Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
ff573fa193a0b02f3b826b00434c7d6a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff573fa193a0b02f3b826b00434c7d6a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff573fa193a0b02f3b826b00434c7d6a_JaffaCakes118.html
-
Size
19KB
-
MD5
ff573fa193a0b02f3b826b00434c7d6a
-
SHA1
ced241587dfa74251264937a31344745c43ddf04
-
SHA256
d48859f23d1f85bf220165b1ac922f4f8b4dd358477a6048f28ff082e84aba50
-
SHA512
aa71bd265420a012ccfb039ef4655515c82d849f3053812b55f8d22bc362b040d87a9aead55156a98c4523934883daf4101d696d816a7f35c1741c29f8f2375f
-
SSDEEP
192:uwjnb5nZ+TBnQjxn5Q/9nQieYNnjnQOkEnt3DnQTbnRnQmSgHMB4qnYnQ5hNnlnl:LQ/WqVqw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d014e2c7b312db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000000f5fe63351feaca32c9575d7e8add59d17e1c05ce8b9de24e633edb67ddd0d10000000000e8000000002000020000000a74f3883634cc12a2e646b2234e48114ea1f8685fbe263cae72001e75c46101b20000000ec019b0d7184d19ea331a66c5060801eaf49a44828a3a01378c90cba9b7308304000000036b9eb066453208882343d68d6a92f07b71e15224363b5682af1ef058ebd5519835ec23a464a7e433dcb3cf56a09d359b0504ca72b3348c3cb2db05da6ceb649 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F17CE5E1-7EA6-11EF-B40F-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433805962" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2572 2348 iexplore.exe 30 PID 2348 wrote to memory of 2572 2348 iexplore.exe 30 PID 2348 wrote to memory of 2572 2348 iexplore.exe 30 PID 2348 wrote to memory of 2572 2348 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff573fa193a0b02f3b826b00434c7d6a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5409cc20d9e522a6d4162e9af2c452572
SHA1797203488e10db32d43ff98fd3c789fe433e0eab
SHA256b47f2ac260dc75401adb8eb78177e6dad03cbec8768558544777ea95e0c593a7
SHA5123ee9c214d7c2153ab1bb776d1e035322cde14f8ccc925c19f66ee08208aacc70078021f840d4322ce7f8bfc2eacf0089273877a76101968dd7eac9f65c2dcbc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555ae403618d85924eab067e81d80f0ff
SHA19e8fe0d24c091530e5b09cbc0e0b1f7b71315048
SHA256663dce92dfa4c4c9468fd9b04f9f41c69e2f72b4beb6118ad4dc5ac4d99ec570
SHA512eed92e4b86ce0780ad64a73c3b5d45abfa6c1dc5a4cfbe8cd9cf22d792ddff12e941c6f72c33e0ce28305aa6b716b45dc549b14c8cfad64027f80b03aef4ffee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5379d1d4fbbaac9749805e431b40c8beb
SHA18aee6c0dad03c5ca4c6a0d3b53d389665d1b7c0c
SHA256dc6e51589211f69a0535b20ba20c5805bd7fd4cff4d1715d35a4255b35ec1696
SHA512573e7689e399b1d3d5108a5c28bdea954f849b2ddd5c795207f1783c1e871b59ae65c7f3471d31166f775bf5936c9e8302af00bf99084bba2e3bd7c2a5e7654a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9fe8f0aede99ae46d26fba842ecfc6f
SHA1580d2a235fe0551c5dba188e21dc7daf0028708c
SHA2563b6368faddf5dfe7141ed879318e78b9bd7e9c6adad30e8fa5366a1b9f4efc86
SHA51226d7beb7e25644e3713f41e146d101f85841a38d970162e04439827f492d995c5fb37d546c392439181c833a316a44182651d605a9df689acb5af7d19d068f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e64ecad0075341be70b5690b2ff34e3
SHA10183e1b65b61e985e7416e575a4c06cfe0762908
SHA256b25e2c32bbcf85269bea62ebd1404a3c800f663588c6a174ed5ba90a07df90b8
SHA5128a48c95eb99775b2e1c6e40bb6f7f8f670b66f7e2f2643b473785791696a127372760067574b1cea7de84ac01c8164c3444f7ddc5eebb0cd791360cbfa264ed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d59db8aa8339fd83373cdf88ece430da
SHA100a8be65fb920978462a9b667f5f6cc934d219c0
SHA256b0c18726470c4ede9d0f2665341ab75fa4f36daee8e26bfac780489e0df4b0ee
SHA512b021f2853495a9c98a31c256225dc61566508c8f644a09636110851c94ae233d27641cf3fbcf381c1d499be9b081231743daf4834f75655fd55925641f6e3bdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb67416504ed044da6f11ce9d1a3d22d
SHA1826450cb7b749faad25091e49c1b014cb09adcfc
SHA25664ed87f003bd4d632b4d460308593d73f0aa2cb2004140604060064ecddfbcaf
SHA512436bab1918c47619af1bd452ffd6ec1c474bdda0339b553126ecb2fa39c65c32d2f4316a10855b75dddd41a736233011d738f9d019aba52977c4e5c977c34880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a864d2bc9196a911b262de510ff4c6d
SHA1baa43a212bb76aacd31148fc74eda88f3cf0a665
SHA25654e7e2b72e489751e5f4a4a1fe91be815a12b1a5eb62e6ade2f128c865de2a34
SHA512b9cb614934f7cbecad061182169baf3ba6a15b252bb8841d5ecf01df16935f79fdd73b6c391f5cbbeadc460e8f1a0c37706daa7829e14c45e3ab0c0e55ff3c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed1d9735da80901d22f1be6bff6df364
SHA173e04d1e0e12ca86915bd5f0bf6f5f81155003c9
SHA256a6fee71d48cfcdb2feaa9e2e3b3c2b5a1534464cb672df7643c64a2bfa30775b
SHA5128609822c291b8ee6f0d4396ecc2e0123e84966ef58b651ee4ba2fecd207e3bdd7e52a0540f0840250c7a816b4e3c2fb1724af55807aae294b96ef89e6f07bb46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58180d3390c28117f9adb6845c636c334
SHA11a238ffc10f14d3f594d70dff16f3658a8df2607
SHA256c574be991e928ec434be72e8f7b4c296826154369ab992811559f3c1fb7f29e2
SHA512076c9df960503919e990e6c6c3643446fa779a1d635e3230bd6c9e8d1f1817066863db8d8d0fd5e851a9e003730bda076bdaf7848525f18879f930fde5b76223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b6c6a26becca1ceb84f5705b581d726
SHA14295e2fb2912934a11ff25d8d3029abaf5e6a461
SHA256125f6ee4a3eb39ce50e9f7aa6eefe8d5271353dac2aafc7d6b51ab5e0c9c74c1
SHA51209738e554ff2418b3a4799d0f3082dd38bed6c9160fd3c9145a0aa6d509fa15af61c5edcdcb4f993dae2f3a5a0c0d6513e00d8698cf92da55a1ea2a6f9afcc75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c662ea9e20c1b49657a8437a9a03f40a
SHA18c2ee35419ae6fd779d3edcfb917414fa0fc5851
SHA2561817b9157085f6f75f4076aca75b22345dfee12d113d11a2675b1bb4ec9fd80f
SHA5124c7d762659f09d7521b817d2a3c31295ed108b7c4cd1c1ee7995750a4c11df7483dac99f27e44bb353d527b0a7d64d62cc06ea5da5579c657f3dacdfd9ec4de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d0f2ca7e414cf2be81c45959f862670
SHA158a19b1df75268e5e25483e04d60a8c150c8447d
SHA2567a256c5dc708979571d048d9276f9741e507d262692f10597598f511c3d103eb
SHA5123584cc2d2d61ca8659f6ec9ecb2e7487f78c3dcd591def6f7b99e604df1c204b3d8ea630b0cf3b8669698491234a68fb682d0be8d71811f70c46fd8e2f7d0f23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59699f67d6e908244efe4bb05a0bf118b
SHA107ace8eb825be2525c811314fc6dd1e7442271dd
SHA256bb78d908f4805b9f0d0279250ae7cf625210db812ca39bd561b17f2eb741a41f
SHA5127ed9776ffb9ce61e1395a4bc602615fcec0124a025107a80a398acffee173369165ac48b63cdc3d201a63beae7dbd2969fb993fb0d631a2dfc673c5c4d84ae22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fd3a1e566990cea655abb92c398b5ad
SHA171a3f5bffed813758d007d1d2ba7eb38dd335966
SHA256a7bb349df2384b8f361561fe2d2cc60f0ed6103bb0c7be1888aa8c5b21437341
SHA512d613af121cc82ec00dacdcd57a07576bb452b5d85a591344ec476f019e11cc95cf2c07c03f044a718d93ce4b7a3aabcd65e5c4d637d1e731cf59bb808a0332ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8376a82858806c03c972ca472f91166
SHA151392a913f696555c5195461f79ee92581c3c026
SHA256fe63d50c4fd07b4aadee34c8562783008b223f30fcd236c20c71366e91057ff0
SHA512d00763ac320f9678b78977f53c67dd3e01e6e22995428c90cecd731a7021d92c3f77d90111a0facdf496d0e2b3ce2f14e003b62147ca6a62c43ac89312dc507e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5642a005ba9303f4340bf3991a429958b
SHA1ba214ed231f031710efc7d3ef79182671f277acd
SHA25615edc9132c3807d631b0fb7f1280362f41cc0570cd7961da07c819cb4a5922bb
SHA512c1ac1e86d19f1c9e0e67d560c61b84c2b1cbec3d270888f68fa136dc500b3a0cea6e476279001abc438a07fe10470ef7ac3138f724ec8e7d4e27ee352be34333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5182895fc1969093a1a7f3d9d80d43bd7
SHA10b583335613b565179552bec0ff2985f24ab285f
SHA256dd6f47945de53c18b5d05b237029ab8aae0d5540a8e3ae78a5e882b2833bc479
SHA51223a9db8f14107e22df75f0d08d0ce5a0871d4a3aca6e20643416753fa4f508d283b02686e3b0eae5111385ddf5ac30febedb04c9a7bf09d3096330dd4b0a5504
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b