Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 12:08
Static task
static1
Behavioral task
behavioral1
Sample
39ec52bdeaa5448d526b01aa74e68776_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
39ec52bdeaa5448d526b01aa74e68776_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
39ec52bdeaa5448d526b01aa74e68776_JaffaCakes118.html
-
Size
31KB
-
MD5
39ec52bdeaa5448d526b01aa74e68776
-
SHA1
f0d708941c1510bd9828006f0168a35a50e9faef
-
SHA256
9bff5477a540ada8ecbc4e00908d36a9b090c32556e93c5eea567f4b0feb03e8
-
SHA512
5d4cae61c1d12f598b5f2c288ba3fab9a920405e568fc096679d032668022becbb3a41baada2f6403cb57b0130d469e8ffc18aad2d4b4e0497bcc6629cdaa4c4
-
SSDEEP
768:ChF02AmOahaSr9/259/2gfLr2JXHhJxXiqVnhRNHrEU00Eo:2haout3aXH7QUhDYQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AAB8B081-8892-11EF-AB29-72E825B5BD5B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000479385966b709248b3b8695686c86050000000000200000000001066000000010000200000000db39eb6b77e0efe8e3bb6dd1583be327ff9b14e4aedce82cfaaa17d986516d1000000000e8000000002000020000000ad12dc8465f79488bcc1d2161b4586ee95af6263008f47fc6e2bc384a7c9d2bd20000000e5e43bb034ebec4d16020ae1b894a9aaadc4c1b72a95fbd6a9baf8a9089cb1b340000000273f8ca8cc6eac16c99092b48d20f3183c8c29e1319093749f557805fc34677b8fea0b07cf135e038c7facdae9a8c27f833005889141e0c89b22f8881ccc6ca5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0008b819f1cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434896766" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1716 iexplore.exe 1716 iexplore.exe 112 IEXPLORE.EXE 112 IEXPLORE.EXE 112 IEXPLORE.EXE 112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 112 1716 iexplore.exe 30 PID 1716 wrote to memory of 112 1716 iexplore.exe 30 PID 1716 wrote to memory of 112 1716 iexplore.exe 30 PID 1716 wrote to memory of 112 1716 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39ec52bdeaa5448d526b01aa74e68776_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1716 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c83d3c6fd15fbdc2a42fc0ef3d0c54f8
SHA1716ad74e9580217d12f115e329684e7a43ab54da
SHA256e6d821bbb76348cf31b1c2a944e6305268a3827e1e00a922e6e0097be62a15da
SHA512d54b69103e6e215bfa06cb513f0f52a3ae60da6c540c5db1f2d5d585811aaaa72533b235488c47b261a8c789520c6bbbec40bfee68dd95e490be5763022cdd00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566caf26fce59fada1b047cce72eaa3e7
SHA12caa24a25fc932202e1cf5d1e66fa84b91108bd5
SHA256ac2be1e41ccff50ad29fa7a332cab4d5982960efa9fd61d197e64cc463c137fd
SHA5128187f67905c6c8d08f3f345172d2a06a5f5653a057071b74bb942ec332cf92c3c4a7f98d989c4cf8fd55b6b45bd42c1ce234fa3c16c4d83fd35069f62e494458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2083fdd62763969142ec88ac16f665e
SHA16c8fb1dd0b9f265ad53c79a7230306d6d3901eff
SHA256f541aa16be44bce1c6383fe906271c3ec6a4980ce4ccddd2e0c21d23173ccaf8
SHA5122f7a365155d64a1e798648cddfaad3911e99e8bf805a8743d459d6d810bfddf2beac918bb847bb4ab858b547a2d735a8dfbc37760b5a64a2d3810540c5895d05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597c2ff76bf0cbd51bbc0fb59a130da3e
SHA1b40a83b5cd6ebe90ab6aeb860b65b4959305afda
SHA256acf7c61d4d243ec39927a69276712d5ae9bb378de47649567ecb7fb030b28838
SHA512eb919eae855c8500e7aa979ded9310c5bb0f20db4e541846663f166730dde68c4911972715f39efa1c2b95760d4f16a4e007981e0a4c8808b909767e9fc9e727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513a5a4305145d0aaf3c520aa59b3e77b
SHA1a6c96ffdb7db4841f533fcc866adc20c5d7ea020
SHA256f0ef82bf1948747f4c42c43925b48857fd8d41dfad1f2fe04a826d903f370810
SHA512670457f297d7f27c1ef8eb868de5ed21582f15b510d4f323e1119f9b2e9d2377db7edc5f25fe6a468d4688acdc18c6c6a2653a1affe1b3a51aa65e2966a2a50a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5501843dd38f256be4ec48cf84b6355be
SHA16097493e661e5bb425c3395f591b0248127112bd
SHA25647c9c4093e1f904507b3294f269ae2b4c41ad698df22dc59faeec0bc11a6dd13
SHA512afe133147482d9aaf50cb917e188ad367d44d10efaa56ab5e85d36c880b5d1f3d8ff43468739262f638e031c65c88f7f08ceaf21a0965cf16806f53a5f95f845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a28d09a9afce3d99bfde150cd730161a
SHA1a30153eac86b01c821a0540c3389dc6ad766fbe2
SHA2562633f2ce44513c352917b7d79abc4890a78b8530f31a88363c39785e69428c1b
SHA512ce32f632e35853e96c71b3b54f61c196f1763be8e6b3833c9f776fc2edae4ca7ab13e845899fff3d490b5b4efacfc365189af7e17b25f22b4ba1297ecbde5b7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51efac40ab4f630b93bdbf205547919d1
SHA187b726a6d58b4b3589680d363b92aad071d295ec
SHA2568ea6908bb3d3a192acf1575b23316c1a79af020d730ddb3d625db7ca11fb5ed7
SHA51244ab9dda17a2c9a2bf41fa109665dab7a5f2008d7d2ecb826453558affb9e91898beced25843d068973816c1116fb7be5cdc2427ec2ab2507abc9c72ed90370d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7f1cfd5ac6fb875fc2f3c17b5461557
SHA130e05d1c81b4df1c272769ac9cc6bf40c184dc36
SHA256627e8f66d0d0548c0c184ca421783bb4c9d9d7585405e3c354aa4b2b31067b43
SHA512c03a038bfe79aa7213146c0ae3a7ecc3e3ee0482b6c0b5a4a840b853e20c02c3438d6fe2556690c3c22dff0103b1a24fa8ff41d94b70fd6bf2b088fab4ef5d5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e044871badd60342472ac2f58a534750
SHA1b586d04155c6893e09ab6f27c5ebce6545cce6b4
SHA25635c8081a68fa84dbc7f7d69a7183fbbfab3dd07a52ce4f10f15b9a4e69040e28
SHA51238a295a69db2050afe72eff615b743d7f0c5b429830351397b61d621cdf6f2dbdc2591de36c5707198f577019fc45ed151c18a3a1953f8073ab141cc307cf334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55099c9fa509011c3e27b97c9310f496f
SHA1ab2f3ee1f4b54f74824816cf5043f3f27006d07a
SHA2565b12fc0d654c5904e4672af0b30bb5431a78f3c1c205615d96b980ac16c3d12d
SHA5120d99f6f0e17ef3380b5bfc80d372cc5221ff3ff3f03360e229a75edf57db7f050ddcf66753676d830c987e417f1bd9cef229460fb41c9a10d7413a1a2f63e79b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549bad2a65b75090bc648e10b57a583d9
SHA1f9d2385fbc9e0488b3108abdf89c5f6eb0f65172
SHA256a2751062c82bd9bc9f1b030648a28d6c916f57f816c02c81582fa8617c1740ca
SHA512f699f5328309312d9560b396054e3a0ca0d9c0618606b42d2e6b1455a2576cb5cbaf1ea41d79acc734daccf25742a39f8eb1fdbf1197d52a2e7223d10fd4dea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567df2a1bca1c71a1a7d803d3011edf71
SHA154b33b60f0e45e32a09d5459c17afd6218e3a685
SHA256844c1c66098494de0fdf2fd295d7d481f5b34adf9960c2f11f36158e9f14e3c6
SHA512b8aaa948c9251cd0c3b306e241a44198862fba78fe9b1bd125a0e3960722bc85aaa374eb45f5c61c0e5667f456016e9e82b0ca3411dab503bc287bfc89e2c5c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab600070f7c786ed6d6fe9d2c75a874b
SHA13c1853ed39cd31bb75341bf4a8e9a8687d170f30
SHA256663d1500ff63c22f358db62bd9f443802f6d80832fcfb6bce9c7333c6446e1a3
SHA512329100d31ae27b6468511a15715147b31b44e521e9f66b39c40f0d84a057fedce68d8862a1384df4aeddbb6638be877a9cec5647bdce809d5ff1215f11822a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1b699b16534645320577652738dc908
SHA14ac7b78a90a59cea19f24b20a0eca85a670dab45
SHA256e1ac74b6c0767e387b3e797836feade7c0a1621771bf5c9ccd0b1446310befa9
SHA51255aecd3904d8464e10e7009ca8b9a4a1d55b0f19532ed27e7d140e261d13c8b95704b9e62e23d316ef490a2cc5d45d07284ad5ed92ed3184584f231710622066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4448bedb33657a2d0d972cec4689ad9
SHA1c6f8115891d053cd96b4f1e73ac9c20b61753db4
SHA256394b4415f6a0c2491a98adf0233be178487c70c52611295429bc09a2499fcbd1
SHA51251dd4f032efe0f092d884771a0460fe7c7c37b3a9db9d8f5842509f23ee6294bfede7d2e79a3eb82a99d76e4cf65ec8acf6e3b2576af1650920c6b8d02433e32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c25228a2ec9a7783ce3a4cfb218e1e7
SHA1d8e5c12bfea563bcede70f4610a7077e16300f82
SHA256986c034ba6ae47c9e5213b1a4aedaeccea05051691dfee397f0c482597c503e9
SHA5123363a1ce71283d4ea83c8e65f2e7411cfa915ae705ce4a2f4ade1d4e0b66e3f29a3094c51d7b69b3d278724f4917c216403445955ac6e4b450a54aefab3d3424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572d0c2c7b516407c51f11175d1df5a2c
SHA1e53cc5993a74c1ea8c869bf19607b6046259a944
SHA2567ff6830e25256e8bd5f401a5c9221ba9b39bca2e209226c11bfebc155c8619c7
SHA512c7145216a2890da9103da476e29931b61110a93f0e28031b6d56365697a11410c8422e0fa1409bbf2418e3d556528747e43cbe84945de595f8e0565745f65269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5705dfa6ef519044db06f71bb6ff20c44
SHA117e0588b75c8f3d0f3a34cb4915bccb7a557f32c
SHA25648f51952631a9eae5eaf993729b70bbf7c7f87e2486b1805b8a3a5a1a38a7233
SHA51283c44cdf62809839b93d8b879f332e30dfd2f5198ee43159b2bf45f44a0135af3af725b956b4a37031e84260e512c2f3fe68befa97b7c0b44db3a48de549616e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b