Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 15:09
Static task
static1
Behavioral task
behavioral1
Sample
408dc26ef5706d1d82a42e0102a7500c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
408dc26ef5706d1d82a42e0102a7500c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
408dc26ef5706d1d82a42e0102a7500c_JaffaCakes118.html
-
Size
2KB
-
MD5
408dc26ef5706d1d82a42e0102a7500c
-
SHA1
ecd7543eb93be14c37daa62afc92f4ae92c63b02
-
SHA256
7f5d9441681689dfafeca5c736ab623fc0f7d642e3d1c1bd5c5704ac08aac2c3
-
SHA512
69d831c5a9a6bd5f4e409bbd69e63ea9ed4b2bc417da1f43414e822b968831113879b86b5232304792eee79ac1d36ac9e82d58bf38e89d6c02ebf435aaaa58d3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434994032" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eece16f334998b4e8ddc30ece0725d4b0000000002000000000010660000000100002000000037fc9e49eba5b37d184e55ac83dd4011ae78d1c78e5da1f17031b69ffe1ba617000000000e800000000200002000000067abf73edfed2d8ff82ad50fea32920594c2af57e639bcdb6ec583beac1d23be20000000279082f56075e6bccd30b1c624183e7307a05fab265b0082ee51bd62ecfbe28240000000712cd46950eb26f6372c320a6eb652b38dd1221e72876553a8681bd0837374039d725480b9fcacf76d0c206feb2afc2839eb5bc77c23da155d30df1af0ef6d01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{21CD0531-8975-11EF-9D33-D6FE44FD4752} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d526f9811ddb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2768 2364 iexplore.exe 30 PID 2364 wrote to memory of 2768 2364 iexplore.exe 30 PID 2364 wrote to memory of 2768 2364 iexplore.exe 30 PID 2364 wrote to memory of 2768 2364 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\408dc26ef5706d1d82a42e0102a7500c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a807c031e931fdba01616ec95e7e6288
SHA1585f4bc133d37428a5d021edddf249b69ae39c0b
SHA2562faa22acee85183e2e56852463ac7704e3ed32ea09074eeb062668d3c1d627d6
SHA5120c953382934cd9cef904ffdf8fdaecfa6fdbf0a8d9be06245842f8778816b9c2e0277e80362f103251b8c74628b26907b536fb356821dd2336a7df7818079b81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596c8b4eb971dfb02af3312c24f372faf
SHA1b18a466034fc337e756c0763a199cdc2508a73db
SHA256ecc20fd48e293c2d7faaca245f4bac686a3b369d0a9b8c4bcf8f380fb27bc810
SHA512741129221bd5a5741cdff278cfab6f2ee138d25bd5b1092e6d3fce323ab23920b922a172f472d4758948940739233ad2baf723a6280eb94272b7ad019cdacf63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5166f26dc0b4d51c8586ed29d5364ea6a
SHA1b3d71a342bb6c3e8b5724cf7a9f6ddf4389b555d
SHA2561b61e09ce28df57b179e3a2ba1e6690bfd3d58b657db063afb29f0e4af3d5aed
SHA5125d5467fe39826b7df202c548e315d86cd1f682d02e2f265430e79d30225e1d8d434cd89f7020e4408221d2607f712fffcc6ab3ee0b31633357463a0f53c38d44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5295c13dd720157a7107c92534bffc65f
SHA135fcf1f088ed69b13cf185085da3d8601603c66c
SHA2568de33581182a5a9fcdf495480f3095b18b91bc34c3c8be5d13bad1be1164027b
SHA5121ff47f0b4eef8aac3b2100b44035135c719598661c6c994549c7dc3945a740c06c26c00ba5301fe852e05800527c6a5452708a111824362fa8a2f77da2aca218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4c42c784259bd45898f1fdf07e14d4c
SHA1281a330bcf6279ac1a6049fbe3a3bce74e1b54f9
SHA2567bbf07ddff1e3a9605f214726c47423ab67ea021c679888dcbe8148d5b7f1944
SHA512dbc8276567d862131bc986a3e74da0dc410c4df1dcee1b75cb52103ffe48c2472b2d15e2667ca52514dce5cac245c67d1291f4ce45d7afd88acb2592a8e9461c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542537fdc2c7c00cd2e71fad395dea7ce
SHA1ab464dbc5a28734756993e396f9c652f39816883
SHA2563936f8b896bf5cd0fa6f81678f7630cd89bb2e71aa63e1323fd9b1503dbdad16
SHA512c46a933f881e57707ae81b7b802e91490613868824b44b5b0ae92067f897ddf19c404393d6e43fe8daec2fd6a47b6ea4670778abdb25b33870c0a3276fd1d261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f6a0df7e8cfc75031b06ce28f7d5f5
SHA13994ffd52a874b1fe47ad5d8f312de3de72c218a
SHA2565be1c5fa426aa46dc5dfcb43c2b19fa531a3e8a5d881f523d44087a7dbccb622
SHA5126b558120acc5895000987e30dccb8a9c2a668aed5b7075217a1d397a1ee58b1641087ad8771a4cc632e653ba04c5b5d0ebc0f5ff77369b16ce49f1c01d285fbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e226e1e52275e9c3d0379c5dcf18014f
SHA115ba7a7635bb9d9a6d22ad822379f3dcb289f8ac
SHA256878934ae6acf7b96675b7b9fb9a2534cfd0d2e5eeaa2f25ba2b18567dd6ab716
SHA512425d92582967631cf7e1b8ba7d217551da27ba6b217a76dba4d584877d9c9ea620c78bb105e6111e0080276c70d941633435317630c0acb63ed97b32727056bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ff2c5faeda1c73cd9b653252b04ac9f
SHA122018016e35f6800b8b774d60506b8f70f190416
SHA256c652cc2c6af2171708314a5665d6152080ceea79d95dd24b2af18b92ac0eaba2
SHA512d8ecc79c6f40f9ae2f89bb2bcbdabdac39068a3898199c3e25f14abb5e0e76d252c3ddea2053d8a896cb8f4b6518f5191c89351b66c937e727b1cc042658224a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5033e1c4ef6ebebc33070815a960f87a9
SHA14edd1d835b2e52cfdf9998b2a4100846b1538a13
SHA2569c9078b776029a5b95f41a7cdd9859240ebd4728dccba260a90d081b81f470dc
SHA51240069cd67dbd70157bc1450034054f0686a63dc52b74114990d1bbbb134fefbc36fee539a2782e9c07c822f7847908cfd2388ecb452e04dfb0033de20c5f9d77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2779e758056d730063a66c31ecac875
SHA18b871ce5a2bb396abea561d4d7425013533c86fc
SHA256897988dd8a7be2e914553e18559a832ffed3c220ea2040c1d40c5bc17f28f803
SHA51220b3f143532bb0fe990950bdaecade5144c80b3dc6e4889b7b78c783fc13ae87e7c6abb5e87f436d73b4c3966c98b8ba2b5bb5df92f9558dec7f18da5093764f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d5437b628188101d01b24869907a373
SHA1612cea12250c77719ddf7d1286810e6020baa213
SHA25699d6e0797e1949e17d1387743f835c0fb76babc9dbf094cc2992ef03a94e6382
SHA5127a8c8a2e10723d5ab9e35b9abf14f01fc36828780c67c792e99122bee52006d1cab2afeb58886f89c556789206c5c385bcee4a615eca9df45a26b01e616a5995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5409e461aa63e1509d0dadb42420be81d
SHA136f511b69a80b1c65c6a68eaeae22824fc933e25
SHA256967a7075d76feb5ab8e72358e3a5801f33c16ffa9d57cef3a7413c02ab24cb9e
SHA5128b32c8bb828d53c89f4a2e0b1489506fe0922faabfd7a318c585c226d2a41c8de5cf139b6b3fd319f2941ea7b7cd78ea0307d2eb5522685490342e8b432c5dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562f628f160baec3885675527fe4c76a5
SHA1e67bdaeec7e177787829de138e025ce1bb828b77
SHA2561dc1ff314afc1ffbc4c30094d1536b33eeafed456aa211d7bbfbe5f40e0139af
SHA5120e0bafef54eeb225a00332ff7d75cb6569567a30292b0ae768a99b64b123be60326aa55044c49648b5d973c95cc560f4f8845fc00a43378097f5fa804fbd9d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d21b2eb1d4e0dfe074ab90de8a8231a
SHA166f81c1b206acea3a8ca7157b02214e15aab967f
SHA256603cb25430d6a966939897773edf0b811996d0b57595768d5ae3ccf7d2070617
SHA5126b822ca8f132524209d87833d428a53081d06cc2b13187d0db0e719294352ad7ac696c57b95211fee4826223993af1343d479edaaf87513c0fc1e13eb5a15f35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dacad4b61b8133f8fe7ccd25fbb813f2
SHA1e9b4c09ad0570f851ffe2040c458379e8f74ccca
SHA256bdbae3b5e81f96fd767017c56c406b3175dece322595cae7d5f081a62df4e38f
SHA512639b2c8ee70907d7e5faa3a0815313c9150a2184b14f123d1d60f267db25dc03adb2183998f519c79b3026103b86f0a13f6436f163a4f2eb4af310baa5ad45f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520caf788910c7dd60c3525f966d47a44
SHA15814753b93a3b535f97e7eec4017281923a74d10
SHA256ef86e4525c548c687d14debbb8a431eea56a6bb21020faf48477b2597e06fbde
SHA512c20df60a33c2a31c6e00a4e33007349b4dc09a48f1766f3070c01940b5e0a1cf7a6eaf26fa1d6d32c39fa3cbe95d17f704cce98a1b9d392ac283fee978fb7643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c234da1b90e1767158765a449c42282
SHA14c456e0b03baee635c413da44bd7645c3213a3be
SHA256e02d039269b4a95d44a7af0675e5e1177b55bc3aa50e7f3b2ac394fd87325d5c
SHA512b3e4e395c41572dba7baaafa8fc385d9319639f448ec539f7e7aece28634fc5ce6b296933e75435d16a893c90dfe8d3a337e277458837e205b7f63a90addc224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf9d776b3173e0ba0a872afe3ab04329
SHA19bcae1cedd73036cb88b4d4a8bc1582d5374a7c3
SHA25623ee5eb42101f57f23848bd8352cf75432256a3c25ca207da6307ad58f6098c6
SHA512e64984e011ab60f374f3a4923b06a1c9026c20186ec505c8ee30e89abd93fbc122cd0e6b50e34feb71c6f1fd286870120a624410dfda135867ae0746fd61d4a7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b