Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 11:36
Static task
static1
Behavioral task
behavioral1
Sample
3f9f5fc6a4a9ae110e0787b62678d58e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f9f5fc6a4a9ae110e0787b62678d58e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3f9f5fc6a4a9ae110e0787b62678d58e_JaffaCakes118.html
-
Size
12KB
-
MD5
3f9f5fc6a4a9ae110e0787b62678d58e
-
SHA1
4fed11ec5a37512aee97b571c29fb2845b9f41ca
-
SHA256
1a6947b52a4c1c101d130643e99842a772520f2cfcb4ea4379d3f105231618df
-
SHA512
c45c947e64050d6bc34672b242a783325c6b029da1f064aefdcf159b949d52d12202bc867dd02203a30a8369cdbd10998a24623f6f07cdc87579ad09ba49d4fc
-
SSDEEP
384:CyiLOwcoalomTosjAigb/0lMz2TdyoxY6xuw:CyiR3fsjAigbslM09xY6xP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434981281" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f018f84a641ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{722F0961-8957-11EF-BC71-EAF933E40231} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000063828e1ec59bf5e0a6671c08b5cc27c651b741647397e7436ab0c30cbc2fc67000000000e8000000002000020000000ce1839089ea37755329b7243f0d9c6ecfe47dea1ebcd8ad8e19e99a35944fa91200000004c537557c19f7ecdd8034f5a834796eb0eebd4b2d315007fef39518620ee98d4400000001dcbc52c074d3d02963c54624d970116872ce7c6298d2923f9b7a0ff944d9987fc43858b9a487e67119740cf0670bde9b34c634a7fe01a1fc2bbef8dee87ea96 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2288 iexplore.exe 2288 iexplore.exe 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2124 2288 iexplore.exe 28 PID 2288 wrote to memory of 2124 2288 iexplore.exe 28 PID 2288 wrote to memory of 2124 2288 iexplore.exe 28 PID 2288 wrote to memory of 2124 2288 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f9f5fc6a4a9ae110e0787b62678d58e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534425f3e6735416541e42f3126829540
SHA174e902c47981e9e57f18422b049da294058ea2bf
SHA256264bcb94f4106120cc2b67f99db3948a19931e548105bb110cc2b6339edb8f6d
SHA51254d9cae9d9042d46c65959344f64e2d523eda5a5ee1b714b152bb4a5ae35d5ac2badd7c716a8973a02934c7955df287fda5687b20b0d4f017a8133e024b34b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d6c64044a10533f9ea84f9231582c05
SHA1603e2dbaf55bb9823de4561be24a585d3cdc98a5
SHA256fb31874c9964064156dcd340c5548683a63ae432169dc3342ca97e8b046f6546
SHA512926a3ad46bf871ec0cf2662ddbed9cd9c5033f64e524595fac56c981599beedd3ff3c87654441b733c3a770820e9e887e5a26521352f7289ed867088d83b986a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578efc539cc127f71a6b87177ffd295eb
SHA17eed063ed606a89591fd8a9217d1dc5bcd7d3e07
SHA256f6a79174536cef7ebe4da0ff83df253327df800bb0b0fca17aa00468631eb990
SHA512c759f60cc4426761e0eaba390150556250da64b035dfd824a4f12a2b8c89e49ae9acaf224268d7f9bd94af65d159cf66557585588235f3d83add180984f10328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52614384e4d24bd11b57c5d6308535e4a
SHA1a241ee69fa1f307219c1c233e8144c24eeba0e6e
SHA2566d66c3611e834d9fa1e8f385ead0b963a2041d08d0e2cfbd1b93600e0b20abe6
SHA5125a2699a791117814873a2483bf19e30b876372511b2ba5286c5df34665233300989dd2d9c0a8e7af627b151c241554e68e6470aecdf3f85d0733942cd5f5d68c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560289bff48180cb8f63554927603f1e5
SHA1951b0f48faf89214c0225ee8dd6119831e8afc11
SHA2561bad19e6ebc148ecc9510837273ef8148b4f653e9d8bc8ace90e5df565e21ae8
SHA512ebec33e7a61091d24277652ec25ddca3f9ac01935bace92082c78e9a8a40ee3acf4cd243d761d8dcf792b6d94029ecf2628ea0cff4f762477121839df461fb06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519e9466bc0ba90c9aa1bb7adf305387b
SHA1d5c909c988836e01a770ac8bbc49adf09d676d27
SHA25657e654f6c690a6c12a6452b0dcbf12460005652080ee7f2b047739f589ce7e49
SHA512c9c2414647173bbd43f15c161719d8183feb63636fe936c8f5daee07f6f3a42692046cd51ca48c47a575d38086a37e4cba9cc11eb5be27b5691b371a192dba31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f52719c79683dda5fbd1b138b89faa2a
SHA12e9f372107468a378943422fef8701c557b39791
SHA256d5a02e9671bcf96d6691c836dfe3982d9f34c194c2bb70714ecab6d04e290ba0
SHA512ac5a3f175787b4afb92529a3e878ab96bea3638574ea3308b7c3941e68e429a9297ef879cceca618173976fd72df472273b2226e12de2b55148b4bada504bba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5760c7cb0598bc2331f5e419c7dbea9db
SHA10cfecf522058a9e4367224499df3fb4d6f57fcb9
SHA256ba88b08006e61e16edc7702d470b6c2bb129c46fdb0aac70fbc6098a8dcfcf7a
SHA5121b7bd730bf8d7e44c57edebae1d5fb541d2038f3f12c5ca1095d9f347849f3fc115df0f9ae67219aced5cef6e59380f1595dc6ce4e2c2064eea8dfef47c79667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aac2b556771a12f681c8b7a3144ac99
SHA14e7cecf18b96a8e919e42d1e835b40e0ee559140
SHA256b4cf35a9b62dea67ba21f36103e57f3d9fce976bc080787720156699c812b7dc
SHA512725d00fc2461cf09d70328f26ba37eb495971347939fe5c99203e743e40c3ac4be93802632d7cefe0a109d18a969d8f0a74ff4c8bdc3c8feb426a6c1dc12b987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a439a7cc7b3f2cdd924dd1e477f2d63f
SHA179a4ea736d167b8459ee7b4a3cd1d9f6af37e8c7
SHA25647fe89622a3220a567bbc6c98a32b940922223e3a987aa92b693b4f6769cb2e0
SHA51258a08976cbf64dec1e99641144b13404bf096e1c4704f3c53df0d9f93aa7c526f75b66d4333afe420e8d83f0d37306454c47c8f92b9020cdc3a5b86b08f984f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57967816fada3148fa77d449b7e741766
SHA1e1f482ceede54ed49bcb755e75fd4f9215118e76
SHA256742ba9a282d01726621f2c37297d9c6416d9ce47160e13c0761d307d52cfcc8c
SHA51233f544b2a9fd85970254f32897fb118c6d954c364e4e06687d232cec79c672ea86f272c9da17ba06b59d558d17ddcc308d72106b701c2ac2bc80a8eb12d61c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb6227affaae9c2f8fc0830175023ac
SHA1dfc74b3b62ec4216a22805cc8cf9f3872969ea80
SHA256ee9dce2d12af58322644a25d7fe3b7f5fe30a9ca949ce4f62d809119a53fc592
SHA5125d7e866160a629bbb4165515c4cd649227610658d906b359c1493718e3c6b96fe2a4ebf18f72b98d7197ddedad7f76cf4a12d7592e2fc1ae1f245e428fa42873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e63ac6195e1b00451ebf8acf54031399
SHA1fc0ef33586487710313e68fe2bbbeddaaa1ef7f1
SHA256444a19d03eb39854ada8b135308f43a78e4feafd3d5d2c9ff55dfe57e4a97f88
SHA51284d29b0b0c8bfdd872902dba40e67a053440c6efb490c86b12bee94e3f1850e6b973e4fca725b07b79eb8c593482dfebab72f7625ab62b98329a2c3c62961260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abb6aa77b33b0b5f4621e74d1f66f480
SHA142471a473a474754ef54ec8d74991e1c2edd9cbe
SHA256c1acd0c6dd00e03abc9490f1afcaf59a68d002887dda1b2507b5ff165e1a98d9
SHA512468f0a0545c1237c656ee95ae00c14419d065f3ccc64107d1947d125cca2393ae0e18f5cf2bf797589cf8192efd2d630f007b9d1596c7202a759ccd4a44b1630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1fee49dee7706917168fd191651680c
SHA1f746f9f316bb3154fc4e844a3c526f40cf1ae54e
SHA2568c4625dd7525a522c3a068f987587a97acf5e7bbfa6b8731da7b00ac7ae14611
SHA51288ccd640a2e450425ae404fe5f5ff4981e0b07c9baa7d855fde9e7f1797f0bab7e0e643b9f8976fdf1d95324e3c4b4bb35c6d94bbc6081ef81ef596273cb3acc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5149083b8ae6186e2750fdd30b1685288
SHA190a136ed663e04c9a2a191863fb164b54301a564
SHA25646458c69dbcb97bb50f9c082ff9ad6ba50d654ff358e6b93185973dc9f339391
SHA5129917b91499b1f267df694eeef8235743819279a41e1c20286c6802e73c287bb4cc19ae995ec1a5392db8a37ad8d360501bee3d17e4cdfc38e43e4b8e9ba36a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599f88f0b3287f8c62336fdf85f0c0611
SHA1c735ef22cbf4b262d8d697c8b8ad767f305f87e2
SHA25628860855b1112d063ddd48239af7a8eb14316ce7281edc0a449934bf98c76172
SHA512ef822839a1ec64d14d833f620049e353ebb6f053f9383271ce454b86caedf13238bd48d01ca2ed5c47cc67a3c115d0245211f23d4743692cd84f01dcbfad2d7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536972ef38d4a6aee53749f66e0c2496c
SHA1edeed31bbea9b5fb17d89f3da0271431fbf9c611
SHA2564bcd09aaa9836856e38c4796fd74941df163b98d3fb42727fa38dd42cd61db2e
SHA5123e611435058435795c6d73c4c053e704e06e03f4cbb20cd49ccea3da73664dff64d3d9b7175423e160b4e3449cd8b298fda44498c56276001d78cb15baf04aa1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b