Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
fb47b1626d3bf92f1a5161da8feb6f4c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb47b1626d3bf92f1a5161da8feb6f4c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb47b1626d3bf92f1a5161da8feb6f4c_JaffaCakes118.html
-
Size
29KB
-
MD5
fb47b1626d3bf92f1a5161da8feb6f4c
-
SHA1
7a8e9188059e51776e1fb2288f09f194366c392a
-
SHA256
8f525095b300c46d88cee08b22d14466afe782a0a91fa427c7c2a2bbb6a2b898
-
SHA512
2b48bc8868b0c3a46f6cf6c8888691bb33c2b47e77ec04bdd7d17c4d0dbe66147073696b526f1596a8dec1ed146abe08f58fb249b911e4f7c6774532c611d654
-
SSDEEP
768:3pUWXllBoTFI9p8VZCuitzVNW6Z2EL45NrsV:3pUWXxx9rlWrvo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f026c1954911db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C11D7651-7D3C-11EF-A322-62CAC36041A9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000018abbcac3b0bec94d980f66eb400ec32642ef9d5161df73dc80fa61b5f11f42f000000000e8000000002000020000000adfd440ceb80355ebb4b81a5f24c8638ffe7d7e10c54ec03d7e5b69bb33ae4692000000046a3061ad3602efdb077a74bbd8c9f37887cbf5355504576695559af5e8f54f7400000002d6f09257669f7ead4c46e7d61aa0adf1ad6f131eb972507a26018c98cfc0077799d7ccfab08e835e0e92905a1f92948308bccb4d0a496b7b970bfce106781c8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433650403" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2292 2644 iexplore.exe 31 PID 2644 wrote to memory of 2292 2644 iexplore.exe 31 PID 2644 wrote to memory of 2292 2644 iexplore.exe 31 PID 2644 wrote to memory of 2292 2644 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb47b1626d3bf92f1a5161da8feb6f4c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac015a9f4844c39776a1c82a96ce982a
SHA1b3e836b1e71e35b86f609898f2231559919320f0
SHA256b1ad9edcc21368a7cf6226ca7348be3f0160ef0d84de9721b311d6c94e56d717
SHA512047b40f526c2a11cd4452ca1470c00e75d816784eddb9c6506df95a6418b893af5dcaa58d1550978e0cdcf685986a405e79880a3c28663ee521911fc3afb0a36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c513396a456f11792a5a4530af1d9953
SHA1e0a6cf2dd8bb82fd269b9582368a70cd36cf7709
SHA256881fd260441a1b43a0f8a70267166fbcc6621f55c33cf3eb65421ac724bf018f
SHA512392f8833ca12329c080d44a4239d6b257ccee8722eb189948c85fc9274924155d2504403e6d0760153b5109f6dfae451758ca2c52b084a3023f0dd1c0580657d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d5199e4de28b2f905789d6e31777ebc
SHA1797dc99545b0de879f839aa18b6769fded362bf5
SHA2563cabab3b278275010aa234d6abce82b3c99a4e64b1c571f0f3033e64088c74cc
SHA5129fd58837e44b1fd51c0d5b037baea2255213ca0594d02f5ee1c6ddd3544f75d1c0e20a02bf75a4f5a2b86a0d2c1d086640fed65763c98aba565b4ebe1d932714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5593b79ce6919f75dc39e7f835ba8f161
SHA11e1519135e17f420e21283bd08082b93415fad13
SHA25632b1e793679e9d0d21b37888dad67e119644c6344146bc4c5ca707ca9b72626f
SHA51258dd562e718a67d1ed86eaad8ef253bfd4e19efa77e0545e2414a67b57d5829291bc3738e6815884afc4545f7a0110edd2ab5cf00a8ce6d98a05c4b299ee5510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf4e205386e89d97304b4fa293193bc5
SHA18225b70b126bf087d2f2974697261a75d21f7d92
SHA25643a2993223b09ff9f1da97202bcbfb1dcddbfe04da424a5e9a767210dfe9902e
SHA512607732bb9ce5de1f431362ecac669de347aa0caf0b0b30fd465f668dc042e7093303c3371c4b1df0074393b4d7ab3660cba784e60cb2b705b4d83e47dac2f2c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537c0494819a6bac2f04d14fcef3328bd
SHA1c7ac8722674d1d43ceb82a14d425b246b416eec1
SHA256d216cddf6316a857795a2699114e6bb7b6f74b69df5269e39df74be2deeeda6b
SHA51297dd04bfed4bf5fac19d66e545efc0a2684178c4bf135764b604241236d1b4976eaca8f104b38c6e52858f608077bbfae4a4551233f72782b12574d930ed3653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59465b891a45fc1ff7f6f66899e1b988a
SHA131637ffca39b30afe8696045e7a19d753d02ec53
SHA256881684babce9986274bc637c7566834ecb4c168bfd4ef20da87fffb25929202f
SHA5126dfd7f8d41810c795d6e4238139fd8ae11aa1bb1ad5ecb84f465a877dd5c922eddac701679f82f5427075568e1fd33b0b116e6c3a485fb32d36a6732ad3a37d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c941bcb3d657accb49fed2abcb930b
SHA17d245855e129ed07add358521544b80d69ee09f0
SHA256866aff2abd43deb88bda890c460bee91f7181fd59f0e8cddb2abb50a9a8d7481
SHA5123d848ad13fadcd4bd8d0db269811d6f6efd911167dff518a6fafe5b681f8468b90b76aa906b3cd2db456bf1c9b239872ff1f43d1c27c8a9d1cf23c2ce77bebc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5488027b483452114b81d61beb27d0ec3
SHA10855b2e093f866f06ea64da6bd1acb16ab6470bd
SHA2563ebe8bbdd0e535a4151129a489c00ccf4005d7031556db5d9d28fb482764428a
SHA5124031cf6ff889ca4379a74cdfd6c178ee9874e8a54e15e294d5aa72b5e6dfe9bf5290de6164aa441da5d34efe346bea9ed8cef50f5881d6416a6a58c8bdcd0363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5bf1aa69e1814cdc34ce332576f3a59
SHA127e4eacaebcbab64f49932d0fcb99870b63651e8
SHA256b3e582447afb4659b46dc21c703f5711495a6be54d4067a7b0b89dbc7477012d
SHA512cfffe3541bf127debdeff1c861bb6f963825214fec4baa46e9270998bd207b3e154d9227c0916be8571a2d93736cb33eeaf1d6274964cd1167850eba31508a5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bbcdc5abad46a3daac18e1f98139468
SHA1c45ce1ace0be0ed28596b9dc1b2d6b6237ac0f2a
SHA256de71bab7df732396fca6635036dd2fb22c51d7a2d86236c9e98f530aa5f5f090
SHA5124233c80ae6f216d0d11eba847f6701b495f1f5d55a45e64f094db32d62baa7936e66307d7685ac6dec5044a8b7baa9a38170b1325087985db5fe10c4d5024282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51daf700412080d2e229df1faa33f02f9
SHA106379aa5a0a512a1c8c11d87cd7f78e4097bbfcd
SHA256675eac88e7b00c9387f314aedd35fb4e11288721aa8e420f831bcc8eb5a3c997
SHA5123dd09eb74a95325cfbd704853386238eb01485a26660c256b6b105ddd950d9acf8be36217dc779c01dcb2e42009e1c6ef360a398b396355a2f7eff7ef447887b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ebebf99fc32cfbfafb63d6ecd3424be
SHA14e26a98ff2a4805006444f2a2d71edc4da78a235
SHA256e6ffc10008f65b14247dbdf5997c57be8a2663af22c7ab90046eb02992916e3d
SHA51268788c3f9d428d9add10c66d087ef039b63e104d05bfef24b8b9ab801e6b3382169008b2a4035396b30de72dce27df542d60432d41700a7e7fb4fe9f8e348c12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b010307ce7c6a935411c7616e45cde4
SHA1237b06bd2b66215d1812d39ef36fb3312762277a
SHA256ff68da2ae8bd4437d541e43019b9ea75640b3c1fcb13be3c900ab7252df0dbd7
SHA512faa5ffcd01bbef7c3f764dd4b91f35d6b2b07e341db50afe17758c946c942be55671769400b3f9aa800af3416c9bca484b75e7b76e7858f57887c59991cdefeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524252ada1a6ae663bf83074c39bb2ea1
SHA185a0ffb0d982840eec8cbf92d555bae2fb912fd3
SHA25619f6ecc4ec68fb0dada603aaa3fab5925be0013819069c12d1b98fb3d1711a46
SHA512cab0b551e1ca0cb7f18f4118085a59e8c062d7edae4fde46d943c073b2382d139a9fa5fc29f371c2132b930c2a6b210a46642c91ba8680f821ac6f13c63d4b56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592cbfc3681b4efa206ecf86863cba201
SHA1d9a0fd04e55cda785ff017b3f83d398ad3f7cb3f
SHA2567a56893db77ebfd1d8df87dade936c46cf4d13dc1cf18697ae75931daffca76e
SHA5123230a5cee30454229deae52cba56a983fa1b2a0a67de7562c313099ba629951c921368e034cad186d3649b0b71fc5583f4334008d0e19bdab96e311326756663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51178e905ba5531f39c4bb5f426a02501
SHA10a800323b8c37136ce53c38b40e362466a2ef29a
SHA256fa9c00efa19777160e381be9586346f9becb9004f9f130384b7f324e6125e49f
SHA51204e21c2c62270bb15c1fe111dc4214a2ee92f56291f1c276e4506e8cb20abece64d315dc965fbda06958b2c22e3e35efb080f45b3bc19dcb6104b0d0a390f585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b120c0d5d81263c191366c14b787392
SHA148976b59d968628da5379d8f5f7639d1c38f5e3b
SHA2567f31dc01f6c98ce8ed0ef40573705ee459995cc5751d0f92c01db13a4c7de371
SHA512cd863efde9f25112ceaffb84f1024db58f2d6bdf83e44566aa92375be0b6031d5b5391dfc5f8d08bd501708babf567e597318698d495a3ff6ba25ca9034f64a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502d76a54bc8e526a4e4016841d4493ae
SHA1195e5536f49caf28ebb2bfe82d0f378dd26c7244
SHA256dcb477075deeaaecb43ceee39c7a920577585997e3c5fc64773514d1a6083cd1
SHA5121d6ac09bf52dff0c4350b935b2eda11fd18053d9784d8722e80f707f24a61ec49102d9a45665db934e92fc1c43e28bf8ca76f816073387cf5ec315d6f0a03339
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b