Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 11:11
Static task
static1
Behavioral task
behavioral1
Sample
0a5dec6d0d489b4f09687f595751c7bf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0a5dec6d0d489b4f09687f595751c7bf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0a5dec6d0d489b4f09687f595751c7bf_JaffaCakes118.html
-
Size
6KB
-
MD5
0a5dec6d0d489b4f09687f595751c7bf
-
SHA1
20baa68cda752e72a7f3e79f71f007e41b9b69a8
-
SHA256
b670a62115d72d109cad307c5d7d806b9fdc3e1de414fbdee9f6eeb8811d1102
-
SHA512
9689b27b3046fe7d82e6b331a7484c826a3ddb587c0bc810b52851895f8e3f4d88c1f25cebdc5dc249ad3c9db2ce54a364d22f2e6665f640c447fb7f3a580d66
-
SSDEEP
96:uzVs+ux7SuLLY1k9o84d12ef7CSTU7GfcEZ7ru7f:csz7SuAYS/Hfb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0f486fabb14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{23F20371-80AF-11EF-B25F-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434029385" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000ed55194b2efec72432971f480735b60576ff53da4df34989463db02f04269f90000000000e8000000002000020000000bef692645ddad8fb3bc0ab44629b36dbda938575eed992cdb66309b922876102200000007a9561a611ee3f496af398fce3a842fcf6c4f0537405e3a3148c647aa918a522400000001dcb43d6ff665c3461465e82ed46be916c685ec9434c9c557d060b67b8ff5d4ae97accf184cc7a8fe33927d48aaf528532a8066124147b9b77f55c6b9964ccfb iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1268 2348 iexplore.exe 30 PID 2348 wrote to memory of 1268 2348 iexplore.exe 30 PID 2348 wrote to memory of 1268 2348 iexplore.exe 30 PID 2348 wrote to memory of 1268 2348 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0a5dec6d0d489b4f09687f595751c7bf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5484b8eaf4f67bbedad982a20f8636a4d
SHA1df5b5fe89ab25ea30b1efedf5e3a93e1438cf8d9
SHA25626ada1a9c4f2091a168dd9abe8cbca6df6f795dc1856bc6be8cf9ba670fd8c1c
SHA512c560bb798931570eddb712e756109bee56f94688d365e1d85ee89893510bbe91c5b062d2104cd6f330b3492e0f0650f9cd9ddeb20ed23fc54d08a85f1f1b7794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcdd41c214a70ba112a8c17716f73437
SHA1228bcb9044d7c0e015512b341c050740d624285d
SHA256eb99905f56bfb6946905c9bd33007bd3a1f334b54b11c400f1f17962be6d3934
SHA51248b70b3e780c245221c3a479a50f27ced8e24aaa3826a8d10a955c986a96446ad4281b930ee3ac6b7e07ff18718fdf59d97d660135a5c44483db488767081d34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f4539cde2863b11b65cfd9306d3e8bb
SHA1b80321f06e8b3eff98d405fa7fbbf05595f9e4a3
SHA25656e1364fdb76dd5a66b2011c43ea276f39fe383247f6ae933ac861ab1f59cba0
SHA51259b9311a33397cf20eacca6b4c24a39a4c0723335ead8ed913224933b606fc0448f4d1ee499f5da0bb9888e7e018a055c17f91b5b2fa168fbf99211065cdc57a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563129203311085c7cb79978e7cbb81e8
SHA1b38d181244c677690c7cf7ee27384d6b88cfa1e5
SHA25603a4fcf452f445d9cbe2436f9ba93cb74da9a69e7a8f74f2f288c522eabee7ca
SHA5128134ac0629f03d0538ba69c5a4b7a4b936705550b92b56b7712bb72c6bca9e2b74880e14e8821d15a02b2baf9667796ffbb94af3612fd5afe6a7cb22f05b4605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2357536105821d6fb15cee799c38fbe
SHA10ebb1c7a017adfc0b52951f3d7d5750b19533b61
SHA25691d3199f58d283e5712e8993bc66079b08bd93cf6fdcd0cff2c0c509f3bbc687
SHA512d6b3df4e702aa0f6f37598399153d50b1853ad40ef38f8eb91ad74d6e800cd4e22db0db940ee8a3422266d0f33b481cfb8f306ecdd6e3bd18968a826f4de2a3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a42c93f947fac18132a3aae050f4335c
SHA16f1570e8d635980aea8c0f3b2271497a7e0b9e79
SHA256b04e755e0e4d79b502610fe76e85487a1f57b94d8801c4abdad83d801eb26512
SHA5128f5f4f37d05f41ef9053ab6700133f66c5cdb3f5ff84ac443dc3c733c8f811b8a563e38a7b7108b8e314c6d7fa587ef33cfb4e146efdb0be3feeb18e29b4a4b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b11abc2f56c4d4ed03ee57046b22725e
SHA18199d68a236355ca8e3704051d3b27876d6ab072
SHA25616f3d56b9e72df413c3852c8da8ed1955663705b70a120b44841efccc842e620
SHA5128c74711c487ed1d11d087a18daebb244082804f23e583d47d2ec610bf202c85cd01e8abb175ab2e1738b48ced097e4b7bc75b8048c9d7ddfe3c5f263ed8b1ec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fd45d66c45ac57d62356200e647a511
SHA1c95aa702b4452426dc9a53e8ac2971f04f2e4f05
SHA25631d90d3ec717ddfdacb1bb84098760deeaf89637c747f87f09e0b27a849ea3da
SHA512a17ece83923e37ce509436f0e5d02846db869ae3119c154091b913a5c64cb20e7d16018873660e253b55a5bf3b02a82f4b907ecb55325e4b450bced10fba2f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51942172355e8ee39ad945d3aa4caff61
SHA179f47d1440beeb631c80c1a1d000659a6893890b
SHA2565e036bbd7da86edc1c22c9e3376f55efad80e3d3a4fae32bdccd9b328563012c
SHA512a671872b237866d506abd01f94a896e24a675b5a4f610231012211de189b2be8635cb61ea091dff8f6becddbef4ea0a03b10c6e7af33fc583d9fb0af3adf23c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a5d723d1d07ae6bd9d354c39b5d0919
SHA14e359c6464a8ed777a121086dcf697eb254d205f
SHA25684d5fbc450904102a492ae863f3e3410e3cc7a6e21659f1d0436fd815d172811
SHA512454c9513bef84d707e50c6d42baca01f0d3dd34e2a4ac8c7b11c68ff9e0efd6fe6619a6f9e2b2ef9eaf906e3d4a50fc5a9067e40f8dbf8ed7f366e2d0e89832b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529eacabfed71d1ce13182857242b9b3a
SHA19367a17ecaee59ef2b00ce4ba1aa9e0fb59af6c2
SHA2565fc579201fcb87c58c593a486736a43f1695db4666d4e866bd53be54718b8376
SHA51214c04f3b3e9da9dd0d3b092b730ec0bc34f5c151d43f868f4f5842bae265bfb95002e0f66680b90ea6b18cdd241205bc9215903e39dc7e679cf9829b5daf216e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5606a2c1ecaf487e91a3e4653726ce188
SHA17e0ecdcb8ee2ab4c4b1350e941b10b3d926a5fe0
SHA256f14163d7c85014be81fb45d971b90cf9991b02203b046de0fd4eaf3f6bd1bf6b
SHA512b0f3f0bdc581aa4a4304bcb1b1786644bc7e7bbeff9f97c13d53c35d451ab85ae0b1e47bfe85529f3def802ed35e74a4cca204bc0cd678462952fbccb4e8df4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f22628f0c827377a334fcfde9f4e0674
SHA18ece595aa073d4689636d04ce8e9527033f52d8b
SHA256a12c60749ff41631f28ec4d26159f0b29fcdfb5d2898104de909b440f219d965
SHA5127a4df97e5fde7a3e54af8ac6ab3b97ad0d844419d0c5dfb43c0896cb14acce45f1ac771b28efb60485d281659f609153651eda9e7dfa081191d69a26e6e96dea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522751cea41fb3828b4f7a50a559562e5
SHA1fdbf1369eb887eadbef8d6035a978a10abca49da
SHA256c90547594c32f4153c0c57c097e0926e3d100a03e7d556b6fe0b85c06728f954
SHA512ed751f9bf1d4b360bfa3ac454b449ceb66808535768586ba79291d46eddb8d5d6e06db45c3f3a6a540d4e15f7e7debd033e2a820d755d37bc92de0dd8699960c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525235216ef8dffe54622e57c883727b4
SHA1ea70e0aa13e93b00714e78a5920a2e5bd7813c1b
SHA256e0cb5ed1365d4157f1fef9bb3460c530dcc85021db20a04fb1b7ac512abd68bb
SHA5128d5f106e5468e8672e65e632889dbd891b19ac9895a7ae88d4050420c5d9e06e1e7f78cdfc93cfb9a34a06a18f73caf9f442226794f59d6aa698fe9c07ffebd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e73d28e83126f61c6439359f06e1a070
SHA1719c36c7bc95eff72869b117eb397492e9e02f48
SHA256643a21395a81698397c30c18741a24b5fab9875f5c4cc5c68393f3bb305347af
SHA512216a12738c7ee6063385bcf8d3a853e24c73a0f7a828a98deacf91285be464f000c0c7df6c7233461a73c93ba8fc0e77325c76eda8d9657bd872c9c35e39439c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fab93c377b5e634845d8f5dbdb2d5ce8
SHA13565c5d9141a0b00ae7dfa3ed98c33595690306f
SHA256868af217bb92b83a340994b9dc3726263b68c7b54f3844bcf4bb2a42f83c2b57
SHA5123cba7c193228ac21704353ee1e25238d69ff034c982762a6df88d1c6160d69ee35ab921a3639453ff5cd91c479b789f0c52559bbd021ac02359d89ef42770006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fae03066d0479396c37b7c5acf49290
SHA1f620ae87cc13fe88eaff958c593e4ffbe2371ba0
SHA2567acc9b0e2c6ac79d5c8b661d51b04fa79eb542efb20d80fb2860e092053b2018
SHA512798cfa91f3a9d4b65fd8ceffa30bfeb7f93b029c340aed04f3fb078ae06ed4e80b986deb57da0ad3668918a513b3cbb205458756acd46b491dbdd16ea77292a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5639546200de6cb00059c32a1279b0830
SHA1c29880556fb63f3ad51c56ee1e10407746362f62
SHA256f3bb2ecacb6321a003e6b22290e6d746d19b9c44c1bf009a4b116a760bfe1484
SHA5127891ec58f0876b4d7c61e99c672075790f504df04501787438015437f4b8c1716e61943f07632e4c80b1c4777dcf698cbe85aa938df989e7c56937e2e600f9d1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b