Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
67s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 06:44
Static task
static1
Behavioral task
behavioral1
Sample
8369c26ada126fb06b3427d1e91714f6_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8369c26ada126fb06b3427d1e91714f6_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
8369c26ada126fb06b3427d1e91714f6_JaffaCakes118.html
-
Size
91KB
-
MD5
8369c26ada126fb06b3427d1e91714f6
-
SHA1
0ba74ded62823d0cc2d11912284f72e668feb2d9
-
SHA256
dbd72455610793d55c9a70682d81ca037a99d20869f4f94768329ce6a1a2bf68
-
SHA512
c59147536d14a38c93dca040507a64da7d6a314db025f8edd49511e9b805f5a2f440e03cc38c783ee544142a00a8cd7e046508c7b68153ef29183ab97198fc21
-
SSDEEP
1536:Y0Ksunh+PkA0rmjLit5pP/FGZa0ILLCiF0JJHiGZdqyB5NXCqlt+Vc7Uw0Q8OgjL:Kfh+PkA0rmja4ZPDiFbGZdqyLNyoYcVW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 506dfd90a7e4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428742965" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BB45EB51-509A-11EF-B29C-DA2B18D38280} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000df0ab5987eb06d9dea32e4819fb081894a67fd25839c92d05e6cbc787b6b41a1000000000e8000000002000020000000b9db5b334d896f01c5c827935e4aab17b23bedb19c4edbaa5068219a023bd41420000000beb6e24a4b38d9d513c36bda97a4be5756f2d55c105dba09c5a0b7c9036eeb8e40000000603eb5143c927ae207961df2e6794be752d3ea8510612afb9dcc6a5b4a8ba4b9a2e13f5be30aa57849e61632df375f823fb65188f91240c263ab83817473e221 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2172 1656 iexplore.exe 29 PID 1656 wrote to memory of 2172 1656 iexplore.exe 29 PID 1656 wrote to memory of 2172 1656 iexplore.exe 29 PID 1656 wrote to memory of 2172 1656 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8369c26ada126fb06b3427d1e91714f6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577c7ee44833b5a2e544aa5df35b49db5
SHA16c9a3ce8d2734308037c470ea1928b2d851f8f77
SHA2564f4eba435da0607af6d3207d47f34519cda493f60340d6e6816fb10a4e4388bf
SHA5124a98628b50353106a263e2f8ed997cd6dfab16d2baad511017a0f84fa4945f737a0a3d3383f06b08bb01ece253f23d640369ab9c56290aafdf2948cab6a6f4c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548ef7969affd29c7e00f4b4effb07d6a
SHA11c2a8fe747357ee9b86c37d2346030770204cbf5
SHA2566d2eea592ee3cc52470bd7f1717c8404271d6a58a106cf030856c12fdb86c8e9
SHA512bd0ee80f390921499ea5591c4960f37131c924104777db6484acbde8efab889d7f6170e9c044e938a0e005b64b0b1aae1494efd3b23efc55a0b9681b34a5526b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd019cfa450e3ea6ecd1ca943aa5c5a4
SHA1c7551241506b67ee80e46498eb3344976d5d3cbc
SHA2567f5f4862f06f4b04672f24ef555fc8f2b3a14cb0eff4d9c1494c46ad511df437
SHA512b8829943bf7db4bc855d0c1bb772477328dffa785ed5d4ab586590027901a42a704e4d1fe1a9b6b8e9be4b3678e849649296e02de2e1260d626bb1d474f5fe46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53499d9b2c3ab290dd5270e745ed6571e
SHA1aea2cbf0838db8d99fee62c9410e983b07dbc096
SHA256e7beed8675d4aa60da647d7d7a5a15ac9778745016559d593eb219a09419084c
SHA5123fcc8526ea89cfbe029dca3a9df2a6e9c15bd170e43800c35df783ef2ef58a6b0efa60e187d70c31ea9fab0fe00b7e2cb85221550fdc1c15f0767f950deb43fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5230b186c6e317e13428b37de733f9141
SHA139bc855472f625616214ed9e7c240c9b0ce0f133
SHA256e372546d73bb125ced2d42809d8ae5ed2e97dd415485cca4ba8e3a3900245893
SHA5129dff5f83578a299e8f425fc68a07044b74ccbb9d5875b7da38d7d67e75e79dad501214576774c1e7cc43b08cffdfd8b2bb1787febf9f32b5161ab5a37bd87b7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da9d2833ccbb6e1fb988216a72726d0c
SHA1408b362e829fedf80f190af46094a6f50d630fd2
SHA25638a8c6b3bf21f226cf120fb28ed8dc934a541d52fa2214a0666f7c8d37fc228c
SHA512366f199124a003732f833759b1149c4262c3c1a5315d99934ebf0ca8f1caa56f23cc43fc851339bdca3f59e46f758eeddf7f8ee88a166fad8a6bd49e4088e697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0017e1ac7b1d18ab77c3926989a933f
SHA19a36e88bac751e8410418fa5a81d725931d70d53
SHA25697bcda5490c08e95d7dabc1b10de0a848609e0c1216a0af023e463d3dd21d848
SHA5120acc6d49263bc696d32d4cee88a411d699004833bf66d8233826a4745004475ce698f4aa1a6676a2321182213569f1c1e94e8604acdbaaa428eaf592252e1de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554bf79a5e14aa06ab35d9fca5cc0b22b
SHA1c3f05d23fcc740ea7710a2f4c5635acd965a5b50
SHA25643b2195827cb33e9dbd8f2a3e421d2aed57eca1642877290bdf32599bfc08deb
SHA51260adeffb8c4c69f112177dff6849520b57199a56b1b02321d8ca5ca5ee5f201933c43df1d692fa3713223688533f0e5b868bc93ef4ac5676d38c830238030079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac4162a921b12c9447b15963e42735e1
SHA1969ba0d9be81c6f6b918997336c3cab328d15724
SHA256db154fb99709999c472d25414370dcfdb68028a7cd3f741d4c7addd6aad34793
SHA512bdcb14dcd1c04d85cfe6d2b023056a6a19aa4bb6d980d95200b54f5d697cb14d4e13d328d559267c102d08ee69009b80dec074e0011da9e145d1f4f9188b277c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590a8af11bab8643981fa1c88ace97a27
SHA11a1eca57f4b4febcf9fc941fed09049e8d778f36
SHA256832b6fb9e6452e148015b61c35bbd322e24c230b18a1847ab0e74407f21bf7d7
SHA5129bba9c8f6324771dbcced751f3efc7c708635bdd084875b4cc98242621d72afecfd5f5163f2075e97fd3d361f69f34706efaaa0767187e2959aa61d714ab72c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5579290e9fdd9ee2829e3641b160c8b54
SHA1e6879869a127638b6287171a3959972d314f8c2b
SHA2567ebb6e1e9536900fde120518bc406acfa1a468dfffa395c1b4af63c03150d600
SHA5122e8d98772fa901862ff5a38cebbcd189a2e0f314c7b1f3e0a14011b58093c9d3bc4b71cf35096551f54ed85cd40c977b7f5838e59d3ce16c56d4818a5b1870c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5034e0c5ca0c243976b7bdf91bc4ae522
SHA1043800db078bcaef6f3a61037df8741159e3bd63
SHA256b580852cec96a7534e988f214a0ec2db516f953d0956ad4e7a5917f2c5600778
SHA512f76f99233c70d15ce81952741e973bff5bde9ffb9916239859cd4a80982407b34b0fecba00c0d85fa8b257a9514d5e55b81b85a560f6cbdd14f9cc70a4bdc354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bf7cb7b361ec0b60af8f66cbeafbc02
SHA18913aa681b05f29542a30debf17cf3b22bcfbbd3
SHA2569747ad91ee4294a545dc0bc7df09d3908964af11af2101c7ca8a7aea1c46c391
SHA5129df456e0b8aaf38fb524b5a50c6dc610d5db96754c1be74bfa685e0ef018cb3b04d8572cd8934ded987dbf302d2a5726efb6fb7607f23f7c6d448d4375006620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd6b5bd2602237c8db8e841570fd175e
SHA1ffa92ebed34902a2f5c11389d8a808ba4b802c28
SHA256f394c8f9235a0f3c681f704134ccd416c9350d88f9099011dde83de3f3d33436
SHA5128ef66ea4629fb7ed6dd8853325b2aad59c8b1250e9f48d37db9dfefcef4e41b3306da496447b80655f48c19bdf6f55cdde8d4ce51f4d235e6d14f7f5556ce71e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df6cbd4a5526c7de34f37f1c4a938f40
SHA18cb9b60068cd5efd1b309648aa298642ee57ccdd
SHA256d240eebe5e5a48e937bb6741de1ab9350eee311d2edd85de34c2786a085bf858
SHA51239bfdca18c3e419fbb9560b08f7e1ad42f08e8f32e65fefa465e47af16adc9ee3c8e6b672725dd54ae0e29d35074e1a06ae2b4b3280a60f714893beffbb3bb24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd3ab8c5036d841168481da2ff2266b2
SHA1de2d79a4f68f900d4b301c1ed101586e76773dc6
SHA256d240b4b6211e33baf09fd953dc6319d062bc8ad38d38b526d634a23aeaa5845b
SHA5126c7e06287e2ee07209a603573d62293217383f3c1b6efb6879f84ff12586d54bb2d71724e27956a218d90d753d07e1753daee31f619e0d840084462429d00884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53947fe31fb322c86c5d005b0de8654a9
SHA106fc0c9a91739e1670b95fdd294c6dffd94cbc73
SHA256bc539643c5ce5cf79da12325f29f38e93381f4ff55d09dbaed51461f7d67cd5e
SHA512eb107ebed3db83e84bc21d9baeb715e4e37d9266f32dee5fc790cdf7d9026ecaa1124ebf34e8dd9608c0566b53ea77d629f0811077ce41276915d46fd33541f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559f4b011f058e8d3d5a05cea3f314a95
SHA10e471b7a35c42a5a7d49777c269d4487b1c3cde1
SHA2560453e18f17342bc54420e0ef1834610fce4b9dc6629cf5dd416914ba8bc9f3fc
SHA512d24464f6c3cae1565bb091094b7d01e7fc71dc1a22d2861cfd23c1285a876315f57f4ac20e10d53f6db7a4544f1ed1c4f16ef1abbe0bf1a705e92c6193599a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1b704e293d4a59d4d74a4cbb12be944
SHA15570053f74ce5a57d3c9237b6502cc6489995363
SHA2564446e64fd98c942ae7f0ad945c9e1c41f520f81c4924a0602bb0e2cf80039185
SHA5127c40aa1a35de17f9f13be5af07275812530abd6ccab702f3ae5b2cad5ccc59fd9f1d55d932253de98c5a5a8d63805a164a16fc3e12252810a79edde55360949a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b