Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 10:29
Static task
static1
Behavioral task
behavioral1
Sample
05796f2b9b82c77e36f6b4bfe5b6ea3c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
05796f2b9b82c77e36f6b4bfe5b6ea3c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
05796f2b9b82c77e36f6b4bfe5b6ea3c_JaffaCakes118.html
-
Size
4KB
-
MD5
05796f2b9b82c77e36f6b4bfe5b6ea3c
-
SHA1
f40882fedf672be309dac411dd611f20bdd42683
-
SHA256
845dfa8003daca2b10ef6132330690432b8a980a6619a0638f892eff8997a280
-
SHA512
b195b9c271ae911eb20fa83bd6aee07373c65bfc1862c75467bdee6d42a7d89c406917ab4175f381a88ab2e0cfadd8c568f40d7c37d4a96bded4c95ef4237179
-
SSDEEP
96:QaeXO655ViDd5/58Hd/se432apaFNO4iS:GpRiDKxO35paFJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000004ed9ca65a5708912679f39b7d236fce89fef5e83232ea9cb9af7e7c7bf4a6263000000000e80000000020000200000000a5c40009abe4ad8493e8e7947f0e7d771696a15a9ef2fbe624fe682bc1ea951200000009b63b5d97ed46a6becb8dbed9d383136ccf15d484c0df7c1fdb765c328f47924400000008e0f4bca34ba60bd0c89442a0332c6c3bae0f95485d01aaa7f90de634ada8d5a40376087b8b5c343845ec39dee8095ecbac983e7efca8956dd8c01a6f07b1060 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433940446" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 607b7ee6ec13db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{102EF751-7FE0-11EF-B5A6-7A9F8CACAEA3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2092 iexplore.exe 2092 iexplore.exe 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2152 2092 iexplore.exe 30 PID 2092 wrote to memory of 2152 2092 iexplore.exe 30 PID 2092 wrote to memory of 2152 2092 iexplore.exe 30 PID 2092 wrote to memory of 2152 2092 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\05796f2b9b82c77e36f6b4bfe5b6ea3c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b79bb1f24598e892870d32b89166a2bf
SHA146db1f5f9f3d364fb5e8c9fe7a8f3d2fadeeafa2
SHA256230ff0a4a9eeca1ebdaf9afdf84ef578f783234649f19adc8ddf4891a604206d
SHA512f6b272b6159e7771d4abbd7f2ab779fdafd8772f2c5aec4dbb7c9f08dc2650efcd07b5cd6f54cf5aef0fa818fba616abd885d6126d28bf0781fcdb062d67e7a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad9c649ec342d6f0cbb12dd3a54f877c
SHA1e85aa2eead70f7d300aa28c16d1ced4adcfa04c6
SHA256dc5deece9457bc1804d629761b1757e5a9fec84e6dfa8e427e626bd6ec0c3fbe
SHA51291c2daf107e8dd11934540e7c09edde2fbde94bca286d6394241d48eadade7de63f12f9af4ff2100c64c5727cd5f151e77d555e42f5faf41e236959ff9fa43e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d8d0066d1db760eb1592d2ee4981327
SHA154e0ef57b93de6c4a98ab44bd98bcd3bb41e6a9a
SHA25604c6f9f726f66f521a05cbf7b5885d2faa5492eceb8df8000158450ecd9dfbee
SHA512d4fca0fd018127921a521b897a8b53c1e7fa0b14b0223d5224cec4f5172ff5066fd9552afde7ce690b239dff8d8da3e694957b5bd7343364ed93beb1ac8e22d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a6a842c35933beb75e97fb22ad7e661
SHA1bed39fb5bf922cb98cafa043a347a43148238536
SHA2565b9a9a43718e99b4546cf0a37fec7247da2518419b58b3700ed31a6ed8729f37
SHA512d7621ec835d5da4f33c5777e91f1d97416c3dc5503f24fce0c6a6982631255518e90a9f8ed7e22fd2a895e5b4274348487fd89f087f0bfeb63fadd5a1f6f2be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c164fe4eb8a35576fefaa5789ad2c413
SHA10fd74f925aa22d1f2ea4ff6fe786ad70251436b5
SHA25682ee4f6adf79ccc68c88e36894678adaabe1f081a8a5b9a46ab5d4d0e7779de0
SHA51272b8521fd66abc35537e2f06b72adae1e195a95a780116df527f2f21ffccf6b8cfad05c90bddb4c5d90d72cb65ceaef42263166bc0d37a98305a10da66dc75bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5504ef5af9ad0ddae66e11f9411fec778
SHA169ed0fc6b5c4cbd0cd43a02cb80b7e5cf7f92f87
SHA256201c464c7e8464ef12b3e6ad2712a5b99bb51e80ccce8ae4a9be0bc54465d9bf
SHA512ea4fcdbf60c3b7f97b2cd2cad8b4dab41e9ef2b38dfab341ffa66001041969ecb97511fbfcc9720ecd3abc2ffc36bce25cb1cac872f9443206e70f54b3b8333a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c9ba9aa6183701eb913051664e8ab08
SHA1d7bf3cf152d36b0605cabd3ac7345594f7475c5b
SHA2562040c269d05dc1933c23c04d48f09fee8afe182959b99a5d37d5f5051f6e1f04
SHA512059489b4903bb88f34a8ae48bd401df33d57a57ba98e914deae6bf076b9c23b6b4f443ef7d4aa15265b35bcbef471dd9b6ae4ec2a13e3a3ab81e55f41ccb4c77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ba3b99405a58164de9ba5ab717b0554
SHA110b781694b032cda289075c71d331bd01f407432
SHA256b2c2a1850c6b34b9d5dbbc0a04bf5b9b2744053f5887c2e97a43af2753342d48
SHA5128d213cbfacdcd20aa3b903fc9db7ec4bd710bc32005867e0b3474b08b5045e05c9f8b8a65e6a91b42e6ce6a6eddf06e1468fb3e1d374ec27d984930145c2c1e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd03f66fbc4ce2b45e4766515bb46bf1
SHA11fcea2f9b978ffa5d75004a49243d9a052c2625b
SHA256ad78e7ffbe823336ea20eb3ba856e32cfcfed72f6c59853a4433e052643a5a9f
SHA512e686ffe61f768845ec8e278ce894941b130241378dbc2324a6a4692cdb5457739bc4fd857bae3715f8bf0670073770ace78212f2e866c899a580c814c6074b87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bde23d323b55dd1d3af1e49ee7a6773b
SHA1f38eb54377a191ab4bcb48dd51d55ce91a5f91cb
SHA256676fa26300d9726be6a6636696f63698fb30d951fd760de19ef47e0429a4f1d6
SHA5120281fafb380f0284a7c3930b16c45f1469b7abe905c3b0a2462428db47736ea9e3cce0d71f0bc1c3b4e50c3a5c78e5078421f42ef0dc748f5b3b76885f5b502c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e90d9067f58827f2909e2f31c97941f
SHA14241d42e5326c90df6f25da13235f0327260045e
SHA256d1c466916b335963f08c3432c81b134d626db13347934d0ecc71cdaa6bee4463
SHA512d06402c35136410923ac3c653442974df70ddb5109530d4fa155d5ce01bdb0be9b7d7ef4c8d18f0e40af049195c78ec380707575832ba69b42259675f68b2ec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5113894c26f260ebc50af0b3e91c0acd6
SHA1defa7c68bb691b0866a42b45361a9c7bee21065d
SHA2568ea0aaa13022dd580f2f1ea15afaafa6808b65641e7df10858489a3a3cfd5c43
SHA512a25d113762c2b678387998fc1f9fcada34510fca019bc6bfb14b97ef0b1f6c67b63b48adfc1ceaa846d5172629f532c37f196333d983b71a9e9e63d9251c9ac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c77838fe7fb77497a887eff393bfc4c8
SHA1443bb5d043626ee540298eb00457e3b7a35433d4
SHA256a83e5d5b99ab26903d1b9310a2cbc20ea768c4f9007105f31d6d0beff0292e03
SHA512bd1704357f9b02955e3c09e1b45f48b356d88712b5170dd45fccb185939ced19e1ca28e1acfba0227ed65412fcf51e0cd33d20a8ce36cfa66c5ef751f303bf51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0e4416a8e4be5e435512c95b07161c9
SHA1fc33db88b60b7efba56208eb8237230ac2c579db
SHA2569bb3944b64d435bd5a4190004d95e7c657de234caa2a02d4a09012b397a0994b
SHA5122a2617216d03a3ca66c3c09e8ef78482a20223603c035617fb6cce15ea25ac3fc9126797ae8e89996544632155d64dd68aff4caf086a88cfa6ef77236efdb42d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e29b2eee6bc56117e5929dcb7f7e68e
SHA1c1cfe68b8ee136871677cf617e9d7f0c90b0628c
SHA2562039159f919a5854ffaefdccb5a09d45e8c0a289e920ba10a00a052bfd98930b
SHA5124bc760076c4627540027012a0dc8c7bfe045975857b50c1d4aa3e19d4a3d67011a589deb1e2a935ea351f6ec42be24cc2f6853f67a12ce6896d0c63e1736b957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df234a03d99e21222c7021dbd26d8e6b
SHA168613d5a427e724efcc76aac8740488660aaa59a
SHA25626d1bd23921f413268326c6dd587b27672abcc67eba704d2760f03b114a3b733
SHA512c8d87a93f2f176cc4ab899d7efe37d471d1b13eaf602bd7d0339613fe50265f3e3082c71057bcdcd70ce836d98be2830fd58368ded57163f25a4e3d089a6177f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cd300858fc46de8f3e00ab6e7d9feee
SHA1c782007d0fbb0496f650cd2d05cd2bc83cb34fcb
SHA256e206a82623cfc3590cf64714a261a4818f8485a29c818e014a1b04658f39bf5f
SHA51262799d4a31110568acbdb625086b8a67e7fdf69e3fe0f69cf3ad91e10760f853ae72fbe90eed6ff92d2ab24c5bc6fbf8f6c4ed1dc8c2a3fd031c9d3491257b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e47624d222ebd7fcef625d3eb0804595
SHA1cae196a192d8b474e939cc898c1a7530b0a5410d
SHA256fa5e4c42b613fe1e9d271250064440b61cf8fdca2b161732e218cf96786b59ec
SHA51232495a5cf5ceef11fa492fcefe455c8ebf0b450d7933096bfc6c48c5b4495280ea25a9b0481ce411720ab0e2a49ad497590b22a061dae077df7b3fd9fecb486b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d21086a746f0af7b9da176276846dfb0
SHA1d7eae6e21d37c8d77668f896a27add606061bbac
SHA256eab58b05154b0943894948607c0262a1ce003751d439fd28c00a7b3fca04eab1
SHA512774484abf0db002219f34b3eae11331f94f15fe5635a1cdc5db0a05c0b04041fc3fff6a20d435c4d37e4ed88c7911c05aa4d8ec230efa54a14ea0e877f326206
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b