Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 10:15
Static task
static1
Behavioral task
behavioral1
Sample
056abb83c720cdfd9c6752b3bb40d307_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
056abb83c720cdfd9c6752b3bb40d307_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
056abb83c720cdfd9c6752b3bb40d307_JaffaCakes118.html
-
Size
90KB
-
MD5
056abb83c720cdfd9c6752b3bb40d307
-
SHA1
cabb5dedf01b06452036fa5ddecb129e9b321a57
-
SHA256
b2433267e5629476d17f7dcc792e6f037060f4330bf12000a70c427dc7de3018
-
SHA512
2e2c05c1bff12781636ba8157680a59047b24c72d9e68374ac2351603a72020d1ce724159e963201e2f7a98a6abdf0b27820f0c7f5a1ee91b9d8909638a5ee74
-
SSDEEP
1536:gQZBCCOdO0IxCuH73dqxRQbWdg0yh0hspGFycy77GhRcMgUh/2M683L+m9ai9Q+H:gk2A0Ix8Pd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000004a18dbffa93e8701aee5153307335680021f554d30931c5bc8b88cc1a932c8b1000000000e8000000002000020000000156f6b59428c574a5706d616b814de663e4729b2132178ba10d30a2de847f3f7200000003d946ab40dcff8e192dccb3ae4ce5c322a06ab06f439a173df0c3a6f4392a97e40000000e1ea4de2915b2838b50722f5a11d3b6b8fe442e4d0cb2f41f39597215f4190b0e4d1c2d638f401de018dd3bf721491b8be2a815af6cd56cdc462df3e9a0f1813 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{102FF3A1-7FDE-11EF-926E-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433939587" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0df9ce5ea13db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 1192 3028 iexplore.exe 30 PID 3028 wrote to memory of 1192 3028 iexplore.exe 30 PID 3028 wrote to memory of 1192 3028 iexplore.exe 30 PID 3028 wrote to memory of 1192 3028 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\056abb83c720cdfd9c6752b3bb40d307_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571dc9db66242a75ab78064afdbdd7c45
SHA10676ba9781b8db2eeebaa686de0f6416f3d5a137
SHA25623500d1c46a57bba13b78ef0e4326858e989ee4b270ebfa849c767fae0bbffa5
SHA512d2746bb588435147502616f0d8d357eff735b553e306523f00b7b52bd58fbd5bc92f3fe9fba5a6d51b53d18a7552454ba39ef2d8bced09860acd381a7b5754bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e869a10a23a4ae1a71e963860d9c376
SHA1e4343f24fa84a1eeaacba4f5cba9e508635a7921
SHA2569f83be61fac2fd7891b002b415bcb23c33c0c75e5d0ea44bde913b0746f375a1
SHA51252046e20b07ed3864562bb5f6c7f1acf11fa360cbbbdd337767f6c6eb4322e5427e88cb95ab9f579febef77e4c7afb5339d8b16fdcd1baffb68ed632291f4bf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519b640f8377345f4814aa9cdcac3034e
SHA15991e7bad72f8a335457067d394cb655da6af5bb
SHA2568f9dfe6b0c421ecde282ecc068644a5cd5da309d0f2bc4479565fee31fbd809f
SHA512123c9a74dace4650137ed15a78f8ae60b1eab1fd85aa3ae7986e9fab05f7f5190420f62ad40b9804c352e5a55135fe9f8a2ffd270504645c0d45dcd746838a1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a04bea167087fbf953e9f27d87720b2b
SHA11ecfaf25d300bfc735e95f5352a8470362b76281
SHA256a6527cb71e994595466d872968fc83ecebaf8d485bd4095f0aed5b23ed2dcbc4
SHA512267c56f4d391175f3f324a6c3c8b1592942f09b5ae4d8d5686d61f58e669008949f5030b9318292da28a6b0d2d446924f2d8693de9d8afadc69500aa055df37b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b14309867b11e3aaee238b06a0d24c26
SHA1cae4aa3646d65aa4de50f0c06672ffe776286fc9
SHA256e27391a1758ce13657375b6280a157945fa25640b88b7e55aa4e55af064244e1
SHA512e516f52638066e1bb1210b831f0ec624c0c9f38dd6d5b9eaa864c85bcec5430804807c1409923fe7bcffdb975ad78257f801b5dd310af7b477cadf957cec95e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e097885698317c50a3e9634652cd3275
SHA1e7f3de2737b16b61dafb9249f9b3c2ab80900b08
SHA256af831d9c83d882c33809721eb2d3d61c3877017829918876683df75cf98d581f
SHA5121df0023e0765dfd3ace9e305e1d3be3972dd2f6b7110407fe2bb107cd93f948686bf67d7bd45db04dbf6a443b15c72083b5dd65ab5d5bf728477548ca374df08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526ee22b65197a9f5a52bb22348d70f92
SHA1fcd5040ba37d1c6db1669efa21ab306eeed102fa
SHA256451c9bdb166e7d442d92db21b3ad0d320e5d5ec83632e31b9d0713b56bd2150e
SHA512f74e3ded7785e6e8203aa1d3da17b31e0fa13f0ceeca83f2146a2cb2ad65a1bd2c575a3e178d6879bbf16b235b3fb92439f61881646f11f009c5181e290711bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd3c889a93d991c6e32ceb448a4c2e38
SHA16667f7630f323a0228b0f87e5adf30edeb6d4e46
SHA2566989c150108dbd65fc6bca2e35dafda179e7091e49f927e4def5cc31f753b2d7
SHA512019d7c4c632e07ccd0907e6bc0e16de29749c78fbe39ea10992e276e770294d284f4e02719f7c78d7f6a65829de29cc608493f6e06049f281efd36d53a649173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57afd1f9294b058350baf84791aafae4e
SHA1d41daab6d284837f60c7a9ad02f6114b57474d46
SHA256faa117bc3d0d99869a9486aa9371a592bbf99a5a10896e47575eddd8b03ec39e
SHA51234b0e4c136c678b8ca653a0fe5d67f294f334c57e50f315f5fd92e6fe22e57e34cd70589263ef7a34ee87264baf102323bf3cdcf0ff69fed787f5a3692bd45a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae2df269ed6f765284a589d016a5d38c
SHA1043d30d938dcd572d3d425027a1c0c6713205ed3
SHA25624093c9a12b58a170cd9750e14ef59849369b05b403095889b6f15e1b277bb17
SHA51270b1b1003602a0fa635c88a406440790e699c6a17ed26ece06e0f98bc4d9b734233541f96d68207cb9fc8bbb7f82808dd76689035209423f030eb577df2f7a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c360ed7f197f677df578f392443f93b5
SHA1ee7d51ce2037b1d5bdc99d40efd18a25f334b685
SHA2564f85a0f6ca67e6d2faad253181352af728cd20a564b63a840ed0abecb1c7aea8
SHA5129cd168463b57109510a4665b3c4668f95efd3adda62efd142bcb63864b15cc88d8f9d01c20ddbc8d564378ac0564e6f220f8822d7eb76fe136e3bdd3569d01e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef294590f2355536edeb5e236761fb8e
SHA1ee5d059d78be27a8fae5b5d7e3149a84418ac56b
SHA256443f952867424e416a81bb071b8edfd1c8201033b6b6d3d933b4b29a76c1d515
SHA5129b44d0bd8e1d99bf1aa420fe23cdd0aff9e5087195779f8faee1eddc7b7ea6e63bc9bd3dac25c2c22367739309e7e297fbbb42a34a42ee85962ad32da6a049b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ebe2301024939a8c54b7a09c4e60619
SHA1255e87a063ff4906d019b970baf926b02facdfeb
SHA256b9f97aaa73081cea4a33b234a96a0f1b097955b1646b11101a2fcaa2e7bfecd4
SHA512360212ab389eaea7d248616b55de96078b82557e286467d62d05a5d37f90d46a0d7a668d70f3376fedd8343910f8f40c2a8e1a9fe70f56331cd6ff1da724b80b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561948ca21c1e1ebdb0f6fb5c0eab0604
SHA12ab5191fae156925937af23abeba07059d966e8f
SHA256b5010a906bb8e7bf660ee671818ed05401d4a3c4f9d1d36c56fbf8a807f6dd1a
SHA512a0dea1d04c5cd6e0d59c574ace434abe6def418f45c54f050e67f407c1e57c93ba852d63670cd767a9479fa120f22c624d76d84aad2e6e5e728bd48156b49c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eea1891bd93e31dc767c1539e631869e
SHA1e4cb5a85be26b4b0dde11fdd015cf3a4cd870203
SHA2563fe1507db48b036dd129c1755c82fdfddd955789f26266dcd38b93793ee68993
SHA51246c4376ed44ef289811751e67112e8b4042f65b7527bbd83d9efa15c158190738b8df0767b02cf9a8d035179e517fcfbdc33d0ea07ab576af250262fac00291f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdf386546de9ab40d57b8024b0363b21
SHA135716b2a719d06c72bac8cf4bf79f23effcaf8d7
SHA256de24c70eb7e42e5c0de0a1770c22715ce482df8828625066a49d6e362e8a72ff
SHA512821bdee57e213b48f528742d37e4d5003ae1d60307993a0f14a833dce94688305e0573fdf78ab924b5c719946adb7a1113e73f0bb123f88493d4f4beb9886da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5665bfdab486f46cf35c5402eb72ea400
SHA196f0e83b45b6c9b8b13103b42450f9adc6843b42
SHA256c1b85af0151951508d2ce8ea36bc8af495620f57aa4add9f4b692cdce6a5104f
SHA51288feec7cbf82c197a2faddb16918936800363cc7bcb4e8a379006ef55f2deb8dbfe18f9c0d0d355f136821ede4ee169063dd039e03175efef4fe9ecb8fe1a175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec861e89a5a8b9748498ea71cccf58da
SHA16f5338e197a594fa86e5ef44b1df6a794dd66a71
SHA25625eac2fd348ecd671d83b9b419271fe609e1bf1b282dae369f5bf7e7cbd825fc
SHA5128afb0fad841d7b6b4836d150fb5d79f16169cfe6e4e4cf0ccf8f0197fe3cca64edda3d2f38c95d922f49b7294d0df9e01cdd536027dd39ac8f6fd22d234a12f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cb7bc6fb3a43d960c186058b9aa3d55
SHA173ce0878c32dbac4bbad6dda9773e44d3c377941
SHA25690acdef2b9bc74c81ab6065b7ecd70ddaa51617f1d870becf479ba3f5afab35f
SHA5124fa3358b78c22afc1bc0ec7a9ed92ed1e5c64ebd16d67b81b4e10ea20af4e466b1f28b62e9b99c03024fd46a38a57da29d3e625e37c6e4fa2fe69386d28dddd4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b