Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 01:53
Static task
static1
Behavioral task
behavioral1
Sample
3d2a98ad1165c4941a2319e7fe562de0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3d2a98ad1165c4941a2319e7fe562de0_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3d2a98ad1165c4941a2319e7fe562de0_JaffaCakes118.html
-
Size
139KB
-
MD5
3d2a98ad1165c4941a2319e7fe562de0
-
SHA1
96f52ec7c3cac5797270e46d21335ed8872ce05f
-
SHA256
1cba763c8a5abbfbfa59df2094318ebe0c04c7458744f748fef1e3e5027380d1
-
SHA512
4858ea9cafbba722bb9b3ff5754ead6e8842454005edc27bfdbc7fd51d99b3bbd1b2f2990e139da887419c7364f644f194e3a57d882f29edff71c3672d1bedca
-
SSDEEP
1536:SENqtsUmC+qyI+b0ElxSTyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wd:SEItY0ZTyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0083E661-8906-11EF-AC61-4E0B11BE40FD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434946302" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000a01655979338419a6e7c5e9980313de0ca94262d616df9194bcb36a26e66d2e5000000000e80000000020000200000007099bc950d7912594491371141ea7e5ade9911ecedc321b89487521d0360cbc6200000003565c1dede48fb5a3e897fdf402b6bb08889c43a28313bc9736fdd35b00edf2a400000006b601c5c7e081d1158d0f1bc05207d9e31fca21051c1c633787aa9f178f0e3701871dc01136e8be603cf5fdb4dfb0542748d19448d9520816641b643d701f187 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0dafb16131ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2708 2980 iexplore.exe 30 PID 2980 wrote to memory of 2708 2980 iexplore.exe 30 PID 2980 wrote to memory of 2708 2980 iexplore.exe 30 PID 2980 wrote to memory of 2708 2980 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3d2a98ad1165c4941a2319e7fe562de0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd870f768f584e4f94c48b888e311516
SHA1af8bbce0a12e245583cf226f4ee6b2df33567e19
SHA25637d99949365dff1758c33e3eebffc64f4568df1477462e2fd1164436b4850d7e
SHA51271b59d5ca58787c768779b381405a2692fab398f2e345f70dca304613cc27453f02cfadb6675290ca754b1522dce3f7e5e4ce5e1e8ef8bdf90284bfc063fc639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5725e9f83a88a06db8def5a2520ec22fc
SHA1655a83e5faacfdb2bae546fe3964517f96cbcd3a
SHA2562f5f135f47b42befc8363305c3c2d9b63c0537c82c28a601fb1100be48f9725f
SHA512307b1be9d635f9b49ec4e4f38e60e6095c6e1a711b7c7994858b73041dd2c2527b055e9a247fab38be7ad9c0072b0043a967c56ecf4f12fe3506dfcbe49a3f22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51834047fc92073658d773dc2c57d5123
SHA169b247d0bc88d458ba9b99ca19dec082c10b1888
SHA256e80c408dbfb16d8bf5685fbb239e20ff567856ccad59394e13dbbb0b8000d886
SHA51246b10dab6b79c5141fcaf7f04e033f6702569c0f1355544b2eedc00e7d48defc9ec7141ab5bb955aeff99ef2ea59e64fb7dd5cb100390146c33e64fe10b404fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c803cca5bbbb97005ab7ffec86acd0ac
SHA11b08624a812916d487b73f4f7818c78e6b43d12e
SHA2566d5d36af277133319c4b7e24e5b0c8744cc44487b9ea179c4e7819346f480186
SHA51261ace1bf25f76775aaecb20d8e606e1760460b3462588647210ec3f9103c024fccfa9c21d2d644f84379e691769e5b9035dd1c8d58736561ba8bb7b8aa277fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9951eac42f0e3b0c816d1681f016d9a
SHA13f697706029ef0032ee4b28c9528b932669cfc93
SHA25688f15a585eba9ccf095d119cbe71509b934ec448370c948854dd293b6273a675
SHA51237755fbc3e7a99b384eb30f1b0d2a29061e110f96e32de3630ff0217a847cb8952d8d834772e1487bfb97ca6dc40a08d4fe4438636a5ebf404c00ba3877e48a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f6fc8e25074fb3ef6f2ee40bc9a290e
SHA143ee3786f53d2aaa9396c726a8df44b35125c9ce
SHA25606d1481f148bc9ce7c437e20657c1ced66bedfcbfa9f0d2fa78524255ed7fda0
SHA512c8bf98ce2045e38c25b7b052cdd7f6dd9e797b3b6e2b182e05686dcc59976fa557972243ea869c8dabcf4aadd54ef046841ec54a986ab9c608157cdd2afb0abd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5029e932b4f76c4d52188c421e015e6bc
SHA1f1d94f566d80ced435cfeed864ea87eb40dc9418
SHA25630357e6f3274a094cbb0202464612c8829fe93be19784ce441ed8b721de11528
SHA512b61914c55d072c6ec1323f243bd09a64732b2de2748dae0bf4455b132c4c6bf2b44e49e782a86e0531ea6fb92c5aa255f16e328881151dc2a71651dab00a0565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5154be58fa420da43d02a7ff48efda332
SHA12e1709c16de63dad982ae32d19cc4fb7958b281e
SHA2563f6d41ade775210308f2d3090c9dc59b680fbed693ca5f5b86f16cd71b06c277
SHA51213dd0f1a93138eedef48c99442bf2c024981b72473fa07219480f2ee11dcf9580347eb3cc0e27cce7add60135b6ecba1f4657d1d4868c9d98bf3bc0a957e626d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9752b5c32f828384bd91b821802c44a
SHA112dd1c10e929af03b3a3716a28c6fc798ffadfe5
SHA256dc9fda787f861d30ee7528e0f5a94aeaabed1473acd5b07d2d2858d8d6c6ea85
SHA51223fea9bbe887f5b58bd1197011d3353f89b5bb7ab9e27dcd42ca6a7c467cdc064ca23104f57a3e9042c8749fad0174f1cd3fc90b42bc022ef44dc874ce3b70e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5726c4b77e7f593b966bb9066a12ac43e
SHA1604cfd33b6e1487ef686fb203da65e45f6957528
SHA256076e21c0b5140dd16b31044c1d1b863965ea89de945662edabbe3c12842ee4d7
SHA5122f165732db4b05556d14a44d70c5e8439e37703911298ac25dba589825e14d4e51dbfd88b09c88e4ee643a3b42b8e5c47d8dc4d1a98fbdf3fb4eedae0b9ba533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0d3256d6e7ee252bf9c8e8a189981d4
SHA19492387d0cfcdd3fb9f8fb8634357062318c1d52
SHA256a79a170cd2c30d7eda4efbb98a252a5c66d8efffd53bccec8db0d5accb5a225d
SHA5128d363ffd88ee90c1802fb7cadb34e2e36b068a5096784eace68a3a160a32e53082b3a8812e056fe88238845b0660fac842516c95063777397f97fcfcd9607cb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a11b520f61cf08517799d0bfc8b6bf4d
SHA149984cfe687ed93349ca6829f78a5e08af600ccc
SHA25681cddd997f965fbcd572a865c0c29ad6a03886d5d7e58c3b1850bf33a1729fef
SHA51215213828847ab882e32c78411c9118ea8fcc97762f20a85b0b64550616e35357df1b51a7678956b23c20b809129770ad78178167163414d214263d5b79e14e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5869c81de4eba1acf21c55727c039fa8e
SHA19bbb4672fe5460e046e4e42fe62df93988f3c548
SHA2568b604fdb99dc59157d8352f53d75010833644fd388fd6c00cfd2bef548b4761f
SHA5128fb2e8ecc9e3424b70c628ffb1ab00096797e496686307d4e7dde53c95a0a014811f6f99e05dbe62ce7d932ea4126e9e4e36ffe923fb5df3b00882b0a80893e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5097be4f0322eabcb7a9d3b3901cfa1b1
SHA1896f38c57a1513c29df8fb36dd969edb2b92cc76
SHA256c3f61afd44bb54cb3b0ba6f069202a03e511c77cde3a2f352c94d75af9b74578
SHA5121153cfca6f3d731d1305928c1e57c48685565b78114055f295ecda7ddba2dc98b622356dc7129f2f7d08fa44e56849b8f612a5869ab9e9ee284988cc549f97f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b2a5fb51ba0c68002843bf25c24caea
SHA13c9e49fed900d11a2e51b15d582ddfd8aa153ca2
SHA256e1fa2692518431f76887033fdf6b2929a7795045ccbbeb36172238ab928e0db8
SHA512888b1f28ff370113556d3a8ee17b0dd3aaaedf5f75ef709a90909cc49a9eba8f9bfe89a915256dd5bffd470ecbc4634a194bed01812e33cc984ca88ca3f39c31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51436158e85f9e59fb3bece594fe97b6a
SHA145a30790bc04c667c9336106c35a45d38f0b47f4
SHA25611f5075006256c9076585b5b7f092fb3f89b07a443dce420643152ab9cefebf2
SHA512243e7c4b3d3e83c58b58ecbb3ae415d8dc06af94f5e33653e987550cdff1b4bf18c47b0a9f6f05e9cd76621251adf8e63fd8edc11c96098345b03ba28cc53cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f0a710c92f2dcbb85e5ae2799b05816
SHA1794632e309220e480bef73468202d25c606a44b4
SHA256e927c06924865d3e0d87c5b99ef245053602e494273d23303b364f952e71b4b1
SHA512b218e6083ef62c817a5a0d5babc94dfac9e0888ed3f5c531f1a73da6c0c5bef71db6d486cb665b5d1158c2d559d9d81bbd4ee9a811a8f60c73ec6abbef9347b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5432e28b3e5b6797162f4ad517b45d979
SHA14118ee1e3af401ae60b4774459c3387817cd7423
SHA256b56993050c3f515039b8eea928aeef32abdf75b29cf854dbd03bfd364dd34b3f
SHA51283f8e2c1c9bc71ae10a1ca3644554564e56e763034642687b1f95e9303d6fb6dbf6e94557e3b61dca82dceb85042cb9a021dd4c0698b574a569078fb92a6ab98
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b