Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 00:19
Static task
static1
Behavioral task
behavioral1
Sample
fd6f3f9de0f0ccdcffa3d9bb7a4ce008_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fd6f3f9de0f0ccdcffa3d9bb7a4ce008_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd6f3f9de0f0ccdcffa3d9bb7a4ce008_JaffaCakes118.html
-
Size
6KB
-
MD5
fd6f3f9de0f0ccdcffa3d9bb7a4ce008
-
SHA1
0d00fc2490547cea1c393bc00b1ddd828b260ec5
-
SHA256
e9f33e1174314820d8bc632df0f5bcf8b4c3e9c5faa14f2dc3c9c89946f21f3b
-
SHA512
d71b6de1d01e8e90659701de1549d679558310d7fddf1ac9f5d56929e01a6b0e025c80400f5b47eb0a69007d5410d2e674183edac61320e16898ce9a720cb2f3
-
SSDEEP
192:dmrvQ1f3SupVyeJe6voL3kQz0n+QFKj0hu:dmrvQ16cVyeJe6W0WSu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d041fd510512db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433731033" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000ced8978d53edd1bf4eac1087ebeaef72209e707886b61c8ad91328164714b718000000000e8000000002000020000000f5a1fa2bed485670dc85c3d19cc55f42d2a892652dfab0f2a1747eae4078dfd52000000081879602df1b89c3777529f06229ea1c734487f5fce4e9d3353edd4cff276eda40000000a9f99701d964d55598a0141b05e04f8384b0f86265c51dc4e4f124d3a1329e496d62ec7d14c0a2e4956ba8d7f2f1341bd205ff4be47c5b5d2f13fc17deae3924 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7BB57651-7DF8-11EF-80BD-DAEE53C76889} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2176 2280 iexplore.exe 30 PID 2280 wrote to memory of 2176 2280 iexplore.exe 30 PID 2280 wrote to memory of 2176 2280 iexplore.exe 30 PID 2280 wrote to memory of 2176 2280 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd6f3f9de0f0ccdcffa3d9bb7a4ce008_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56270857586264c28395622e2c3153791
SHA1df3d425bf7fbce8c35e39d364550fe7ec39d799c
SHA256fdd64ceb65822adc57a106352d9555ae752f78d96230b66d5e657af35c236964
SHA5120d43d7915914cfdb84ed3fdc32726db5a19b0eb34d995cc0e86a24d037db95fecda6171e8d69683b2830793b8427e410acc267af6611a89eb5ccc7d3a04fd63f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52163ef9732024b405fa167bb474bfebc
SHA17143e213138ab1257155debc1c7e473a103a92e6
SHA256e538cc0b9d531ab89218e8960ac609ec1cebe9aa89ea6b362dab187beb10c3ac
SHA512b9e8c567c646c540c277b2e3b7daa72c2949085ef08fa690bf66b9d629be21123c839448ad8768e5505aed58276358b2af2e178e858fc8012943ec3163a5094c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec9f49374d787173b9a8cc82166e7a4f
SHA1cea6821dcc92df3d6bb52cd2d22272347ba6f856
SHA2566d29a4e0a598db5fcfe61e10865fda1edd038e56f19b9004da7b237656c2dc5d
SHA51246f49cb1c0fed2a3ee7b8903d0e176d4ec28d1228f2ad2d60d38969da7d8e2524b42789ccb58bfb8f681e33ff3bfe54dc0cdbc7403f344531565f91ccbf185ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59368f4c0681b52f6cad548bff80a0f46
SHA1019e68951efac6f2dd6eeba75b146356b812afd6
SHA2561b3ea8b852a2c65788342976869e718c9214ab163acaea4e1a351929a36c78ee
SHA5122dfceb5c938086656492d0aa5cb8eb12bb77de27fffe2c38dd99237c76bbd14118dca37eadc9230ab2be5281e035af8c84790969617c62713e583a51dd50ee81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fdb87cf9f606d6ff1fda09eeea5f428
SHA169c14f45d985abdb6a3ebe3ad981c8c37a4bf9c5
SHA256b1374647ca7033c0b51f082526063984634612e0931251f79f8b211b79f561a5
SHA512a969cf029e244a441b1125d1a52f5db5b9c61fe490efb9c622bf8206ac7891e0033a36a9623cf3e04575a90e75e61d322cd926e087ff26f482fe1254dda74fb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5995dbe56a4d69fd99a021c8be34ef4dc
SHA1e664fe7385368a88faa6f8cf652eec703b4ae0b3
SHA256d51c005e5001cb1643007d9d2c10cbff9ecef631398ebf0a3de81c474eb8eb86
SHA512d77b10f55a503b34a2793221d1940c39b43fddc79bc74b06bf6c7cf517732e88573f89d3631c4bd855ee87199e1cbf3d0857dbb93a63fd38fb5be75202696344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7b28a54842a9d998a378ca63c69dab8
SHA1e55e195e73ed7de921a5d051420575541bbbd58e
SHA256162fce8391e1680bd5eafc0ce46a29281f0fc266bb5f3ba5d9b96dabfd96b453
SHA5124b92af6b4a8dfa8ae630d6cec2d3289fc83b03a794015b555f9a1152892cb2d26cb0b0a85d3654363df8db06feaa489470a5f3688be11c97831b188ebea509fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0aef2083f65f9f3a9a81a32d17d30ac
SHA13aa0949ce5c6ae2b64c7afa0c99e9d3109eb11db
SHA2568fe48f836538456c71d6273fe50f4ee1a6828aa2181b4ea6b1bc1d184d1fce65
SHA512d043217d24dc104f52f41cd6fb1ed40de580d7e3a1d1ab69810db1f6ba7376be9ab7796b3bdb417734bdbd9e5f2c9098f0b08db16c9eb603e7d2327aadd9a06b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512438cf85c2d3c5120a1c53da8ec61ff
SHA1c84b62efed425f6c771af8b99c326c6adfd50115
SHA25686ecd1e85f1ee796f4069aa98e1a7d5a246b720d086bb30e396a5bf0e275a6b2
SHA51256722332fed12140fba659ecd8e77d27e9c9b5cef520c097310e18c509360d90f656f2e85c78f441380c5652446b2baed7aa62845210a0a8c98a2c5e2525ad3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5491ac80f2e947f9bb924597c77ebd388
SHA18e2964e8c11fd9dcbf1ad62e0988eec5b5c6e768
SHA2568f3d75ead42d84bcc33b0a7e9acfeff398b480267fddea4047d21add137bc53d
SHA51292ea613b49ce7ce4bc0e2f5075b4824b0093a3e13285488b15c54b8b2e4f3f9aae4d26067bc119c051df5293dc73dc8135a2cc907c0c1a6586673f904bc7c780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b38d723f978a80f9363edf987ff3b36a
SHA1a2e218ac6b0ad51c8cc574826389b0cbd57b12a4
SHA25612a77a43fd5d1e64a3ce02d4f1eb32d24509800ca940715ec08cd57a2bb8a6e0
SHA512243b2e22ee74e11dcc9cc5596535b206a9d5c0721458d9cabbfbc8f43b374655d6d7de380f0623f39d58dd1d6251d8269c9d36edc83b4fd87834c119984bc5e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5365ce3bae8cdaca2e054dc7233b3e664
SHA14d16b21df56f0c8538ee8e47b11c790c7f8be85d
SHA256e3e16a9e477661995f69e4c6d9a6c6acce9349469bf6ffa1f33e7a11e903912e
SHA51243adc235a942d810b9c35e564a59ce7ad60444f6a3a1f930a8b96cffdab5b857a5932dd8972b2d766a4d42962f8b1f0caace6694223d9bab0af4a63f545cac3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59931dcf2da07b68fff33487fce0baf00
SHA13c5d2305d111c4e3065d8b9ae8f60b5b308eeb5a
SHA256d42821d2b7e53518ef5c8f6c3bc37fd72fe392ea98d0790ee15ca83ab31be380
SHA512de7e9d8e5505556166d5fa30273bd45d4fe678468775143cb6e1de8b8e5ccb6787df94fc74992cbf76db2658e5cb5d52e36802e2b503f1f99d4d8d6569ac6393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e92834eb9841f64972dd4059962beee
SHA1527a60ce578d1ef5cb4d0e5d1da48ba3d1a2bfe9
SHA2564fc989c3dad2e7e8fe12b2a924c9168e2e4b5d1c01f9089e649f5cf049b1c4dd
SHA5128d85eaff1353e2679251bb99a6eacea715d612c830f6556a405c13e9442bc7c318c650930681428ba0757395d0cf2703c7b96bdf74730d488fe94b734e3df03d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5227a1e8fe25afc30f82aa5435af49351
SHA12d93a74fc9201946e394ad351c782c0612cbfcab
SHA25670e463a0ec906786690e14f57a2a2cf5a53d5791048f476b3723a95b2cdb7b77
SHA51251b72a3ded0ce89c1622271ea38f528e5ffb97a214bc3b4f9ae5805b70c079a0308475f40efefff61a2c4e70dec1322c0128a8748f2ca2b670f03a70f328948a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58da4201e0fdf8ce6d3a17f949e073962
SHA1eb0801dfdf6b43a951a0e53c27cbac44747f61bb
SHA256a03be71910e393f2a38321a52a4f346088d180eda68bce9d574759ac01b4c70a
SHA5122f94fb95f3464de6f1d8b84770e605b88b95ad32d2a23fe37c39c8c6e08537d37d8c90848a56d7fd7836b5622a6eb03fb8111f48cae6aa763223a250cf37c24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50968e9323ece75e024bf82730390809f
SHA1e85b1cf7fb6403cce601f1c912a14505d7364b42
SHA256ef1184edc20327e07b35a9b92a3c7d5f96410eabea557bf199695695462b07fe
SHA5124e2c0231f87af5e44c8662d42a801e2021f5e71cbdb3c25b4f55af90a7c9365d67cbf01577249bfb46bcb825435b046d48061eb16aff1c21c0807ed387d443c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b2c22307cc8bed107e15a22d6ba7f00
SHA174111921ee65c68fa45f545509b030f8a3b7fcbe
SHA25615b82cdd1143c0fc4e9b8ec9ec5e030fe5339dc32c8c1011c580c57260dacc8a
SHA512f3d63fc8e1581a674af1e23204c35ca87eb2cb63cde4989a97c05b04ea03cc9ed1488b7e333da7c0d3e336e6766cabd5de13550cb0715a23ad6bdff4e2614963
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b