Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 09:13
Static task
static1
Behavioral task
behavioral1
Sample
3f019d25119b5626177d1d25b550ba72_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f019d25119b5626177d1d25b550ba72_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3f019d25119b5626177d1d25b550ba72_JaffaCakes118.html
-
Size
13KB
-
MD5
3f019d25119b5626177d1d25b550ba72
-
SHA1
34b2e67b5c55709b18437bd03a403056426e1ade
-
SHA256
62f85418652f1c191b1d07dc4394fa28b6714eb514a7b723069b88c527907b14
-
SHA512
ab4063b7e0e0b3926d966aed61606dbf2a5f7d97636148b429da57d7da5512fdcaa076481112ac2952f3dfd31ce711750440c42352cdc1f2c6c3ab24f1f98208
-
SSDEEP
192:csz7xHAYS/A6E9EoHsyy16tbclEePHb76f:cCHAY8A6EjN4ESHS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000ba676b92836bba39376a5f54446a30895e5ce7ba41d46743fcd92f7ce9251d64000000000e8000000002000020000000db00fccc098d498d3e881671fe4462ee7107dbbfddc575d53bd773959b5e599d200000004424c0a9d6d6a8096a616a21c3cefcb3f7c2098f5ccdd0f5cd7d37e975162ba3400000003d58224f2187901296cf5cbb781dead6424c15a90dd60f892f531e4cff6774eeb7aba136811e724bd65a5c7a2a7caf5a7cfc45ab7dc7e5035061e8c4ad968b5a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434972679" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6B0320E1-8943-11EF-83AF-F2DF7204BD4F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30c9ef3f501ddb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2664 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2664 iexplore.exe 2664 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2760 2664 iexplore.exe 31 PID 2664 wrote to memory of 2760 2664 iexplore.exe 31 PID 2664 wrote to memory of 2760 2664 iexplore.exe 31 PID 2664 wrote to memory of 2760 2664 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f019d25119b5626177d1d25b550ba72_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539e3098826ef73b47f8ebca3802cae6c
SHA161bd142bd9c0ebce358831eeb2fed64854264741
SHA25652878da1932b584d471789cbda9ff0ef8b41dcca3bde05f6eb914999e9b7f2b8
SHA5121d09a00a59abe80624c6534243869d7902cd7923ac739b1dac6ec5caf79e8d78cae28a650b344b3540bf87ba1ad74d66e310886cacac7dadc241ec7399c62674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532ab11bc599835ea867987ebb30bd177
SHA19d0a37312c33c07656a3d5c0cabe9afb3d332d3a
SHA256bb62f94921f4c07d6278efeb9771b29610699ecba8aa5672c17b8a8f9b145155
SHA512637984eae1eff114f9f5fedd6d5aeb69a44d8ebb01d3b0aff958568c29945545080e995161e9c5d4c288ddf5fdf1b67355c413d9a9b263b44ea521c3716f53ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a971493505cd48a023ed90820f57c536
SHA104037c6886bd76597ad0a8dd859c2063eabc0823
SHA256e6bd744391db22aaafc4f785abf9cf15e1479958e4f56ace786b840a1fb442a1
SHA51211db0a683569449e8fbfae66c4fe76e9491a36f878223f860c396226bddf05638e3d961a31d91e5d5d696bd7e790f7a31ad454a90bcc579ab72d5e826b5044fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fa7a8a465c6a08771600d3d7745c86d
SHA15f546d0aa3d6f2108822022e7eec8de08cca0f4c
SHA256240449841e4860228fa3f5814732422ef767c0c49e5373876f856d70a1827121
SHA51257b8d62f9cff10b3389d5d70c73d0da8a329b24c0426fd5321073f5032e6477aea52e344c83780b9172bc714e59792240d8702cf5e8925ab962146c5edd4c2f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5057ab9b571cc593920d876932f38d975
SHA10d50c2a774e9d14eb8f7950789eb50346d22c402
SHA256500d8de2d2a25106dff68f3d493fc6c25a2d49c5380b37df31e2df3c1df5a293
SHA5127cf69b3c4760c12a153b511a6a27d477f34e5bbfafd47cf65227cede6dc5afdd87c19fd01e8471c611fa37b83a7c21a45691508057931e263f65d5abbed895c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59567cd5ef289ac3909119de324e77131
SHA1f0cb2363a133482a03e4ecb7d1a002844ac0d0bd
SHA256e865fa7bad95345221edcce56c0e7db0129b55b1547c28a159b689fc89bdd637
SHA512776fd10f354a527c6f8f05dc4b26ac59f0ab215e761ed79f517025e20b92fd2a9e7664fc5f46194db5d1efc123566bc07e8cd981b6486d43e46f1f13e43ba182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5036b4dcc26bf314ab8171a7d7ae10ecf
SHA13e037e03bbbd32cc0607e4085ee899e53a9ac45b
SHA256f89a35a5edfea9ed8f437d6bdce00fa756e5de54c32098cdc263f997389f6f37
SHA512fccec9f93c00915dc70ed7f44df45c25e03fe43d4a60d0fbbc7640e135028348818344fdb75005f6c5ecce6dc9663c93e91cdb25c110e2e45971c6ccfaa86711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ab6b5a67eb9732b979b45629740c854
SHA15a8631aedd486b7ba802c75308dd6e87bed0a065
SHA256e5e7c39f2b0e1e5df4b530aca143d8e46d86eba98a5fd01409c26296eb47c1ed
SHA512128a389cf5b2d31c6d121827f8f523aa03b4630c0de96941efb5b6ab65d0b879b9d14958f615460d0b011f96abd53d8f5669d5f0566591cacf02215c2316129e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d2e5b083c77d511b2df1cb724f3c319
SHA1778e73c3664392da880224b75ef91b7b654c689e
SHA25603dfc46a4496f445b0a3c67cd8a0bfa20918f3e3c1bde1e326fe1f4c563f60e3
SHA5120ec32750cb8dfd8d15fc15d2bc54a582faae13ae072371aadac864f6a2618c6f1bf19a150dd143932ce552a51424a5acba5ac408f12826da1189e400cd62cc31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e1752346772379aa91aacbc4b07b98d
SHA1b4bd4351d4e037e85ecefe9d72a5b1cc390aaac9
SHA256199c78940e72006ace8acf40537b01f4e3d4e1a8fdd06c9abc19686b82725217
SHA51242bc84478e46320e6137057c6ee3ee2e68ba3d5f9c7e8de9aed5907e14bbd8ca2eb0719e0279510951bff6556f010339f65f62ddba121f8025132963022fed18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9a4bf04856aa09e87cc6351e278453f
SHA1239dded2804f33ecf645f20dcfa1e63beaeadc29
SHA256829102c93a9c71736849ed522bb945f43757bbe4b9cbc134afa3ea70042c5d56
SHA5121b186cc1147cd166ce490af56b941109eed7cb2f52a780b44c2ab4ab49469f7ae300c670939aa1fd13046d23016a56edd4449c41afc6bef2f06091cb8a7a33db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575bd3d34f5fa43f8a242b44ea3d79a72
SHA14e6ac3f42464b2fcc86964b2d902d87001bc9095
SHA25689bf1ffc8e12ec567f3380c67f5ea0e3b183a7356949f8737897c10160dd4d7d
SHA5124260dd7de63f0716abf6992f160b3514be69980c6c0767ab5c632924d766054363400fc42486b73594c3f6bdb8668e05302893ad7c29b4ea3603a7c4910f1695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e96540a23c06c7354efbf5c27f48b16
SHA11e6092dd50edbb10e7379dd3c657eb266e56e142
SHA25673b43eeb48f81ae6c42bf14849a9bf611a89e6b31fd145f05242da9ee58237df
SHA51274d3badc292199c6e231b3d2781dd7e06db6591c0a1f12302c529451656c48f5096ed9245e4e62e45fa9d88830c3c1ee19f1e5de8aac304dc921955daa6f4421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5672f0c702a5541c9148620d5d1033d2a
SHA1bd026d9fe39024b611b16dbed24250aad62368cc
SHA256a00f1f7ff7f2a51f4dbf86a97f0a4e22ce2e8a0c10b9274ad48acf554479f678
SHA51243c4149b203fd9e0b0a33b66f07aadbf4714237aef5fe051cd0836fd6369bed31d5b06cf490da9b8bd9aca7ff47f2eb6301f53e13b53c58792af6b2240e519db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5209da0e8b02cc0a31529254aa79a4834
SHA16ddd279d6b5d1e640c4716457eae0b3f3f470590
SHA2568fb9625b54cd00e8258cc66be0165334d70fca4c8b031584ca5309d4d5c9cfb1
SHA5123c9d5a3d3b0ddcc80fe1b7660e91d6f655f519a69e27b27292051b36b13f3082bf1a86d0063a611336e26b6331d506060c95857bcaeee43a0674ecb7366cad03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592ec6a947d28d3946291e5dffeb0bb00
SHA154c3cbeb4a7cb0230efac4704a92effd6fcc4072
SHA25664827c1e00a4d02803f3c77838e57f53ca02722c5c0c8bf67a8b070d61e79e61
SHA51225929de5ad6d75f4506602327fcba39a599dcf81d381c9639ef92751e4d61f2c214e49337c31e2b57e0f412cbcf60839c53aad316aa7df3019bf13a9260f5348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c840513784896e5b415cf594ae392836
SHA10f2ebe4ead4560457fb53e115093c3dd0463c976
SHA2569fc052f2dbc13100e9bc020abf37640c758de756e1d1ae1c39c7db439f197c97
SHA512cda62cd80be2585112c90a91fa77bc4ab1fe5f09d99aa0b2f5ac1649cdd5f29a5dad036b92ffa553074d4508c2bf9a453493879705f5652a6d3001083dcfb589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cd0161aa5c2c2f446d9077473374688
SHA16445767943f63899c95db4fff915b41f3ba1fc9b
SHA2565445c55e01522dab54ec32143b7687a959a9bc51211db4ba90559be8a305b860
SHA5122d57da49a6b706087eeabcb5707f4de1991d4646fa891cd67be1d2f70277b5d03ee1f07411b1d28090f66b2c8f09c385efd0c807ba6be71f0726a5d357422b7b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b