Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 04:32
Static task
static1
Behavioral task
behavioral1
Sample
830be3ec2ff011ff7cda1e6e9e0b26a3_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
830be3ec2ff011ff7cda1e6e9e0b26a3_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
830be3ec2ff011ff7cda1e6e9e0b26a3_JaffaCakes118.html
-
Size
57KB
-
MD5
830be3ec2ff011ff7cda1e6e9e0b26a3
-
SHA1
2578968a927673fd56b26d62fccba0ed331042c9
-
SHA256
919475fbd348db06d84de9a29067569ac01fcb481e041466641a750fcba3a449
-
SHA512
c3f76405f55f302d44ac634add0a115322b0bccaf5e071d4c0c360b533090f3cef37cbd70ad507ec2c9b92dafc653fc9e37b72e5640d54be9242ea99ab04dc87
-
SSDEEP
768:SlStjmqGYm52+qGb2wQzRSOkmKJZH2JaGRXamidaGnEmehH2csw:SlSRmz1zb2wQzRxkFZWJRigGEFhH2csw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000008e9e468914db2838a22db3f8916337dacbf20f651c5fa193b0669e8f6b03c24e000000000e8000000002000020000000250ddd89d6b37f7a4e671d6efa89218cc4a4230db7b3bdb5bb6273d393d2df6220000000b0421ad9652bfebe3bb1a96393e9cd3e3bb7cddb7c8685cb01625b317185b27940000000da15160c52e33968fa7a77c6aacad24106601aa1a6ae1488f563e1541dd4d573384235a645f9d6a06702fb316c69e7dc6dbc9da5b86d8a62b90e4b220132f8c3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 304a2d2095e4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428735001" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{31314E81-5088-11EF-93D0-F6C828CC4EA3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2972 2532 iexplore.exe 30 PID 2532 wrote to memory of 2972 2532 iexplore.exe 30 PID 2532 wrote to memory of 2972 2532 iexplore.exe 30 PID 2532 wrote to memory of 2972 2532 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\830be3ec2ff011ff7cda1e6e9e0b26a3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5403b08bbf9e193619f37fa5df8c38281
SHA1747856a3518edeb007bcd946bbfe8f356a4c674d
SHA256fa3e3a752ce6cd332b5c1af670104904fae1001a866d8487bfda861463010afa
SHA512bfeeab4be3b170b48885d04a892186f7b6ef967e23516557aee3e1b8e167a3b26a0e13adecf131c009da297a53ed2b7b705394bbb0992314adaf2a19d8f41e8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f375bad68d325a69e039be984a77189a
SHA1efa2f3302eaef930b9a13a693f730069722846eb
SHA2562c1a4230f4cfa30c4b3f964aae397647362a158530eb6ba8cb5a3a55d3ec6337
SHA512eedbafe1281b7972ab05094f465ffc40c6cb12e1c547179ef887269b24db59e877d7243dd99bdd09df0443a855b191bc89ffb361999d8792b57510ca230dd5f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be4fbad284ef37b234850877fc5565aa
SHA1564d62fbfd3251862b9c48c99d5963afa3e4aaf3
SHA256615eb6250484831400c7ba6b5388765d945367d5cc0047065435e502d4947f9c
SHA512136e2d7689c5254692d43441c7bf81c9e65326bfaa52dbdfb2a42e18f149de648c4bb4c7ffc398ceaeadd32560817afeb8661797ecabd4e657e57a127b007a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b3d862a2f905e68953731fc428a9376
SHA18d316f84593ef85d839e2d1435b1d0706e388725
SHA25643e608a192ee729851fbfb1fe1d791f9b01d0952ec4ed822fffa169f67a1880e
SHA512df2e28308d76fac4db3ca52453a4d50a0ee4493be5872e9a2380483f97e459b7bb1eba671b72c557e1cbee26e36f99b2b468804ebbe967bab07a152404f4e319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9fda8cd27e7d16b4774bac41422751f
SHA1f94e6915129c0f55bf6bf6cab2f9ea4ca8afca65
SHA2562b4b31633364085d15eefc5d0a5d2dace6efd22d2abde00a17a9c0ba9d1a2117
SHA51232030204cbb19eb8561b2eef1446727c10e9a91de34cadae8f748fa8422657a20b73b17ea8dca512aa63408d0c2d66faf5d5667a11792bcc7202c8eb2b19e4c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9a26681e89b9d7388d963a89401386b
SHA1bd73f98dec85145bcabaf3448fb8b6a45582fdbe
SHA256f340e166d04e259d52b31272908410b821c006a9bc86b98997e8f9832b8ad581
SHA5126a159ab61337377a6e6130d8442690e77b13a052c65867b1aee31d1065bf2a1233ddadc6da857eb85c7830b5ef3a336f10cfb8c393a45c43fb8b502462c45ecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51db2e9d1df22f3d832dfe733a5f69c55
SHA155c2a2a3febb1d0ca28f59e3fc69fe6405483ff3
SHA2563ad0e89957f9d2894f91bf872bfb3e5a3f9d0e0d5f2dbb86f867146fdcf1bfbf
SHA512a43333e20888ef0a516edc9ec20833feba41692f9f31444dd75e0c188b19f9fb4ff393440b380123541d2392fcf1249f8ebde05e5c3ef9bf44722846b4cecc4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5271f747ea3642482083c7945beea7af9
SHA110d09b80e8d56a15f17a6b5e8d8581a6987282fb
SHA2565446341cf273783c1419a14cc630f684134534b36b529ccf35d8b6ad84d17b4d
SHA512e28a86d788ed5a43f796fbc66f56df2f470fe016309d76a13e57281f352d4e2d7369917fdf34961708d34638804bdcef024614821f1bf07684d11903090d832c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e0525a39526c01eaf4ff2f7a0f6708d
SHA1419af8aa0ed1d471d50ec2764deb4846075ce79c
SHA2569ae1dd8a9b0dc916725a6282c2245635dbbb2914c51e63aea51f48ce3dcfc025
SHA5123cc397e9459399b1e0a0a1b6aba5f359961e021c59e57fed0e2ee8e561db978cbdb66982e52371bdb3899efe5a44055db84c464d1b456759f24b218870627977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56feaca72d618f8b58fe8d8b62c7a7f95
SHA1d9e393e3abc8877d27d8759209efd110842143ce
SHA256d337f294233f0739ae4b7f90e7a4a361f6d96320180feba9eca6bf230bd956f8
SHA51216da9b2ebd553ccdcdfbb697fee76ddfe27e06d6b3d1d40c8e3e8b942cb11956d28eaae1f0391030c80737a00583094125c0db20029badf885b8694fee69dcc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1d75296bf55bf3a1a892a18d0291c24
SHA19972bf0b16b4c537e4a1f3e9207806662b6ad347
SHA25600d2f76c4191543f3c4918d7ef4650a4ba313a1df1dc1eb2fcdfaf0bc2c7a9be
SHA512de22e4712644d59cfdd60a2731b561a7c509cb231b97cf8dcadc6af88278176e31320f88e4150613edcca00de0cf0434d4c46444218b7e0a02dda7a273456755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2c4379b7d6c108702c332c56d7f427d
SHA1eed6b237870a188a0b6e125f44f1349467cd193f
SHA25665294c0e81c2ff5ec6b671cac7ce5bfb4dbd4aed10dcb43e0453c466b4d523bd
SHA512d63e3b6236d46f35db65bb61c314ace120583f3b80699a472f6fbcfa52b15f74f370b8c1136e1fb9b234d447a7820b29993c64a1c1fc18a38f781c945b41d929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f161599f471c9a6eb6c6ce9dbe7509bb
SHA16fe0f1a0dcb1ca6aa69eb4002c234a1156afa685
SHA25643d291d4a77c4a5514a548559fdeaae225c53a07794b7281fe68c796514a54c4
SHA512638eae8bdc157090d7c4c630647223e5ecf32c1a066efc5868dea54e4f15a87af94532faa3c86831cd03e19e9700dd952cdbc59b058d3c3d122472424cedb6cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533afcfb997a821813616c4211eb2be61
SHA1a8e4d5255797446b07342fbf2ebae3203e07d297
SHA256ccf848463f56dd53000f88108ce7620a94ad1d7ac3ccd47c96a63116faae4f38
SHA512c7505e59b4109c456f10428b87ab8ba2e6a2b56e003459e2b5df7fde71eede8d8acc4b45adfe5d2da08a276feef9e7400c62b0084c7c56caadc3b602fa90fcc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521932f351ce1c0f27cb002c5081af0bd
SHA1326db01da0c6b870900b4cd8d373ed06691c1fec
SHA2561788e7462428ca26e41852523a85e85a627ad68aa34a8d467eed216cb9018d68
SHA512abda828c5d9e08e2799b9eb0545a7fa01ee2a6fc6157aebeeb5d676f8727fb3075de4a1e53ce8c4494a7981547493fd4cb2ab1c78faa97be5e602f23f5fcd5a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fa8aaa3fc2a57595f26ebb3cfc08706
SHA150581c36581b0c13502fa3fce6ae7dfb2bc21f17
SHA2566c93e50c6f3099662e03a0f79f244bb0a68e79a7d83343d6524a179d3f456abb
SHA512a5c45c9b9d3a259028b4eb0364b5bc62e8788af7f26a34a1eb732343a2ff6c7e444da96466ea0cbe7c06c62ae7c53c753e0fc504756e550928dc3747f97f9513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2578e48c80924fd168060a586ab6b1a
SHA1c741e3abf89e2e8330f319985f53193964f4fe3e
SHA25630ca7b03a7016873894ec677b5ef8b82931c0f31082c52d26d14a42a6200837f
SHA512cbffe5dcdc9729bdebc39cfaad51d696c7d11db87c074e0c8ef9d50937da8ab7569fd3f54856eaa0170c9cbf34c4310c1c0709fdec7fda870cd03abe6aed6b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5634f2e07fac00fd3fc3166505a3651ce
SHA15cba84095454de6d7272c89b2b69b99c7153464c
SHA256c949483c8260d9725b642206c7a478db564b1b985abefebc9f4ae661aef90bb3
SHA5125ccfd690fab0c66e2a3dd044e88789465e568be6e18d71f9930875e63a35ffac18ed877e00b3461ee4ec456d72850fe74e6465520eac958f7e2f53581a25a1b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c751a0cc7070a8d481bc411fab8a26a
SHA149061480eaa98de5e3d3b901d8f28b2e82f70b28
SHA25620480dd1bdacca4a8e297ab0b9aebfac4ae2be0db8a0d6034399c92f4db874ff
SHA512e05d56f432fd24de56af90982c100acf16a8edd7a6bb92ea0fe4642e7e2b5b7c054f117f1a26813608d782daf705b9f1a404f4c52221194c76b248ba26eae3b4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b