Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 12:11
Static task
static1
Behavioral task
behavioral1
Sample
3fc7b3a69259ddb833aa6bf6e17d394b_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3fc7b3a69259ddb833aa6bf6e17d394b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3fc7b3a69259ddb833aa6bf6e17d394b_JaffaCakes118.html
-
Size
57KB
-
MD5
3fc7b3a69259ddb833aa6bf6e17d394b
-
SHA1
8c24c28b8f625dc992e694032924965f3f5e00ed
-
SHA256
bb851a4d655026f172ca7ff144486690ca862390b707c70b33bf5893d51a52bf
-
SHA512
6ddb1625562496b801d6962edc2572b6e3c1d198ad2e00b67e4d25b9a0e4668b0e9642a6ada2cf2890a2d8f797ad3f7a73ef02c81dc62f92652e2ca5af05c4e5
-
SSDEEP
1536:ijEQvK8OPHdyAto2vgyHJv0owbd6zKD6CDK2RVrozcwpDK2RVy:ijnOPHdyP2vgyHJutDK2RVrozcwpDK2m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{42410A51-895C-11EF-8E54-C2CBA339777F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434983354" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90e3b31a691ddb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000f50f96c58374d106f365122932d4c2e43d3b74a07859e221924c163a84f30d9f000000000e8000000002000020000000f3791cd5cb59035b6fb5ff5b7eeec3463f6b38c795235b1886231385fb8aa6e520000000683b3f6cef2e5a745c2ce71d4a24a477106343fdfaa65570e2b99869bb67122440000000f677f7ca9040d314c0b6c4f443c62c1e9cce5bb1622c8fae1021da803c3c2ce76041694506472ec17688e4308063c0e3fc0e75d9d63a95a619d0b7e6e2aa4b3e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1072 iexplore.exe 1072 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1072 wrote to memory of 2744 1072 iexplore.exe 30 PID 1072 wrote to memory of 2744 1072 iexplore.exe 30 PID 1072 wrote to memory of 2744 1072 iexplore.exe 30 PID 1072 wrote to memory of 2744 1072 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3fc7b3a69259ddb833aa6bf6e17d394b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5a697a2fa3952c4a3e8e7848d1a9fafca
SHA18c7639787de40e53808885bb3cb657675aba196b
SHA25635e6b9a80a2aecb61113195430fbb2374c72120552bf1cda0d723f2622905845
SHA51214fb61450d2ab876c12824f773e55ff70b50a3685e8b2a4e4e89808a0960a73e720f0ae530f2202a5474e709973a995cdfb6d0f9d33980dcdfdafbee181a073a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5efcf7bd01558c3269269c8b3ae30139c
SHA11a0a2ff2e34e9ddda71f17a6970ada75905ccb0b
SHA2561c66489a22c85f038e749b81c2f719c2b5bb75c86e833cad725105b3470b444b
SHA512ee358a65fe908e543473ae0917b62b61351d3b9286ff2796a21679a0d5cfd3c75b415adc13649bae3be14b0ca2c558727abd75494c99d9f24f1eb3835a1022c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565a22c5f5e28abce6b20f856aec4d2f7
SHA1141e669efd270150a3ef9780c260c1856fbf47a2
SHA256ffbf4dcb3282a6a0798ae3567be4c32fe8e13a3799f9c052b2de93198a8fb8e1
SHA5120cb9cf67bfec2278cd52c6c7e8605532d1d6928a6530390820569d7b547ea14318527f5872cd04d004b568d71d6fbcde2652f1fb1d0cb2c1efac3eac9f79de7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f5206493a960364eacd2b7d6ea15b12
SHA1bc1f6cffd0182eebc0134672acab1bfa06a4ca3a
SHA25692f544d1ba76aca8a00484e8a6bf652eb979321e5879889625597976058f3085
SHA5123b18c8cd5524e8d8128206a94eb59fe508a7b4a2313d9f039ebc67b948f334a96af6f6d1fb635fa19120d8eec73c0f37d9af4924258374abce4e0bf7392f0aed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5c5c298390ccded03d1d3b22109dec3
SHA177d43e09057f968f1638af4f93cbbea7c1272431
SHA256ede4d37274a1bd7e2f1d19b3a1921049852b2034603072bedf026533a280fa2e
SHA51229aaab1f73e5fb82071e0f66e243b7474001a8b6bd1dffd2b8f2a43407fcd7e2355ed9a244cdffd6064ad552588d9e79490cedc3bb49c628ed5704e729bbe21c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52df327bc0c14c1836057b0a74777f5a1
SHA126322d785e88e7349c3868421aa7f1374b52067d
SHA2569afd6dc76fec918c77cf2eb7b23871cb817b73360fa711dede0106e512cd4d6e
SHA5124a754c5c13b6f1bddae7a5b44f51fb114760a7f2bf4d13912d33dea8a1bc64fb33337efecaecf53bd99c7ce0b46a91f804eb1eacfd116c7d58d52cb3ff668968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db1217ef33423fdd28153f1b4ec6d350
SHA1984213942f4c78e8aa87e9386dcb094f80f17079
SHA256936134332ab9ab9da03b88f7ade8ac36713db48ccf1f1af188bc0a0addde8f19
SHA512b90600d36528e4fc0681f41e8bd800a18841c4d62495e299c61646c20ca0a38e71857d1a1a4ad35e8518b23430bc86b710a9d3e4c326b1cedb33e86197429ea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54204218d3ded24f4c65ceaa71b4d3f7e
SHA187bc1169d0c891596436d51edb50b8bdf09b5161
SHA2567fea6e9cda64a33e1014baa9acf6c9473f1d22501f43c920dbe6bdba3a1d3211
SHA51261f96196e8123b416f15aef40d9bef965c54c1b13969954410d6d056a5d7d6fb845a14de69362e02b20c7928298fa3949b11565115d873478c9e12858a6b1581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caa32ba6356249c38b57d12f3d5fe983
SHA13a77b76d6b83aab1be65d22897a06bd11cf8aa36
SHA256e3a462d54211a1465956dd12da9f8dc5ff4b7a381f21380ec771acbf705e4c5c
SHA5123dbdc39ae876250f8bdfcbb29e5e97777e7bc3922f6e4cdf64ed21bd9e4f6faf49dc062a687468287f8960c5e6dad96b8b8351dc0be43d295ec2a8068010031b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd663b77a5b86c2609b07119ac2e79b1
SHA1fc2d7110fea1f1cf7d80f10234cce4cf59458fe6
SHA25605008993e7204c8bd9656f15f6efc905da5514d0f26cb9dc4541869dc03966e7
SHA5124736c4234f9253dfd38c964475aa6e522af508c5f650a7e0df1842ffa26b238daa04fc353e48e881eeb82c7e82198f37e359b4e86cffe529df87ca734c388efd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5041e45e07c9ba2a1414fc29078ae1166
SHA112ff048a9a03f02c0cddcaee5214b5d6ced5d8f9
SHA2569784440c0bb028b3fad3068629135e5ed5d8ea155e36fd1b9062bffdc4b6482a
SHA512ba751d7697b38783d6ee94a97453d11469f7ee45ba3f5c0da05b343a73631521cdf8b30dc3dabb283b5bbb6bcf46c42d2398068743edb6945ec2a660888c630a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abf85d7da41fcdd7381947b423095cdf
SHA18b8819852823bcf20140362927b89eafe5e97fe7
SHA256a25183db7ba91f187ee3e8bd46fbda7e29459b8e0bfa8ec285563ebcbdaec9c0
SHA51244b0d3fd2230bb56edcdc3525c2fd3e1e61f7a750d7c984ad40718e5f0e844fb061cd53bbc86c483348d5b084bc0f09fadf2a12d8c2a46c2a50f62e3f52b5ce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2b9d1410c8d6762ce35872f9482a73f
SHA19d279e408bf80485b344d0bbb8872df0feccbb48
SHA256dd2a08b14a082385b505e4e43bb3aeb7a84153334b7fa3c77e1906502a898140
SHA5123c5a6d5b412ec9010f7b44a2f562e1565ce147a947ba451e269f2cb519839b9cb66e6895059fb92305b748034177f00cc04c2fb846c82c7576efba64944bfa67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5391b35c9e2fe069e7ea0c24935721bfc
SHA1ba2a1fd47720265be6c347a69504c5f3a0816946
SHA25680b5d4ad39362306ef95d1d59e7c5f3ad826d447c4c20aa65e2ff5eb990f8c48
SHA512ab08117f41202c407c8c24ba859548afc43937589e265d59107c1a547b5fc6ce83e1237e14dc10d65528adb4bb2be85d71d540bccc7de19d0860fbde81429652
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\f[1].txt
Filesize40KB
MD5afd0235a67c8d0e24c26f821c47eb107
SHA11befb1ea6168dabddc48373df11b5b960f76c5ee
SHA2561c2278722dde7fd92192cca3f50a26c2054e78d236b824db62bfed0e76ab337d
SHA512d975e191fd89da2b0f3e39814964c4f725d76644919fb9d685ce85cc51c5feddee4dffddc9ba029029172c8e1bf28ff5683cc067f68368bb200d951391a3790b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b