Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 10:21
Static task
static1
Behavioral task
behavioral1
Sample
00d5566743bc5290eb7a28b6fe474da1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00d5566743bc5290eb7a28b6fe474da1_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
00d5566743bc5290eb7a28b6fe474da1_JaffaCakes118.html
-
Size
6KB
-
MD5
00d5566743bc5290eb7a28b6fe474da1
-
SHA1
5f6b7f7cc4586f072a1d2f29d132b6d974de94eb
-
SHA256
b45f6bf0a8c600f4e935bed57e708b23d22237ed1b10ad7367096b835863d81a
-
SHA512
67f6c4ec1c8e9fe750929d8954813e7a2529eaaa23b6c23bdd96bffa938444090d018521522d6806f0ffc42c1539cab97c90fdd9b9d269d4a04f856c5b4ec41e
-
SSDEEP
96:uzVs+ux76lXLLY1k9o84d12ef7CSTUJZcEZ7ru7f:csz76FAYS/Ub76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 201ef68b2213db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6FD8EF1-7F15-11EF-8318-F2DF7204BD4F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000006ee039f1e268cb369e58fa6e0d90d6c1b2d18da3c6ea3b0987277ac01f42a5bb000000000e800000000200002000000028255b3ab0c127de32eae1e323d3f4f1b66243db5c036dfd6af6da214ebf931d2000000010d0b561f4ed4aa09a626c264f5a09cce729ced88d5c94123eb4ec4b8fe2279940000000a8d1ce49a3e270f116da1f9a3b77c8a7d6cb81dcb4d2bc3044e35438f3b1ae27bfadce55e8d16d9d0a19e6122e191a641c66cbd1c1801a771a0ba072f4d2d537 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433853538" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2984 iexplore.exe 2984 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2820 2984 iexplore.exe 30 PID 2984 wrote to memory of 2820 2984 iexplore.exe 30 PID 2984 wrote to memory of 2820 2984 iexplore.exe 30 PID 2984 wrote to memory of 2820 2984 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\00d5566743bc5290eb7a28b6fe474da1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea53934325ce25299fca715455dd8a41
SHA1dfa39ac2b4a0da493aebf5d3d08be61c35d1f67d
SHA256c569f825dd87f93b73d1482b3d6f0e47edc58195e0f699523ef3c9600a4675e7
SHA5127418c6e16c3ababc7bbfd6bdf415bde139e81079f6631d48aacccc37822a152ef11bc3d793fd1310ad5f356a5b36fc2f7bb76ae92df4b8e8219465f24717beca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a01db6976bf08873d0c27734e9db28c4
SHA134523579c91865b04f103f6c3c0255f216cdd620
SHA256bac6dd82be90eff47abc52c4e8568fb526e9692c77c8c95c1c4620cbe546e0bb
SHA512083daaf0314123486d5c7b53300acdb2b611c88a152c30a93fb07bf2f49ee93f96a5408300b599a000d0b8fc99596a2b1df77ecdd9309252a910b248b9965332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efd67447422707941db1e3a9d94e55a6
SHA1a44d947bb9fe139af5cf3d518f8a9e1219a826ef
SHA25678914970519cbc7c5f868489d5fced73275b01d4bc3364490942178e70a52b2d
SHA512f11cdfa8410c5abac6b08aa958f6b38b82133ca6a231550bc439e4b7ac0bbffa7180dc576828a4edf87ec4c4e4d697808e94e36acecc2198ea8711cef51ac1ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c632f896d3e4d408bcf34e2fede72ce9
SHA16da39c404c5b63c53fced8ee68a417b67a137fc2
SHA256a89765e3a7e5f46ffa6d3178cd47e8520fcad3cb846fb001804f5269506870b8
SHA512c31bd6f9ad6732dfc8af5887063d1993052c2a88aaff041759684cc43f1e4b257d57665ea1395d09db287853e97ae0106202cc854ca572dcb5b353c5aeb989be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5638ee702cda718e7127e1754fc35871a
SHA152c54a97e4ccf8720b1dc5100d33404b14a7bebb
SHA256a51c016fe9f9c04d013cee5efc453bfcdb4212e3cc08f8ca07425b3995746651
SHA5123896cb1d926c91437ce843361321adce97bc78e72df7e9dfe7b096958ffe421487e23182b6be12d9131216793acebc91fc12663c83f682ea931b2160d73a2c8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5109415ea1c4ad83d9c7ddc526a39a81d
SHA140d6a4b4270f260ce27a8517b1973c380cb8ece8
SHA256f04419eb156558690883dddeca699972438acc7d254aebe0bd9b5fe5f37667e9
SHA5120413ffb63998be706635af44fed645384fd749a3f95ee2df094be649a3ca171f1b81742c2b105213de77a77a1a1800a31e13b42f6b7e3dec47ffaf098a286ac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee824a66dce70786119e83e09b17d3e9
SHA12d7005c9861d4a677ccecf8b0d9a0f3ced06473a
SHA256ef8abd26914d99347c0eca181f58baee1587effa2d30a8d79d009835a441a78e
SHA512f6846ec23d3602e2890fb63dc57dc04b94d0aaed0591d75a052186333099b860be110a501d0b8b60354b3ea46f42e17bdc84f93b7d8c452dc573158f9fd53b8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc9b16af5bf354d26a3d0102b6985dd0
SHA15f65ff6a48696fbb9e569c5f7242e54e5762eff7
SHA256ef27d2f11185f2ff382bd3bcd88d0b6d9ed29617d172a250f9535cf725724561
SHA512bb2c9ec0a2aa3b23524ce24f8781b87303c1812a614ebb1be77edf8796e10bf2d35066bc9aea6f17900de89bee415739f3017033db75a92d86459771a34ff741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d15fe2981e7bf1f082a034bb50d37fb
SHA17995542f8ff16030db840eb2ffa5769cb0d6c9ff
SHA2568b91183a60945b1ac864c75ac503420943561a0d5135f2eb2745450d98f42ef3
SHA5120da92c0085b2fa71d86e28dda511fae00a5e9f8c2dd254d69d9ab8f0261d26bb6980d95b93e2086ee40479824a0679fe172b69c4ed444962f713948880ffaa73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5143a953fd5efc69733e73430cfe8cabb
SHA1f151e480ffa1081116a0cb6e11975a583c93470b
SHA2565e87bd612d22211e262ae48276379177896eb88d2bf1c9ab13048c213fbe3237
SHA5123910228a77fc60b0139a0098ad051623cd8e00d0dcf18340cdc8ad3780ccb3f349dbb6fc2071c441d7cd2bf969b02b1b8006f7c4933bb00d0b471199cf0a4afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d13fe6349b5c45be896f386e7e8b9a58
SHA1ad2e24eaf1f573efd53c2d0783671150ca9dda93
SHA25690abdfc27a6b8ec727624a8fe79a58f462013521fb4e45d10e2ee08acb734484
SHA512fa7ac39d633aef7c841d5cea8f28a3932ef93786058e5c1887c41b03e5c0cd1391e7a4bdedc3969b126afc89eae1794d1489ca8932ef5427cc9266b1601e568d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5292523bad50a50509df60c435373e072
SHA1ba5c85fbe2576096895ae9bfe2d87eff105490b7
SHA256decced1ac63d97b52ae226c8b8695aa3bcbd2d2d0c1a1f489059342aa1915df9
SHA5126da21bf49250850d226604b46edbabb945a572d225535b389348377d95949a1396385cce83763ad694370937d5eb42f512e2c21d0d0d962fa1e702e129e8f4ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0fe08e30f3db5010361dfe7b9592490
SHA1bbe931acb313d1db297107206042ba94bbe5d21a
SHA256e11a2a9af9175ee724b5a68955963ea40f0b8ee2b6df0f51d2b200bec39ae1ca
SHA512b3638899bbbb309f1f2648ef3e790f25766adedb220a0acd49d06ea9ab1363e47d44be94bea9e9c93771c52f4b09c4f94e91f45c74472073bd2f8350ddc18428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526878549aa0a2a15e09d652faeeca0bb
SHA175c08998c5756cf05f4c51ea6d8950c4771475c7
SHA2563efba781a93ee84979c188a32afb1f9cb63c9076abcff670964ed7f2d5c38439
SHA512cf1320acbf3c2c120a18c5e48384366a16b085071d80e65699ea82524f7da6f31fc5cc67d66fb46b22b586ac70ef1bc884315e6cb7e35e5c627605677ded9142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5444bdcdfe03dc7061fb665f9ae6eec6b
SHA1fe3a99eaef0eeb1d7b750e08e13770d6dfb64a61
SHA25666dce9975e57e4197fda1226bd24db2c73bae8654be8e691a13054085b95af84
SHA51211096fb0dedb64f2d415086603e7d0bdd61e0891c50dc807763cd1cef172f185a3c5afd1c6701ae734533b0df60b2b1c42f8e5a89918fbc40ae3dab2ae5e5ba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e227d3ef845612b4bb3eefd782e69f97
SHA176358363b368d1f6de009380c60b41e914f2a56b
SHA2567899c45c1306f782a9438095964272147c64989f1b92b497362e7725aec2b8dd
SHA51268bdb899b51a449da4c845e5118c1758817f12909150016106104be150083b5de70d50fc5dc45c2c98fb078a15368cf02c3a603f8b1677099b4c5ad724d30a4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57728cea655fce4c0d5ce5fb1e565161e
SHA1833309cb322fc2445e0fe2082bfcf5f846127203
SHA256d390b80267be74c8f5eddf983348bf967bdc6d47f456a749356a58e9ab7ae221
SHA5128b068b431f718b53c4d907d0ae9ded0016ecffb91da1947592cd3e90cecccca68a7db2c59f44c3e23663fecc5953fd7c8b0e03aa0056b35e35d5f4dc9bfaf389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54901558aadb515d64934c4275c31a2c9
SHA1db05734c75219db59b43fc3fda0e80b225ec9d2f
SHA256c6957f267a7a89b618063eec643b677ea1ea862e0bb180fcfb72621f909dbdc3
SHA512fff3eab7eb820e3a82340b8687a4ead93686153b8cab44d0a79abe040cd52789e91336a95066a4e64f4408ff21525282eda61a3d193d586a3e6238ee46e24d5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543ba8589de3be821762445e250ad650e
SHA1e0e61eb33130f2d0b145259415487777c5adfbc4
SHA256d4abbe041ed5a059c212fe50e7d08902e7e5fece7cdcb4daf156ec997b09e453
SHA512db185d2a19e94b44733d9d8f42d6f06ddcb7e2c4313f1f6d960b3aad38e3dbb98da955f841b7b0c35b5ec732847e9396836b491e1a73cf08633fdf6e8e83572c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b