Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/08/2024, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
83bdc7865ea9de67ae2b6b695ccabfc9_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
83bdc7865ea9de67ae2b6b695ccabfc9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
83bdc7865ea9de67ae2b6b695ccabfc9_JaffaCakes118.html
-
Size
119KB
-
MD5
83bdc7865ea9de67ae2b6b695ccabfc9
-
SHA1
3c81f2141f97bf610e481e901449782bcb773722
-
SHA256
46c20747ea9bf03c248008d36b2ed1fce2abda6eaea0bc7e5712bf653e9c9353
-
SHA512
b0e446fe5f83e255cbfec52f98a6dceadaf2363f48c290558511905aa1181916c918e0fc1fadbb9964ad58f58b91d30157beadf31a7b7585a17dc5760b6a3073
-
SSDEEP
1536:JpEHgnnutaF1de4EvUnOJKpD0rx0PIzqc:EHmnlOAk0Lc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000001009f78c6e4a52bb01984a5ec8cdfd75323741ed347d41faa9ca5d24b1bdab52000000000e80000000020000200000003a8cdd6cdc366e87fe54e9fe0658508bdb33304988ea2e1f0c5f49b8db1ac21920000000ce02fbef5fa47750e2cd0d2fe7464c6701cf54574b8e36f2fd7a5d23823fdc08400000009aa13ab35f3c63255afffbd1595373524ff79757f8363a9c4ae6d54168f661af05fdd0bc80e6b59a6425886ff1976f46eed4e25f729fc0e47908943ade2f98c4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00b6541ba9eada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34D814F1-569C-11EF-8705-5AE8573B0ABD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429403306" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2624 iexplore.exe 2624 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2748 2624 iexplore.exe 30 PID 2624 wrote to memory of 2748 2624 iexplore.exe 30 PID 2624 wrote to memory of 2748 2624 iexplore.exe 30 PID 2624 wrote to memory of 2748 2624 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\83bdc7865ea9de67ae2b6b695ccabfc9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54e6a81ba1d85e366c427932ff3e07cf5
SHA19aa1bf45fd7970030113751a1098e106f43b6cd4
SHA256a6c71303c6be84d3d8e8f6d16dd4e2221639e909be1c4dc15b0e91302526922a
SHA5125942979e276a6f70fff51c473a0d833708f25e51a537865d5ad83fc0bee330a29cf330722f31f98b3d035b8d9d9a07833ed0bafcf958c23f33956fc9b9bebf8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7e9d9623d44f6d0f8f31b9cc7b05a1a
SHA1a9d9c9ed999765a7ed922004704e6f821e23d4ab
SHA256fda8fab6d976919578bb459f463996cd9d8f3dd60b2a56ebbe142c365b09a7e7
SHA5124774d7395ac2cb0eca3d31f7ef085cb59579a48f495adf44d9d74c4bcea8ed65edb96fede82a88833b4ac9037e3cb835987fe3c91a1ab3c37b44742ebaa79df4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c346535a9fedcac9fb864257e827cc6
SHA15aff5e97fa463728aa76ec01e23eed522c819d19
SHA256dd6e68cd829e121be4ff5222fdddf765323190c468f3518e08f5c08d7af9bb11
SHA5129378a1ee05119f340b6f82ef59f1eb4c734dbfc257a2f1dfaf2a4aab88a78df8ef7742b57603696700e9a95df77e51c7690a9ac97988c2f2af645e4d2a142ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57851a42ba513390c919d6080ef34cedf
SHA117a2038150328f91fe54b657ea8637cce07de27b
SHA256839ce01a1a1caa4de8e458cdfae799f280e7913bbc169e2ee2d6560a79944310
SHA512259adc3de905192b8fca239150726e6fb8c2dab7861c828d0c29df64cbce8ae6fc4e70934e1bd70868c3a728ae640f56bdcfc07bc5c2af2352088db12f5e0280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c09cf802d77c3db176b733f40369042
SHA1ba82eab41b2d1eb36b6f62d473a17086c47a9610
SHA25686cc333ca8ae0dc72f22199ab58f09d25975a5b15cf4e6ab53503a5217129552
SHA5127b2ec536b52425de8ac7e843ae72bd6bb1a7e796be68708e8dd1bd2575a861e95b229149df31f1e79d8ce9cf396f30bf8c7186dd065f3361fc7986a9d9bd1c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3be135aaa2f7d7d1065b196421b0e47
SHA1bc1fd73aaa791ef2c97af0fbc277edaf50ed0e0f
SHA25690135d3ed32a87a1530262da37360bcfdcc64176ed9fe4f7b1eeb2cc9586e583
SHA512fc8caaff1311092f16228ddbb5a94ca03bd20101ffbfb4f855f304207bc66b65dfeff624ca6f24193596d9ca41a88b91ac4294b9f8672a7070e9114798ff8a5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582ea5746c4a18235a107fc41b7b651d1
SHA102449598330349ed8fb9ef4843ae0d51441c26c6
SHA256d6352bfcb41b6f19eac12cc2e65c40e58926cdbc07679a9e048d5e17eab26b0a
SHA5123f422c4626e895c8d99c3b81d2f612d12a70589a3b66cf7e0942c54f78c389b4c5ab152666c9f74b026920eee3f00040e1c0ecf4ffbdf24fac3ade35fa304d28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5554595488545bf298ceb20d25526ac52
SHA17ab3a0472b474f38e3894eba5a13f13aabb3ea33
SHA25641c321678fdbc62533873176086ea9b804dde15e4c328ccc0a9e6afeff934e87
SHA512fed466361ec93290a06e9cb8a4d41c471b08dfba869014fe156307dfca1ab9e864f2b405bdc6af5225edba621237b9c924129ff3ef177830f8075604c0d081d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f50ab7c164a88e5a000802bdec7bf2bc
SHA1b1da489f7007826cb768a7425bc633b485408f07
SHA256e36b2f7e39d85d4e8a0dcbd19b9edda6cfe5aa57e65331e95e707bd69263147f
SHA512c523eabbbf751dd53c2e6e1435ab0b52c06afbd7accd439b720da58f77158bc8a1c57ac2293ac5c75ff69b6b72b7c854d664a544dfe793a201b0baeff3974bea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfc904e9eabfe7726136109b449f906b
SHA12b2f42e65b2ecf44cf9da1f5e014af474374ed7d
SHA256f23c4c61e35e9a5e3247f770c634b16b344f731370611ea9e6d9f84e7fb59ab9
SHA512b4131c84b0838006c1057ec4613923c3f836cb3b293dc60cf93118d844359152dd46356b59de5f95e82a157e28f04cf2afb852cbc3ae3d1c35b8bcc0d11dcfa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5484f467710f2630c2c1ecddced82b5dc
SHA174f677142d37788b48f0f5c0b9a9aa71ef229986
SHA2564b37fc829262021c8d2f71713a4d941507c41fb333347af2799ff6fcb691b754
SHA51205d41be35042ff7e6c472d82147247b8d9aee942ed4482e3a91acd0a20b9694fa3ce50a82df74e686eb1d1898dc3aaa5d8b9b83a02e74daa5ba5b6f31e02d8dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d55e2bc598f5101d61e31fb1d7e5828e
SHA1c95fd35328094625486b78da8ebdfe893318a4b1
SHA2569627950021e9ae534181e49165b90a5ba18dc2e3ab3ad67d07b79fa887b13942
SHA5129ab09a05641a293a749e1ebaa2301411fc11086374e47326112cdf7271c0fd92fb3e23e7cc2653ddaf54233a1cbfb3946895dfa60beabf95025d47a5e12ed2da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545898096524acb1239eea1592f1ed1fe
SHA141ce36a466f27318e446f0a936329aedffaef1a8
SHA256848e8b261524a937cc024f5d071a7964b51117092f57c14f4b4935b187d8015d
SHA5122f3516de471f18c7af9efcd8d4ddae89d704232ffc5302549e222e8dd92f700122d2f501871d6aa0497c3d816c8a4b1072f8f99701feb245078b275c2dc99e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbfb34a2c35aa4f2bd436f76e602e202
SHA1d7012b107ef6602ec851f4870a1ab07c4c248cec
SHA256190419c7bdb1b32b18d0959be95a3e9a4fae47544708cd74bde54adf28ab73fd
SHA5129976005d2b0ec037bf80ef8368a2a5b47561199b8095c522672bbfb1d2a1b88781ac16e688c616aa7f7601b616f07f776e00f1f1241e20aefe60c793bf6321cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bcbc96e717f86d6c7eebdbd1c505121
SHA1dd841064d147a91e80d9e566c86ba39b37a3dff4
SHA256299be1ac9e682519a21a8f95f6aea4affaee427a78da43ddadbbc11e9c1f8ac2
SHA512b178666941b2bf5e692a155ee852c885b8c7c62fea82673136ed1b5a6b92cfb8ee88651d47aff4179689c8c55311446b2dd15ddc21145d8b5cf51dd9d87f21ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56040700637bdea598c0ae1601f64ba6f
SHA1b536ecbbe0cd9452c48b8a4bea964cf0be8a7ed8
SHA256ad9e0be62320d57ce41d43b4f6a648f6516d51b463cd5d3416c0eebcfef2c653
SHA51260c8097ff8f80a8adb39942c3fe4706d32bfe31b4aa8473b1d509f4a768682b95c167821b6c24e97baf4290300e36afe24b4db7a317176c05ec24c63e689b8cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD566dd394ac5daa2f63c38d8a428120097
SHA1a02e81eec0c0733eb4aa240823e49c7f6bfc6c68
SHA2568917eac3bc474277bb7e356be16f351ad37e07170650b5ba1763f84fefb0ec11
SHA512ba92607fddb6450588ee0ce51a2d4d539dd854788dc80f0875468c77fb65428aa43c6787a95963f74556ff78e9dd285c03e36743f7c7fb4cf21dc4ded1fea627
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b