Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
fd262dfd67b0593f1a04a044f46d63fc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd262dfd67b0593f1a04a044f46d63fc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd262dfd67b0593f1a04a044f46d63fc_JaffaCakes118.html
-
Size
357KB
-
MD5
fd262dfd67b0593f1a04a044f46d63fc
-
SHA1
967bc5f5c6e56179e1b1abe7d21ab36458f99f59
-
SHA256
df576bd63424c3f2b9b9924d5c51a9c854d8e4dee9534f5b489504c8f27576a2
-
SHA512
ddd4f24031434a2ca0113c2769a9152fc8fbc562454116d674623446dbbdb701dc278acb94e5837849f8ddafe005d1f80c59324b495452385377fe4dddab2e42
-
SSDEEP
6144:STsMYod+X3oI+Y+6AQsMYod+X3oI+YMsMYod+X3oI+YQ:K5d+X3YQ5d+X3s5d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF8D8931-7DDD-11EF-B60D-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4094e0d0ea11db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000006c78cd3449da69752d56acd9bff5fa445e85576f9f5b52b47f95fb694f800aba000000000e800000000200002000000091e9f04fe1dfed7257a93bd1849190c0316345befef42b65ec87aff2a8db2074200000003fb74f5c7863bea987db6b194cd6456ea72ad1a33dcaafa4cef3edfb3fe4e0814000000038d88407c644fa471e1d25277748f97a33f05e694bbceeb0aed4fc592a35817599516d26e97797c21164dd29b1abaf0461ebdebcd114418e8de807d40667feff iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433719603" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 1072 IEXPLORE.EXE 1072 IEXPLORE.EXE 1072 IEXPLORE.EXE 1072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 1072 2364 iexplore.exe 30 PID 2364 wrote to memory of 1072 2364 iexplore.exe 30 PID 2364 wrote to memory of 1072 2364 iexplore.exe 30 PID 2364 wrote to memory of 1072 2364 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd262dfd67b0593f1a04a044f46d63fc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df860028d0b5337e918367f2a503bf15
SHA1bc583146763f3842787bbd44f7a2fb0796288bfa
SHA256944d4c3bab8cd9ea32c444b45907013763cb61e9557ef09ca2689baab638ec03
SHA5127756edf7dd2cb2d604a88610f879815139692a891955450d69aa37c0a903731dfd903ff98eadeffeccd99655b3b78c4e1fb37f537083bc89d772c929df60b824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537fbe000bac39b55b7cc9f4e163c15d2
SHA183f081213af679a791b0c12b96bc819e5cf5783a
SHA25606f6978b922d95a5a2db9c36c51c19676deba650fca8562fff2ed9347221fe6e
SHA51206bd6a6d0e18cfe16ec69bf24e2497ff1dc2dfba0bbc6aa7924995359e70d10be633d53bdb55f05eb9a8783eaa393e0a1742b0c94115fdb2059b4a5563e95730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b8267a614f19a272325583353f9ba51
SHA132312a26bc3f5afccf827ac18b09b77f0c570f35
SHA256efe249e8024d4e548442e91591c69909a43d4f69db15702de1ffdedda7fc6560
SHA51220c07d6c75e6f77feff646936d3ac27548515c77b312a1b1bf4ca2ab79468d5fdb5293aeba9e0be905fb1b6d949adffb773af40b94a6268540a6bad99489aefe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561ca378b85872b41d3900f8461beeed5
SHA172b8f4f70a3ec7303ca5aac73770fba344c5cc27
SHA2560d743d3609374280cc519eacbcc1f38e0807b014982c18260db9bc136e30fc35
SHA512f7af5a18f7969d1d704a370df7451042fff12029f41064a754df00f8709d0cd8858b2b088535842fd43d20894a5bbf627d54cc1c01601bb6b51fa273359fea3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd23a21b39d60f4f5899d2b309d11672
SHA147bc7db3b5f70cd12564eba9a8a37ab4ce12583c
SHA2563e0d8b04708fbf37ef66fc90525cf000cb7745e3829610917ec025bc5d6ee7ae
SHA5124b7d0b21374fadbf92940538cd1ada3fb76d80786390f52417b423fa2d796cf0b73bb37248d5211a28e391c6c4f656938d5bdf54e09491f5d3f78ff8c51fccd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fff4565bcab790d3e80113207a99b95
SHA16ea13fb4a6225bc6d436b0c8352220bc3209fcd8
SHA2565e57b416780181bcf25783ab15c8582760921ca6d8c6d9d57f707bcec619a367
SHA5126a7fbcb4ef0d2ed636d71f42bfae0fcea5b1382ef7df3c0a1ab153468977396d1618bf854f7a3691d00e772ce3cbd9e9c96f15314d0da3638b4f9c5a9e081c4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5248ad2565225b6020e1b0215dc089f0f
SHA19814f28ef8f896ee8c041258b86ffba512d2e74e
SHA25628c9ff62924d874a00592fca82321e8da93f6a0126890204421074acc6283150
SHA512818f72af8ccc91809a080764443a390e5572fc3f875948749a812c0c88a06ef0621e86aabc6250e180db524fade37a3302e186d42f2af8d671815fbba5bd713a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54077f07ab9a5ca4cec048df83e6b4916
SHA17db6bd10c294c2b6803c74bfcc5249af266b6ab6
SHA25633d7a2bded1243bf2a83669a58481ca4e0c7d22b01540c594b534db3eadfc2e6
SHA5125f5cc6c90fac733b7874a5c7d165cecdc03e49092379432879f865c296da4946cc96778076d50bf66a6dfdc6af05cd601b0dc1787914486d29dfa4c15a479cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593993a69137c90edb4685ecdfd7648e3
SHA1cd08474d2bd5156364437e940d9fd371ce6fc611
SHA256e1c62cbdbe6864fe63d84ca4705665e60f29d8ed505ccee12ec2c977d2ad4d71
SHA512e2dd977855225f39d446451e3ed4e33fa2ce8133b4d0de98eb6d7ad599105f1bd60cc0bff3ad1231617d94410c3ed586ac39867dd00ee601c8cd220269678d5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0278f6115fab5803bc1a3162ba763fc
SHA11f6f806f725610c55b3c5bc410e53339371c44bc
SHA25698c0f4f5cfdc7e4b1003bcf3272bf9f36a07fa989da596ab7cb2068b56fbe308
SHA51281e9c7042bedb736ec43a24839db439681bb4477a42e9eeef16f2ed8ffeeb54eb80dd7b771c629a5bd805ef9fe2948e9682478d544302ff5377d43b127e321dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c85d36932900720033e72f9d81f93ac8
SHA1a78650950d177692424c6c7ee4bd678b09af2af3
SHA256bac5f13ffc66480bb3c4447bf039ff69866f9bf25b25a66126c0550077190dcc
SHA512ba1274f64218dec6b0bac7fbedd8556ba851ea52c45a9643cf9dd7dece04fe21accad0ddc49bc208479040907b6e9d8ee40dfcc2c82ec79ad179dedce4bafcf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3633b729f4253d89a2d2a2dd6b210f7
SHA10caf5ec54626de3f81a1df8aedf3d2cfcb60ff06
SHA256340c889e21d93d86c0c9cc266ebe699aa7ca68716bac5af6210c8882a0a09904
SHA512f1655202c68eeeb44737527f725cf087bf3aced333b9e2e0b6a1ae409b987a5959dab67870bfe5ae2b562c4d1e56d5923b547f852c0918b4d93dd19a071f150f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1e456cc617c13de32f08d655a5534c1
SHA1a2209b25477c109e9bf43715fc47dd8536be6e07
SHA256fd61428dff90153958a58cfcb92fea492e1652f01c05b45bfc05dff63174c027
SHA512c8622beaa314524cff8a6f251b8ef18fd47045df56e8da312573226c7ccd348dcb7a4b8e03901743b6d5578dc9ec5c6fa61d2fb3009b16154accc2062052e338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8ed75704cae1a752f175406721dda01
SHA1a21abb81532b26d4b22e36401d47fa988c8c7938
SHA2569ef5233c8be9238bfbcef86615e9e4e6d8630b4ac180875993612443b63fddbf
SHA512a79cd347a9389900ad5fa5b44524982161e65ff74ce6fedee0846f74d4e774d49df84589e33e55cc8904482bbfbb774f62ac5ae2ab4fc705af60fc5f112a2444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c33658e08108035f57eea2fca0e0afc
SHA1ffa20fe904466ae3429fa1b739ea72895c10c19f
SHA256dd606c97c42e7b5f62406d450cf52b3db25eea5ebdac69e3cc1070b821f36211
SHA5123ac38ce76826630cab83b4d3eb476463702018e0496b5b22b4d087986adddbf08998a65eb7563a78a3b1598486ef2726e668fcd2f23bafbe9e97a2448020037b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba1557ed9629b687adc91a91293e3c65
SHA1064f80004dd186d8a218fe55135015f6357d6289
SHA256af7f992e2636409526c2c277ccfa5506f26d15da036f625f5cbe98a7533d2950
SHA512f7a2dbf82e5eaddcd9f73fe40c05b524c15b928013c9a90e61c7ed51ebc39e567c47489c2a91f5d951e597301d51ef74d6feb66b25a59407f31aeb016057fdc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5374e3959322166fa660e584951190d5d
SHA158e75244a80ba4c45af8c4912303c88e367dbd94
SHA2563624a51021df228d3d38f0c23f441dc0a9098381fc8fb0e5a98f92bfa141e837
SHA51219d018921fbc4217316d5190fc44d6c0c1984a1f4b082bd6d92e8bd806dc21333448c6ce49048a9539bfbb242b2113a9205835860dc9c2a1c2a700669a3f2a26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c50e5135bffe0f431e2e6922287b62a
SHA1bd0a014eff3a774869dfd403295f3a9a19f28e17
SHA256adc38b5dd59557cdcb571e85150ef55798a5e2e671a504019fd005f372d77c00
SHA512e0802e1331d54d047a761ab0168ae1265f137f141c3d45765a633579a6073f32e7d236a406f59b2e3df647339055fbed144befa7872948fd2365aa4d287c1ae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599d58bc4294ef929e820e45195fa1a42
SHA1dac7c720e4d175da888f62f12cefb574d5e7360c
SHA256ff2afe267a7ad30ac20cb5350f8a1c19bed1221c6c21b302a2d02a70e50464b2
SHA512fbd3ebf1f0b00523ccc66188536c0e0d2927dc4bc5d12f5342b890be600f922ce384235c12568cefe5ebf254c059b24690859c7ed8999289b837248a5fa46abd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b