Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 09:14
Static task
static1
Behavioral task
behavioral1
Sample
fbf8fabec9fe57141a10b3304b6a545a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fbf8fabec9fe57141a10b3304b6a545a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbf8fabec9fe57141a10b3304b6a545a_JaffaCakes118.html
-
Size
6KB
-
MD5
fbf8fabec9fe57141a10b3304b6a545a
-
SHA1
15889456bf0694bfcc2b04aa5015539c8c1612ff
-
SHA256
49023d4f868066e32e6a4700c8cf5f3379a6ebbe1b89d0e594daf11f7eeccd18
-
SHA512
a54947a88b35df8ffadf4b3322587e74693ab8866c81e7dbd07a4724704d4178bde03cf8879cf046582ce87692636f589e5cc9daa8fd961c1898ae99445cfd18
-
SSDEEP
96:uzVs+ux7OLLLY1k9o84d12ef7CSTUQp/6/NcEZ7ru7f:csz7OLAYS/r4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000005f0d95174d0666e86a63a41a06f9093969b0ca3b43fe25d34c0204aae43fd54000000000e80000000020000200000006c6448e47071800cb1892eca3879286edf396359e7aa36eba7669a9943a097ba20000000d72d5dd208c0e157a4a080de9429dd8f84593ebcfaf0456efad07ae72e0f572a40000000fdeac5a6f374131b8d41f7152a8729dc63db6a083c4c29979979f040aa894002beccf830979f353766367845d41533dd48e3476e81dcd5b37cf2827a52fb8693 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0d7e50f8711db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{20DE9191-7D7A-11EF-9747-6AA0EDE5A32F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433676764" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 1880 IEXPLORE.EXE 1880 IEXPLORE.EXE 1880 IEXPLORE.EXE 1880 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 1880 2132 iexplore.exe 30 PID 2132 wrote to memory of 1880 2132 iexplore.exe 30 PID 2132 wrote to memory of 1880 2132 iexplore.exe 30 PID 2132 wrote to memory of 1880 2132 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fbf8fabec9fe57141a10b3304b6a545a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8d3af53ceb3ca91dec5f215e68f624e
SHA1abfb3d344b6ed6276e112e68ddca5a6996216736
SHA256f6fd7580b5aa638aa403727058fc2758a28e9eeaa29d2cb15267bea749dc43ed
SHA5124fb8d2caa08a882eaf829bfd8500b249809bb32cf8b8706c1d8d6264c055abc394e213e30e337f42b69c066f61c0df42c1efd5406755e1caa2622bfa51a917b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570a52c9bbe6d9baeeed45f7a70838adf
SHA1483a46fb57404935ecaf2b5c110b031a762e982d
SHA25605f0fbd47648cfec47d5a658f68bdd7930e54ae7d856445161a97732c688068d
SHA5120f95cfe7840ac9c25faf69f7665a2125818a361421bb62f6bc2d5007db95e76145378263272f1caf4669bff11592c602838560e869b913a25fd930cf2d05373e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7b879a62f3be913c4324c3f8c2aabac
SHA1553c653d184a56dedcf32d5c9df7a06099ff47b4
SHA2561653119b0a27139f7e33130a1f840d6f1aa8b78a964eeb12dd3c4d334a03180f
SHA512c9a21431b252db24f5852d023447118f2f1cd04f7f19752384953df55535d147e4840ccc2b37e6c6f210d2c442fd9e392632eb330643a1a477afad4b17d965fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb5a223916ee5362b9e541f7d3d0dc1c
SHA1125fbdf6c261297238e59668b66b394964f83379
SHA256211dc1f1456246e53e19a3bf965303a4aeb61bc5f9727005c493bebb06189fdc
SHA512d19b2f26c0f0a658c3fa2e445d4218c43e27384cefb33eb2f14416f4f79a7d0147afbe8e53c966843104a886f34edadca1642b0dfd01497f34088de45c432efa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9c7e47b22b1874616c5178875582541
SHA18308740d869d1f5840c239eda770c8e27e9589f2
SHA2569304bc6bd00d19a0ef2cd83c3fe0eb5deeaf74388a169621fc442af95aa994eb
SHA512546001e5e19062d60cf985c8259cfaada0040c74790f0ab3973b88e38440d93ef00b2761ea3572af619b3e52ef5a6c06479f4f3f5d3d2aa433ab811c40fa0e23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ed70b76927e20588cffe48f56f29869
SHA1b6358ee6fd18b1d9fabfe43c42491a3b6e435270
SHA2569b632fee211ca34c049218a0e4a8b5892122c95079befcfd9daf2a8dfacb9d8f
SHA512e94b34db16c88d0e92144016c4f91fbd2609e27c5de7ba4e4dd56e09a6dea02b6a2ea259434698500c1307506e0e997b4bc4ec6c594c3548e9d47b2899814ce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533a3e6eaa7f7d21c36b505796a6178d3
SHA1bea3f402ae92f2aae3ba8f85e0f3b3ad768d1589
SHA25640e6b62bebec56a64856b86b9e0caef0fabd83e13dd1815ac01333ca0c3b90d4
SHA5122e4486f28a46a9fe6f7e52256f45db76c00b7550259978893a2cef55aec8e3d61190dab7460981f1f020d1818b9037ec74d79fc23ff612f54a8612b250324c31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578637eb29d9c1d06104d576f7fa5cd2c
SHA16d3771c251f592dc6e673e954ffcf69284d1f826
SHA2568690672fcf4d4a94cd28d4504721ede6d57f1300d34ae05040f08d9ef104673c
SHA512075f87383dceb1a14ceae1877d8b7e3f444f4aaeae30ab3c637d947ed447c30ba572db023b04de5c817942709893122bcddae82e1528693e5717f7ebacc058dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5649a0f53a19131a95bcb6cf118943d2a
SHA1f19bca278506972a41daad94e2582b42164a2aab
SHA256b45a11c147159826914c8084552eee476ab4b413213708b9ecbb017337b3be80
SHA512c77474e8865135d56210324813965590b3280d7b5c1f18545bdbe619b84c14944ea173588d464e9c155365b0239252c84d1abf7b718154d29581d28279009698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a928aee9e14b1d6d286a01d9b302b18a
SHA18ac447742ed8ab50c71158a1b4879efa959e1e98
SHA256d91bb2116a7bb1bfe1446dea0f5d2a76ce8a51d6dcd81426f0513a6f377b119c
SHA5124e9e9343c5a177c245c3ff2d53ce755b894367b1b1ef6d421ecde3a8409d1be13b52e9668772bbc73873a34ab93fed0ec7ea02cec117f0dbbda353a250e5df0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552dcddd3dd5970cdb42c271ea37b8e6a
SHA1820b48cc6dca0005b10616b52ce017944bd647c5
SHA256086b0dae771642328779e47ae5afbe5cfebee8e89b6268db19160b8bba812e13
SHA512f050c6aff82f86d3670bacf4847392b87190cb9527a1a6454fa3bec9f4880db23a771a5f35ceec35f365d95d77506949a91f0c36f9fe3e7d24f81a744dd06c55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5707bcbfd2741849a0479f50ba2dcf845
SHA1df48103b0144792cc541a87e4b9e920b57266912
SHA256e0b58024508c1a2e1a1cf1ec29a4aeb2ae15101f734be999f35b4a083711e4f8
SHA512a3af188bd6176aaf3a98642a7f79dacc8cbc82ff2668d1a6d12dfda07537bb137c0335b2372dbdf10c12b25f530ccda18a0959bb7d786655b0f7ea99a203227a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8c54f7fb9ed44e8d0b6ac0144b150ae
SHA1d6408f597132cbcdaed3e2f9c64b6ba8863638bf
SHA256c48c5525a964252a0c8d7a61d7dbc2465a990c132175cf3a40f42b957b3e43bf
SHA5124eb01eca68569605b113b5c00d1db5808d01e64a8e24fbe09ec2598ac56ecaa8d27ebe1492cb2453b57597a3c6c471bb7fe95e839a336c822fc3767edc31548e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7c42f88a35b1e4d29b8f49072be3cda
SHA146b2364b68a65be40315e0949b859ecc7a440663
SHA256d46ffd96099eff780a0bc233bf94e92be90a4a0dc279f2543f9d7ec5efe539cd
SHA5126f3248ee14c6d1226316c61dda7f2742efeeb229be55d509f6a9803bbcc83f3dce664fb6df98d63bf147d120513bb7a1bd5f1f477b52913bdb8e69fd328f3ad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a262e494f3b3a1107525142ee66e015e
SHA18f7af23a114aea682d45ad3c3034bcf4756de324
SHA256e9c1687e9c11520e9e8ec8fd8d573fa29713e5fc2d1130ce69fda54a01872973
SHA51233772349b42c09f4534ff92deba5f630754f845b8db00dfca8efdf341c84aa72f083fbd032ac3db712b0eb41f591c012fcbbcb58a1efe6745ac1902cd65c96d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad4c6798ddb701a8bbf148aae260188f
SHA1c10e4d461d49625806038f1dd474d5d05e0441ef
SHA2565934fe27b9e7c70afce5673e9c4a7ae6285506e751727109b5c2ab5e6913331f
SHA512291c22a982c836561adb5f6367f130565662f56275096d20851871e0067bf97f5986d4a6f74d549f4c8d3567cb0d44ba6da99ecd3f49ab1cdbb56a55824fee65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bc0e7890aa495024e589cfd67be690c
SHA15afad698bf5ba54a8d3e4b42dfc14a3a69b5e832
SHA2569c76f1e9bf3cc3d7762a9197f1f0f3edc84a879750dce99779d202ffdacda468
SHA512631c6a8a761c95a384edd9b095a5302c10a19c6b689dc40a30a4f556830fca4fc155f18ed6ceb88119108318bc6b89c4f6db16c5d85cc6303165c6f33f8b4b7f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b