Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 23:12
Static task
static1
Behavioral task
behavioral1
Sample
fd5534eb93bdec8577de0eb6d2cb60ef_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd5534eb93bdec8577de0eb6d2cb60ef_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd5534eb93bdec8577de0eb6d2cb60ef_JaffaCakes118.html
-
Size
56KB
-
MD5
fd5534eb93bdec8577de0eb6d2cb60ef
-
SHA1
d316116f2165cebc37501db1d93651efc038f487
-
SHA256
c9a2e00f77ed90c297376e12c1f86ce10fb31b80edf6bcbaa2a8346639ddf0fb
-
SHA512
35249012b58099b780c67ffff7f4f8ff2d8c4762f1789fed84d56cb4849fa8ea3fb58b10ca8239f528cfd0980f14495353be2df797af2f9f701b002471dadc1d
-
SSDEEP
1536:nQPANY6ifAdp6sfj3B9YPZff7OLuKuyejuxN:nJi4dp6sfj3B9YPZff7OLuKuyvv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433727041" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2F0AA811-7DEF-11EF-AF16-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000008cbeea1cf077657639b7dc6056a268c82bbaa073b6fb20f795f8842730a11de8000000000e800000000200002000000059d8abcf8f5002ca62ad9e847a3c1262422a4f99e46982949afe0231b7e27991200000004a4ad9e378cf3229ed7dbf8fbdd116becfc5292aa9001ee80fc96981b7edb206400000003b2514beae1ef3c5669246e3c14ec614e8956cc87713847fd6616d3d27bab25c0363db64ab8e99d4e1b83754923983575df9f05c1d34a9dfe8bec2fee94fe36f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30d3b515fc11db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 iexplore.exe 2712 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 3012 2712 iexplore.exe 30 PID 2712 wrote to memory of 3012 2712 iexplore.exe 30 PID 2712 wrote to memory of 3012 2712 iexplore.exe 30 PID 2712 wrote to memory of 3012 2712 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd5534eb93bdec8577de0eb6d2cb60ef_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5541e7d47387aed256f30f6935ab582c0
SHA1ded85283486b50752f5176264d1dd2cf2a3690e2
SHA25631adc631cd0bde0830eb3f2311fe4c9e891772bc73cfaa24ee05b34659cb3096
SHA512952c79344a5e1eb151afc460da4faf3951de66de4eca4a0bad268b4f843fc44ef12a6f91b216bd91b7ef16917e5930c264f1a18b6caafed56134dceee1ff0f81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fb30b96f4e1bd9bf8eb6f6bf6ab586d
SHA1bb5a75f893b954c7a4dd036edbca6b2ae4532a5a
SHA256b520714b14f31c567ffab92608cf62aa42ea1bb2463b908d75247553c2a0f98d
SHA512d4b8be2809db35de561ca53b1096a2bd71237039b27e1e2c6378b7b7dd65f82b370cf0e5de1285b3c354691b5b68d792ca6fa83adb6af397bb279c1b237620c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c012bfab00aaf366e8349b579974238d
SHA13a65a21acb13ce10e8d11f7a683cfb73fc4b9f68
SHA256cbc45e71c80633d3c3c316235c25862e2c44f4857c428f54b062a2e3a4766c47
SHA512020c2e34894027bafbd356fc22c81055b7a764183860a98d9c21216a94de1248cb690a402b19d7192086d5890ae003589957cbd255ff5c3807541fc808a6dd48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e70f7781687540c8ad812c1f85cdafe8
SHA1b4f1999ea45ca86e45a96a33527cc352dcd72019
SHA2568a874477bded2bd21974e1cb1e85c619c6cf0f2a1e4ba49c4141747c032d086d
SHA512f09fe0a379c69dc89cb2d54decb5fff2ae53dd686f8438fc407640170c994d1ac87d36e8492f196e5683bd0e01f30ca3cf39a5932d95f99145eb60cf942328ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a03a75dc2719cdefe34f137ce47b8ad7
SHA111181c78e19034b224bb5fad8f7e3da85f67989f
SHA2568b7391d9b6fc64b31d22e28abc4aec8fec95d2ebc81c90c5f4d1370c09d25f41
SHA512001a1571f9d74784d3d40cff89f05db60bbeb0891fb5dcd621b4b8290e76779746acf77b4a66bfa6743c10fa1076c8d58c15cbb6d743434887b361fb1e55e3de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514f53881914cc77524b6dfc5570c3a17
SHA1dc2ea5188b19ddb91a777e6e897414e62c1fe05e
SHA256bbd0342d6ae2013497be846f2a41a548430a4c22d39cd3c2b525ed389ac90eea
SHA512481d336f2d85fa4eb9bb814ad364be80b8326e044c6d02da488a3e5df0dcf95cac4fd41a74964d9d3a2fad240dd3861bce2783b08b82e1517c50881cb50570b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ac9225af9010e2d98f1f5a4cb699d6e
SHA10ee54df613f5a0b36431d2ac1a8fe0a198995c04
SHA2565ede2e063dca18277ab06e7c399ddee7c552647ae30208685a419d284a80d602
SHA512c47a06445aef88222d5e1f387ece2bc8c10f7d137f2ee29d2b39b27e54e9974a6b03ff3aceac6578a8500d64d1c8780f334f549784e2f85652dba0d31e6c3f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a22bee1de6e747b70c13999e6065f826
SHA11ca2715c34d4d2e22f68c6c8366c11d458378064
SHA25646503c3589ef32592650fcc0be1ac29c59cd15bea48975393dca9affdf6e44f9
SHA51267e872779a5acdd05a366a424b40e2b7b6978fe6e983ea7e9623be69da3535316925bbd6d2707efb1c33861eb46596cbd9ce181a1a7b3520263a833cfc229c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e45ff0f4a07a4a9770cafd581d5a9ae0
SHA1ff92f948fcaf3b0b85de4c26f085e513efc1a0b1
SHA25631fb68da43be4322d7acf611016bc75e44ec4d727f33deaebeffb142e47e742a
SHA512b2478ecad270052ea64b568cba06acb1f046fb7586d542b8971051b496df18a67821ca64e485ebfa1157f13a37d69a0f565ad4a2c58b382a332360fb033c149b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586c8bdb2d0cbed3328d3a8ef9ea2236a
SHA106c79971f6969bbee4851efe8632d042a97c0d2c
SHA256c309b3c7fdcf3dcc1a140f3b78044b8cc5f537ed4a8a3faab85cfe88f934fd3c
SHA512ff927dec7535bd1a93c37d82961d4388256a8150039f682a9a389c57cd78e219555cf0136d7771980349ba1b1420d7e8e53aca8b0d061f20a2f19de9f9ad9b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5159a77bcac656bfe6faf9d921b84a250
SHA1e09532c01665c2409fb999690b8f02acd68a83ad
SHA256b742965bd29d17c8a2d49279af61a5f0bcf1c7696383cbe28d3c8816535874ba
SHA512e6daacca107d29b9a81a866461b06638e45c6393f5f33547845482a59395ba1902ae6121707ac73f9e488d3723ccebb2ee945cb83ec0ad16a77fd5d7bb705301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e23b6e7a22e7abbee6600724b845eff
SHA15d3cc119dc567f9e5116fb4c64b88d5ad637cd51
SHA2569467cf6a029a6be16efafafe4bbe50100f72db34e163091cc6eef917bc545eb4
SHA51299df371267fa3a43e9e0a739bb841404a0dc462ae995b5082f2c6fdc20479d27f25093957b04e327b7e8951392d2f536efe72c730fe9ed0c931cc36e5e2eba41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c7089f83e9d6f9af49368cf2c2aa436
SHA10fd392ae159aaf7bbd5b0ae3de3df60a30e9baaa
SHA2565e057ebad8a1b6ef70a0e3ba975a1bc74e07e1bffc460d7275f2ed0919a82f68
SHA512c6947ec9d13a6d7c3d985b82c880fae61b60ec20ef394ab9fec26caec572c6b1c10b5ec5703c91e17c6269e0520930f02ef2f81f00eb695cd59f62bb6cda0e99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c89b067d0a8fdd12ea265d88eff8fbb8
SHA16706bcdde571e4a4a2d66346b56cfa5d216d21ae
SHA256446ffca183ae0069e0bcf4cece02f3cef477a222dc63fafd9254e84db361a380
SHA51286151e97ea410a2275b128107a1f7f65cc64ca5611b56a3c5e53629428087f5fc9171e5a32ab89bc6007a8f553d55ed9eaaa72744d7dc3018e9f9b786596bb35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5447027969ba9f39ca1bc5e82a714e415
SHA1b04e9134cdc8c172ddb1ba31f8dee9711fee4205
SHA25675c3c5100fed05a6a77778440b8663ed404df7b2a4aa0866d6cd4b1a0e7418de
SHA512175f3bc3a4927efa91e120a4acc85712836edd77c06da0209952cedd32403954d6f1cbe5b7ca27be2fc5e06c77ef1aed3761d38050bb8c7bd536bbbe8ee10d1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5f646269429e7b0bb0cda1bd73a5295
SHA1bc4a79b95282e540b27876fbff8cc44cc02dd57b
SHA256e29e64342acacaf9285bbe19239274a7f52cfba4b19d2952de635346765c01b0
SHA512ffe372fa6c10009d7d8f06b199128ea44640bbd192821e507dd3d3989ddd61bdf90d1904f0348feab98addd1004ab81c1d69976b98d23f8f00dfdc63e612edae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0f7b2ddec46bc949d1a37e991cf5b53
SHA1fd6bbbbb7a35ee57b2194d71185dea292136d0be
SHA256fea8bab667fd4c9d6b87d864e47fe721eb28393816a9144e43962fc372c2918e
SHA51269be845ac92ded545aad180f4f28433bcb197df41c97547dd30efe6501fcc5b357da4936c3360a22d88de7f5d02ef4c4e9b676cde76db638e3ad51c91d665c7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5182ffbfac1b1784e94a016aed5a5c0
SHA16a57ca28b54aa84d7cc7e029d1e53ad505f25e63
SHA2567b5ac3d8377a5eb657e4685ba107cce0f6ede191bb449bcf35af6b2ff2e750df
SHA512b6ccb859d67884573f064cbe6d86f857e84b560c0ffbed81c84aefd1ec2a861fc70aae910911d4acb1a71b8d6cf75c6355cefbe4dbc2c659a451f5ab1a4bf48f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b