Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 01:53
Static task
static1
Behavioral task
behavioral1
Sample
8297fee06bae5b900390d2c17a9d9a58_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8297fee06bae5b900390d2c17a9d9a58_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
8297fee06bae5b900390d2c17a9d9a58_JaffaCakes118.html
-
Size
120KB
-
MD5
8297fee06bae5b900390d2c17a9d9a58
-
SHA1
5b017195d26215d07ba9cb9e778a570d047b7234
-
SHA256
322caf572ecb3a2149a55405b1d9b7ae48cf21008734d43ff58104e98aa38b5f
-
SHA512
33b4a2f51e238278dd9283ec070ca5e5d58511329400151dcc3683524ee7a1a352a0c7f56d4b1490c01bbde98c3a2e672f40a371a3aafbec683f52c21bc2883e
-
SSDEEP
1536:8msIhXh4E8umz0XrhYQZLe4s0rbsREiHYLqZ7:CIEE8umz0XrdZL7s0rInb7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428725464" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FADE3D91-5071-11EF-A69A-C2666C5B6023} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000005f846b541c8538ca66cc2d4c979eb88d534aa969265f84e1c649e0166d5b6826000000000e8000000002000020000000c287cbc4efedf7d8507962924b38f747a4f3408be88fbd463bfee0705c0b595220000000b806fa36f6c119ff2d407928e1aaff1bf3c323b18dbcd6b5bc05c266b9da142540000000addeec06731f20dd0ae0ffc2ac66a2342552410673b29263a0bb630b50539a639aa0ca16061fa4e88f1c2036d6a086c4bd180922a0ec578db7b928c09c247a51 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0169df07ee4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2144 2072 iexplore.exe 30 PID 2072 wrote to memory of 2144 2072 iexplore.exe 30 PID 2072 wrote to memory of 2144 2072 iexplore.exe 30 PID 2072 wrote to memory of 2144 2072 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8297fee06bae5b900390d2c17a9d9a58_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588a78d5f92c7d1afbb16b932c9fc9c2e
SHA1917ade75f3d258fce375649f70cdb13fc66c5fd7
SHA256fada091ede38d61e6ac5d8015195619486b7d8e9c26826d0994db0d4befc00de
SHA51228ff2d4a42d3f22294221fd6e4e4b2da10ef36d7727b7441e27e0494cd4ebcdbd201a9442d3831597fc1e3c5e40d219c443d58366397d0bf013de0eea42d151c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506dd40031136a0e7f549e15533bdf8ce
SHA1ddb576636e906cd6446bed1bc28ee885a79afde6
SHA2564dbc549bbc5828c315b5d51d5c67e0d3de39411a5c771931259ace0c610e9321
SHA5123c53874b4231fd774047390061cf9bedf142d08d8e1ddf0bb780a7886235d808fba48d9317f78783edc62c425d4312dfa1501ae7cc2384dbc9265a280c45310d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5200add8388f9ab8215e4096f8849d268
SHA15cfff7f3a20d17bae2dd7e98f62a5dffcaea0cb3
SHA2562fd3f2bcfc46caacd8a769dfe5b4168150db81b0f503e5206ed545c914785224
SHA512794f6d63f6993983c4158c445cbad29ea89b5cbe2a3f11bf539d412e6a38b04cd496b38287fa6818fffd2f7dfa15bf42439795c41415ff03e668fe024e05cbc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc4a138c6a0edc32cb4a142f16ea6c5d
SHA16afa671786f7979756ab3b11b4bbaf0b35b1bd0b
SHA2561ab6541395c296856dc8b8fe44eaaa0fea4d17e13183b2bc5f8511458c5f77c5
SHA512e5b1aa545883734e37519f227331c75e6a8f890bea0cb64f7e508477a8c0d848c1a977a3128280c6f88bcdc8aee069943e917b5aadf93a73fa7a952bd8424d9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506e97fdc39bc2efa9474c5fe2c747005
SHA1b3807c3b5771fd2791012340501064bb8c87a82f
SHA2565d1361fb1b3daf73a763325957936aedd4791363e6fe12a46845bd2fdace7707
SHA512c165be4d662069a001db3eb248f9cd049d0cace6a275349d793a66a7d87ddc83e3a2a1b5d3018e8e27bab26270f7108751d062d1b911a430505635c6d1d0b1db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df453034c0d0aff0bfec37c111880d3a
SHA18d8cbe6cd3a0427bc6e0833f07b87c34652670bd
SHA256283402f6091b07c27fd59b26a13dc6a9f71d82fe9bce8dec5b10592a44aa5fe0
SHA512fe43af3f70ac230d654da9f4445e7c18b8b9f08fe30c57d6d198b7ee65c22e35cda344d91e64350cafd14088b067322a76ce7937e39a81c358102e57170d71ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c9acb18af19be319bee4ff4b00bb5ca
SHA12b18e4ae6de8749ce256780dbc7c7a716b2286cc
SHA2562d2adb0fe70864c7b2e1aa913fe9ecfb5535a44fd375f009ece70f2119c5dd44
SHA512617554ad15cc7fec252280111bc111d903074e22e3d6e3e2b8215a7ed03652b350beecd7568a6416b3a1f3c81079566b0304a4603dc21a1d4ed088fd91189c35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9bc95a83b184ca342084dc178ce3381
SHA180124d2524c806fda7973004b9f32a5f391ec2d6
SHA2560bb4b442492adab2b39e44562aa567a166486ed405d6dbeb6868b918fd582762
SHA5122fedb32f4b290c2ad674a43efd73042e48d3b365ec8f1bf3cc87691bd9fd3792d64c044f6a25630e773a4c42f3db667187de9f02cd45756817d3f7c1923dc8ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501745d6c455c2fbd0e86efddd123c057
SHA1e287f1d258c818835fd41e15be2902fb537dff63
SHA2564d95551e377e9beb4459659e965558abf003eec96612309067b36e68616c28e1
SHA51262e9569cc69d7766bb1f1dd4212408228b45c7177f1ec0f6126504fcf920cd8bea5d8dda7276f78e3a5553272d1ede488d910ea94399bbfec3b33b147facb5fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589e28bec1a28e1943b59d00498390882
SHA1849435e6c84670c0fca67f602981c2b3667e791f
SHA256cf66de47c727240fb944b4c0f5f6ea6d9efe92a87f5d68467e5bbfdc0d5272d9
SHA512b48eff4d424be6d85a22313148dcac3b0ef1e1f6e29911effa18e3b803df6b0eec3545bfd866e6d3e799ef78f09f9f5198c40a59686cfac62335e271df51a071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a564e4e9e38491bf416e92b855b15328
SHA14b6f90567045d1741e10c2c114a19d1ee768b439
SHA256c1110f9f6f105695c11f67fce837d782dc4789dca42e94df46d7594f2ad4c15e
SHA512f858861d5c95582c85159e4435fe105b52623e97ee6a0f5957d98bdf87a982085012d370a3ac24caf704bc1251055fd6a0c3aac986de02bc9697629299d94e06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5569f05bd82f7dfee4e6db3591e57ec59
SHA121b58bee08b29d93dac169880c73e1ae722f6cd2
SHA25676820b63c7755f38b9bade2a754c8ae68c7cc99c21d371a3b724c8aa83034947
SHA51223c28a9ec8ee35d3f160c371ac306d95bbcdcc07a566f63b482c77cdeb232bc33e17b3be9899dc9c5ca077c17272fac3ddbced98681845e2410a9fefe67ee7fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536f1030d9fc402c85877f19e9f5b667f
SHA173faeef6acc925f737d14086fbaa4a56597f0884
SHA256476c580d91fb2029b27bd6b3e984a4fc5888371cac7dd49f3cb8da6bbb1b6f2c
SHA51231110e8d8c1eac66f4a952e79d856f14b72a4335606f28644c8d579c66cbb7ffc1846c65f544270d68572e57118fa1d8a1c90e2e0fafebeee52ef543aeb3054d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5807505574c7e164411bf4b3b32db03aa
SHA1f446c3d93ab343c9e1487d7bacb79a806e22c8dc
SHA2569f46bb6e0ebd213d92f4c479f44ae6c3e80bf8758a122fddb3c01fb97bcf15f5
SHA51234a317963ec5ef4d729ceab20739a9435bf367b044655923dd352c3883467e2a170e03fd07d0ae222c28a43962561ff96d140673f7b29a42c64d535d17565722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d88ef302891615545cd9978d6ff3914
SHA17d31f512eb8d7b95cec61c54e2b49fbaca670c11
SHA25697f53c0ee34b06e0b25ebd8f4b27c5d95558cc23179c1094a9d192941df34468
SHA512f3699753c7e5e8333cca171452ac9b8068c298e3634c312ec7e4da184835372adeeeddb8c8e749803ec770b1a03ccbf3f3f75bb3ec63493a68c6146ea66330f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe27dfe36bb4fe7491cf6796965e00fd
SHA1e92b0ec1059d03e6f23bbb762d155c7296f06c41
SHA256e5143a906b245adcbc2ec69510b667fbf9e3ad9cdbcfe267572ab9363d3ccce6
SHA51228ed338c366bc2226300e0a8b30fcca74313015654e1d5ccbcd8762f1f1f52c0822bf2a7d788cdb1933581d7b9d9442789f541b4742bed95a1379e69d13dd6cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e284d47a6e310db79b6fdfe85b9fd13
SHA15c9fbb288b792540ae2e1466c41962a2668a94ea
SHA256a981b904d8a65bfcbc4ed37ec0480a4a8192699164e89ba0d06d2fc66fb27c63
SHA5126b173d9c8456a2dab684fa58f05b295ecd159f051e0594797fe8c96e0ce08d4d1a2a1d7eb8192f305ad110a17b3c113c41a30e13702b378f37639dfb86f77145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdc787c14a1d1694da7352acc4062355
SHA16afa5205b2f67a3079b01c376e5796838e1c5476
SHA256ad81a45064a77656bb04ddd2cb597dcee5c1073ab87515274df6d6537fb37c0e
SHA51213bf4dcc685aeabb484c1e93ee52c090429e54d96ff216d87d76df638f214ea8efe91c7366961cb5165bfbab55bb46c5ea8539e5498b6da11624ed4d1c5904cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ade79652f82e805998732c4158d23f1
SHA14b9da0e40aef66f42643a253e6cc89a50cf45189
SHA256197b3b8b2942d7bfb7dc0aeed250cfe4abf638265fe24aa5b6bf1d8b045701a3
SHA5121b8d816a53c0a63ddc5ff78d32cd130d9a35c42dc3dcb01a75585ac2dda465245b7589f769119048daa5da71ccd9f3c20a821409260d5bee9ba67e40c161ed4c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b