6f3d28c158b40db74c5dc1a975b7ff7894eae1a9b99a8b94cffe7ad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0d8a889a6a92274522c1095e46c7274
SHA1ac9c277a065be299a29584549fe22005b985c733
SHA256d65da5f3ff0eb82e20c1e9531326887b1c80c76210bd6e8921ff39df9bcd5f38
SHA512f892394b1896eeb20d6be44da54073c6fce6f95e38a038b44030e6b34236c88d4637a5a95dad9d9c95f0b2a28a6c208de48729b746e73009a8fe4a17988d1ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a212e5451df7c618b90ae6ada793788
SHA10306e3769445fc79bda6a99096f6313881748e2d
SHA25629a8d25c76420aaac95bcfdd20c3834af2a8a9f9952b6cb54dcf3441ab92ed7b
SHA512bdb2d65761c4a92e97e8ff056c5d8ff6fee8c38f978928e046468fd7f4538417553e7041c9837c6061e01525e5dcfb4653e32533782260b2e55757e10e0263fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4d791e7cd98bee45bfa899315b2198a
SHA140754b5407f0d6bc9afcec9064e9d3be4c9e91c9
SHA2566685a5a53b4e8239e5bdb0559829ed4ef149271afad6387d79bfca0ce3cf0385
SHA512b9116bc44e86e5348525ca3e969f1c48679cd69919cb842ce68eefe282a1990c9593ab61325dda39c7dfaebed423dad8dda0f7d01570bbb587f26f5983c6610e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527e47592fd4142ebdcfc936734da13b0
SHA1020e045daf2b0aad5c84b26294f6a25145b3ac5f
SHA2563fd0b61a015f5c2b753f2611e47a96960219743a79421fd061416b8089da551c
SHA5120a4cdf45f4eb5b45d06003da9852f7218dcd5ccbbd9263ef3aa572a4794ec0d83ae87e43cb35b17b87a6cb3ecc9c09a5ea756f52ba60023bc8169024313b55c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550a3e86ef722f77ad9b6f1754c31b57b
SHA14695456ac91b62057b26a7bc66d30431846de396
SHA2569cddf35793b5a2f3fb763c74340f9a4b86d76823f2efc29efefada9223e656db
SHA51220035f0ad1c33704113b5b310423445311898dc287e848be1168fff0813ac9df76e7407a99fdb3726c7f850a021dd4ad80f397b9aef51036e771e76ef14bec0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e964bc3ee7edf36e3f25fb56a5723c2
SHA19c1e208ea31f9606f6953c9931d633d78e7726f7
SHA25643d52bd820fb60a4ccd6bc1b191d19ac4111026e9de7a2a900b174071269ca62
SHA512c88f2dce084d96062fda521324e2dc7fac3e7c7b2066aec47fd96288d955cc57a4092cd7cfc3d7af18a16a0633a94f126117f5812f02940ebe83e620615a9638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dcfed9f45f8450366ca0332075b99fd
SHA11110ac8917c680f7e81d1b50cf68703703fb4c77
SHA2566b2091f3afaef0c62dad5bdf4a57b317578c60d80b5c9611509852351e1c2fd9
SHA512be4d5fe6e89f0dc42a6ac3a9a6bef603dbcb83bb28511d48ecdbe0c218dcdbe4f3eef084d070b0b0189c1a4af26268babdbb5dcf83e3cfc4bd9883fcefe18093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8b94026e08eb443e5ec15448855b413
SHA10b9467839a785e0abd9378daecbdace1ecb93fe3
SHA2561324600b616a121870f9acaf265b10e34a28d78adcbc05c82672a19e6b4c2023
SHA51211b32f2f77e87b056e5081f31b6b330b777136521aefef2f712ba7c2703264d6a0ff6c4e783acc70093307393c31a913c54e96cc071cec43c89aa90ba4465faf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fae942d724db5ea542e41e9c38030a3
SHA118f516b7550c060f6d272f736851bcfcada1736a
SHA2564cb36aa7f9ceebc285fe2ada5857c23ff3c0f26f2bfb3417ad6c2c0d54097c99
SHA51259d4b151ca27f9effe0527c49de10d40079f0dd9f942c26147b5e352a70e35d519dbe17d2371e8ba31e4780101acdced40cc87a98818e0fbb211c380b5afdfed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5737437d2c5d11f22459f21842d28672f
SHA154ce053f62d49a7e58abd145b88de94c005ea4e2
SHA2565680692412e7d947432095b5cb59194f59ce81eefe2272682a7d770d6728367c
SHA51269eb55faefef04869aa51a2543b651d80ab3044b538ece12b7b77006984ee928b3e6e7fcb5a6578cd8c6df4a4f91a0ef4713fbebcd77fe3d1ff031881e93f067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527d729d18283dbf6f54b1c1952a2d0be
SHA14c7a195596269746d407f6c331c6f8e89ad75078
SHA256313354aa42ca1c5853cf4991b06bf7f9a6947fe0a491ca557682d2ecaa14b81b
SHA5120ccc16f7da36c343e96b2e650d2af70d999a1eda9d478afe540360a9c3a8991210499536a11ef98140031f532606dddfca2c30bbf279f8fdc8c15ac437564875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a6945f93a53530c43b9677ce6dc9899
SHA19432b5ff49974f10e202f4a28617e25fd3cfda38
SHA2566163ae159d1436fb7aff81b530df819b61034f111b8cc367fa4a630ba33df1bf
SHA512089ea026084f356de9b77bd47fdffa4506d93245ee1a34f30aafc00e5d912884d78a19b0f58fcb4d084b00751991529c05215fdae383c3a1e5cbe3af766f4bd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec1c6b832951b4c070a9c888aa860d5e
SHA17a769c93165c6ca52f0b726a8c1601840db24d31
SHA25632346f99f22cf2cab6d198fd00b419fdf96dda3e6b6c9c329a2b1bbc6a79f919
SHA512d119af6aecbe48a4e2561b2360b53ac319e6f94e239d4a958d18bbd9a6f9671edf9511f9ba143a00c8af0bf0e803b456010902004f0cbd5924b708f59f6065de
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b