Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 06:53
Static task
static1
Behavioral task
behavioral1
Sample
04c378e698e489473ae5c403d5266c0d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
04c378e698e489473ae5c403d5266c0d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
04c378e698e489473ae5c403d5266c0d_JaffaCakes118.html
-
Size
10KB
-
MD5
04c378e698e489473ae5c403d5266c0d
-
SHA1
f43477acd8c7dd54912fc4ebf32e5a8123f9a170
-
SHA256
a24ac00557e2e733acaf73ef85474e9fef1c6b37ce00dfb0a3213742869187ed
-
SHA512
b578fa8b09d37006e2b03f1f87a1621c36ad8af8e7ba3af0d5f1042d301abb973241ece7e55ee45ab618888285c00234c7e5df473ccab80a09b3d1b44d25b142
-
SSDEEP
96:uzVs+ux79zLLY1k9o84d12ef7CSTUjwGT/kSBpzrhufGet6fqb9jKtfs7glVHcE8:csz79zAYS/qgiVeZKdPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000004f25ada31cf7e8450763b6bd0f38f986f14bb5f189b7b08f14e7f6211e2e8254000000000e8000000002000020000000bab8cfd0ca679f2dfbfa41a53395b5e6507c2c189072bc130ec8ca2f2dd6e03e20000000581ab8cbb8eaa33302ca143be733b0c3265d9d420bc9da735a5e5bc2ca17d4654000000039839d50e7bc5a29d3a8ca388115eb54530fd083f56537987fe1747e05a03cd1cc464ceead27b93cf2050a7035cc46a5c5d23b2c96f8420478f8f722e38608dd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB1EB871-7FC1-11EF-B6DB-72E825B5BD5B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0e9c5b1ce13db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433927473" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1288 iexplore.exe 1288 iexplore.exe 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2132 1288 iexplore.exe 28 PID 1288 wrote to memory of 2132 1288 iexplore.exe 28 PID 1288 wrote to memory of 2132 1288 iexplore.exe 28 PID 1288 wrote to memory of 2132 1288 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\04c378e698e489473ae5c403d5266c0d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1288 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549a6fe45a3292408c863faf39fee6284
SHA1d8f6905c4abd90175476144ab920ab144b28f600
SHA25640b6ad59182460bac0398458559ab0703a331583f9b51d6f21331f1bf0326290
SHA51252f4bc6d6c2fbc4785e8157fc6c3b4f76c0d2210bab081e4eec6ecde0db5624af0e9199a3e376a8b4ae33ed663ef8185bfeb80e1117be4f81a37881d8b6c7b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8cb9317bb021e1c96de925d8f25cc94
SHA170431855eeecb04c0dd84cf6b985a240df852d4b
SHA25670f7f529c1e770f97b18ff7cbac645864b393434c1f52099f4d9fd6053b7a341
SHA512b2746a157f40180724fad4270d6f5a3aaf30aefad4cb247f241d85d4ebd95b323f4eb3bb1d1d730f2813f753be75097caf9591bf4e1dec9169d172f5efa2aa50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4021b1643c9000ec79c1b750a388283
SHA128a22dff2537dd248bfbc355ff0d3bebb7572e53
SHA2562abd2f111d369c538bb85231c0e5f825f44cc1b9f7a121793858d87537a9cd59
SHA512676a4c1575cd9f6497371359fcd80518dd1f644eb4cfbad28ad15c56609fb04b90b371e1f3914e86262586b7f28f6ae99afee34b47be8514551067d7eb4d08cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c53f701c8b3f78b2ad5c32832fb23d40
SHA1afadf7ef1fa68d8790b29373d56e3b71e23477ed
SHA2561b433bdc47b2817f8deb2858330d51ce1b0fda3b9b9906d7ee7f81fd4365a05d
SHA5123325e035cd8407f54ed80f0fb5687abd8e192f55f5221b3838d08438fa735b1e7661e49a9fe8992b412a1842ef460f13d2bb3519e457f944f90d269dc7345c20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572c1be4e47328c73de643cd61f19e317
SHA1dde6b7b55a04232ff929afa6bdab111f18ea993c
SHA25623fff58f1cf2dbd76915072a63c10436666ae697bfb663fdad657138dce65a94
SHA5128e1b5ad58c85fee1740593491dcc7d311d21c381eba195296e737399a031fd6e3510465137d052fa40f1d3a4e4a7807632ddfcb0c9ef537508f21b60b62d325f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593d8ba475f09e75c802f56ee6c9a21ac
SHA1133d3be653e5b1b75d67a1bed6fe8478f2cdf15c
SHA256c654a8211c28a5ab2c235b18777a41f0594e00a7f0a1d52d0f8dfcdddf34cdb1
SHA5128281a192f8e94f762f34adecdb8c6b391d394c2d521162b3c2cff0b42358fe68c21a6df30e02d6dfe55eff5debf86d98c85a80798b346f3f4ae39233198276db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5401c24deac6d1c77af1f964bfb47bd46
SHA1166cf27d2ad852e22a4da06e11a92c62a7c56981
SHA2560f4451e57357fbdf68867f2f2420aed6b4ab5e80e5b857e8b103546cef647e87
SHA5126197ebf49aa3a84b1bea2bb26030cb5b3a41e02340d7532efdd83fd2dd06cabe3c680d7c1c0536504080c7cc2b37a7707259cdb147b12ab2f4a65982b73deace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6be1991ec4ab83e1ee7edd6e2e44fcd
SHA1a660045f119ff97a1849c13ea1c201053f540276
SHA25642cfae07b4382f31c929924603737edaab68458bb9e2e52b022f35c1fcbb8da2
SHA5127caed82e3445962253a67e228bdd1b0054f30e63121695e43f7b63b37db296ff31191e40d7d8e6a287b22ca2411558ccce9366a14d81d70080b6a1e91b83e67c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5b65817925cab4f18a4d2517a231691
SHA1159a5f5a68d8c2f1cbd190de9cd518c8a43180e6
SHA256a3358a53191dd6f334d8e156c6625e2ba7ce27d9c3559f447646f260a4bd47c7
SHA512652dbfca5399ccf34ac17a9174c2f9cd398d9946966267ddd01e5907c3a0e84bbe5f2a689d5181a766a1a79206dda0859fb355f665c1e75bda12b72a0c0dcd5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de1c56fcf930f33ace3579e4c467aa94
SHA1c96ac3a85231a4f41f07fb20dda8aeca022b53ca
SHA256af9b50de03d4d2cb61523fbdb0d8ec967d863a0675e6f6b9ae3539b2f173ed1c
SHA512c6cedf6b2d666d8ea5eb71524e75c19482656f3205242ea0cd8c74b4f47ecc624a62180f4c0a50464863075410d84f718d957ad0ef80e6d1cf3ff7a392bb5633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e28a2e0439ebdcbf1c32e7a5812624d
SHA1b467d89998895a3c90e18546c4b482b294cebc37
SHA256ded415b5ff67ecaeaa1f02d3a36a3637c701ff39b3e11efa3c014cc2881139f9
SHA512b153bfff38ebace264949f7e4c6a6b78843b01f24cbe49c0fecba5b3af9bff75da3366f3c61729569f18075f3cc4238b212de6ff3dacd45406bb274ee720df23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55814c9254bcde8e18e4a7295c3af9658
SHA13ae4a1f9210b42fb09bf2cdaf267e8c6d1de41f3
SHA2561b9a0035bc852b0d267ad399eae890d2e0d6b44063f51124ac27ea15d89acbc5
SHA51208e59616e687cff9b2f73a9194a9aa280cffee08ce3fc4162f0e311709ef4657366bd9a11491724e7d1326b205fdc6052066ed840f00614004e327547d5af99e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a75db7e27b92439ae080afaca8b6bc8
SHA17583519a4bbea05da3364fcb9e7e66216791c70b
SHA2569ac20d3ccbd892ec400221ab3199f970b05bedbaa3169633ad1e7a59d306aa16
SHA512a2f14cf524a596ece6e814ef71c24a82e15a833c71ae5e6e349bbd8f0ce3ecbb35af9af4c1c79cc525f0a6688d91af4843e122a2e6ba63a7bbb8e39e97be6843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e635dd839fb55f5785082f0613d15694
SHA11368f28e5a11bad73d640a63587906fefc45cb82
SHA2567c51994f94b6aeb90104d3ac2d8c8bda6fadc63a166fcdc1abc3788f781749b0
SHA5127e77399e259d113b8f6d33dd63fa84a3e5c0c67f4054f642f42aba87cd7049d81f38649bb6c804ae06f1da5e5e8d5c1693e754c2127513b35f20aadf69016919
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9cd51162bd66aeaf9ebe0528cfcea57
SHA145732823e970dfdd359c653c31ce8ea34909f397
SHA25622ceb74ede9e427aa23bed35a2da27332cf9c5f752d551ff12c158455daf860b
SHA512040beb532f312138dba3c90b3bd5d1aefe43b67e94cbbbeb89f3afbd99fe7b2db37e10bc2d8801dfdaaec68f97d4e96a801ba4bb85cc3cf2531b47f6ae422372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5400e74850aaa374f4c3d62a45bc08bbd
SHA133d65453b4731fd18cb07badc4d5b6b5abd06482
SHA2563fb81c0a4047b1260741e8fe9cf92b86ac7db12dc7ad99bfecc37a7c01d1f00a
SHA512a47cc17eba8aef8c6da7fd7620255c451eb1b25beaaa85f310d7c7231922064a0002fdd2f78c063652bc840bad438707a3c7b1ae9028139398e5b0aae8264452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584590459dce4d3b49057e4f38aa65b28
SHA1d8629c50732e5703de4019b59f10a75a659b90f8
SHA2564650654de77411129d02878b356b8826e482126fb808dba50bb87ac52eb97749
SHA5122283304a92bb112bd6114d8cf1b25ed5736034318e1e1172f1c3dfdce4a6aa19c9f14b7e5593c19b9b3a2df392929a60520bccb37a8f5438f6cb4b745840b593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569c425764bcd2ccab92057a7e2e7e093
SHA1607277c09e49af4a025bad2d146ad5c6cabb3ee7
SHA2567bd58373ffcc8c148eb6ff6855cf0d928d96e918a7fd183fd3cb87a230ba9b8b
SHA5120b7d1a8c68a05d2717da566c89266ff204cfb854140e9363a503e9d3bf113e9ed07d718550808847cd606830ade643a60029855f02f210cf56f93f80c89aad2d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b