Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 00:30
Static task
static1
Behavioral task
behavioral1
Sample
884b81b670b0839aa2fe0e7c9838068d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
884b81b670b0839aa2fe0e7c9838068d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
884b81b670b0839aa2fe0e7c9838068d_JaffaCakes118.html
-
Size
6KB
-
MD5
884b81b670b0839aa2fe0e7c9838068d
-
SHA1
254e9c3f4491747357273f89ead65da0be39cc94
-
SHA256
424ecd524e2bee5a921e4782a14475fdd495b3c63f5f15f881e440696035ae0e
-
SHA512
557a1c18a1c788d5b5d08543a48dde90416814d5b7b35f0b1b594c12552b05189d0bb688d8460a3f5ec9becfbe814f01ae557cd8b28612b0559fe66656f5e7af
-
SSDEEP
96:uzVs+ux7VKLLY1k9o84d12ef7CSTUkAcEZ7ru7f:csz7VKAYS/ub76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0511ace85ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429498121" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000169c11c53561cbb63efb9a1bbdd6bcf8fbfa515cc9f199d374c1b727f6a52e73000000000e80000000020000200000000668bcd240e1b787e3191163aea4fd50fd23bc472450b31cd2f9c09b7e7b0ef4200000006b9c452db7a26b9b7aa9e9dfcfb8a1348ad14c3ccbb5ddb4521bd26ab39a8c1b40000000f354349ce84038673af92f83142973ed1ae407d057e2fcf93f523a964c0477d8e4010874d5532e3c915a136cc6e21e9a733b4081ad607fd7e27c9344032d46cf iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7974A11-5778-11EF-B8BF-428107983482} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 1796 2980 iexplore.exe 30 PID 2980 wrote to memory of 1796 2980 iexplore.exe 30 PID 2980 wrote to memory of 1796 2980 iexplore.exe 30 PID 2980 wrote to memory of 1796 2980 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\884b81b670b0839aa2fe0e7c9838068d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea7734562e559a95dfef5bb26ff517a2
SHA1676d2b7828ad732a5a56610e25a83bdaf9cf3b2e
SHA2563bc8d5b789cdf512d1877feef6d98c4cad6a9fbeefc9c2fa0ec0f0670ac65efe
SHA51230cb105e551dbb364b306c553bf59b0e0c1326a2dc21479dfaa72cd0f2446efeafd9eb27188b824aaeb8811e5b4296b6db9e22dc2039cbbf36e718640d5c7d1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5903c7d1b9ad719364be3df743afed3cf
SHA137a3bd8d46f12956c13a52627f44bfa2459348d5
SHA256429602b240c699da6c40eb48b9aa2fd07f0cbad23f8db11fe823d9445bdf209c
SHA51217f3c592dfaaadbacb3afdc4c2441cf042cfb551c52ac864c052bb3a2e77ed0af00edf0c6267d9a64ff7cd30ede9459f8be1a81b69521b63d2bc0b5978c06176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c964b12bacee76b605324b428b36cdd
SHA10dd4c1bca3575465f461a83a2eed762b71779188
SHA25625e05942b56a55fa7174bac34f54e66fb83b7716d1446750811ac3581294b49a
SHA5129a0b1f9147b4598153d2e33deba77077b5a267d247c532ebdd31f70c5de292d73249ef7aedf983a8aefec0dddd9023d63b75c93a59986639de60c219bb078351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55012e7b5638758e9143e4beda29a2ec4
SHA1676bab2f729f9f8005abf4202efa8bf59fedf50d
SHA256287814f2016ad37d19db88dfcfe38276cf18b057d8a871791f0bfaeab5f744aa
SHA51233226848e30f14ce972ef1fbcd2f8804dc1a68c220a3b14bb608ae4424f043ac5c75008351eb188e433be3ffba4089c8f5ec47d301e99e3f75b99227befd3ee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e211b67946c14dabcdd2135f544a41b
SHA138347a009be5ad6f9c171a4f72056e659fea54a9
SHA256644aa78083e15271674c53fc7064e94bacb683c951d5153614cde19db550fb9a
SHA512af1df05cfeb24a92d12e5feebe283243a9a620ee2c460e8e6a917dac435a3d415eb6d35a5932b373f3fa4574d5a79a3af8720468702f4fc251bc522f36539bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b92d503c48e491058e17bf0e6012afe3
SHA1f28613ecdf2b806cb99b83b8cf77238a52d3bd5c
SHA256c0bd902ffe5e3d4cfd142cf518f91c0812e0c4f7be73a1c1c37ff7cbadc39066
SHA5126f11d39b533cc6957949987c79ce0f12a879e31b824b7891bf891e5204c31fa1832aa4e0158855ccd1d588584482d451322d91665bf19d56eb88e04fe21d272b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507d996627ba628d72308fef93942f37b
SHA1c075dc59cf527883674b0ba847946dbd47329b78
SHA2560ad18febaebfb89011d930f48d4a80eda8afce43681b96e6043f68271d2b5ade
SHA512599d666d8ad25126c11e39c82b1d59f9488830fab61b3e059237d0305bd4d2ca29056501bdf6f6705d0bdb8964bc7361f52560dd6c743ca9c430cc093c1a59fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4e4c2fbd107b0854149ecc52714d3f2
SHA1f382af07a20d7c8e1368b3395120f57b8dd5e69a
SHA256aa1d92a3ac04cc8444d72e472731ef88ca9fae31cfb884e75c52b3a1be117343
SHA5123baf2b510ca400f8412b94bd78e9282c672834833cda98557d98b87788aca3eb73dc9da2baf5f88267bd67cb73acd4a4bef1aad67839c775c6d6e3c37d26421b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59097246c924376f11e631a619ab40993
SHA16065af603efcb6ec1a98f0a2ad8fe63f6d984f0a
SHA25626d9a092b63ae56e77f657c8e4682f824add5940be2004709637537f66b2ab22
SHA5121c6124df0337f56cf2b6b4d6cc1ef34a427cca877360928f365336ae707bd4128c9a0d9fb0705042c99534f293ef0f40413a6809a7d0add91a85a33d94aba03d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f2c3b3a21755944b20a54b698ebb8e8
SHA19341225c81659300cdd6157f028cb82842861120
SHA256c2fead4d7fd20eb42eb584655ee62b3b119a1a1f5c5afee583c9ddba0fd2c251
SHA512aa5bb5ab26d90db1f65f06e5af367990e1e13b59246d6de34cfebd353084fa956a8f51766e4bce5d50d66a0b6652bd71f5dc28df972df1680f49a7132beafb54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f0b3009297e14d01b1af80d7cfa43bd
SHA110a76485c0c35405ee7f7a7f0007220e09ccd34c
SHA2569a0b38d1cfed338fd0ce4e46a8bdc95e343de0b8a92c296be17b2f6fa951b616
SHA512df2068368c87247e097aa38513bc6cd67243bbac806b2924f5aae2af9029c69ab6c46de9cc133fa17a69794b42cf1a400954ac768813563e1bc69dcc5d9b8339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5699fd1db21592ec2732fcd37e31c9e38
SHA18ca5f418f0785ca049f824b8208ffdc9e7ee894f
SHA256df49b6bf8f1ca751a746478e4531ebc42dc998cff54cec6a6fd07e736d2ce395
SHA5129a1894949da14f4a0b78e5577a20ebe651c90908c1be88f7840fec62921762235c734f93a0aa8f67cb8ceaf3b5f51c88246822767dee55da3f258fd1461087af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5144cdf9116259a62a0e853d59b647c8a
SHA11875fad7a08613e6770115d9c35aecdc4d8072a0
SHA256c072a3c1bea1b8f265ca9b2fdf65fc2f4652bc7df1fe4055711f3d5ac0271a50
SHA512220774fca7ead45607d517f8ea394cdd1756de6c24ad4c60a10ccb9d5706e6df56d138afcf89bfaf62b4177c5ecf227a0dc4ff13253036b6be07975fce0304ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f445fe79e0c9baa57713beac9ac81966
SHA137ac86cdd16e81848373f80129052c7f93420295
SHA256f8c1f741d898aa53012ed97f02e94ab7b80fb8902e7655110c21145f8dcabd7e
SHA5120fdd79ff16953ece470dae1fc066511c88e7a62194b9577afe242640ee3aac1a11e9e743aa4b806edf74e273d9c6f8236554e46695de07f0fb001b7e13e8b938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b1acf644ecef0fb2165d8a707412445
SHA14654044c5fe668339ca21b6c3cdc3800422f7160
SHA25609e6000ef81045b3b28aa93673d2cf54163963644995d48fe4127ff370f29254
SHA512fd65d3b7cfbc83cf3b2ae7c562c4c768a2c17dc5cfd6515a5fe1094e13bd079ef28dc60f7c28703f63f2c7695d65a0712904c31f41d56fa1540fcca689b2e827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554e8c60a4aaceb1d88e2ba6502d34028
SHA1f94d68ba27259534eb06dbf5efdc5e35d701d20e
SHA256d46f2d41d99e21e6f9d6fd8415011842c0dc466b494d5bc69e7ffddc4db44966
SHA512efd2b8c652af35a0e63cb884f4f1033a20f8591cd8407e4c9e4da4f73bb80913fa35910d071e90c95d5aa821f4811a11c23bc94194a89e3568b294a9fd54d7b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c9330068ae9b57a4e6ef3374c79e9f7
SHA166fa3c532ba8983c10823f7cb884760baa2921d0
SHA2560202849313c884d09f4ad193b7683c6d33de7c2a8faf9004177a6931dd61ab49
SHA512b119e95aa1d089661a6e67ac22dd85131f3117f79cf81064b6e08ce0dddfc55d3b60ea730fc6413328e65772131f6fffeee1061765ecf55172f5a1a1ecedbae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4774eb0af8073c808debeeb847e155c
SHA1096de86f7d8384f3b1beb069ca682454292f894c
SHA2561bab2346f98cc6e4f0e49dce761827388d1efe552fd0f3fa36dde0a55c7c64e6
SHA5129a5982b72816e56982f6edf0d68a7bf359f6d69ecb71943d9dc2afe3916ad3ac5cf318f943711c30ad2d5cf60535de7ddce30bbf5557c3e71451643f8c7fd7b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5554412804f94b9df4bf0e74652ab503b
SHA1b0c6325b2b60d22dd9d62feb4e98c7fb59917ce4
SHA2568f1f4659fcb6b5653d1dff1a90208d2774d9d318f2182fda24d0bab1e2c3d2b4
SHA512c97c06f858f6bb6bf43520d2b9f43dc4e07fa1b593f9b4b7cd755964259056e8d0dc0cb0c77bc70a750d2ef42b3bd837bbedae6db1233d8a06db47fd0aa7de76
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b