Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 07:21
Static task
static1
Behavioral task
behavioral1
Sample
098576db5f64359e8a7475cecd4a683c_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
098576db5f64359e8a7475cecd4a683c_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
098576db5f64359e8a7475cecd4a683c_JaffaCakes118.html
-
Size
7KB
-
MD5
098576db5f64359e8a7475cecd4a683c
-
SHA1
7494aaf1eddea1fbc21aefe81035080efad5bc2a
-
SHA256
b01c31194d9f097e8e54998bd9f10d0f60ad1780b56cf42566b1ca6ac4729793
-
SHA512
42afb8ef6aba2ae566a1070440f5ce8a7c2434aab5dabf16b788c2f86c3582e6b9df221fefa09dd87d80fc633a08a3c5bcbc4b97bfe4581760dddf5100fb56b6
-
SSDEEP
96:uzVs+ux7QxLLY1k9o84d12ef7CSTUezfCwdxCDdCCpdACcdScEZ7ru7f:csz7QxAYS/qOQZ/jZaSb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434015585" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0284B951-808F-11EF-AD31-F6257521C448} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b86dd79b14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000f8f80b6472c5081761ab739a0dcac62acdbc8210d5f42ebc64687b853098ab21000000000e80000000020000200000004f84f197255c60751d86761fd0f730b58f24758e025418317e5db66a60d1d7882000000005b97cbc4db400fd9c51aed4a48a776586399d8e32ad33dd101e3d54d9ccba11400000008c00516e55396fe37af5d5c5e5a016b255628abb4ad5c3a1571672469e862077f4354ce4c0febd56e7ddc25f4fe1f8092f81389e5d6abe751e74dd17980d6684 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2268 iexplore.exe 2268 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2840 2268 iexplore.exe 30 PID 2268 wrote to memory of 2840 2268 iexplore.exe 30 PID 2268 wrote to memory of 2840 2268 iexplore.exe 30 PID 2268 wrote to memory of 2840 2268 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\098576db5f64359e8a7475cecd4a683c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5557f25099f31af62ee414ce317629764
SHA1b4ce3a478fe19cd8a10e544fe287851a3506923b
SHA25659cd3f5f8ab6a10b6086941a442bab7109ca0b60d110d23a9e6fd63b0bae8513
SHA5120827bd74c28e7b7e18594a2f7e4e42f39b5a53e6e0507a8529a2205f428760bbfa12647187bca143c3bd276475ef203c7b794614cc3af6919067fbc9856197bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db9f18d2c8f08ced0b8896cf1a15f257
SHA1f991ff6b6dc0494233464b3b34e0a6afc9655813
SHA2561d8ae23dbaace738bc587017cecaf1dd08dd79135bf6c0f7fffcb376f15e8ea8
SHA512b2c9e14ff150f976f2828eeab8496ec79ea78b5584ad0e34e794525cbe2a3cd59854d3ab809db69ff2e5690bebebf15250cb267fc2c321dd2fef9fecc00f622e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8170a2ce062b62dd6da792492f2138a
SHA1a9f8c4a1eab572615fa67fd129f88591f99902a1
SHA256581f09c21d91f939372a6cd787d3f012686afa43e5688f63e1fec19dc642d66b
SHA51293feec125cffbea21ace80d5d5aff3b98165a0f9056e3ba5de09de63f29205839fbf53c8581bf20eac1674e7b9caac32b67ae56e567ed68f9867bcce7ad489d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf25bc77f419f3940650ae5548a99b06
SHA1db425d6f29a3ad9cff9718fa32e8e8dbef8548a2
SHA2566a00f2de6a2d4afba45235500bcc6ab42e3462ce0adb8682786a84b1b8775367
SHA5129727971b40d85bc90486fd22bb78790e18f524af66f2e51ac4120d3ff1b049928b68afbaec22894f3481bfc4a43b4334485cf640ce9df7d7ace7857fee9ed99f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523d32f1a79e6bf8788410ef751be11e6
SHA163b6f15ff6f89ef1ebaa975de3e77587d95423f4
SHA2562d38ae61c64d7b4579db56d85be009b345b132d97507800448857a82d56b8cec
SHA512e284781cb7f670511aa4ea0da7470552f9b1fae14c636c994753db341bc931c80405a19cbcaf90f6c6ec11a7395133c6d1712641f337effb83eea5cba69a293d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6212c5b188fc56e05ba9c3c6b4fe7bb
SHA19616a9c5e6446456acdc4a50f615741dea0f27a3
SHA2561bf5192128237cced5518cffd1a3f3c820cb38321bb58a5fb1152151ca043fd4
SHA512182446c2ef669dc857694b0fa4f25faf79345bf64980400aa0383d7e130f14a71aeb1d06ebed714001ae8e214bb786b9d4b95baa418b9ffacc043b84ee7c26e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa0d7a849f1d49c055d6d70149747579
SHA1f46f3cd066f34b93e6f6a3389f5ada50942b2b39
SHA256e30c930cbe540c2d8c15f2c1a7a85097678306bca78c514ec98a423deb796c6f
SHA51247ffc00b1fcd743492cc884231c73086aa75248659c81def0ce4824bfcb5d159f8339df6980f193acace5cc5d43864332e3f24a564bd0ee0addf4625cf08dac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b52d5600f5b53bb15c7dac5c97da0771
SHA12b8c4c8891b9f344605cacab21ebf5ce90de53eb
SHA256937fb27ce8717f004efd147d604c61365a75f2a1812c7c7163c892b8531fc648
SHA51266a8ba6059eeff2e5725a7ceb21abf765170219c6529464c87ebf9a376ef97f27d57e1106cbdb1b41f626e27450b0f6335b312e88adf31962d41b281894a5a53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1e4e997f41886d23215f7418c779733
SHA1c3fee2ca0cda0f5b087152591e0723b8e0a8dd3f
SHA256c53bb56c5c82fad9a05dc9070143cae58132152352af003ba9b3238bdae08865
SHA512f1f0123c95c5c811bd87b6c3ccd6b8e3abf648f0ba09267373639dc3b5ecce071d95afecbbdcf78a3f2a0559aae281d735967afc3e40a4bc3c80a43ae8e7f66e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564fd16ef5f1d6bb4db236c8c488a1b69
SHA12876fe7ea79c11ac2f4b7172986b1906f8e61687
SHA2562d28e705134d675a9bd00b26d1357fec30f83440c163906721304f4ff8800e24
SHA512aa84fb26cc2fcd441ac714a1f9789f617499c405dc45665c95e21ea432c4a8b1dd19bdc7d38d0e944093d4eabb5fe29c9b417676ca872596e1e0aea6b0a34784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2ebd2836e5cb7472ed75909d0422012
SHA1c8abf2b863e98c9a0513ec0f7582ac3360bc68e9
SHA256281e6265a6d1130b193d03a6d08667ea16859458a7029667206aaf5410a4d7df
SHA51297083f474b158c16f4c1708cda17ff953e4fe8d614d56c0dbe8b4b60eadd47bced80f8b703730e20ba6fa11503bdaab00c3085e4f0c0866dc7ba16994e42686d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e31c22fe86c5ded6dbeaf189df0fcbe
SHA1acd648dccb771cc737522574a99ae868a90715a7
SHA256924420dada969afd6989272fdb00c9a99fdb692fef57f629e328dbd603d61893
SHA51281b54c91f5c73e0d08ea114b660eec096f519ddad00eea5778ed66906930112208cd66e05975837d112885be932c0ea9d360b8e9e03034d55ecbb3a767e3e85b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab2030a8dfa26da37ff35d35bc1eaa8d
SHA12265be5ecfa16ef33f18ace7508ba35ebf8ed956
SHA2565930637ee5931a4dfa12a868ddfc5be70278912226f2459abe64a789053c8b52
SHA5122bd30834fc0f638408478c28eac2aedc1ce411c5eae782f36dfd6329ca65b236d57b23cd581ff91049bc3c497fb84366312de379c460143c88b2c3559225d4d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549709e6d9933032d555e5e586b349097
SHA1573ea4885a668e7aab05e08e8a35018387c0fd05
SHA25627ed591a409cf48a53722174249c356c81c2adaabda78d2daa4598ff73f32fc5
SHA512ec04c26641d2af6408717e173397c3a6cae0a07b03479d972396c2c081794bea05ac86c3d57e7fb471967e59f029699eb488136a22a16db22b7e858877255dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbb5e9ff22c431e42cd9e9b5c6791009
SHA13039c3267680c46c8e930bf3a45451632633c590
SHA256ba7f17e4ec3b99d80c7e75102a1eef1bb36a346ec2dd343b0eeb389aa1472ff8
SHA512afe480c830884220a2187e259fcd4971b025bc99033f257d3457a165c43fcc3bef80f9852a58c209c05b458514e8d51412609bc54f5c3908557a194da71590ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8bf15f42ca61ff78b85ad32f104443e
SHA15c29037be8a272eace6465bcc308358df2a9ea1e
SHA25656e172134716ed8ace95ae47c6298c43a568ef37c1641d8fe0ff0e27d3a7d24e
SHA512fba1253acd4fa33f9ec4809fa29d6d33730f285e7c079182c24df22b88ee3af8658764d3376292c21a60987f2ceb3d28d5a5b714d1549e84e9d64323e32e5e63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5227f07c36a625f000f2f2058635f95cc
SHA1859269fab3392d60b8b25c31763f97e568397711
SHA2563db8868aa0c9e36dac536ce96c55e1a0bd45c183623b937cf5469c4a599fd576
SHA5127203be958c61ef099fba4d8f3db7fdc6f830cd9529824cc86c73a43763961e7b74c90a3a1c9832d9de34bce2cf241567fc8348d418a50d71c8030a66b38276a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579f4d5a504a8e75f25d055d356b4aa8f
SHA1bbeb932df9877a138ad53e3b6285b2dd64192c27
SHA25665823cd8901cdd8f2b0116404429f7210c73f5729727cd8b5d697fa8912dff4a
SHA512f2dad19f30c538d6f680238d9a8e7a86152acc4a1c717c9234f150cd1bf8ba5dd1656d909434162d488cc1c38e23d6813f76645ab55468e6972ffeb405b954cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5645048e7ab91a3c52aac9a08b3205649
SHA1f779152ffec6243213f103f0b7caf8302af42d96
SHA25620e6fa7e70c2ade973d167073814793a3638737cacac5e1afc7f14f0e6109458
SHA512dd89d2f5a12514c5ac1d7e3896bc4e9a687f9b968fdf77856eda21a8c74957371137772e7f2650278b602e96e2c9b30a94e9614c521f86b9a9a0455adb6e4c97
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b