Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 07:52
Static task
static1
Behavioral task
behavioral1
Sample
09a305d6d8034d55e47928e78374a581_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
09a305d6d8034d55e47928e78374a581_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
09a305d6d8034d55e47928e78374a581_JaffaCakes118.html
-
Size
12KB
-
MD5
09a305d6d8034d55e47928e78374a581
-
SHA1
19c60cb29069853823c928468229b55d9868a971
-
SHA256
a9d3d363606a338961e4d21f439eb8d5b1e3df922687d81cdef665cd383ff995
-
SHA512
4e982f753ae5602c95680832be9e6b454926d073219edd308e507916735031b7689d8d05d71c142b6dcf7c2211a4d464923c998b6e1b665d317460fcf7df4bcb
-
SSDEEP
384:sllIcFV/j9O/guNBOZuniH1+l0amzguLZ:xg58l6xLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4D1CD611-8093-11EF-A045-62CAC36041A9} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000a53cc4d471f2d3fc546f6fc1693c3d319c56eb86871cdee5b6e68309f3fd43e2000000000e8000000002000020000000b3f8d201753676d563b4cba8c89a0045e0406cfa71073eaa9a93296b7fffd55e20000000abe28a85200913447b205ed8a6455c97d8e9f18cdaf81b37e4603b50765dbb794000000073eebee7726e80f89957e0d6d4cbd0696eca6dc976df92cb7794328f6a10963bee4dab7b084c531d2e48c27c378472c734eb51a36daae7c732daee21b443203d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434017428" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1069d84ea014db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 540 iexplore.exe 540 iexplore.exe 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 540 wrote to memory of 2020 540 iexplore.exe 31 PID 540 wrote to memory of 2020 540 iexplore.exe 31 PID 540 wrote to memory of 2020 540 iexplore.exe 31 PID 540 wrote to memory of 2020 540 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\09a305d6d8034d55e47928e78374a581_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:540 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2e69c70dc783b8ab34fc7979fa6aa59
SHA141f366f9e02efc115feed4554882484320946bf0
SHA256b8ab4834a3094eb826303d636c78e322d6758b7a6efa63732552d43342130e5d
SHA512059a2af4f8c5be52c49a4127733ac4939b6c61020e900515ecf6043ec65c153a1658c2687ee6d43112d398a7f18ed95c29dc7a98a85843b18df9187d699b2e3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5effe3c1b2f525f6cfffe6d2b8e52fcc9
SHA19ea34aca65b578bda8b8f3ca715a6bf4325dbb93
SHA256b1ef2d51766cb8a5f2aba55f9d1a30373a7cf7d45b63a9109efa86f24ff62efa
SHA5129b770023ee695c40c3951ebc2966188fc5e62680db7af7d893d5c23b7005af90bf82dd76b88e5b677a89e66a28415d53876cab2fb15412dfd5d016c6bf0ad425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55854912ec1775d726e6e18281c68ff53
SHA132bc4c35352826d070e45363fa9c36dc10a5388f
SHA25678ad5c9b58b0bd7ca307fb1748cededa9973ac278b6b66e4201c887754d18491
SHA512fb498460eb553dd3dd93f8f1c93fe5710683639a7e870d6f9885e46eaf25b507d474c77836c85059b92839cb4abe40e34169d51596b541eb576b50ea5f8d46e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c529ea79bb2e96eae882f9961b543a57
SHA1c27ca6ae31543debf323f51ed3c95fef4774f8bf
SHA2563845fa0c6f79f52a1a8c430ba05180a1ee83b03f60aeded9e115657dbba1bfd0
SHA51261045d51e15779450ae1a965201c2fd3d413c56931bcc1c4cb20547a7345a66d616f70c016a6e148daf5844b9eb82c78499199854d21617260aaebd3487eea3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581d43a685ccba6251f39e3f987c1d63a
SHA1109da53f26af5cf3006a07fa2fe594048741739d
SHA25681505d978aa3ddc5f18a052be39bb4dc2895d9993172718344a34742e17b19c6
SHA512d0e9b95308691ecc373e7c862e10a211b5267ccc149a8ca317e7081da1773c5c752e0714067e737c1a7c6c39dbeebb876cf60475d7fdd54e5cbb167010a807b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5822400ecafd4015e587debac53af3dcb
SHA1297b1c02476fb1b0873d8fac18164102f54a53a0
SHA2560b7fdb1a5c9f5fdc75c4a8d850d29e7eb3eca270f337cfa8ab73ddc3b4206b5c
SHA512e2b144986f75a11f2c7bf03f0b7fc18fb869e0ca87bea025a8687a0a2c46f9a162fcbed93946a1e379c355b1a9d860499c349b429ee051f614d11355564792ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d33896534fe95f05f142d4c1cefefc7
SHA170e4479e35a6df40a3db304df5169db366c801cc
SHA25619afcb8e51a3c12bfcc6434417ad253721fa5815ea0d4e62e91fe37c543d3473
SHA512b0e38fea2dba2d46f4e1cfb799284d67d2b9a4f6d8b846b425c90477742a50296628f57c9afe1f8ef42ace4e604bf01af6685d6a632e024f22cab640d4e739b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aba0ad81510cbe9171d0ca1412601cd6
SHA15de05dd1c60ff82527ebbdbaf231362c1a84b54b
SHA25691458e3cd57d5d6fe47096d290aff0e964cae680dd91aba5fe87e2e9c043ae22
SHA51274230465085b699fbba2819d899e7ca6facc913d19b0402cfb519538aa47f7c70db9a8a746ab6c5d502296c1bbff6496ec02b7f495df37a0736a8ee2f41b9d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba93bcf7641bfa3557786a6797aa81b2
SHA1985c8af7036b54000299eedd52dab77fd5c26b2a
SHA256e5bdca525db792966b71bbb0855217f454d58fc3ed94b61246da17420a6d7c2c
SHA512b07c7009ecb2982e02b3ca3f4176bafddae6e218d639874a2ab167bfc7155d8d897c6f220e49ca5d6edc5ea05ca4abb9d92cf9be86cac41f4c176abd58d3a56c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebf7c9845dcea2409ec68e1f6662a6c8
SHA151dd24ee63830b2c384619bdda562a3e9bbe0bfb
SHA2565e5f0e0e279c06ded22c5a55fc079543744152bc865f55899eae1a9f7a791b97
SHA512e3d72caa0731d563a6f0617bf9a5bfa339d67a74e4f989ad4c4a0b0d64887e34afae154f1e5221caefdb672467c2073ec6d69bb2ab42db0fdb7a7ee30d23226d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ad2a405291b824ef2add3ac6eaddc53
SHA12b8922c964803f081d099bd4d1f8d611905cbda9
SHA256c6af1c5c4fee356137b9969ed5dd233ac3f437adb150ca2d75bc84e9fc75d6c5
SHA5124550b85a951deadc6a034ef084faa1607a7481b4999c4b8f4d534bd3c13a6a15204365abd50a180a2cdf13d40cd8bfaac4ea7e27535a312700c7c3c364728fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514ad22f5501d7df31f7621ce30777f6a
SHA1090136bbb5d8cbeb7471a682e973e304048fc028
SHA256927f97664a173b38892012937c5d4463f3106a74a8b8290f98a46474dfa7283c
SHA512be3bb244d5c82520a93681caf8d67a74a586cf2216c5f888067c3be25fdb0b04dc4f793b923b3fed9c94489e8a3245fb755e530eddb242883ca0b55b992e1d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3e7733d10f547dda60471078cf6f4ee
SHA1682f584a89679723a01ae4c86e97830755f8143b
SHA256835b04380d11fe996ce7ba262929950b2e3bc66e066f9a5ce34bc1408f0d9de6
SHA512903f9dbd967fdcbab0aeeee4ddd8d97ef6f2ba97c693987b9d8057fbffb30ee7870e20c2618e4773f27a1575fa92fd86a7cefd2b73e20026fd8eda993e502614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f088154cab4b5354610c76aaf8fe94c5
SHA16fe6f18a9cf1230632636872dd04398be2fcd3f0
SHA2561bb0834f2c2b1b570c433e91378a96a54f808cbecc93fab66e3e6aa9871a4c98
SHA512e3c799f1ccb0277dee704f6e7ce9651dde288f2ab0c14ae2c67f07148089e03ce6d5aa3f9d631d07aa0cdb93a3fd2de88ae22c161a0422366b2993be4bfe0ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7801d69f2f06a5cf910301e34979105
SHA10bde3a9835466de69457fc46a9efad06ebf017d8
SHA2567b10bb0e07272b8ef8fe364496196fe2bd92d0dd5cc68a5187ab7cc4346485b9
SHA512085546e863568c0251645b74a1266dabb2f2795a7ec7c47740248b4d83180ac9ba314948d3f3d43b383ee702de979f9b93e08ab42ecc5052303eabf5fbc4d0fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8565edaf9544562cdfe8aed95db1762
SHA155a877d184eed6f4aa2883b95e34901ffa523639
SHA25637880d7af5243e892d0fa4439b93eafdeda1ad3749181c1c179eedc01dbb9774
SHA5125c1852d9270475213ed6eb4e83ee02810d8d2b36d1c692b3730391257dd395663361a01b373622e32d9cc6beea95a9668c6cb80a941a14f45a0d7eb45257e50a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d7095df2ae510efa7f9b2c6ac43cff0
SHA1cbba1c4ea17c34bc2d304aefbe4e6442b36bfe92
SHA25630ea975c683112299f68140a955c6a2a23aec6ec113c2a9a8feb81004ddb58a1
SHA512878df46b766e4979d4d90d2c1b3bc7ff8b3066979d5157b9d17503d1c74bb3d7d93ede4dbd23a018063a8035eb313e10c4a76a3bf7c63c7b44517ea313283cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5581a5a02d96c2f4e6886b9936af31a5e
SHA11dd677c63388c1821a29fb81cd4852704905e309
SHA256455174a09468bceb18fa799d4f4e19018f0a500f55072ecd8aa6bd2ad3989d10
SHA5126d1d0941c0611e7dc304029622be21ccf1e0b09aa1f2a09305e38524bf63fc3b8d05c5416f5ec5626ff162551202aa1b54ffa2a84f51fb0f965850260dbf3b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515190969fe6c71f1fed884b844971ee2
SHA1bd074a1e41c1540993761c374a70c5908eb28aa8
SHA256520fda5748873aafec02049af6110e34f903c40ed5099b38253e5ef71cbcdd77
SHA512107821bd6ba9f874114d3bad23554bcafee578d403df82a7324f5b7a442c560bcbfabc8c135f06aa101686ce92d96561af6841858da81b69205409cb4e966103
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b