Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 01:28
Static task
static1
Behavioral task
behavioral1
Sample
8283e5c4540a36a7c96eff06101b21af_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8283e5c4540a36a7c96eff06101b21af_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
8283e5c4540a36a7c96eff06101b21af_JaffaCakes118.html
-
Size
5KB
-
MD5
8283e5c4540a36a7c96eff06101b21af
-
SHA1
038eb312beec6fc11048046c70f11dad0c4e42b8
-
SHA256
acc29d8f56902e5bcb70559a8fc846ccd2b5b68ded14ce29314be0974c79ef52
-
SHA512
48e7a6c61d32c255166b98a567cfb3816af366fc1668a7c5c8679a5571971b6b7da4e653b5d382b3d0e6980c9ca19bb5b32f3dc3ffc918ee429e341477690e11
-
SSDEEP
96:x3DZaQehqQHHytP/xF3ivPwBCWf1TqLhW6e31aKs+4SnLl7M64pr3R7aAZ47f2:XaQwqgSB/xFqoq9eFgACvoT2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0a99e567be4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428723968" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8063BF21-506E-11EF-A748-EEF6AC92610E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000ca989adf62368905b2d354d342ed5c54aedd71591eaec8d311e02d1a43514926000000000e8000000002000020000000f9b3e78cda0c21cbb3f0066dacb732513fc9c62a3fb4b78117aac99d9aefc133200000000379336a6d637c2afbce2349b277b40fc29a2125d4e7ca42663a06e7a7437c2f40000000b778b5d9168d4b9c3f7cb58a29b4d01adc73bd3e11dad9048de24832e113456ebaff7a7e8c01c192fc9721c70383d0e307623830f05c7cd12ebb52916e9d7dc7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2352 2344 iexplore.exe 30 PID 2344 wrote to memory of 2352 2344 iexplore.exe 30 PID 2344 wrote to memory of 2352 2344 iexplore.exe 30 PID 2344 wrote to memory of 2352 2344 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8283e5c4540a36a7c96eff06101b21af_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b19f92158d13fe52aaac0ac2d80030ab
SHA133a7a5af0d5b0ae438f36189e1118a88c34103f2
SHA25675220e77259be3935dd236a7576601c9f6cc1493fdef52269969d96c82ea31f5
SHA512b4ed25867c9076d92887a226a3c74e62a853b68c0f198c0fbee6b7efdbf80f4401df7e36fff099df4cca4fd7e510b0fc569c6af1b9fdf5d1cb74c53b75c78f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e66b889339c85083e7f021e85fe70ee9
SHA10f6ed9566357f7c94375b84088e19f89577a2b85
SHA25689cbd6aab86c6fa2635790944f0cd18e0a10cb30141b38fc6e6c955607f70db4
SHA512334f64ae3858baabce7e171573a80e69aae3a8d85896acafb7c47dc2552006f3f340d2fb90ad54ab03ec8b8ed4a4f4bff8028800415972a795e45fad804e0b2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b46675a0534627fb5f50d14c63327c72
SHA13349df4a48eefacf0e9b3c52507ea37dbbf2a29b
SHA256b5357350cf794aa99043b1a702ff11e08ac48d22085a5ea1cc05ca5868df1a34
SHA512622ed6a07c07b5be9447cf79ac76415eaddb4901d3b5fa255c21bbb1db83481c5210f06ee13b0fa9cac581d9de1893b1a3d3c93017d67cc503db00ba5d8170d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bb785720ac355f0fedc37177a4599fc
SHA1b78fa0daceb790feafb4ad3bf6cb1f8c89fc3d71
SHA256400975e609788edd81398f000a1b7bec80d436b99bb2220bec66c4dcca829004
SHA512fcd5dc641302019c4aa50b33a24fff214001bb6d0503cd11572d06aa99e30bd4620e5962e15fc26485a12082b4ce22e7408fab672a190f265e14575f38554f67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599e6a93b95eab0cc7ff23074c55914b6
SHA14b92de7f2de0f09d66711f1616e8656cb25af595
SHA2564215c8168fa04d83fd39e705ebfbe3dfec43aa76eb70605321a0eb770733839f
SHA512d8320da13bb2d7a5885ba8c98db0f7adb1804bfa66ce608ab16bf41d3b84bc70ca7648f2cc403f901333f4a15e76e49df99b4e6080c668624f4ff3f2229b716c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a88031134ba92b9d1fcd8f169dd98df6
SHA1eb3133af787046af3725fa69780a7fed11d69a1c
SHA2567c853d503a4ba8c8f5fb55d9bee57a583e7c82409846e9895650549e27e91994
SHA512d2f68d4458c3b6a0f96fd98b759398819212902c5db75692b9fb5abd6e522c264d657f0c02dfdd4c2cd3119780a9199ace61ad31976b2b1e80c2680c66e20ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b05e6df9d9b3c82b71468140e475a00f
SHA18787af93d96eb6adbaace9f18e495feb4c294df2
SHA2560fa723968e30666ca8ee6c68f16211a557652a7cd7ef656b4e6154b7af811ab4
SHA5122aad6d55e29b28aef0cfc8fca36f899bd7e3e0fbf14b4c2e60d329a6856c498f47e8e8625d47b12cbcd827124b7e5d3c0f0f17d8820d4ed1c0739deb57492935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f237cc333e8156a06563fc8971ca2dd
SHA1c10250b491121c3926103f7578e1822b9c17267b
SHA256ba65b1e30f1aecd31663ed28c20c8e459452f8917879a1b96555c55609ceb9fd
SHA512f32b44aca5993af3413c76305e04ca99ca7ccf437e61ed56e65bea07a5f2ecd8dc9dea5e5c5bb987982872850ce24f2c84ab04200ee576c4711ccf04e8432dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7f90905ae6b91f09fc73d7b01d56ab8
SHA186138681f94e28477d3024dfca156d5be6656fbd
SHA256f2caaa9ab9164089d8ebf6ef8f4dfb2a531fe2e28415917197e20983645f1ecd
SHA51280297fe09cf46cab8a6ef9c6a7c8237a4670906feb9810a7057e1ad042f46ee58d71e1e7a65ca6d851dd3a680fb5dcb0968ab263d07b39f6867c13427e8dc41d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b96a742ce3a81110cbd069061a8a9c22
SHA1aa0bc2d06fdb7d3f9d0f4b8b313ae561da51037c
SHA25650b686e700b98ef90968ef0c43f04780917d3eb13866ae07468eed553fc2ae8e
SHA5122bfc4025c7b8811ca2a34dcb1c9462e61bc02e99b223d7009b2893ab8a1a0feae53e67a8c84ccd13a85d51e83f77369afc937e1f059a58689be0ce2d5ea19ee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55085cf05d72e34208a00810e9e147c3e
SHA1028a861b07abe8ae2fa3c4d974739ec2aa14868c
SHA256a65d29db80ce55b2a890113c50476e2b8bab6c22172d7fdfc8022478ea538a17
SHA5120d9a45a5ab4fa4f9dd88743e0e5587aea928ebb69c396d7b3fccce75b34daa5c9e9e63cbcfbe31f836e87d8e2374f58065514571f98d4b62c0caf66b5c932559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0178a6a4af9d487ae95d02e9abdb414
SHA1d020701519d404a451770e9d4ba0d7cd2c7ea676
SHA256c5e603ea131bc9923efab316c73bd21218060cd99d3bd0a491277d59df33068e
SHA512dca02bd3d05658c9796f0c277332a9684923361886044bf16a1fce32b3a941a4fde356c78fcbb552f799f0021d6ef5332c70426f8a82a74e0bd0f7d3f4db0257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eda01c3e5a94c6d693a32b734a2c680
SHA12ff732be036bfa38034daa74b822f183d71d38c2
SHA256a06286f68d4bfa7809db55a3397b293f3821d8a892aee2bc05d8ef3f3dcb0aa8
SHA5124b13b76c31ce27637e14e2b6ab5fdbadcfa5af254622194a08fb2dd6d87659de47afa733637fcea766e3622fb79d7e9ef3930018f384f70975a0e4a377f8ee2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57737af9668b036cd6dfae6a75fbed1ca
SHA1e46a8276ca23c17abb799f44f36a35570286a170
SHA256213c40479d4b738207f4d8c51f9f2aa33e79334c4fb1fb2c75a5c2d4b9c91234
SHA51287a431a3b0696f50b6bce8ff252e15c275b6fc236520eee2fc0db13e8afde88ba4e8d2eea5f4d9fba90c581f73c8a423b8fa5808fc547a9005451b67c634d8e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566d0405f6f0dd406b2cc294a9701980e
SHA11cf042c2c9cb61e5c979d737dacdbdfe9c3d848c
SHA256cc6ae496f3b7df55dcac67b4cbf6db962834d37fb5bb29ce137c15f113850eaa
SHA5120cfc52bbcec254d163d5104bcbfeeea9b47fd4b820c6ebacaae6012e2b8f3a9eb0ffbb6acd04e94103edc8bc22d292d31900950e8382c07cdeeb7954a5cd052b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8e8e9a020f2e0f7620da5cf07578a11
SHA17adea7d3f90d110e0dd24f14aa7d7497bab9df37
SHA2562b02698bf42284f3b7214f36892e4f127b9973df5f276e1c20ec80df8aa0d2fb
SHA512e049a2e88319fd717da252fcac183074f10f94c1e97e2508a98f8c4a21bc92b5faf884cb42aff84f8057213bb1014e8e249c0bf8c4bbbd56c27526fef1a81e71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567435c9c71e83921afb10afaabdc26b6
SHA18307ee4d19bb86c9117a8f1b223074cda9a186b5
SHA2563b89d04dbb50b33220c17cfa10a1c218196144f14dfc80c2087ee9e84afcbda7
SHA512be4a3b2bc18cf5d2c056574187dd017224479752e4338f4f0c6cbaaf1aa667934ad5d65f7638874a2bef2aab7f7e476bdf669ae350decf6770de94c88ae76c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a69f65749bb7bc56aadca371cc274c1a
SHA19464b2a1b05cffd36fcbfb52fd67ca53339ea086
SHA25671e1e34c57d2aa93d9ed1cba8345883d2346444778c84a223149675abdcb6547
SHA5128680a972a2efef2b828d0d125c7476295444b6403e48472e82e09c4822371500cbe72538e4b4b56640b69a4a1296e03caeacff4bc624bf82b7fde11bd5f4478a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589b7fc79ef5fae8dbe3e7b34e3f224e3
SHA176761e136143778ccd531d5836a6fb4b5ab2ba0b
SHA256ae30cf9313b81e82863d016fe5e8122a26e5116cba4a43f82e680b30c4a51872
SHA5128f8e3bd7d6b679eeb485e083b0f70896b6760333eb38083cc28b16aa844337222ff8bc70b8599ff11ee722fc120e173a6315b82cbcb184666470415b28722dc4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b