Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
82783e847dcb8ba1e78b9764cfbd105d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
82783e847dcb8ba1e78b9764cfbd105d_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
82783e847dcb8ba1e78b9764cfbd105d_JaffaCakes118.html
-
Size
22KB
-
MD5
82783e847dcb8ba1e78b9764cfbd105d
-
SHA1
ce640cd36e0f29d4b929dde0762f7133075a003a
-
SHA256
497cc5123198e013cf217e2d99a6464fa2a84aabc2a801bec739c6891426acbf
-
SHA512
840c4eed222e92753ff2c235c37487b4350a6f22a5e69fdf591681d2e21804c80421170be4b82c60ed77cc27a863c341265117e613d22b5d1cf9960a3e2bdc2f
-
SSDEEP
384:5kj6wX9uOBaZ2h58+J4JBJtcdXk1e35S3xrq+aXQyry57kynYPHR:ijOOBaZ2Diwks3YlaXfry577Y5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F213501-506C-11EF-8FFE-7A3ECDA2562B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428723080" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000cc1ac45a4a64e58399b385e99e30b44e56ca7aa59ea7d41717578402e005c010000000000e8000000002000020000000dbb6ba27558ba7c3f283ed26012c3ea6cbec67a1fcd5518b6a2eac15b553da2c20000000efcda7acf9e0c4136f0c5b933553e51569f8a799266c4519a3bb2c79caca46404000000075bbc345c2523597c2b29ea3950aa60acc71d27a393d2aab9fd5125f16128cda1150c7af0fb990635f945cb68e8a402f8ea0ec810f4d449c1bd96cc475de4d16 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20a39b4379e4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2832 2120 iexplore.exe 31 PID 2120 wrote to memory of 2832 2120 iexplore.exe 31 PID 2120 wrote to memory of 2832 2120 iexplore.exe 31 PID 2120 wrote to memory of 2832 2120 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\82783e847dcb8ba1e78b9764cfbd105d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55b754bcdd252a9ad09f1362a6db2d26f
SHA1ece56db55d42d8cf730d6cbd01c42760cba595b6
SHA256511c364b8f506ff501e18e629e9b8bba39897f3b281d3fccfcae2ffc4bd03af4
SHA512300621fac25d75a745c5ea79989301cc85d9a7585a84adc013d8f30bb000645726fbb5414c3a830a3c8d53b955de51f4764468b96c9ab87dea8003447b80a95c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59c851502667ca39896650c6a251d50f2
SHA17d0ef0dfd7fbcc1bab6a4a387d156a5cc80dd952
SHA256b958921452a8ed1665a4e532c0112861b456eb2f7079519685f5e4fcb85a5953
SHA5127300474c11d9be2d1992f87d16c5c5b860736c15d5a9d00925e18dc1fb0b4de04bbb111c85c5c162eeb58bc222889ce15489bad1a7d8715437684bb538eea560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD562f09be8ceaa731e644c3f8e7f3ff0ac
SHA1171f77af2843cdbbeb0c60838a11e47a6e9fa501
SHA2564ec71e5b6f17e2cb7c4372e77749300ae3ad2a53ab81c6d1294f8cf29c3dc9bc
SHA512cf9bd4132ca30962ef4c157b62dda008cce576fc6a4b445ca98341b1bb4b1f8622c7d5eba7f8d61b27d8d7b3f26ed515dfe606b5507c72569a203dc3bd762725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5213d697900828aac2e877210d9341c65
SHA15e2c25d17276a5d595eb775ffb15a13ba3c49842
SHA25616963ba6b173216320faa8e3e753b73389aa68018d563779620b2c57f6e4dc2c
SHA512d67732e39ae3f0ba49af7b7b796a43a0b9ff88d58bb4dce88334b0d15c0c2817f235d54ce161796c8e94daccdd562411c0829dc986c4d0ba00907b4028970f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5495e360889f3499f1b49ea19fb0621aa
SHA1cf15c4013a47bef2c80b30176b74ac9cad2cbbac
SHA2567dea9f11b9e80176aeb84265ed2e3ff704a6967ee820c6f7ed73904debc55b04
SHA512cc04b441eac1c33026cb96564c547a364fba8b02b95330565e7b98bd9f25af702296851a3055ea4a3f052daae1727fa35c6238be51f77590408cb013ee4b1f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ba8ff5a8d88c840d98ee41dd32ccb3e5
SHA1c34c553f7f3ee1fcc1d7b9dfc809ad9d2c0db734
SHA256420ba093e264fddcbcef99cf979adf05cb26b0594f5f18d03b31b67c3488e257
SHA512e5545602cc9cbe3a5bcfcdcf1e09f1fffec9fede5e3dcca8327ec99d8dc001fee5f2854e47c8c2b26484b42a73e6ec0673c0661675ee4d502975fa0da530c3d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c0e7d8a0197ee73a916a707ef1cd6025
SHA1096ec306a5bddd02a6f3753d4d2cbb31266541a8
SHA2560bda0fda34fbbb144491d21f93ca0044dbd4baf1e75bc685555afb9293fa7072
SHA51284a9083eed5b083c8b651adf25204caf39ffe167bc9f5152d48f6ab2d354737e6398dbf0ecc4ffd4f1e20e1c3948c6c96b43aac270df3c5e5bed85b275a1dc98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b072c13be12ab9141037b802fd3b1050
SHA1cadb43bbd25bad8fc429cf797474214b39f38446
SHA256f6281ea224641d6e2146c0d4d561014dc7efdc34d6da170e185cb4dec251555d
SHA512db68ed5964576ff6215cbc635407a3b7afaec2d89dccb793ce831ba854e5ff4303deb7df4c1b710aba0bae73c10df5616cdf3ed31cfa3bb6bcc719f30af984f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c3e3219fe7a1446c3a899ace8788d646
SHA1b1c06589844596db59ca8cc55d22bb4d86df031e
SHA256cea396f231b889df1ae14e56f8349c97c9a43fcce3d72d7a6cd4175e7c5100fc
SHA5128ec75a28ebe55d73910ce79aca18241f40d147dfd7a60d63b486a7fc84bf90f6fad4a1e215a2cc6003b47839760ee14105626ae0c8cba37f0fa542a021176ec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59a8f70f449c89e3f13354d0bba2f9e9b
SHA12ea82c04c1058aaf1d2f706034bd0597437d9f6f
SHA2568ecd0c0ab352c1e801ae2d889acbfac4799f372e17a751b98cbddb26872750b7
SHA5129bace2a6980f19e5c444cbe48398a4d96ca1a8e6b9eab144ad9741a15cdeb2822ed3aa43f93347c2fa1dcebad43751ead2943024dc4e58b2cbefa2af1db3e131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dc6ea80127979c32dc7c22e507078df3
SHA17e728620693f7ad140e892e5aff5db36e0ad4666
SHA256c889b89b53f1e3e1952920c761ba2b589cb6f2a6bbcfae253e6a4e40a8c3e058
SHA512636f7123e3da679fd69748f3ad6029dca2e9686df87ea32eb150b0db7f1d1f0267cdcf399d87173d9c2f39f62716a9f599358377fec5570ac1ea440bb8665a1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD507f6c234aa762e9085428813f9e3cccc
SHA171e2edb14805b1c4c9f6249a4b738c9dc3d902b6
SHA2562d077d4313983cdd46a4359bc89a55814baa9e8ea034c2a03e8fba13d4d541a5
SHA512ee43755e03f51889d740529997d912c4dc508d6dfe78e113d020ef6bda8a35387e13753f95544c1426e24d924a2c4282acb5bb9a6d74504c7bf00ef9c8c6c42e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD598c4f7db4a3171a357cc88f1f077596e
SHA1f3a6a6bf2d9a01eabbed065df0daa4f91db8b81c
SHA25696b7c398a85ae3af44368df1ca0e31a3edbac7f3572eab72d011f719be7c6fd1
SHA512b478dcc69b2008f394cf154ce4eaebf83731553df4a192af4fb74ad37ab5bc24b99953dce1c29a750776440906fd18d8cd737d73c60965a2f00661fe75c32b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD584af491fb79e4cba941b8539e26fdb49
SHA1685dd9bd92403aee2140c3b5b461c2088c41a31a
SHA2561fe55b8e255a5952a4e10e11b954b0a847a5df153f6daf6683067c19065fbe13
SHA5127af99985891903c71f90d027850c053c99b4bb70ad01b7f5ff8ce9dcbc9c6c87966fb2e06b90981d2760547d1ba055fa44204577af4bb578a92584c8479c678a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e59e71f7233f67ef7fa4764d35e126bb
SHA1a76a443ac51ae201f4e91c453a23d4b390b838b2
SHA2569b17fe46743f144de35924484b7ae4c4290ec7baeafc38bc83d471d9d7dfd649
SHA5127032eed16a9b48b6a013199de57100e370c08b95b9bc823095468e42708fdbc7fe9014040ec4f76b4dfc00d6e50953ca0cd2e864968aa4f14c6c527aab485b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5019c70e732acd5b5c91743f83035a1e7
SHA116049c25f38e29f42e094bc3037aaf5cdfefea91
SHA2565ed220ceac1f6b57f406031b5dff0663c53348e83b173f6defc2019f1c20ee1c
SHA5123eefcf6aa887c97bec601d135e865841ce206366edc97beae76c1eca6df6b55f66bd03362f95d16537518238e7b35016fd986efe79f5363faaa8dbd029d26578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f7857eacf8f3de47d2d03c62af4e2257
SHA1b5431fe4aa89e43b669f0c33cc7cf5d64afea6d6
SHA256d125aad8442c89f79996a75fad83142f2648fd43650a08c7f9ff2d825dfec514
SHA51289b47f599506daa816a8234ca877f9ac7647bfc1fe81c16d57bda916536b6ce90b2e857b872cef2fb4208ba09a6bd56f5958fece9bd590a60914cf6bc6375d56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58b57ac4587cace8afb8015f9152adc0e
SHA1900e4e75b8c71ae74e71eb528a576decbb06da65
SHA2565cc4f000feec2d9908c584be8401532d02d700d4de30d7e7dd5c09928fe5df2c
SHA512db07f6c0403de89f1431ea8f772769167ee2b66fecc0b410371825a95ca2ba81efa94c192548fc39c6ec66890355fcfda44d4b49e98417edf750e7b4bd6a7c5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56072d216cbc716a72deeb3ef64349aa3
SHA1607b27c3711dd5cec4ab5431586e88c27a707669
SHA256240214760a8ec6c0f150a9da98a9e01da0457228db6968c951b640ca83d57538
SHA51284cf6b7d4b19d381cffc9e4d7ab0515597ed1ece5ae911417849e1ebf89a52bdf259bb545f2f23814447ef5b022c3202e3dc31eb1953e8ebff78708790517289
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b