Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 06:46
Static task
static1
Behavioral task
behavioral1
Sample
09632fb5706647e1c1519446e0d8562e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
09632fb5706647e1c1519446e0d8562e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
09632fb5706647e1c1519446e0d8562e_JaffaCakes118.html
-
Size
9KB
-
MD5
09632fb5706647e1c1519446e0d8562e
-
SHA1
5cc84f7c900f189543f82ab72365ee8b80954204
-
SHA256
e4d22d90319ae8b142497f330e8ade092edf0a68c862e30d98d6ba469739c22c
-
SHA512
3938e11f9d5c6ae02a565804839790666ac8b56a269520eff149fdde6441951fce52b7367b140213f1cf2bbf25c0ffa5970a86daba1b75a71bfd6dbdcdc9bb11
-
SSDEEP
192:BEhdm2wLnCLnULnQLnNXLnAZLnyLnIHXLn0LnDLnuLniBLnHFLnzG4kBAW72OrYy:OhdmfLnCLnULnQLnNXLn8LnyLniXLn0+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7071f4d89614db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434013439" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{02D3BDC1-808A-11EF-BA28-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000419b86304e8a28c406f8dd541f8e046cda96e4a986f15e4653d7db89a0b72d77000000000e8000000002000020000000e674c7579278209cc97838fb067a6ff182e9f10a2660f2b3befa9507fea3fc6820000000bc7e84c1f39880800ab9d63ef57b72d30e5e19626ed8602a9388bcffb468714b40000000dfa7386880801023e80496290924e86c8781a24973b0dce049c803e1067417b2f5c6af87c619f07e41cc0c8dfae6f07f049b40d441f9f9b86d3ce0b38805832b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2328 1984 iexplore.exe 30 PID 1984 wrote to memory of 2328 1984 iexplore.exe 30 PID 1984 wrote to memory of 2328 1984 iexplore.exe 30 PID 1984 wrote to memory of 2328 1984 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\09632fb5706647e1c1519446e0d8562e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9c716d81a2d6ce30c9c0ec3e4210109
SHA1398572d93c7d771aeb172fd5dcaf2c3f68dfca37
SHA256c32fdca7a231c9cd0e6ac24df08cd8b3d7b222046d6a8c5654fcaadc62a9596f
SHA512e9bd5209a2806cbdd2017990f73bceb9f0229b5fdf5ecf02df3d91ed55474e95e60a38ed366f8e551d1a5a817aadb2c9c7cac06ad2e01ee603c865a3a169c902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51879b7a676aef23516f4cb9c8609eade
SHA1d5594c0b2f7ec56760bda28ddb89b77cfb6403ee
SHA256d80b91a0697ae088a641d7bfa141d6baf18efe9ff1ccd1bbd04fd0e5eb824007
SHA512ac2cec95ec19d323f796b75dd45040dfd72196d856d136aae22225d859ac0bc5efa436fb795693f9344f5a20e00030a483ae98bdd603d9d718debb8293d5081c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1e492db55208cc7d2eab3e5e67a64c4
SHA1024a0fc03ca412f8bac2b6fe0a2f86de8f514385
SHA256b5831e7d8ee52af7d01a642fb4413eebbd9a28562f959cc1a86e88093b05724f
SHA512aed71b216ade37191bd24b70eecd1cffee516785ecbaa427bdc2cf94618d24b3446f306aa76bbd5d94dbdd7928e61c6fc4d1d84f9843278efc6221cbeec88412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c8727f630fd1a84f14309d7e0d29fde
SHA1abcfbf740626d506ad0c49b0c31e6ee73fca555a
SHA256533b373aed1ec2284672d4a6ff9a3c816e93527263420adbdbe828dc613a821a
SHA51228dfd4dff6dae1d26021e57612c2e68ef8424a45a1b4ca13e86c82d9e04f8e6f01d187142b52c148608ef1b55c361ffbb0fd1b4976c5fef3b8845c291edea268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5044db7ed8f9b80543262bc62e79aa9ec
SHA12f8f419775bbcb12ac31c79bdc4f5d039e892ff6
SHA256aa71768623239fb0a2f317b943ed38bf720806506acc4a3f667f062dfedf7dec
SHA512203844adc2c9ee6cfd4e99333354589703296df47e548e6c022f2c4943cb8471ce08e9fe3065db7d9d9b488b01385862519c7c6ebf1bfe73ee2ccff54caf8b48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a243b4ee3f067b4508ff69fcc23775cd
SHA1f155cd247933487514b020067ca22c070b2f2c0c
SHA256308a1ab1c23266c489cb018ac02232a35e4bf37f82c721f92ee65650f7f9559b
SHA5128d00b012509c5c8380bff1dd8c4b3ea69a08cc67b2dda50219fb6bb1aa6af56913bbdd85525676b13b4169496baf79474f2eb4a00b8b6ec0553568c7f0d2dfe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db5fe0f4610610b40d1e815e3811190e
SHA19040bc979e14d662f198aa29eef9adff75101e45
SHA256c042cf113f96d230ba43bbfcde593e152e368954a42e2e4d7fcdb8e4a63b72a6
SHA5128a0f9e7467e6a37752a483ba6d75b969b36e8f6b3b29b58f911cac09f06325c5527768cf5194dcc4ef1dc6fbde70332fc2e55fc42d98172b9ffd2a884791fc5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5853ba08d18029fac2521ace6ad1a0129
SHA10353552b8c604fd1bd78309bb848090601d0cfd4
SHA2564e4246461e319df447d954b370623d0bc31a03841500b9108b62d5fe691dd146
SHA51251bc49478f531dc08536c5565a09f51b16373c10b8b960529d2bb484c79f0efc9316cab0629bd5f0e839352457c6d037cb225c218cebec1f4c7a87f0205d4958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c2c6a4e4265ae79b1fbc004682d0073
SHA1f633322af00335d1f21ddc61aaf666d29e3fe464
SHA256fbeb21414015437b6e6690d7126962ae4b98a866825d3febc74ea5461e351f00
SHA5128fda498248504b19b13d01725c81a6a7c382ad3f1431343c963527fbe1b181d4deffb3884962eed420d53748003c74aec9a015a135bd883e1130f9c87baeda36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b411becba4553441a9e4edbfe2e0cdf
SHA13dfd8e9e8a9990c9c16f234f014e2e8eae847794
SHA256835b42efa82d110f8eca9c0509f38fce174847ae95b1d9c0645c9aee57c04201
SHA512befba8762a0369126e0a68b2f3cfb89ea0cff024d680b02da08072b9e602ffe051c551ba31e1817ae1d87488f3f76ee236c34f5c9ddb3a14430cdf63d5b99f8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae2c8b2fd46c827ad5a54d32f0bfdcaf
SHA17ec2c1a68e87ee8eb6cda9939d133a4f5881fea6
SHA25615aa1aae000314a02c04b304cba329b3582d384a814385f94aec37cab401f42a
SHA512fcb454976a49cf9be243f156d3a051e066d0deacad78d2f22cec68136005e806f0a02e9c38c388239a8313fe85022757241d196d3fcc00774ab83217afb9bd75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6a3b5b4560b4fb5805ff1fda3cbf5cc
SHA132b388bda2c0fa0d9a9a0c864ef65847f5b38acc
SHA2569dec99839fb98201273f0d946764604e4f9a3ba4bff242b830ae5b14cf9f686b
SHA512b0335f5979dee74951128118e815a556c86f4e04db8437948b442071b40eecb35e4c4be6bd8fe78c9841975444d0ac6ec2ead794c450a7aba2a1ec4446ec60f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b86f7b6f8b75589e8bc1202a91ab15df
SHA1b99a082581d7718c981aeabd07e3a2ed82a869f4
SHA2569da3c35c992fd46742772709e54681921058f56e114f7582dc9e29a01b0b6734
SHA5128033a14daffb401472dd7c6765cc0ba2f9fe0f773f0e67e007bd50494b67e7d7ebb04041de90bd5799ec91cafdc6464d36447937ac2bb9d2d2ca1b553d9f152d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ee0861fd7836da3913abfb992191f60
SHA193a15e39a891ed27fbb902bc1e03a7fd6a9bb65b
SHA2564a5506f1c6f72798c173d229dca022366b37a8cfa7afbdcdf9ec34f00ae8184a
SHA5121ffe1f656f62393a357cf022ef63e0dfe3c39581b7a04838797fd8c383f14339d44cf562bad0f10df9ce3cd860f8204646c976ea6f48cb7c43941e77fb24831c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50321b916095ea08a5ef68c11e4dd3bfe
SHA105ce1db4447d026ebafd58a7c6c4e8d11a64fcc4
SHA256c86a5920eb6b71d0ec07f2439c01e884b989902d7dddb3c1ef7ca6005808d50e
SHA5123a06d2cbded4d272795afcdfa74e5e91e7a76b1dd0ac474fc288e971f89bfacb3652500f33eef59797453d48a3e3ee5c5caae45fa5a203783da2e9ea45188d1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbe0bad59046e7bbee0b6219fc0016f3
SHA14af4a450b4f04c367bedc12acb5c7a31c1737a6c
SHA2565b2cdaa55e6f5a733fa0b44801e0c7b382d32dff69a4715197b3d0325db80e75
SHA512672766f54eb494a4bc21a2100eac025834bc70294652e62a2923dcb58b05f6b6724ca1de28dc593e6dc249eb41413aa7bc816aad959c4ebc179c3b4c98ad241d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54df7122c98542ae79149b7a06a1c42fc
SHA17805889779ba7b6950611b7e28a0494c2cc9abcb
SHA256aa136e64d3bc5b9eba32b18117f2ddeac7e0b32bc7a745dfd114cd18124e0673
SHA51239319c8a941c558cc514d0481021a9b88fa99740dd48bbd2fa55ea06288b5401c625ad48faa1da81512d1b11fbcd4b0db4b7c699ec85359adae002266758352f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50669b7738668409092559590b1e3625f
SHA1ebacf29c654e9a5441daff280fac2bf6e3511a51
SHA2561bef769c61e5ce4dbce45c9c06b860f91f87d5a03981fec6586c8e8b53d45527
SHA512217889b3fc008ea77ddebd8a9aa7aefa769615e033f9584729256196f6382e73af5d1df1d753480c03b6dc9b7f0dfbb71f21ba0d7fb3f08d7bc96386ba97932d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e131d3d6204470f23f90d549030a336
SHA16569264d1a288cd7edb0f8542955d09fc489cbf9
SHA2567c0770cf12d0801073a57e0705d73d4a60e71143435dd2d725fb87d5825f930b
SHA512fa0a0225f28fbac389fd9dc9bd23aa8b13a3b33c5abeb1726352155bb05683e679f75d6a25870b6fd38d8531e4c47544d4ad11ec28acec1e7a7a37cb870db63a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b