Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 00:57
Static task
static1
Behavioral task
behavioral1
Sample
fb357a2bece8d8b2a98ca8573870b61a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb357a2bece8d8b2a98ca8573870b61a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb357a2bece8d8b2a98ca8573870b61a_JaffaCakes118.html
-
Size
73KB
-
MD5
fb357a2bece8d8b2a98ca8573870b61a
-
SHA1
12ef60053c550b1f31cffeec3a1138ed049c791a
-
SHA256
789c809558a501860e12b8f532b923ca2b86e65b37005605d1a42b1ee7edf012
-
SHA512
592649beeff8d2193137737bf3b85abeb5aaced66dd7382b9db4450a175865e7b7e44638c98faedc0452c73443e71a176a2ff6dcf5682e25608a5bd3684e601e
-
SSDEEP
1536:g6E0iv08ByJtPi/VrX0c3bc35MApIOlUU:gp0ivlBQNCJX0c3bc35MM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433646891" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000002692818ff79ece1eff67b95810ac8ad415b979a13f133aeee824aca21c090733000000000e80000000020000200000008a42d9bbbab7c1f9ce080ea85d3a280af723a2fd8f30f930bba19fb5a21e307020000000d8650a1f432b4638fd456d7da2f7895855e08f25bf4d80895a2c85de4d96bb7c4000000096ba66040a783d641d380ed1b8782a64b2749745ef588ff7b439d13dc126cf9038686b604173d1efb0d9aac5b3066e5fb32e8c3fb41ddab8e4f1ebc102d8f862 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 602a69734111db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{93C7D0E1-7D34-11EF-9C44-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1260 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1260 iexplore.exe 1260 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2348 1260 iexplore.exe 30 PID 1260 wrote to memory of 2348 1260 iexplore.exe 30 PID 1260 wrote to memory of 2348 1260 iexplore.exe 30 PID 1260 wrote to memory of 2348 1260 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb357a2bece8d8b2a98ca8573870b61a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1260 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dd074fbd99cba5d7a21c35243c770ff
SHA10cd998bd3da653892cec5920918a1f3ea5cf6940
SHA256e165b6b23393a4e7d3145d30d67d60fe3866733a67071e5aa909fbf494ead3b6
SHA5127791dff839fb636453f3ec96409a698b5332e61d8bbd5e05f73c91fbfe20587dba20ad1c873786ae7ca40549462b4a5a96c1cc63f5e96cfa9474c7c02cb921aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b343d4f1673d6101c31ecf05d4fd89c
SHA1f520e6164b5ffa230e4e853e03a881580ea925f0
SHA256710219fea30ad8e42a17fc27b5df3bee2cb545a977441ecedd80dab8ea4db7eb
SHA512db08643051a8721c1d912ac1bdbb2a9c8edfa2ebf44558c0c84d42135769f40d7752341343e42707121a5cf487560db4dec451e870f55313c4363601779e30e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c939f8e2c57e50f7231bc62464eae8ae
SHA10b1f7efe1712813ef7d54be9db33970571adcee9
SHA256fe239fa6792ea58992710684cb88cb670b4338b4b7a5be57bce773f813d2c4f3
SHA512dd87b6f1c045a66d7825b2cf3cfe1757c79aa46f246464aded86e8931429827d09b8a7369c09e4edc4fd68337f60ffe4df5c87418bc9c45ed5813aeb8bfbbaf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b428a87db8bf75cf42e8a96bfa88668
SHA1fb84d820849fb34524c4df03870a282737f3577c
SHA25651c1520c80d8e1dbd9278461353559f43716c3a980fcafe4e1c13d6655ff66c3
SHA512804355c7bdd171a66aeaa7e4f1d357ffc59f4920e8d0d7185a9ff0f1bb6fe54f33274088a653cfc59d18e69500e95e259bcb82024fdc4fccf2f227b23570362a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6e04ead1ea4dd025e51dc23509ffb80
SHA1237a05a41f4a67af5ce3bf8cef67b7bbc074d05f
SHA25655890120bbb0ffe612e717b2cc4a1a1f0696219541fdbfa8b4e5112e98ff715d
SHA512b6bbd646524e672c31d48df4b62c06fc3ee854b576138c5e0e2c30cec94cf443ef6162b19d5f3e38403e50d63d40f5900ded13d07a485820a26c3cd55dab92c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52336c4af5cd2f372a21f14bd12b21af8
SHA12290945b4822e0efe27b26005145181d3a9b8280
SHA256f4b3cfcdb0d066beaec4af9e9a54c6a683b78287cf5d07b10278bb2f93d3882d
SHA512b03fe4e18f876fe80b0447f1f8168c829d469f5a78182618c147c84c1f78e9f57f3bf820fd2c064ca41ac554bbe19caf7ab9e389b5133d10604e7b0a78c4e375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d344d902b8064dda2b833154b175a20
SHA1fa727fc8baaa79b13ad094840d6c7e76905e2f96
SHA256d6d5dd9adac749181011d80e56ea6e1914c4c45d781764796cf0fc0ec4bb2884
SHA512540a19724a14552cb6058b234e92ffbdf2c70fe60ead2f0f3d66fcd931500a74e4822b9fe132970cf2cdfa6768e2d0813dabce2e1420b90ed1b78abde9530379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb5b75bac0724885afc520873c4ebe0e
SHA147cbe7ad47578d476a81324deccbeea2209974e7
SHA256e3911f3b14b397a9454fa5f5910d4b415af0a06e9aad253b7e0c213845e91ac4
SHA5125b58923e71e3e39e6c218d696a30b17a4cc1255b160a6913c7381b15665975887c1e904aad385e900ebe3d2878d5dde222e3b27d0b2734922ab973c4fa4475bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d1d76cd0c6e0056716bfddd88791171
SHA16b5b84c6035fa50c5f1651a24527936a4ed792a3
SHA256f175bae564ffbd84d9ab9d99a0266f800524f5acb20daa2cdae2ae491125e477
SHA5128bf3da8561c59d1ca4f3980f0accf4b6ef08dd62487906c61ac3c92015db187069578fb10746e0a6874c648069808bce4c9bb7080cfc45fd699c5019b7220fdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d626168c6175872e64ca6ecd13b580b
SHA14fc77e3eedf00f523ea6b6d830cbec0e93ecb077
SHA256327800350d31ffa6b23fad0dcfda543597b3c8799859289129828eba0e365c6b
SHA5127a09b67e9badbb07c1fc4e477d11421123c47e2d6c71269b2437e741e550009c930b2c00b4dcbf42df38d8434417ab4bffb5e67bc62017a988044bcfd0761950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5159fff7dd3cdd0e38b5a557b75aee4d6
SHA144ad0e92499189e4dfa62061416347c4a0614d31
SHA2569a86a76b6bcafa2d26fe2aecf458b45fc65a2c883e2300611719e2577441962e
SHA512e8c89b8d19edad9943942d68103f76247cb64f5d037458b3b75c35b5becea676b627743c4069b57b58bee81e86726d770303698b937f5a221761b244c813762a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5731a9ad08a407ddb474fe838900de6b4
SHA138f46242bbbb6cca1f8b7becb0191feec72700a4
SHA256d575b548893dc472140272775076c34d9fe8849f3c5a017bb1fd28c5f95ec1b7
SHA512ac0087ccd8e1543bd4c46d31c97c13ab774eb0af33b04acc96422de9ee9e129e6262f9fe5fb909b309f67c90775929d76e124cbce41c9664395c1e64603c9a1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eac985c806bd34e0cc9921728087e4c
SHA1f04bc41435864bd6fcfcefbfb258466ccf70cc10
SHA2562da29616cba85c796f38cac52ee2f4037c660739e1a598cfa1f8ef45c67e117c
SHA51222478b50e2298bb561ae5a8e14dd27f75cdf603d56bbc756097b6dc9f3b183428f82b92df3625c22d907f461f8a849243b8175fcc62120f0cdec3303fe00a5e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5633406b885c432857d6df9b87cf960
SHA119dfd73107e6525340c3aa9a5f8e20388fa2caec
SHA25652058c99226734d5b236302fcfa1d5225a979837d4f381d26c78a4ba278558c7
SHA512accb382b9ab4d48baef216fe727f4c5325e5053a711a70cadf4bef9659047d75fc42ba6eb99144063be68208d0a01dd4d95a3e1d8157a478d8038feed7828659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1a7e8a42a6d012a4b7f6eea55216bea
SHA1f05c280336ba76b1aedade41da4f4ed0a4478318
SHA25640c030d85852524d14cf5f26efc48b5debf114ccb7ec87c58a62d1a76f50819a
SHA512644e44d534c29b77bae6592ea8aeda772ef0131b8ac4a18ef3a236afec8d50fa2de40c7e3c3f02f6b613c30ce14c0c62690b992d0721d7da895d7ca336056716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b3d56f4853a180b6f516c74ac385cbb
SHA1def0e4c1b63cfb4b039b15b0b3e7b16b989346ae
SHA256728114188ade6758231881d3e46d400db97fe1ee268fe00d68cab15bcc079940
SHA51220cbe7af7da758a13a57fa8d3adee543ed10f90241200b66e0c27866b1e09b0468e5350761346d318105f693ef8de4acdd56059332114200f0128d82b2fdfc49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b61c814eb286264183b109170ca149f1
SHA15052e399339b280977200e109c9a89579034a876
SHA2565bd9c9d8cf4d440812fbc728558853cff34c580b95c52527b743d7f961350b32
SHA5125dcd4e67df280d8ebe5f595dbaa0634b6aeb5b2238541c1ab552128bbe3ee50e7224fd5e9023711f130aadf95a8f5a202f7c87877f47508fa720c72a256bab30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b44c76dcac6c56e1ced26a2d59996c8
SHA17184feaee035ece538e3b2f678084090086b4dc3
SHA2565c71e144261ae2f286e0b3ea65b0d336b50cf51b7b9d8f6d6ead7a29f26a47fa
SHA5129ff0b60a0836deb662a0fffe30fb57455e0252d2d4f79eb4b27faf1429325fe9dcc9784cc45ae4fde94f0f2c78cf360846eb0a70c07ece5dfb27c5a87dba35ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca7575210d8e46a2a33ddcef3d15548e
SHA149c43ddb4bb557f183cd969dec84a84c07645a03
SHA256a29f3955d5d2aba223c0e8c788190879aa0f1bb0070f526fd27e91f710270961
SHA512f07df5bec716ba82b7bf23a868d1212ef3a4c759d3e2b8b2f37ca9e3afa424a1a814f4c3cad35394caf5187c3d34401d1ce770432d356dc6bcc5ea26c6a2fdb0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b