Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/08/2024, 21:31
Static task
static1
Behavioral task
behavioral1
Sample
81cc04f66d5fc2c2f0426c67a0668825_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
81cc04f66d5fc2c2f0426c67a0668825_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81cc04f66d5fc2c2f0426c67a0668825_JaffaCakes118.html
-
Size
10KB
-
MD5
81cc04f66d5fc2c2f0426c67a0668825
-
SHA1
35c2bc196a09055dbaf45a7ddffba551c9667d25
-
SHA256
501aef94801d408aa47c6e5f0c472b00a540d1c3e21f868a69852f5ade179cea
-
SHA512
25f2edf81e672e629585d80f60596863b144a69ec400060c7402abe10d0fa1fdcec76790fa7cd75ba002e633c97da88180c5fffaf5361b54187dcb1de52cc347
-
SSDEEP
96:uzVs+ux7dILLY1k9o84d12ef7CSTUOGT/kQWX8phDfXBDfnuD/HlVHcEZ7ru7f:csz7dIAYS/TQgChDfXBDWDPPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f052b9385ae4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000003d8cd06adca470d2a2d2c468c12afd5e7050231bf16d0dfe98d1ba2dcc5c0f19000000000e8000000002000020000000569c7c0701f63cc267dff9f8ae5d6cd28c19d87cc72a715c6f1285a9db35672b2000000082a53734dfc014b56c42e61d24135867bd2bc9415a449d0903d4f5db4bd0375140000000083f105ab3701eb8af65297e987188464cd618dc37bfdde3aaecb8af572e178dceb6e88e30a40aaffb6cdf31155a93ec90b2c523dc59dc08f7c35439ec899371 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428709743" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6243C881-504D-11EF-A248-D2C9064578DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1016 iexplore.exe 1016 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1016 wrote to memory of 2104 1016 iexplore.exe 31 PID 1016 wrote to memory of 2104 1016 iexplore.exe 31 PID 1016 wrote to memory of 2104 1016 iexplore.exe 31 PID 1016 wrote to memory of 2104 1016 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81cc04f66d5fc2c2f0426c67a0668825_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1016 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5534eb360dda9fd44f6f91b113d911c07
SHA1b56e0a8a16a070a7e7253b201cebe4adf7f74a9c
SHA256ea6e9cd17b06ab7e3f6846a59fd0a3a04238c68896ef360e8139d2851eee90fd
SHA512afff31ec70a7f296f32f75bbff05329f0754976e9bd229591dba8fa3241d6e05da1963d8a50040aefe160d3a78bc0f9f6c26df5cf224522dbaa530addc9272f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c2076fc425a2570c35d89c5a6fb4e41
SHA107113f4b829b231990df0b195d081d0f184a3957
SHA256ae5816fb31963d43c62eb2c634e9942ce23dd514288dec60271d32b7d64b4144
SHA512d84fc48b222fb21edd7d2ce269be14198d1d60c2f449f89d59550e74c4eaf61a7ecbbb41fa478e2b00f139790d65b2d4275e488c84f91df60428dab8495b1f12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50213c636949a608e3bb520ffa8643b93
SHA14cf350c1a231ffc88a6818c9872e4e1101e99fe1
SHA2567867e3f41f250d151238de5ce9e01404bb627dd24967b744e4c10b9ffe9c49c3
SHA5120773f3089cabd6234250f6dd297bd11429be9f889402005b33b620f2b4dac49a1ebcf7f3e7bae91ec6cb2328f19016afc8b1a94459fd3243515ef82cd2f52b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5163667eba9008b9efcd3ee92af6f1cd6
SHA13e0297af992bfe8d3e6bce228163a4b8905f8360
SHA256f0921bad4a8a9805a7172aa107a21818f44ba0fee12490c8b290f581f81beefc
SHA512658f09b22cd991a1874ad32b29ffd9664d57fffd62b5a14e4732f55d69bc26c7e10b5aec5ee02bb12d96b2e8acf05c680300c825f04c83fed07f380d2f2c75c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abc480a35f7879b870dfd9e9878061d1
SHA131f591a7592d7f4e8f8b90ecc1f5ba9e1fadca7c
SHA256e55e84b1ffa8c5378ece788263b2f227a6e23378877800150dca68c001e1311f
SHA51275bb958d3d8a95ebe216cfc23c5b9f578cd0fe8404f30fa54e11e5be1b04cde6896d2569ab2b7817aed19311fbac3e2149f73effb9dcb5d12968428a4f626620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f94f7a799a26d7e50ee8a239cc40433
SHA1b89607eff08d444f73f636d8e0780046d03542c7
SHA256a6bb0b55767b5156b3ea1eb23e605b84a05e6f23cfe9d6e1a670ef64dde87949
SHA51226b604595748996fac6e2fd0fcac05551ba652e0e4838d42260a253e0350d17a028803d3d17d9c0f41bb4b75eb48d1ed1686f3e971bed4c59cd0d9e4e8ad35ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5897037e4c1b787262b0b202d457acc01
SHA1971acc7551b173cb98309dbc62c0e7a99a2e699b
SHA256875ac1e2033b3d77a11e631da5370ec3f5c642ccc246af4ffe348636646128f7
SHA512ecceda6704ef1a7d0dda5cf3ab7d5cc04a4503ce662eba051520df6de48e77de2587672f780f2a2d2ba965f2f006f464ab713be100bf8efeba671bcc6ee31c92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513668c9e8cd5b6664019623937d46082
SHA128e09d0208173e0fa711899aacc2a730a93fe77e
SHA2569094e8339a8667c84098f392fc85affb7c73e8282bde83f275b948bebd2b0195
SHA5122f7ead81a14e65e7167d9c659aedb5371c72b3d63be5949da69c78680a0f521c35ac3cedc5536dbd72748d534cc0c30c60fbf8194c476bf697f1267438485584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b52c73b7170a065418787aadbfae9696
SHA1382bcc0ce76c574536a8645e45e683be8c4578b3
SHA256bab286865b921d2df2429e77ad01a339d60c33a4d3e499426aaf111226b92a2e
SHA512a20265e62269945617e1cc520bc35ffd153128ad55d6bab3e8ed7f39a27552162160068671417880ef23d3b5f3907b06a455b8b9f18308a467a98e330f5b686b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587b771fb10a75e9f39d3b25e1f4da023
SHA16c28c89be82cccfb439c3719065d8c2e0ac20c0a
SHA256a68179036d2a36fb77e57a81fd965d7b6b29678bbb24122d51d644d0714a05d8
SHA512012a9a7c618730c4e29e8f3ab663a996b75dbbaa03eae78e48fba82d6e583be8b6d1a1121fce693849eb536f774ab1d7c21a35513265470f40880d3dc8e7df6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5636199eaf1612dc2e36c97f0696fb778
SHA12822c7ee530476a4887bf393f60d990e2906dfba
SHA2565e9a13c7b935d13dbab46873a9420c7f96ef168c24ce79a2516a7fa3cbd4bb96
SHA51263de26d71c97ce4ae374e985cd234f2908b8aaeaf3883be2cd7d541ae8c2de65ac09a3c2f3b35069f2b65053f9a66093d00f182146de3a21c7d6b89f4890f783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577a608a872fabaa22411f393cab044d2
SHA18af93166098d786a197f96ed30d65869c33e813b
SHA25650ec7104bd73c870edfd4300d2db5e693b6f041d915df2515573ef715d9a3ab0
SHA5123f0bbb210bd6a384af05971b918e88fc4590f376a5876afeef79805f86cc999c5040d331d66d6ba4f1580d28bea3d9aec0d2b850b06c9b2b15f8e5e4a1f8e233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562e13ea423222f8cfa17d2ea92f86e90
SHA14baaefe85f3c5c71d601ebcae8fadb8388b6c351
SHA2562053550cf0820009b10e596fc9fe771438e92839fde82059ed657beb2991b555
SHA512f6fc1eace676c379371114ed26703d5987abb3df49b11f58bdfec50684b8b53d7e1e0ac7f35336a1e38a0596fcc84e9f84b5aa27b0272a62d7b5558a715bd646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3e2afcc2075ff9d09b8f25b324770f6
SHA132d95a4615e5a4334aecc4bd19bc39b5570556d9
SHA25683af220c10f22ca341aade8ddadb7c41a4a8d29f8a88fdddd7f07178a887f369
SHA512772455532f371c6dfac3463844dc07753c5c14273ec8283e767d265d089c1d3625a4f7e86a9c3138da12e7679729d74a97c990435349d35bc1de1755c797e451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f3f3c82a476dcacf62637e2e9ffe6a2
SHA11df201882ee22d36644fd6314625166803d49872
SHA2567c309a468bf3d28bd540934a01d0274960109ee6be4b2dd6f9bd6881a889a28d
SHA5128318e9858d2130919377719a7ae350f13ec1ef5097ae13082531a5e5021a411aea992da7bee6d49c088669e6133378a3d0a160ab081072327cd0e30dc2492dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519608fd65ffd36395693cc94e418d6d0
SHA1e7bbc17f1871312f2245b0838de773b7e632ba80
SHA256882a8ae61e3a73d98792be8888bb86b6df80b2aaa2a556df5dc43d77ae548195
SHA512039190dd6a2cabc51147b7712e6d7e03a2ebb18b1fed77488a819a1b9965f8b6d40e4a205753f70919011b3a455bdcae4815fbeca8b544e1a7d52cb96fee3cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d07c63062d05172bcd100444c8fdb10f
SHA1f361259151b8b7abc7485fd5146043d3012abce5
SHA25699f32fc47c0f082d40a4f4c563523917cb8ad06bb3a711afbe8f4b60c7231626
SHA51203778a937a141c99007fdd5774b0cebdd359606c26e32f10288d8aa0ebddab99dbc3fa71bd3693aa91200df3bcf74ec9082542cf66b38f516e2986cecf736a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599fedb60c35d3f140bc6ae4770e64684
SHA19fa4863bd6c77ad13e3ffcc12d77487cc74c7c11
SHA2566608e22fd1b6cdbd71ac6e03243f57897cbb111fcb329375dc98dce37d997cec
SHA51282375c7d9c18f279d935036f8b88a4d0ad57d4d92a1d9ec330e7a14e0ab59d702c98d081fc05624c33ff0a5a9257a003370455fac56b4ef59784072f8201aadc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b