Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 14:18
Static task
static1
Behavioral task
behavioral1
Sample
062cede86355998ea9d3ae301444c547_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
062cede86355998ea9d3ae301444c547_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
062cede86355998ea9d3ae301444c547_JaffaCakes118.html
-
Size
6KB
-
MD5
062cede86355998ea9d3ae301444c547
-
SHA1
8d089f926740ba15891d12d3d060d9da7a40a95f
-
SHA256
66fa614aa15f2f879af7824221f5f476120cc04ca27d596f88953cc8cdd8ab70
-
SHA512
01f1c4245644b3c938f915f4992cf8a3ebf44a48c4b38bbbbfa26d64a65f47e866a5acf45c23a93f3c6f533c12456cdd23a425805dba8715bf3f20bff3244f86
-
SSDEEP
96:uzVs+ux7KWLLY1k9o84d12ef7CSTUV9k3cEZ7ru7f:csz7KWAYS/4k3b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000652be615805406f77d0225867f833d7a790a60550647b516e72ec6cad4429f21000000000e80000000020000200000002d52d2448050a9a3a3303a1515fb39e71ffe828c2616ba28d2cf840be73d23d8200000008d7603126584b4f8cf35d63ca636c3bbfbe0a9086e499bdaa19a10341edb049e40000000be5d0351ba9050c5455ae21ada8b3b0750ac69894a934c7ce7848e9e48b6645e7561793ff63a85ffc57ef9c857bb9363009a3744adb6e712e9fff70cd420b9d0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433954161" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF04A041-7FFF-11EF-A160-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e084d50c14db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2352 iexplore.exe 2352 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2148 2352 iexplore.exe 30 PID 2352 wrote to memory of 2148 2352 iexplore.exe 30 PID 2352 wrote to memory of 2148 2352 iexplore.exe 30 PID 2352 wrote to memory of 2148 2352 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\062cede86355998ea9d3ae301444c547_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592279599c05f8ffc16c79d353ab53e86
SHA196c15030842d35b2b582b3ff034f02b0ee28c115
SHA256d19e194d815567e3b4af59b41a3e3ddab36b5b47082b6b4ea5dfc943753e6466
SHA512250e708849f1f798f5bd9df662a7b7b7946bd865e4aad19574e37c9b168b9ff4d4de345fd8f2c520e6ff4e347def2870d76e834d0c58f73f65e9a80c86bbb67b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf320188d4bb336d479e9f2a5a66a740
SHA136b303b9b3e17bf3f07a888e5902d59f074e145b
SHA2569d26c2a7a588f078e8dd097cd6b3ca939e7f33ed7803036a04bd8533d49e79e6
SHA5129eede9c7ee5b7b4ad5f0c7de0e3e13114c37576ee7b6d5f625520f61d8c07ff336a0f43b4b8e87f3549533dea4fc4734dc9fb8e659759d42bec5ad10448c539f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b234bc1e73cb5a06c5445355fa759a5e
SHA1cacbf4b9bd19bfad6aaabae25232fb35afbe3d65
SHA256737159ff2ce730c8cc88eec0181917646a41566f2e650e1c5d25b18b02a88eb6
SHA512b95ddeb26a318822237723625368ca92a129d3868acffb22c1fd9c455a71b9ec74ccc6f2c675cc61f5f103596f32737326d7880e30344c97982b062615b92417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5609162f044d8e026fd206d20dca10365
SHA19eb4f8608a500c83b95be04c1b14a993dc4a10d8
SHA256cc5e35cf81145c2abb02dd5abbbee28ba12fb48b86ed54577129d4e2adbc29e7
SHA5123211cea2f50b6142c2d06c59dc63310cd8d4056342acb2819e611ef3a9b9db1162144ac8130640f29940e7a8b6e44a7a4ac5845b76498705c061de7689700a77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d235c3deb4212aa9ea8948fa088480b
SHA1914db0cbce83107963afdb72ce1c2794f494a6bf
SHA256f6602243e4ef71cd909a159fcb8180ea4e32cdbab0b7813bea2c7276591c97ec
SHA51201e0b352dda320bf5a6a1dd8e7addbc77a18305aab107dc4036b71e1328a071fad98405140a9445ff55a1ae1b9abd3b4fbf68e56467275f9fc5400cb511b5f62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5158712df08b619c8448011664c8d3246
SHA17cd4e7eb5ab9883315fc856c8106aade1dd3bd7a
SHA256823076491f359bf3aafaf1ac14a3f06c793e6f93a7ce6f4ed7bfd6eb72351df3
SHA512910168eb8f562d48c59c33d757ec5f0be777ba78f4f99e170378072d0f8e8033efd6f97fa4ef941fc7c40fabed082623d28d51465555066100eda4c562b9c9e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d2924ad129e2349df5515e218abb85e
SHA139a365d7b41fe7e0d77ee7da9c6a27048a2d2b3b
SHA25606137c3439c845d3a28b824f78eee963c1d4ba0eab66425534d91385c262fe01
SHA5129ec63eee25c7ca22196ef5f643bb56f82c0f72e65d74ba81d32a7b8b39bf835b7fb6eea9eabaf9fe3e876ed9fbc6fe1292979cf0913f3da8587bfea7458c32ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f433ee7e5b11966bf0db5ac192abb4d4
SHA158816bbd4d2a8835fa5253639f48c211e5b1cd3e
SHA25665ff718185faee8463b8709c35a58b35a33401cb875fbc4de0124705bec621be
SHA512e0f2aac91dc622e61b085b455732f17e3142f1eb08af4b4b32fdcf7d87e51fbd2e6b54a1dea298b350aba2a89627a380d38803449d1ba20ffbcd8c252873c4a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e54724c099851be7f242e4cc192b1fac
SHA16ec5bc3f811d6313507fac5e2ba872cce06fa0d1
SHA256e021012649d4b5a15fc24c306fe716a9ef83f4eda2f632438b37d8a866c7ea35
SHA512d6b55cdf2e80d39a95563be9ad913b4152d4186cfdffddd4417ecf370316d1b69c54cceaf0b82c8e7d28386f4bc47ea4c99c604eb3d597e0439df35d28fcaac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6fff1c7869086acbc3ae91989d22ad9
SHA167be0e2fc0963d9c685de7ba006c1a7fb6b33b95
SHA256bd06761a781abfbb284eae1f8f2c7bc086fa2da37ea0006ac759caf077284794
SHA512d0dd379eb1f2c8e2241aab9fe22f956fb49297f86cefe7a6cd631feb22859b426a0d9775465bbd1eafd4ad747d311920ff976d5acdd8c5bea15188dbf7c68684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5659c7131b1add4ca419c4e43e74d30e5
SHA10453fa739e9e6eb0c2b4cded4117d1ed1361d277
SHA256999a7141c6eafd13f9be84fd356465345ff0d846e601ed1a53d593d37a1673ac
SHA51227ed63f9b321d282bfb764a19724e6257167e030d42acbac358a5ead1dbd49f97b26fba6ad24a9f78fac17edfd8a724e971d30ae4868cd458dc42e01b1c5eb62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a152ce7a0f7b28a9a4630c0dea5ef5c
SHA11b7caa18ac57849a76331261d6147fb58c7aeb0b
SHA256755c526eb66e8eadbb132a0d8e33599db0cb60120effd459a4cb1464e89430af
SHA5125a7dd394f7f45284521289af565b5fd904f5bc597ae03e510d0775826a3ba1a7e8ee769c489282d6d46d633f05c36f7bcaadc5bcb5dc53401db52d27d67213dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5244a21d0994bd06923cac30fd0e7c915
SHA1b596f407c0cf8e51c4efbfdf2485a44c14d3af25
SHA25620a20cbbd4c78603999bd0a20dc02d33c81c2a3c37a293cf6c89abbead5caab6
SHA5123d7a42aa7873006392d7e30a6df7a63834e228d3fc08399e4005ea6b22a616f2b04a13067bb5802a0b6c4dc8a0d0cce2cf8e4b8fd03a2b715bb4b78238061b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e33ecd130b165226fbfe7ab761dda940
SHA1783312e1f0057ca109d4d81c8c38e23ad44c8195
SHA25642e556281cd9f45ae936e8dd3145a5195e677c2d2a996acb9eaa97564ed4f08b
SHA5121bf161358b567c28e6ec2ba06ba501eb47c8e8e2a6aca512514e67dfb5e79ff1afb4875f468aad649822e82ede2a781492e76c8527d5aa06f2ad5acbadb3dcd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab003ee614276cc8b54e880ac2536a01
SHA15ccdac96986a6508af8312e34caab9ee63ad48e3
SHA256fe4a15d77ffcb3342fb9c7da629bf9861e1a24e6c44ee130c05de5464b017d45
SHA5129eed5967ad224cc7a24a4aa9a91dcad8b21fd2653998a2f63156a2c7ad15e1eb002cf24ff683a1b4ce06e54217e2b0f54024db982a0931a66138023b5d4d0d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6bb454fc2311b8ec401d4bb77d226e0
SHA1246cd28e19b2175f2ca94c2af8a73a7751453589
SHA256777a7d7ba441c951c3aadf4706596907030409b53cd9ca02ea1400ad07f91928
SHA512a8c75ba07ed4735e8163ae687fd107f7208c0510b7cef4928111caae8f1e9e9851458531462e004cc84dc0bf3d4e49e02e9b0d60144156b4cb1d4a6c73ed52e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b031c290a36144c71ee900fd1281b2c
SHA186040d8c46f85cdb020372ff37843f9c0bf0a6b5
SHA2569329c47bb4ceffdbc61c621c1f480cba3d7bdd509dcf966e8ae35cdb1009de1f
SHA5125f162ba889852659cef70980cc8a988c9ab9bf7605b8e6fa96fa8cb7f9e2a0df3ecfcba487f5548cbd82a9352f6397acec717982912f1a005bf3d1a3be8c1cd7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b