Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
ff8d1a5949949c09e37e54a7fa9c580c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ff8d1a5949949c09e37e54a7fa9c580c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff8d1a5949949c09e37e54a7fa9c580c_JaffaCakes118.html
-
Size
19KB
-
MD5
ff8d1a5949949c09e37e54a7fa9c580c
-
SHA1
c5e3c797471f8ccc1ebebccfc59ed4c30f5c655e
-
SHA256
ba4304b5dc776f36fe5dc570b2e44e4639635b0ef5261da07e2544159cb5af23
-
SHA512
294d2a35872ed19eb9a42239e17ff8b71e6fc30cc1099e0e41052f5aa3b77d5e95eb14705d655f9d3ad7962a7f65206ef5c5680116035f29a77618f6773b56ef
-
SSDEEP
384:zi6KhgESeVBD8cYZQ3RVpfyfTGNvemLxXucfIk99heqzVc9Z:ziXSegch3DpfyfTGomQOIk9SsqZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433816890" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30c0e337cd12db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{627C7941-7EC0-11EF-A817-DAEE53C76889} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000dc580a89ee3c759acd23c85fe13f9c3e2dabdc36f31bc262b08fdb5b64e47666000000000e800000000200002000000095400bd645671df85c281fbe101c0e4a78508f96a33102fe960f5f5687cf2db9900000005c4a79cc03f5d8e5d8ef602c172d61be1de3609eeec65883d18603bbd63ec396a720371d8d82fdf1e3d3b8afc5aa518165ed1f9f31cfdc7a15fc0e3a95da5693838e6b7c3e20ee0eec6231f9b03f3d1ece7ce849b8dfd6e595baac89c32a12894503f9abcc7bfe4eb37715d7f0dc34192523a1f8ae589fa69e3b8d6d24705b74d4fba431ea339d84960a128735e93e7240000000d47f9ff698acaaec8f7a39e4132ac844f4b2d443859bc60c105a9dcc183f141c3d1cbbe4526e8c10e1f50a4a93d722e29a0cfecc1f8a2c99b911df22ec9aa55d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000006a203d08606e74a420690b2314dc24139fa3543e1769d11d259f6c00a890321d000000000e8000000002000020000000288f742b01e79e3f22a074beac316ca47c9df2810643b75ebec9794da448fc1f2000000058365d61e057b934ffc6e35668b6fccee280a69cd67ba753d6c708542798beb140000000e0d8d481dea602318c47f4493fbe25d9c80f0fb4bde343866979d066200e8c755fca920280f6d1d6058882e75dafbde6da97c98aecc1da81ad9c7c56f45b359d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1400 iexplore.exe 1400 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1400 wrote to memory of 2336 1400 iexplore.exe 29 PID 1400 wrote to memory of 2336 1400 iexplore.exe 29 PID 1400 wrote to memory of 2336 1400 iexplore.exe 29 PID 1400 wrote to memory of 2336 1400 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff8d1a5949949c09e37e54a7fa9c580c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581202afba05df22c12f449055b41f935
SHA179719be64c03395298992ecf0a0fa96e1803a14d
SHA256c76b7ef4157ec30eb6b747e34d49e7c9d3c74d42c0b90bb23c35aa989ae51c7a
SHA512725e1ef0eee1b4d2325bfdbffe9b62bdfadc56fb5979e4476379da1b1e4c68b9ca09e4e2a3c95f1b7e2459572c73f5788820d4c77778104a2949ad9824d35a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6d23e81aaf4dfd1c94245d7de06a288
SHA109e752788b888b243116111365794c9e3f875b54
SHA256bd5670365416d92751d37f493770dcd89888ced60ed0c878d90dda1e8093dcf8
SHA5123ca7e454daac4c016902072aa0a0b8a48676737bcbb0ad48a29386ebfeecc44535da61ef1e35d7bc960385cf34aed769f1c9c781f72901b62547af1c3fad313e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d560bec42c52042d1b6acb7d98f4fee
SHA14e5066552c89dea7b660443492952b93dfc9c3cc
SHA2569a2841babbe6043b02de9081c9131c2f4e00c017cd0c7f908fbd9d3cc5452ea6
SHA5120aa8900cd983fae7910704f3e741281df2470b04dfbd67936945f7e30e1e1781398af669ee6d50013ea1211bbd01cca652cc8e464ea6852385098e1db6f813b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525e5ab4acd7e52c369656bc2e97b19cd
SHA1bf105498e2f8fb7abf8a283870144821fde3987b
SHA256d2cf4ebe81c6fb8a63090c11c2eab10246924286fc69a60343d58b63f0803570
SHA512e84207e459f0054e38400e1aaf3be3329d61eaf5612fa959e075a4447a474f727122fb2a0e241d086faff686be4de542b94cde87f9fc6abe164b229b78db0d26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7934638d915913a356d35c6021b7357
SHA114d35d8188922523637e6c3a42647b066d9e65e6
SHA2566e9ee09417f7d0a97e97ac407d56d01535fb07e975f16b6056ef1db6653462b5
SHA5127f3cacbbe13158cd0e762d4d2525189f15364c6bfddc64547e3c39a397a0c4847353a92d3ae2c8b1cebdea6ccb5903a2d7dd8d52891e8c15d508739c7a64898f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547c29548b0b5e9613d8d39f1d2be08d1
SHA10f14e9ef12075b4bdd46e0238ce1cbb4d780c607
SHA2564167edece8c3d93e220864ade834bdb216c2651019c79113cce623d07201c04a
SHA512435f2a3e61a6b6871bb28133b17a99a71df66611662866fa8a9a0013dd363eb94f476be67738566262a43fee3e23b5893eae3ef1e9315ff3253d777eefec469c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53291f649f688eb89127bcc99e22b4368
SHA15d281204b157ca47d7cb38da1f6f26fb0f818387
SHA25622c1b0c245c44cb132a3589034527d8e6cfcc80bf44d1e9f607dc3308241e988
SHA512b46c6fc24bac4ce86119f2b3bc19c22ec49a9ba7d9d3c0c053a1e822db5a13d74010859bfd1c8491345bc58eb1ef9bcf6e446dbdf062eb4d10f09db1ee305d62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c639aa0b16e407cab2ebc86866c4dd5f
SHA1b58062add9159725bf645924a51d5ab58a7115b4
SHA256312caa1a6c243cab491896978eed3dffaca7709a912946f46c3056ba72c03625
SHA512d16077a81a0b97af6e6cf14063682e12bab778d90e75212ce0ba40bb091f258e676376b9a575188af4194ca590f761aecdf50f4e56db00b7388fdc17ab6b1373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522f63eee2e3aeb56db1658451f2d3f58
SHA1264d37997f744f26f7b9157a593ccff9b18e0e11
SHA2566331c5644feaebc61c142819fa25f61ad9e2ab54d21487acda7bf17fff1cf50c
SHA5123d24ef85d8d04e64b70d0c4bda4cbea6ca1bda2c102cf252be7a123733bfce9b234c1ae10c5fd504a379b74962f8e8c7fb60a889e3b671abd4ad749caa53901c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef0f3ed37fb525b17f8a03a5d93dcc84
SHA164a5373f5c37f35a3b38d5fdc384cf1f20f0c0e3
SHA25699d1bc98dbafb4607ab67f5e04def737e0b0f677511665496ccc9cd2636a3d55
SHA5122cf0a993e2b68bb5cad1bb28167f502ad1c53458f02d5596cf40a32337c214413b4316e16908db4a644779e914dc2741737c2cb0aa9cfa40748062e8d50586a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590ebced82037f7a56c52a751b465d949
SHA17911c65ffb3e783a95fe7a6cf85ecb2baf0a9a8b
SHA256093828ba610a412054fdde1a7a22100f594c6ea08aace4c67d0fd79a62613ba3
SHA512f7c1da93e0d03d20d64be03ad5434c650d8f2b74ce24be05af105523bb7576d51479d9dbb40bd8371eb00352ea52f1cd901dde9811a6447ea01556eefaa0836a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3ea6bd4f0f43b816033c0c7a4aac7f8
SHA1e2551423898cccbce8595f1ec5b1b68744db62c3
SHA256417cbf6b571c0b83064bab50cc248f7ef66a2d2604e7c8afd2953eec19fcf015
SHA512800906659c7d4957ba3434f9792f81d2e888b53baeb4fd683011256ee57b9ff1afc6b404876370da82a43abe216c24e5be77ec469e5e92d7ac860393d97dbd15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7d93c752dd84c706db8e311fa33b976
SHA1df494fd677075cf84f85d324824bc165e485a89c
SHA25653d75f91ed06210267027c18cd471d459268ea2de3c3352a173156847601039f
SHA512a87f4fed67cfa5a109b64a619ca103e4fc70bf78f70e4eaded874493ba9d40356872e716c8a432008ae4399164ae61f67251aca4850b7b9756fae5caff85a2f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b5f2055ff1adcaa677535e64e4e00f4
SHA1bebc555ea77c4b0b601327425aad7cc05d2c1a6c
SHA2565ae269331a6637578c7fe6b31e00e51149d123ee563d7a4c5082ad9857a9e1b1
SHA512ff30e6f160414eb634c215cd443c8bce0abd04f9c38dca130e1a2a33d4ba09dbfc558e2b0f5c3088e3ec738ec94cc4b06ad7537f034625641ca99ad4a14f904a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587aed64847da61927d5cb2f431e4a150
SHA151bea2464768fa0f9c9ad43c29b31c52773b2288
SHA25654e09689259126ce3e20c2c0867ad6ffdfe195d9a9a704587ee3fe3e0310b62c
SHA5121d6b3465a059f15e4d4eb3e2dcaac6f425cf564e9066f36f813eabc53b2e9b40f6db7a4adde5cb2168177647463fc8e3fe5233579d703b8351b095de58992cff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e8acf5281c5df3fedc065b91fac3de4
SHA1d8d5ec4be3d13998076df470ac07488f71114de3
SHA256193c4f75a911c09c86453108748cf6b2d4f3113e9dc6b7bed239f9378eec358f
SHA5125864ae8c19f5982cab0fd8f2c2ca1a5d0f66c378d2718934bcbbbe8c2433b4af52061b5ae7918096fb5662fe775ebdd47628ab944e9bfa8293f8c320f547a36c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2cdb63b4398a81b421f94bcb5ccc07b
SHA16f110f3ccd82a6951c88db91ee62b3f06e2418f2
SHA256c21bf3f0652d7cea7b60034d67414df88ba4bba97064dd5def7fa9422dfcafd0
SHA5122c3e98bf9cb003ca9459aabc6634161036bbd84c903c0ff6e4140212917196a3ca3872ae37dfd8d056180ccd3e4781fafc604e8414a601493539ce27d82affd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f556bd577e1bde0303a17442974b072
SHA1617e3ae0c8bb6e8fa8780fa2dc24584e8a767bfd
SHA2562a9e7d1e634b329b6d4e5a67724081b253c8e1fd40c36ac2912aa19356040454
SHA5121f9e1c6119e5fbb8b9db954dbf08daf11f168148ef2baf5437c9d0139eff91082ae2f3606cdad960ff556b0f54adbf7ac5d4c852fd6a5f1d6135fbb69130e9ac
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b