Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
68s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 03:15
Static task
static1
Behavioral task
behavioral1
Sample
042c27b0b10ad0fbb470f17495aefb5d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
042c27b0b10ad0fbb470f17495aefb5d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
042c27b0b10ad0fbb470f17495aefb5d_JaffaCakes118.html
-
Size
9KB
-
MD5
042c27b0b10ad0fbb470f17495aefb5d
-
SHA1
e3aef02019e3192770bbf1ef29fa8bb016a90bd7
-
SHA256
9670e91e58613322fa23a29b6cbaba54ca4830c3be805a16bf0f452adcdd2743
-
SHA512
b0be4d208e5fa6637bbe09d04cae7fc808be4979a9272891fb7219d2139c941550c8c2cf5874c7a9075cfb9bb51c4fd306ab30b5818e24bac9d8523f01d45380
-
SSDEEP
96:V5+J9QzrjLNJccJCJcSq+J2bkiJJgs0Jx5OnJstFJqtJOjAelMzZRXtkcac9cfBb:VwA9oTkQz0n+QERS39JbWfixV0EHX4Y2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7BDFDC41-7FA3-11EF-B0DA-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d06bff50b013db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433914429" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000c93070126d7376fe59dcda2f0ad383a6ff15d82fa2fe3ffe5117a5cca3f9dce8000000000e8000000002000020000000ff3a4d058a2adb8c249e827d05e30603ec621425701cdb088213393ed2947a8620000000ab49e3bbf026632d6c916b9ecee2066c4dc6cc4e283ff377ef97620af43ff3bc40000000c3493dde8b8c9cb3b720234d15d8bd8b743c3f25bd4b01ab6b9328f316b0268e9da757ebd3c0e765a2a0bbdf4253faa89bd460461c63bf3f29721c8c60e08730 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2768 2096 iexplore.exe 29 PID 2096 wrote to memory of 2768 2096 iexplore.exe 29 PID 2096 wrote to memory of 2768 2096 iexplore.exe 29 PID 2096 wrote to memory of 2768 2096 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\042c27b0b10ad0fbb470f17495aefb5d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5913ed383825b2dccf1ae362522b2f790
SHA1646585d928357e8ed7eff71d2d7df41fb31ce703
SHA256384bf2f02cfadf5a4e22c2cb7234519e914ddbc1e7bb80b4f01715d3f6e121cf
SHA51296bf6d9279861360fbbb589601aa84c822832ebecc1dab0891784c93f6d9f1122447c0d48652bcafa1d5b4b337c9fbaf7a169b7796ea9491c145863ee6f7c877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2f0cba336eef805ab8388ec6ee8c4cf
SHA1fe8e103c98c71c96e5e1363de596526091607dcf
SHA256b46b23d3de22340904aefc5ce78026391100709242abe9a86023fd2fa09aabf0
SHA51216428ace0bc22e4d7c36068999ad598bed48c13a68ea15a7c13094a67599e6ee6593007e389e8c648a413a709d38a305cf8f502230929204d696c2511a1a332d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c99679769119bf164766d324e3aede6
SHA10e8ede0c4fe915d064d11b98218fbb24402a88c8
SHA256a713b55dbe3c1cd3b89814f955fcd2202716fc7930ca80a669af5205eaa65ad2
SHA5122dc250cc92f82d5b9746a35251ef97afb1de78b2ba3b83de9414780d09a2de9451d9001f1dbf55d7bdb81945e7d8ad66cefd118cb0b18e9fbe04dcba19986d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517c86e3404fd4acc96a919f579045a7f
SHA1de379107999bd0d61692c4fc94ca6fe3fe67ab81
SHA256d3bd02cbb66a6e322cad0e35975bf39a003dbcae8793862c44a2b42a0d020a21
SHA5125e61bab831753db7cf59c9de2c384b8e3563ea142238724b5867575979b630e972f1ac3136c03073bc16e491455a30eeefac72aeb155884061c73219aec5434b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe3249ac680ca639f17b88eb04cc6aa2
SHA113acbeb4888fa7d03ee2a37c95abcd0fb702969f
SHA2568cba16c09f6d220d01741b2f93b5d2b650c98c6670d8438457ade47255a8ba00
SHA51234b699784170368d5f36fc82330fa74a8253b91dddd3b397f0e20c1ecacd55fab298948450af69814a508d162c2d2685a2e427a4c7776c426037289ba0edbe75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553fcba75d41fa07ac6fbac73de67bb18
SHA1c80bfd5086ed3e4bd339b3ae75d0015420edebd6
SHA256faddc4c5708baf4434e3e8a67440b5669e4c4fd41e581db9c0319f5b82347462
SHA5129df80c90b5dc32a5ed7ecc61df951f7f63e1935c63c2e0f2d6a85b1754d079e55fc4c77bbaff2a83afd08e85d634f27de06a24fe2bdf9820ef92109de71b8a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5155735baa347d57a68818b63eef30506
SHA1d16685b0d5bad3ce702c6c5a04333df5c3c8cccd
SHA2561caa0aed1cf7ae15df2654e387e6d85fe08094ad51ed17126f087ee4ea92f13d
SHA51231c7787af5f702f65f1d1187a8a5e099db5683e56070407b967dc36f8240d0b4e5f4a4651dd9e559f105802ef47e271037ef52fe1ec28ef3b7ecd08657f51577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57041c71d01cf1c0e5a36f8c0926f7289
SHA1ad8539d0e7c11e0f603f88f359f3b7cab49faa7c
SHA2569069cf38376bfaa457ce80cb13a33b243173e9e7c7f6018e7d73d9516c8c1ba5
SHA51281e6157579571071640abc86a4653e31abb7230e57c3a4250d174dd9fb48f9665879ac823f0280fd67d0d604990bf11da13510924bdd3141612de9b12bb6e389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef296661a42e18e50c2dbfd0486fef66
SHA1b95fa0ce156d8589e44a0956104e1309417f91d2
SHA25666d052ee337beb4d21ea2f02fc5aad907b173ad80ed7a4327bb5b32acdbf8369
SHA512f512e6d365e3cd1c362121d1792f40316822db24be379fbd6830288f6c0e068da824853ff50f43e941db1a8a8542d269ea41a5cd09fe78f2c6f0b1f2edca9040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5860ea72124b65265bc4155c908280121
SHA1fd7c7e2e5d84b0cf766ecfa54b2553d0050a639f
SHA256d5e3d5ef902a996568cafb7991f48aa9cbaf814a0a4cd54b8f0fa6553692ca4b
SHA51235b61a076686a1f2e61e8f9d0b360f8dd73576a02c3ce8005e33ca249ba954eab74d251c43f76d2315e8e8135a5c3d99c6e653dfcd491f9f2f05dcd4a6142428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5573903fcfb1333e35835f8e199c9ba
SHA1961d8d8e56a01983ad7138ff3774aec4796f659e
SHA2567826139609162bc52a2612c5d1f9200cff0e3b90a9ed6f80e7b44729cf5795e0
SHA5126268dcbcd45d17a38012ab4a1e77ae7e57c2ad5b136be74fdfdb20ea64e6a36b97079212737ca7d377e836e72f9e2725f1dc5fd41d6d4081e4bc2023cc54806b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf4e3a3f90da99dc37cbd8db34616d61
SHA1318b8c262d6039da9c56d1024887a9fa902bfdbb
SHA2568b5a4478b9222bf1e380ddbc4fb1cc1d0728929f422e836bd407e8e33a382cf3
SHA51209d6f609e11f0105d0f984c13fe7b2093ffe3ad1b5df165ba62058e0219ef0ad4c4c6bd2583c1a44b0ef53e8cb2863471bb7a5d09a7ff0e17cc129538d31b4de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5230b9e715ddcf649c13f1264b05db4cb
SHA185fc399cca65c897213c895d48d14bd25dd3496a
SHA2563864659326f72fe9ef86c59b93409549dd5cfdfa4441dcb79144bf037ed5c594
SHA5123a6753a95af7f102c60135e9c9f2967895ff249cefb1280537e71d4a60e01b6d5ed55d7c0678718bea41ebf524bdd3e264087b9a54ed48e9610a2090b7de3fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffc1df508cf0e9e01b0d930a843a7865
SHA1d184b53c257c2a562ab3759e2c11245685efce79
SHA25612facba2e8f5e0de9290c5339a0f5cebe1643cb0213613272ef78baf06ef3592
SHA512a308ad487799b2d10102076bb88a2e97c25f1deec3a8931cf19858dc2a4a56cb376c1a75f4c74718df53698389083a51121ded959a10ffecf4d676bd26de1051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5240779108683201dab2887c582c98411
SHA17f8f67f414208d193a665258612813dd78d76a62
SHA25698252f55350396a08d2586c90fefae99107e0749ec066a7d1b27278fb7c2a192
SHA51264ec72a738d2369172b5f68fe3aca7fee0bac379f19aea04b082369a16a8dd4274d4207f0f3a5f0ed0511a3e1e168d05ae01b69ec0e4c422129e1f70a70e6f9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c003591cde7e8f769e7e9602f2e7f84a
SHA1de2feeb526e206a46829d318e5d247d06e9bc95c
SHA25645cd556b4dc1b5d9d03e63e7828995c0e2e623761a210dc3ebd7714525b19376
SHA512236bb18114f431a7b1842905718066b0731e7b9d8ace7cdfb0e8c76d13ecfe021c014e531104539af2342283925cd64b372ad2d574000033771fa7367056c302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531abb5f441e47ea3ede8904968758b1f
SHA12259a169ed7b2b0573bb4f7726e3b2666bc2a59b
SHA256929803b8e183f68cd446dcd98759eceeb3d10695fe31604b370f6f6c1c74e37e
SHA512fdd10fe480fbcab72d2fffe6cdc086f7ddf725269d2b4f6be5ffafab925fb41b8b4107bb28eae1179969906aa36c906b07e1b0b290eaa1d33a0a910675ec795e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fa7e42a5227c0e9ea3272c63372ad9d
SHA1300c1e2301263aab6090e50ce9daf8714a3cf166
SHA256100c911fa438673816d26a360bd5cd5a1cabcf1121ac4c31112b627341e24c4e
SHA512560f066cc009c31451f9f8c4cb5bb408bf0078bc702b424e321ae714cdac66db174666e0cd471cee3b7a58aa8f565125175c7fd432c3b1273d0d66ef6852498b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580f6436823872cb58952fa6a596d5278
SHA1f403b2b96f7d753bf1df6aa063edbc60032c8090
SHA256586e6767cf06a2383e3aa09452c99411c7969630474d21a22d5bca137f17bcb9
SHA5128d75c7a54a77f4c8e008ad0da3a332d93d1605307db73427770f05d57901c437de3d853c5d64810b5b16b344cd1aa5ca6f9cbdbc937d1e382b4032bbdd984de9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b