Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
077be1cfa15a1de33c64c9257c25fbeb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
077be1cfa15a1de33c64c9257c25fbeb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
077be1cfa15a1de33c64c9257c25fbeb_JaffaCakes118.html
-
Size
26KB
-
MD5
077be1cfa15a1de33c64c9257c25fbeb
-
SHA1
f35f7d55948070f3f29cc49ed6a93eb0b532447c
-
SHA256
439d3d69c3522ef6ebc65e6c2e486be9e7742c0ab40e01f5738b293563d4dca5
-
SHA512
e0f3e0833affbc7988c23af13e2885296e3240e27186b9325f0b4b58bd05345eab7a2f75d49304f60b1a6c06f83191fa50e2a66147767e356afc518ce247524f
-
SSDEEP
384:S8qtAzknte4SASeNSKm4YqvbbLaurXziXUX1PX0UuXmXeXEXu+XQIWvlJHpaWFf9:SUAteNC5G6fVVclrvvdX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E4D76591-803B-11EF-943D-F245C6AC432F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 601f87ba4814db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433979889" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000e3b6da39b95b66dead03b386ff80d0f2900b77c8d8ac531d8832ae69ad782b9e000000000e800000000200002000000025e18ceff62161ed3a653a69b3e84a960879a6d89027723f43ea1ec258da2c582000000084f95f924b5ddeb9bd2d827efa2968a59ff358c3c1ac07581502c6747e252a46400000000b6be5ade2390397604c1442a82ecca406f1a04977c48c2c72af4cff201a697f8905aa2bd10ab4a644c326efbc2586af0e5d92ff221d6cab2bda63b615d72276 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2776 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2776 iexplore.exe 2776 iexplore.exe 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2588 2776 iexplore.exe 30 PID 2776 wrote to memory of 2588 2776 iexplore.exe 30 PID 2776 wrote to memory of 2588 2776 iexplore.exe 30 PID 2776 wrote to memory of 2588 2776 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\077be1cfa15a1de33c64c9257c25fbeb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2776 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb40f0e39ffd4c826b635dcb2839b1f4
SHA156d1edc87a5c058428329351b8f8159835b510e3
SHA256ddac91838f73df41527b3e84ee7e799e22f6d79294d082ec6be4ac15847869e4
SHA51246433f1126dda880499babecd76cd33ebc0cbe5e05b530e50afef05ef33c125189adc93d55a8d40cc12d23025394320732853dfba3ceec64ed643c8a98c54939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e672cd3df27fa37cd4601def16ec79ef
SHA18678375434052f3638a79a8c8a90d5a7ad76b2ab
SHA256f30602bed2aabdedf8f920cadc31faae0a54b9a80957d1a03b1c486a9331241a
SHA5120d345e1ad865be51cfa58438cf1c348a577f82ea104cd11f21e10b8a72c155473e99dbbfd252cb0f48f945a3ba1bfd4bc94f0df8c9b1e963e0105f6daa81c7fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2e46b7d8c521a0406f7b0e1ce9e851a
SHA17444569e87d636ad80caafdc4c99d272c7b388f4
SHA256037e924ffa61028648a9a13c20b7db34229dab1ab1df09ff0bfa7e067f46cac3
SHA5125f8099d7c8f237d770fee1ee49dc7b2accbb28052949c8bfa8e6ccf4f21e49f0fd68ea1d39195406b57af876e1c624c86e701483408b2b0c4e7f42aabc14aeb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517c04fa9a2cba5e506f0bd69dae7ad4c
SHA1f349dbff2a4b6ece472007bc7d35c695bd19b692
SHA2566da33d81cc11318f8c5b4050e6611b0cadf2e98768ed66a220672b09eebf1007
SHA512a498fefe2bede6af62588944bbfa1b28f18f79e27a033b96cfe0ff506eb72be213a3c2b7efdd743f1c60d5096ba6d10ef4fe9b06a1025068f1edfec8940b5957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ef473c9076696858f580dcf7313861d
SHA1cd922c2710d1fd7d3d08423ccb052144e4ecc007
SHA25640b8923457e9e0b4774d51784f24c47d3936b10240c222024bd03489c08b58b0
SHA5126a3701b9a56057c62f1fe17c8f398ac49eb8524bc4aa3694a1ab4c7c2677398b9ff1b23bcd4128ee903a4ee144e4533b1e5bb98f98c3b4cbe126d2b7737d13a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ff397930c948207a1e11292a6dd8182
SHA13b2112cb5969f9cc9bf3cf06aeab3f2ee2843792
SHA2560fbd7eefe677e2e654650b6850b9d63d7d976d70516b260c97c3d77dd751722a
SHA512b3b4cf2923021bb8a6049b4ff93608b35e4fa5ed2a1866532448fc5ed628cb7ceac32bf2ed3d0cba075898d1027891204ec024b21c7ff22c15009307c6e66b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5360e1557ba1051cd2b37aa3ce9a9c8ec
SHA17dcc66e1c524f1eb519f6b6de0b28d2723ad4aef
SHA2565f1b592f1120a7972f299703b5f053b5a6e9493de39665f576f1bc42c8c884f8
SHA5127f8f92b38cea775c0d6dbf59135fa358521fb62047f66f8182034aa23d941b795d9c365ac125161e174d9ddb8eff9155693c4afe429be42227267fdef215b7aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5241dc706af6ef539dd16d935532d1ce8
SHA111d279926dd9b8945585b7b36527fdabe8b753b2
SHA256761531cb5b12b35afc272fc8e3aa0ae4d672f21038a3532e63097d311d7acde1
SHA51291c4da572234f11594dbd314e51dce2af66702da52047a9b06b613847eb792c8b940eab86419818eccad7203c0f6c0a74aba033152011c5b9f959ce6b0c73bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51218cd1bd5d8379057957ed6ead50d8b
SHA14c36aadd816e7cb4fbfa318e240ee4b15f01239b
SHA256d87368a6570a7fb92e131ced46a02d2ad3eac138524da9de53f38118033a2762
SHA5121e301087ecbcc9e1d01a0de82c173fa6cbf9eea33359f4d593f2a01c7acefac022cdbd2230fbc0ed2eb733ba3eefd95f9b181c5550ad7e7f07e7ac9e90720a6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533451ec061c70afd2820446cb3906b2b
SHA174dd35d865c81256996af9ad47564a68f20e0c34
SHA2560bc718893ef4efa61870baf7cb5af631852963728d39b3af7302b9caf20f0fd8
SHA512a53c81cd244a594f16f156a8135243760a3ffa3a4db297965bb20d2df8ebd05aafc03055f5c6e8899e57789d6e21a152036fb5ddaf3f14c4185e14926a0dffdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5347c23028490ee44298bfc62beb68ed5
SHA1636059601492bd8151dd80af4a38897e05015f57
SHA2561d16254683fc164bab2691cb159538cb8d9ccffdce64f31147fefb0c9a08be5a
SHA5120508e7ec34151bc91eaed2fcdd688f5ca4a5043044e4754440f408272536b4f1f90d4a5d4bcd351db0ebf2074d800050dcda34f40f3740064358db4273fbaec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d27a5b0c9ed09f80140336af50cc2e4
SHA19e41b7cc7fcde7047c082c996063108cda7c1226
SHA2569f550e15657ef42adf00be4ae4631e175a104f0215870eeb09cf3987a9b32400
SHA5128687f694c09a77738252164881548bea320d060f51ba4f6fe1fd6d1334cbbd2b4c60b0d9a881aae793679e81272e8a842d44fc5f5481119651e30451852298b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505a00e15813a132baa3201677eec7912
SHA1315fd816cac033f885cf466cd8a62b248d4f0979
SHA25697dae1f428e8ba03f4c59385341557979669a64b4a7ac07df6334dd9113ec71f
SHA51279c0cd0c54cbd37d54325ec84377ee34b5e37ad3b787e1bf295141fbd135070b11bf5c66dc137e58c14de174712f83e24a826e4dbeaa3f035172e4b2f352ff25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6d8d92d80732225e112cc69f656c592
SHA1c436b386859b2910d69335e02ad2c132ffe25c87
SHA256594d87c0712eaa92fb93d313c869a04258ce5b11be323672dc0206c6e89f80df
SHA5121eb07859b6da93a4e4cb6796f35494c43fc8c118cee6aaeca756fc37ecdc80b2cd424ad207e7f7ca17d724bd6a5e96700741bbd2bceefe55e7a5b4aaf6983398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d079a439a1b53f5af1f1cfa6ba9c5663
SHA104e9dfb741f664468e9db4c475381a5a4d411a89
SHA25631dea424a6635c40fa9ea9d283586f2b44cab38a54d24e86b8187d092f7f8617
SHA51230297ec73a84de7a92764668fcba33c59a0e9def4c266fb1f2bb5ac810b526083c097b317d87254f360b4206e43f1f141fb540a56d9de92087a4a583ca01b848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ee75950b25d4864ab29d76d422ccf3a
SHA19317e5d1ab737a4464ed22c25ae76ff6175f4532
SHA2561ac535f1384fbbdcc5243770ce258c001e71abec2a2f0bb90c21ac16fae6d057
SHA51235ff527fb8445a46c38af08026e3271c658c4b67ede617b317a187a708fa058c60aa6649412365b410b19f8fbf6168560b2d2bc2b83cc9e90bd54510c74334ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f2f609d59d47ad210bb24655bd8a5f7
SHA199a30b3fa1e7cfb7043305f4ae55fcb65c1e75fd
SHA25635949c47e313d6e11e1ae24036b935aa6dab865aba0d278ca0c7109d0e616a32
SHA51251faaf40ed28fd11db77e3547a8d9c2ab24003d79ec8410adf41474123efe61898d99f4d22e20edb47417df29777745ab83e6a0b356f89697aba5f3c2d9d939e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5137147bd79cf7405753a416c7764900f
SHA1306f592682a621afa3f28d908c287173e8bfbeae
SHA256befb468538c1daf73696a1a489abbc5ba30d9f44c9c7363540cd48ec1fb8d3ae
SHA51224d8ef8e08914b6dffd2bd9217e51c807999d22fbcb5d7feb231d42f072de887ca896c03ee8abdddc674dd5db496347b7297532bacd37367f85990bb4a05e49e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcc332c2a2ed05e91ab9f9b17ada7945
SHA1039dc58fc29b9c86f6e928ab7f71fc846c202fa5
SHA256e5290e9150f469850fddd88f451b2926ce8e0fac79b8bd52c5a0d82d7556c31d
SHA5124d8335bd6f504b9ccf33898f985fee89ab55a58899dbfc30428253b651123adbd68da3178b1dfa6a6d69934a3548061d51b48f4c98e5f86f84f472d1f65645b8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b