Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
05dcc8f3cb4473138bcd23371aa0003c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
05dcc8f3cb4473138bcd23371aa0003c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
05dcc8f3cb4473138bcd23371aa0003c_JaffaCakes118.html
-
Size
70KB
-
MD5
05dcc8f3cb4473138bcd23371aa0003c
-
SHA1
fd5a31b3b9bf8a22c94e377ae4d21c6d1f39d712
-
SHA256
a6526d3e62ac1ee215b15e4bc930ad6a83fa7a21a7107d212792ce4741626c63
-
SHA512
8b639294c76de5a8d4536abd2371ca2fb8021cb1712da05a6868215a62e07678b3f65a639db4d860ba730a441774be44dba311d24fda1de073da056948cf055f
-
SSDEEP
768:SeqQqgQB4ULa2qOy3dMZ3fxA9kwtxpc+rZivhz+WtX5Cp:SNB4ULavOy3dMZ3fxA9kwtxplQJzRUp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6040f49dff13db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433948467" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000aa2a992f047f43ad23855efe8bcd5852625b0155253fc680c39c788a50759011000000000e8000000002000020000000fd9fc506b1fe400017aaf51b2f6c9de2fe2eb048b7506df2c58b5c4826411f4c2000000051a378d54747356e0b2e3df55f568578b1e5f8fa180520868d50927101840670400000000c5d16657079dfc12fc862d50cf637cc0ad4659c27d9f62195f30ca40bf3ba3cd34e6cac309223c343b5d8c252f16c128d598b048efbae31ef3440d892d1be32 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BD130441-7FF2-11EF-9FF1-E28DDE128E91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1476 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1476 iexplore.exe 1476 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1476 wrote to memory of 2380 1476 iexplore.exe 30 PID 1476 wrote to memory of 2380 1476 iexplore.exe 30 PID 1476 wrote to memory of 2380 1476 iexplore.exe 30 PID 1476 wrote to memory of 2380 1476 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\05dcc8f3cb4473138bcd23371aa0003c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1476 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9678eb8b24dc4f1d0483dc95c009cbc
SHA1d60f3de24994d169ce15115096823a76ce6be86b
SHA25617147007caf35f544094933599b41b97a2dc4ae5a625324502a59d7a26186914
SHA5125075fd1c601f45ac86c020dca00227585c1de2e0e1934e91f1a574b681a99e1b667b90d3c7d614fb6969ab7500b6d08f43678ff26bdd0835c40b4ad770330615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b6ca176ff33b4589ba0ae502a338d55
SHA1cee4b0e549d837daacd60a153add022bd79a45aa
SHA256cacba66c6e436b692529ecd34b3cc93ab7aaf9229fcd1e758dc5e102f98cfc01
SHA5120106b9f03514669c61a0c6de883551b869eb2391d621b5fd44ce747949ad65faf9f2c54e2a21161dca04363a6aefee2dfcdcf0ba3b7120726695df7d4f316b1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595bf119d7478b763f2813d221089cc5f
SHA1a9cdbc1593009498e6621c4f6232d81a19a7ee12
SHA256d3bb4e26db633a54659c736a73edd9c79f053f434a0c602c36efe991e0711d04
SHA512a117155af4d31fe9e8b339df4eab80ed4cc61bb65092ec029c3df3af62ee5faa9ac2bc67e5cf5de896e1287da9426869997d947f18eb990ebd08b043598df8e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5247353e2d909ab9c327bd116be454c0a
SHA190f32174aadcc3ec4c2fb24ae01c592eb63a851b
SHA2567ef8075c13dccc34e2610edc6782e31f0ad69a756fd0fc6c41df954a079a164e
SHA512b1d0b225f892cc3ca98f44ce74004b297d1c0affeff931d5bd67919ea50073adbd72c1fff7c3c1af9350b0d6c0aa7bcf12777db259767d7e6ff0c4723b988e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc851386c7d91f471c5c3bf3cc49e157
SHA1aba753de4bb96add0464f670ca4bbcae3b723f5a
SHA256edb513d872ab15ea36953f2febcd0647fc3cd027a2e3b47fa8cd09d815335366
SHA512fd3471c75955db5b06259911571a824865c631ce6254a0f991eaa9fd31f868aa69a8817221300070f948068f7ec9f52d05b235a21335ae112c3fcf634e922f7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5820e1294d4b5f49cf4845358c80d7fae
SHA1d4035403086edde37c4c894b53104119e316f77d
SHA256a28656eb42982167930db2d271ade20bc61a87e1f0ae40ea4f4618d940e67607
SHA5129a5e21b6f57747e722330486f0366146b95e50c66f80be70f3089e3ee8b39c5d64a922ebe9f4fd58f60210983b0c94f7d8c65c8dabab7615ec749944b9d4cba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514e1c549e6130c5085d6d38d1fd89a66
SHA10423d0d6c795aef76f924be351cad21dfeae908f
SHA256cb5f0c81192e17e0387ea33eaa551c5eabf63934e57bc2315d3a3071879f9908
SHA51230da9c1393253b9da0d43baf2cdc60e6c2276abe69b6232f37786a448cae21a0c134f733255c78633521d914d9d2c1d2b7191e34d46fe9b40638bdcf540749c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5117689bd4c7ee50c65ef84dc69bec290
SHA1d07258a717bf11275d855dbf419ff9f59ed66c9e
SHA256cfb79673905e077192729f14309c08a77845c8365e1ae05196e96dd8fdfc01b9
SHA51294e482e0fc38187b10a5a7a8c8f391d978d270af1723851b55c4971c212599721f9b8742ecfb61cf1355dad417f54dcdf7e866c7f0f17ec2d0d2150ced4807b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589f4cc7ea7893fa4f56ea5032921efdd
SHA1b86f4c0124d9b40e17114c6a9655e904cbe03e66
SHA2566a6fefacbfbc3f7d33fdc0bd450340d8be527c5d938d8e8570a292f627dfa563
SHA512828c31f4e7c1fe3e3c2de0f025cf577e07b396081fd0aca8fd6b40a76a097c2a2263f12e99165fc8941e46d92724cbe2a93b8f087a3d8c5a635ee6e361be4f7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54383300b032831acf4da89d2155eb419
SHA13592dbeb08b89a3e1b055a21e896c51f1e4bfc40
SHA256dd8bd5cd3c7d7addaac0fbdf410a05a123ad452e286fe5a979305452baed35bd
SHA512032eff6470129a5a905907334d1e11c4d24180f0927d37d8dceb85ed039e04c8423223a5653e2f9d841690c964a1d6ef083570383d843a058f6469d7e1e6a931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f32f7daec3e4c9d0da5c800765d97c1c
SHA1c2f0eae84974f87c775f1887d25a4172c2f04916
SHA25693344f11a5e3569f9ac112d2933fbc2742bede24e9ab7b47438e32ccf2eced8a
SHA512bc97fdfc262b0467fdeaa6244834927d7158fe604ad6b562ed6e3b203885643c68f06b014b2c03fa159ec88636da1cbbc800b6a819137770252edcdfd613ae5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5600a669526e536910d1f130bf7665f0b
SHA13e76089e645aec816568e34b41d709e28f60cd20
SHA25633c4a5505b0413631a7009703dea4b0d06b85dd8428b355bc22907aeaa5fccf9
SHA5121e911ff1cb8cb40d8496ec9e2ed3a3f21ba22bbc341db3f8c1aee89cad1c9aec0146d5a9784dc8a1eaf67e3c394669c1474bd294e0a81e30f33f9199790d7b21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c7bb4dec407b4d63f3115285115a39a
SHA11b562ded7296e8d9051cc73a2a79fa9b9e3f18ee
SHA25628e23ebbe5fed4f9cf9be677e6a297d30a25afdd49b085ae6663dd5d2ec858a8
SHA512f00f9e0c68b380db9adb71e8a9ca8b42730c80a12d13f5cb5e72ea8b2fa613f612024ecde8adce9aec612de51fb648e1e23dd3f509c4b04f3084a08a6a7712e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552992abce3a8f7aef1dd296744fc45f8
SHA1ffe1a80d6f650046c23e9535921465bfd29fd0e4
SHA256d9f15944e8fb33ec3d8f7f1c5974ed1a003c17f755788d09166c3981153d7577
SHA5126cb197c8721a3fe1ab787b315dd0e178faf8019cee3d15eac8bd7ec731c1d86bcb26da55c3b33f37fd7eca777405a4730d045b8503586d1366d99c89955b5461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b14c46bd762805a04b467bc3a55d460d
SHA1c7ee1d7f29f48df60f9729930a1ea20d35de5f02
SHA2567392bfc7b0ff7e0c36b0f77d862a65caf8005d60309818d0879cc2df927b96b3
SHA5123893debd2fafa4fd9d14fc9b9cffc0afa9127dd9808fa72eb1411cd9fae2af6cd1a885920f4604864bfb264792801d799e40ccddeaf9592945091549735df1b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eee108491307cb497dfc8bf7b587fbf5
SHA1d40b46524efdaff745cbaa11b83bba4a76d327ac
SHA2569cff59e7ee4d9ea75be23b1553c5d60f3cbd8065e7558af43fb423a908afc8ea
SHA512e3f2d6724af3f78e3389c7424008198eb31fcfaa2a42bdf54981df5030a543fc4521c814f2c2d256d50059f6482bafadd1a1192fa836c34695ffe77357dd8460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa529b14a20c729defff274421e16c7d
SHA1d4fffe0cc5ec034fdb7047884a9dfd32469ddf10
SHA256c4626537d259f3ea6a91a75b2e32085bfdc8e2ae3b37c7fc5bf5fa3d62d26840
SHA512262f160ce94671be7adb8802b7986e7babea2d79a24fcee645fdcc0ccb44aed93690000ec7aaa888bca146cee2b59433ad635e2fa3b2da8cb92924a0dfc56408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a62ea2d84c8d217a5d26252b9bc550d
SHA1c29fbfc3a68fc822b6216756dc924ac36781476a
SHA256a07f25f86ebec37c8f3ec120c90988dc2860ce39dfccac87dbed26724b5be5a6
SHA512704d4533c63ac24367735ff31a61565db70604c80e33b35aa09ef25d3c5ac0c50e27f9fcfa33cd97bb56cfe1d071912d621fe8ce7e344ad1e8d2a714134c7dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af01df4aee580d95eed807c9443b1f1b
SHA153a2213de3b842c1d9fc5406a3cfc4300b1bbe09
SHA25668387fab8934557f737d3aa0458570fa5a7c9775cab7a9438c9cd4ea29c41bc1
SHA51267895f50b739d6dceda7ee2be5b022f7b38c29294f7f685990670e33354f354b6c50a6f5190a41809b4af5ada7ceac0954990aa46201a348ad0bac5faab3ed33
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b