Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
04ec7d00171e13a2ebd4e8f5f66d0c34_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
04ec7d00171e13a2ebd4e8f5f66d0c34_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
04ec7d00171e13a2ebd4e8f5f66d0c34_JaffaCakes118.html
-
Size
6KB
-
MD5
04ec7d00171e13a2ebd4e8f5f66d0c34
-
SHA1
9dbeb7fc9716a5c214f2a0e96eb96502f27e28a0
-
SHA256
725b23afe54a762fa1af7399e090887328f0f9849af74994346190acf6cbff54
-
SHA512
58c4cdff4e8c0a3f7ab79e47b94ce28de84e14f86270ca99cec752a971e4d90b1096db881dcd6aa1fc37e2e091c82acacab7692419267c0c4294204f0205a068
-
SSDEEP
96:uzVs+ux7QiLLY1k9o84d12ef7CSTU5h/6/NcEZ7ru7f:csz7QiAYS/U4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a036fae9d613db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433930964" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC7CBCD1-7FC9-11EF-8DAE-C28ADB222BBA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000005af634db6f781e2eb35336bbb59e4aa9009da049dc0c5b6ca53dad27560505d4000000000e8000000002000020000000a3ff92d0764e67293384f1799b17eb46084d84ce9ce00740b222f62990e36699200000003d4d0693cb3afcf23eef0a2237041817f9faa104df206046cf9e9d455b324b1640000000a156b3501065cc698c4353649d25ee637fafa8ed52a0b44ac43c668ab859751c33f84798883d5d76926feb03f374ec298fc519c1d8a37611eb724fc19195465d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2704 iexplore.exe 2704 iexplore.exe 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2960 2704 iexplore.exe 30 PID 2704 wrote to memory of 2960 2704 iexplore.exe 30 PID 2704 wrote to memory of 2960 2704 iexplore.exe 30 PID 2704 wrote to memory of 2960 2704 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\04ec7d00171e13a2ebd4e8f5f66d0c34_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2704 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c65d1ed3676e4444241926017846e541
SHA1573c4a366aea2d168a58996952211b75025ae34e
SHA256fb3fbf7c5d9ce1894357e44cf172e365e482a2f067ce6316f27d70f6eeb31c69
SHA512f1ff1fa3144a116a95253d03591a1f8dff6041721cdfb32d6c2ae02113af565b2b155b50e0e4686208b1d014ff27df621a2424dd01b0a870fd95b31333f174aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541fad6851ce7e24e7d26c072ce47dcd5
SHA1f8507d53ff7b817612aeec559c8632fb2fdcd19e
SHA2560e29649a84749529bfeb3189349a5b54889e8e2bbbc960095f05590d2d877aa0
SHA512732dc3063f66104aa14f94f1aa14a527c3870fa4cee90ba5e162072eb0a1902c1b9b5033020277058bd16eb1886bc52ed0c0f9f772a20df1cca9d15e6a5ecd44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba95f2328dcbca0561255b1e8f7d59ae
SHA1d08bd9f6c16bd1e5734fb9bab2140c38cd0a3f8a
SHA25612bc70f17e72241e8979bb968a8154839f62217ec87a338180a001f2fe20c66e
SHA51255b0ce1e56d9d70bce54ac71ffe7ea9eb76b34e05a751f3baca7fa4da33d5f0013edc9d179f79cfd4bab1156603c89e72823392c95e46cc0937dd8cc2bcacb4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52944c33dad85c7b0fa8bb64d3eaf961a
SHA15451dbbd73c5c4660f4f97f06370e58418148c10
SHA2566058b5f00a1270c36db34bb8e15bf7f7759c23e274e384c917f07b49566be996
SHA512cadcd1d9cc28b034cb99f974deed8c3bb3c38833a2f5e12ae43fea962034d392269aca82c399120621b6c759f6d7ffef6527be62b669c58b2b20583045884105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5210efbb2963883c5aae346bec9cab00e
SHA1b0b3e47d10b1b33cdae887b57ef31c22ee863b07
SHA2561f9c4bf652829705263f2de4ac3211259527e93b5c4e0a1595b582850ec25636
SHA512ef62ae868936b792f22da98f60dd0c0003eb885e83c8796226a0fc703a2796a76146e2724d3e04944a009ec3eadb7ef9b23317d45d61aee139b368a1bd12eb29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be8b58448b4322ff7af412d37238a619
SHA1e423eb7615e504c4bcd9bc7b153ca6c6aa4a57cb
SHA2564a43d6191b3600d35127c7037e5bdd566c5278d39f0454bfa86d304b8ff9c4aa
SHA51252597e6366bb3ff69e55c3e9b3d42994ccaa926cdd4165ec89f8546979bd3873437ebfe90e3d214fefaf1074974e3e4ce673d9a4cb166eaa95c9898f22f21b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f2378b2eeecd8e0753ae7ded051c651
SHA1f6a549f9ffe8da94f453d1100203dbc2155b0ad9
SHA2567763036b0be9b7baa9431f5b18b027d04dcb15ef64fbfe13ca06567ba192e386
SHA512dc40d6a71d15e211c731ecedc01f5f9d2c6117be8100c7c4bedd4900800e24db25f04cadbc8d80a55eaf7eb964973fe52f48943b1a18e2229fdbbbedf22a3586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597627c8dab7309088fb63d59b8249fdd
SHA1c2e41f0103717c2d85d8ed259f467b3832e099f9
SHA2566485cfb14eefaf6c6a221e6eef486dcb423dea136826165c531c87b83b16f584
SHA512ff0291d5e51a721eb04c8c331172fe9a078402679de3a67500b414d02dc2793b9cd6988b3094e744084d19e9e4987b9e581b5dfa18f8d8a1943add972333680c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58361f3f831d39139ff06e038a37e29c9
SHA134b85e61e85edd195e487b19471cd87abacb1411
SHA256050c4c9f9c489b84f06cb5faaf69b3f2a17da4511b63c29d6aeedcda8b67b6d9
SHA512d4abc0cdcd2f4f4ba25886bcc2760637feec3e67e71ddb20a49cac398d56bdcaa8f2566230a903e472051e01adc8de8b1df64607023945013bc2e65d10fc0293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f83f469901aafc930338ff0251a11a6
SHA16d0ba9872a0897320b7eb4ea75d576f3ae6ae87d
SHA256d8d403ca20d3399a564287c76e90466876caf437a27662ab3abeae4676aa38b2
SHA5124f58060653dc81a9ee96cf7967bb34d3716813b12f5209bb6976c6c4f829a3741441519bf2dd8f3d942c1a18942a159cff8b5d5f07006575a71ed4ae7bb7bcf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccdcb69bbf9194c43940d43f399abc24
SHA18b2cb911080461f378eed2c3d6a92132deca0697
SHA2567964a9b830d1b90ff7e7937d35402e7a4303a5ed9f5d5af89582fb1367bbcf01
SHA51255714c1426fbc5d5c18f4ff1cb41c0cd6d7fc5644077edd03343869fec8894c4707f6007d73f1a1e46a59897c08b510c2618890596f1eb737ccc0ad2aa45df25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa47ea5bf503c128738847fd293edb0b
SHA1ae5771b3dde134dae7a106895bdea332afe52b75
SHA256ed3180574831ce4b6735792f6efa455d4ac7f634eaf9371c344db2f4991c7e3f
SHA51220844fb30ef8ba3a8c33932b01bdf82b15330ca72163a3bebf868c4503e9a70e28188b02f064e7af0289bb49895dd238d5626dfa1757054cf550c96d5b776971
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6a2eb7e7f48a0a0eeba93cb8f4217b3
SHA1dfd672a53ad2a2623178a20e7326b54e59d59ae8
SHA256cacaac1b46bced0cd9b6c8a3a097d56f61d0e9532fcb3016a1628dab85b8cc84
SHA512e37d3404c05adb5892b943d9556883a7cfa75a4844aba1de7cbbfc2fd0c2feaeaee0f7296cae81df32d78db4fcae2654753b5afae97219e9e47382f0d49dfffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539e7927b003a0ece99d6d207b7be85db
SHA19ca3af64bbe40a3c05728fa2e90ca5ebdfc3dcb0
SHA25629793c515a8eea4e9529ac0d378aa16558c812f472020ed58d9f35b1d5b4142d
SHA512bb004209176a596f7f07c7bae820d9edaf9a944f4eb5436dd423675ec01670f9c399a427bc98e737618ebd7525a4afd22ce2b08bb771727806cf389074aa9b11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae94656bcac420cfd94c040e11de429a
SHA139554eb2a464c9b76aef642fe7bc10131c318554
SHA2560776634e2a16439c06b62a1231dca7bce33101ceedaa233e1a98231179e5d0e8
SHA512a7af5413d18a0f6df8febe035a6054b407aa4ba5f8985ce849e17e24c5db8745e3c1d3d801dbb37c641e6867b38aa17e03b644e081cdd511c2997fe4887f5f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca609d597c407303ed82f41367c44be9
SHA1aa765fd24cf7752deb00cc84d9d76d566fd303c1
SHA256802dace16f41fa40b05f8a1eab113a2004fb050423bddd338a9df3646445eeb4
SHA512dc7500e753ac7145a7e6297c2d619756d5e89e2cce1210155028b9ffcf483f915e5a99ca0184d0c20a1cf13f55bbbec1275696c316ce00b2e7ef14a26432d23e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54edc87b22ffc76187980b032cac0734d
SHA14ff4278f05b936119bddf8cd8b49d53982d9315f
SHA25650f4411df5287dbe8f9f8cea3a40c0f4759e4aa09bef14c2010379caa6d36469
SHA512c2018dccd8fd005c5c43a1253fc17c35609c931544b8104d5e7ba6df362fdb97b1124915bc43db84794ca7c666bf2bcf85909ca93d9104a5e25a9d04194c222f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e20d490f53e180cee41a79b6d25db87
SHA1d7de85720ff7cb2e6e2f2c0da7557dfd5a554180
SHA256f361a34e374b8b746452c97b29b7bdd8ab56cd8ac50f5d28ffe81ed4bc338cbb
SHA512a5c60731b729ffdb0570706cc5a0b293250051b074772e3bb2e98ce09050cacd1869da1d0b20b71fbeb1e169bbd11949259bf9047da17cc9dcf9eea9464fa04e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b1ad4c4eb75a1b41e789ebaa1945edb
SHA1f568e366bc0e3e825d1a21aea779a8a7793e2c7a
SHA2569509fd5d44b3b5453c6ea638f889dc8565e53ae642ff63205410aeb6400a3771
SHA512a906ec5b652ecbb32c1702c735ac7ebd23a71990c047ec34eb12be3fdb1ba9dcb3275215fb5fb79199307ced347a941ca0a282d5c0c75e0f7211471655091630
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b