Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 10:55
Static task
static1
Behavioral task
behavioral1
Sample
39a1e7b719edd63997b14d4345a6ab2a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39a1e7b719edd63997b14d4345a6ab2a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
39a1e7b719edd63997b14d4345a6ab2a_JaffaCakes118.html
-
Size
9KB
-
MD5
39a1e7b719edd63997b14d4345a6ab2a
-
SHA1
ce67c810a1d8ef684e057b4959b6480fe794a66b
-
SHA256
b884af3fa0baae2f2be8a8870cf21b55a08d4330f5e5d8de764c0a185188503f
-
SHA512
5a69f3b4da8da79de3b50deb994541204340ed06d4e8281a36a2993886ae48a5d4b776d3e4f7921b6437630a182a81eafd5f04522c6ba0e8e250d17b721def0f
-
SSDEEP
96:uzVs+ux7MjLLY1k9o84d12ef7CSTUGGT/kPsdpUlVHcEZ7ru7f:csz7MjAYS/P8UPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D6AED01-8888-11EF-A5CD-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0a88052951cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434892395" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000002d85f04bcdd7bb4e9529e1b5c1ad5fea0e4371fa279e85b96364a92903efdd5a000000000e8000000002000020000000bdbf524b1b8ce5dee2d344ff7c40f121e2de929086bacb2da8d48b5ba095c49f20000000a562a9a82244004ee870e9f9d66df59924d2918a163327920ebb4d577596dcb3400000002515337a757972a3fcf8937471d859254222f8d6a534ea5b2d5d276875f822a5a48181eafc5a483c010210e9236886a2560991765b6da778fcd0411f2a1f7b9d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2684 2132 iexplore.exe 28 PID 2132 wrote to memory of 2684 2132 iexplore.exe 28 PID 2132 wrote to memory of 2684 2132 iexplore.exe 28 PID 2132 wrote to memory of 2684 2132 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39a1e7b719edd63997b14d4345a6ab2a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa47d474cf69e0c90242ac8fa48b6ebb
SHA1002daa038eee9e8009c4a4c0c911526216253d2c
SHA256308a3253ce77ddb252072fa7fe4882233a19ec66210f95d82e0e3363244c141d
SHA512a6bec421f91927bf1ad1e1dbbdea0a359eba40e0b4a8d23e4472123adfd00a8c515e4d3a16579f586e098b7c5d9c54ba3879665688cdc9e2901c4ea6e1766817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569e2f32301166476de1a060bafbdece6
SHA1ca6507c0e011907f554d348f722bceea7b561a2d
SHA2564a4b09a4787432f3015e85f8e671e372dff00b707158f36547cd46c923425c8c
SHA512b800fe1ab960fe4d1958c810f8e29077a084f28ff4bb9c05615ac9a689e384c54af5812d0721d33fdfc4db736d8443ab7d7f8f2e93cc05bbc06b3584678b123f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512a87b2715805d0b2a41fe4eb99c425a
SHA11b67845ee671721293068c3ca984f9640e51fa3a
SHA25633533db306c376f76177f704b3467b6c197881d02b18f2d5c3cf5ccbe467b7b4
SHA512e77fa689d9e789f957a063c16b557fc2e76ebc872e56ba55513a4fafa57591e0ebc6b44f10a72166ee5b08383ada34d2a1fe1e99f957e1d0127a5ba819510d83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5658509b38698635d78881e4157a3b3b2
SHA18b7ea86de31827ad142f05d0d0115301d47f6104
SHA256dd191a01615048359f59d613f0a652268a2f38efc108d2e22cd00f35cc2100b3
SHA512ae5f7de9e24be452762002ea74ebfd9437a398ca71c611f7ad9da60d837ffbeab40da0c091e856d7c8969997bd8165ea6ba41ae1616a7dd6dcc6491ff32a1940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ebef8d0f4e584dda123e0bb1c836a48
SHA1c22966c8ae546bc92fed11d010e2595047db0eb3
SHA2561060c3b5b4e6a6c94aadb434454ef4502ac1791364d095eb60ccddf1ab0a5197
SHA5122dbe2c412c37963e6922fbb9119be0b7fe14b1d5ba413a52e5e8f345c2286894089d0542b6ff4a92d7fcb65f5c032301fdc36cd647e13b6d94edd464b308fc1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56639b66ef86b0fa57ec4a2ce8f819ed3
SHA12670e3e3d65f76749771bcb137b5f9f75345f26a
SHA256424374ecea86a45cd9b3bb9458d1f11c63fde859278dcb2eb34a5851cc14ac7e
SHA5128840dac0ed95d2e6023692caef6ed94d5798a91c85c4b6e4883ba85ac90a1588936357f825ba9ad72609f55113caa109eec3b06e09d443e97166f33a603bb5c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e650ae2d77d01b5ee47a0dbe29b1027
SHA1c2f93095522c622d21533bbb0462f690163d2bcd
SHA2565960d76aed9eafd3ba9957bf9b2536eaf96e15d868a3aa2faf9e0350fac15c74
SHA5127d73c538a4e78a1f10a0a6759ec712ece6dc7450555e57b7bfb2d3242b860c073fe59b368d94f3c7156f7e17d2477c1e1645f6534a00f121c1bcde250a74b1d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bee6d0cbe2abbd661c2aee055f3467dc
SHA1f672eecc9828a7482a4e5497690dda85f2e710a7
SHA25683d4a6e8131b997d39b7ed5f0a92b01cc983b070a67b97d525d93d4ae62b4429
SHA5129b287950de758bf492b68af5b63c582b30ec7d02ddea4a0a9ffec7a6a6c17b42353bf40acefe350a57ba49fede98458a67ddc7b1de1fc2ee83b39edec7dfa34c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e82f849ac693e10104a240c68ea0e21
SHA155bff6a8a303ff7c8f2df9e32411468d89512c11
SHA25665ec6c1ab0d1be704e4743692629aa424101e66a51689ea4155995895abb0726
SHA512fc58e8f2e7d09b52004cfd65428a0142fbe530cc00172771e47199fc77c9dc5d88ac90cdc1275b441f8f28656e36a4ad393392c903d165f5ec155aa09a944d4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586ab25bfa568990f2088145881e2de6c
SHA15c432e09e70ae96b65ec4b5429f5fcb09ed750f7
SHA256ff73b11c1a1ee497bd4958e32c691d3c5c3f81986077ac16544af63dbbffc214
SHA5126fba1979778b08acb1ff7d5dd85ff2cae59f725b2e5341cba6ecb62de2df1385344b6295fa99fb9a7f26c14697aa17d64d73632aee34dd4c352e8d06757af8e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5114ae0073e736719c7b9ffe53820417b
SHA19f0e6d5ffc4482a6e2fdad2f5354ed8e2c40695e
SHA25620ec03fb730772792e8ec6d0aa23df526eaa3cb2a10455e0d79d3264ddab2560
SHA5124e96296fd4182664acd39e66033e9e3cf900701ade1ec5f603f71b3b706d4adbbfd684740f25bc25e2c9f7827432214932c009ef1fa343bc189c990e88d4d372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543de8f79722b7eac55a4f2bdbb92dfe1
SHA1c26d474a48dd29a93ef7c8cbf844484d21d8cd91
SHA25669e90bdf124326a67a5b3c72bfda8140721fd2610fd37430bda1e5eb9d4e1cdf
SHA512816387012c7a41cf8582d72dd078a85f839dd8b8c4e958e31d12eb3e68f73784fdd592711d3cb3ff45ba3de1404fb8bc10d14ea2ffaaf117970a644918c637c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c97188264fa73622281499d68500d1c
SHA1a11fd6470c6911cdaa9eefae4d44126d625b87da
SHA25649a0b13c0a81170aae6bb83ea96301cad0236ed751ed2825ade5e15bcdfdf4f2
SHA512809f41e7ebdf705a6403e382f25aac8aa04858632f88da3bcf7668b5cbe75d1935bda5ddd7d22676e9cbf1d32f20f51d88ac8b12869b0f0e8f7ebef621648aae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5502cb8c2f3e7bd95488536e970a2b1f9
SHA1de63aa88c5f15e18143aefe4f8920eb4d7fd5a01
SHA25654830370e719884214370917508bb86237d1f13973f98f9232e7b7276b38ff59
SHA5122f99f1419e5bec420784a85283b577c1687b25912723859ea77e5ae6414559ddfaddbf85e6a146f7a8b7e92d3a872c9c304d9e9d0112ec1c029935b7c27112d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c6b3eae6ddeb5561f55a3b463ad5dc3
SHA1d7ee89478d3a5b5a2d48bc2c5fd2e1fbd0641044
SHA2564742843f18fb3ffaa2e801c7d51a8811eca7098cf137493aaae14d022a238e16
SHA51239a5467969a6ce27a079797e9c52ba085abd1abc1f03a1213f8a004174c086d4dd0f306b2f1d5343b0a0808cd379918e25614eb4c6a3adefc021161147d50ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505f7a5f21912f2f03486a1a0de00a1e8
SHA12b1684affb86a38cf78984e656f984c740114179
SHA2564f2e785523ff6586e6fac4c32d3695f117b6598c9a62e8616efc6313bd9bb9a3
SHA512192f97549da4eac2244bad80a79bc73c22ca31e413679ab7e3d839df37b3b54c35ce4b5442dc9c83741ce0e426c80ee6c7a99576da756ffaad8b7e53ea6b6383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55560cc7d7c14ec77cd74c2a11452a95c
SHA152c7c933ac583d5c3dfb1f06d8849f0849026904
SHA256520ff963601762d6e8255b5d49f880298bf9a586fc3e88d47cba0b17b1ab8a74
SHA51260c413bc173a629ba8a1d63874dd91a826f349793aabfe78f058b65273c81c5243614c5f54594a2e9a1e41e2833acd5e647a97a03ef0b14e58480edbdafd95e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f51375879d635783b667897c77b85f96
SHA15e80a35847988583de741c37cd6566236b5642b4
SHA256e66770341972666ec04f1d141b44e6b3dbe2592f2ed5a6904ed527bd8655acd1
SHA51266638049d5b42e50958a8f76c5cc600868bdb84ce199e2e07ea1d4cdcc93eae6934a87c38a4d872a73ed05f54992065e8446ad8519df1399ba213c95c3e30c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a1f5f4065f5f3f6456ecf66b8d61bc5
SHA1548e5721542fc6b091fe4a3922eb424211aed479
SHA256b509656dc75f42153d20dd250d285af1f8c0053b17ab77116f513bd0626c8450
SHA512f34072830ed21654105ee7eb252a96ba997ccb52bd78017e8e8e49a29a19623bfb4e1fd521904f6e2b1d538589a216dcfc184836ea4fcc97cef9197a72cc5d69
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b