Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 13:12
Static task
static1
Behavioral task
behavioral1
Sample
0ad37aa8b2529241d8757eb9e87e85ae_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ad37aa8b2529241d8757eb9e87e85ae_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0ad37aa8b2529241d8757eb9e87e85ae_JaffaCakes118.html
-
Size
6KB
-
MD5
0ad37aa8b2529241d8757eb9e87e85ae
-
SHA1
d22eb85861a2f31ae7bed588ebf10a09993d544d
-
SHA256
acfba7ce2fbff75405eaafd4f7ffafc0401610e8e10a95561b1c210b5cd4f36c
-
SHA512
4ab6585bb5411d2d8cb63eb50779ecd1ccc786616a426307234bba93993b2f8e7f15199f3c94fb3fafef87c8329b5d671551f77670a242aff03cc04cefc4f6da
-
SSDEEP
96:uzVs+ux7yiLLY1k9o84d12ef7CSTUQZcEZ7ru7f:csz7yiAYS/Hb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 308d0de0cc14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434036642" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{09790141-80C0-11EF-BA16-7E918DD97D05} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000346bb0b5da083dd19e05370fa4d961790407d99177c70abbc92dce91b1373d5b000000000e800000000200002000000049d2681a451ea14d12177fe15a25554cb634e8c6f2e6077cd5ba72b037fbd2312000000060066e0c761a7da4cb00122e16feb23d9e86c27158521ae5bd4d9f449719e91b400000006bb86a3c41bc7afc316538fc485df220716fe5f2d3f25365e3678f2cf8466167448e53182018e46dc435b5d49036da8169c57b310bbf1d753ede994176bcba55 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 876 iexplore.exe 876 iexplore.exe 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 876 wrote to memory of 1796 876 iexplore.exe 30 PID 876 wrote to memory of 1796 876 iexplore.exe 30 PID 876 wrote to memory of 1796 876 iexplore.exe 30 PID 876 wrote to memory of 1796 876 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ad37aa8b2529241d8757eb9e87e85ae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8f31a6ca79bf584bb3c62b06786d949
SHA133a940b51c22976db79db67523e90ad3307c3a6b
SHA2567c5c7d27b3eeebe905cdd9e6da2ea5d7bd39da444f458f89e9020ddc69051808
SHA512cf0b941c408c3e52db989869487b2708c974010b5a7d31f004db4ddad0fa6eee48a91683a33f9f2548758f4a67240bb716173f953b2850c88bc5dd8f113f6140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564de520ab7db0a4e27cf40d43933c61d
SHA16ba91078d1b698006203c7651f072557c6064bdf
SHA2567e164778e15be9c99d07e3106dd51d46415ef5f02f485b46408e972853aefa14
SHA51268e0e8edfa41b32b68b124ae41b1ecec1807e17792ad3364ebb1974a97b4d7730deff675b736d4b8264ad4b7a79e2943b1878398187c8545e4cb4980c2c5ed8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cce44829ceb3b4bb769b0fe2fde16683
SHA133915617b4347fb88647297155fe6b3a33f4b170
SHA2569a14f5da9d40dcade054fc5d94e8ecc0ddbd9d276785aa3f38ba4c24dc64fa6c
SHA512d5772e5e01df1ba4e96f716a3a91b540056a3e54b46de50b3ae42ac337938f90091721b118e0c8f4294f28b3d2cdffb148983e947fb7924f149c9787007dbfa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab9b38026bb12aea98cd710c64e74c16
SHA1246e915668413b507e7d600ec6cc3e2b4ed7e944
SHA25607424325f359bb10bf6fda2db32a9bf66448ded9541f092f260155d73046dc1e
SHA5125cd338f98619b3c0b8cba2fee74ad452b61178219719a0e4c8562f4a539aafa58863a4becd19d612ea292d9a13853477214b774312d98c81b557b7eff1e8b15f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b732ab834e8443e0dabfb757ae37692
SHA1f5c9319706f1925c08b7e5dbba6a9268866ee2e6
SHA25641da5b4c8b629a53c49cabe5f5dd323976b1dee9cc69a624235ac838f08b60b4
SHA512a28fc11958563821d8173c554ad14e20701cb09a7c40fa7956e8830cc40152d3e3e0f2d13459b26da0af617f784ddd27847b692852a83fafa5fa0077a158468e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f9d48e30b8eeeca10b5dde670dcd137
SHA16b6de40a422c29a49d137e9e4e3c32225d8f99e6
SHA2566da59ee27f64c9c4ab45ab7a2e8f229e3d3dad9e3182a7f514f25e04141eabc6
SHA5125eed1bf8c6ab118922088d639c37b8195f5233b2dfb7bee05f7fe5adb486cc11560081bc4bbe909aa4c3c82a8f87e1cad955648aa5fa7aea4c36b3bb6c2b0b9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3427737c26f3b9f96debc24a3af80ce
SHA18fa1f2d7a8a733cb8e6fda831697d9d84ee2be25
SHA256ab506f3904f70b5948e4d51e4a69492755731bd97fdfdc4472b94c54c9ff6dd7
SHA51271bf800238bf13949412a075511cd544c009eb73e211d03174f190d04bd6e49e062fa11200aeae09c05c4d8860e3e9d2cd77e4cba37019ed76bcafe21ab3d940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e199edcf8e64f73a7f9eed1fba41d07f
SHA1b47eac0c05e544907619628a4effc7be00566ce8
SHA256764947aab0de7e89451b1d1dea111f02f3ae41e1dffc6f4dc60ee5c86b68dbdd
SHA512a6e27b3580959e814b78632def22ff49b8d431bce3a8f27360205690c410d0ff713ff9200f092eed749761aeb3a2328c2b16b5217e4b31ff10a3e8cba736e1d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54af7db731a01ebf85a60411146d2973f
SHA18ac7bbb25ea059d1b37c43a32e8c9621fe457eb1
SHA2567e9b59a57740662ba68305dbe56aa8bc60523317b98bf448788f2f621e2015e5
SHA51204f91cb5953a3ef39aa65f363777080e8d0b9e3aa140cacd57d250a21cfc9a5e582d2dee21c01702136a9d97ca7038f95ebf59342ecd5a50a07f1649cecf84ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56be4d253bc8b0ae5d40ac41001d870bd
SHA18d686c2785d96ad36e2c2fa120abc6cc25efa429
SHA256002bf7563493ee93e604d2cfc0af49fadba3430a65b7a1212a48fcc965c414ad
SHA5120a69b0aa8f9c6a3a94739c4c5f91c702fc5ad825fd0325ceca4488cc852c63b48cac5e4e58019855d0ec49f66d38fae0fa9ac83dad3db94bef3634312f568ea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bcdf7f922210e0cc5b6c8c60a105865
SHA12974254c7e60a12b46b3c12cd083de81bdd13ee0
SHA256378340532bfb6a0d6ba8fa30035f04b384b1f580aa63b1eee89fa442667a3e83
SHA512bb97a2c4a3a76f8449f904e0bbfa356e83b6a16b891879113a68a906def2c0ca4261d5936efdcdf2bdc00dd13bf404e41342d11c1e58b61669fda4c31e71b35c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d2ee45b955d7d842001bfe08aacde13
SHA1552837f124b7fdb15bafb6158410061e583eff6d
SHA25688725752a6607ed20804cb1865a3bd328caf44f338877279d75cfa8d7df692d3
SHA51210d1faed241adbad16b33c5af15780f371a42527b5fe1f88b128c629e29ce4d764ffd365796ee957b2845143d9fcd2375e8e2663b71a2478f7d9fad50e8f06a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f2e6af34be74efa82f5804892e57ed8
SHA141a7401928d54689779dc9acca0bc1f871736fc1
SHA256703e938213d53a4a80be95f54eada07f04c93d64665f7e54799c6e8c20781c79
SHA51238af7780f6969d56175f02c864eb356b5115d2f7a4959d406f29c61963905a63e72dbcfd61728545162a53ea53118adb62d60cc56421fbda7dc5724d9692ad80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587591abf5440ef5b87b171a8ac69264f
SHA1ba2abf39a346c8d39c52d9621a1f42d893622af8
SHA25632c954d272c71e4eb1a3ce587416f00ebb941b9e67c8713218312d106aee707e
SHA51225585f15de3a471892de1a2d67437629c3832484fb7eba59378b3be4055177b641810cf69e45ecedcd642ca4cc24215559e7f7cea853c841f503e09b4a7c03c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5504e5a33fc8ab39a54d04618b71b376a
SHA1dcf7153b1be104c0b9ef5c89e13f5f973be3a275
SHA256c4cc6a7c8cb316817bbdb8b27b91ace2220412ebaa092e46d7438476f6d9a285
SHA51204553eccef6894faacb52f93b6e7cf0533c0c3baf8243bde63131c4d5bb23be4f91ee42ce2423b8ca745be74f60ae3a89cfe5a6d1eb8ea057b50198a297db478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b0a67315ef885dc9d376568ecc8cb2f
SHA1ed8d3a5621a8b4d8ff54890986058dc0817f55ce
SHA256857e1725ab42931a7aec6669f8b04f4ee533a49942554dd0a508034c35410011
SHA512575fee751cdb6a0c7e13dfde84ba5ec3dd67c9019dc6c5f445f0ab85ea241db6a7875ba4a6ac12f0cd45eb566a25bee3dd91a200bc4387043f7656be6ce058f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544608f74be8bcbac9bb8f3acb85c5534
SHA11594987eb4417f83fad5c07d414a842fed2dbb19
SHA2562d842da05a56a48fa986b80e0868cd7a2dae7995e2323ebdf8cb0b697dfacbdf
SHA512f7252a7ef711392ccddbfa73f99f4847c621a7d3ef05ac114eaec7b2f862e72a257a1e1296e9f351f804c4822c2a436750ebe20da380d1c1ce9e37494b6bc60f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58157316631dba47b3a83641cddedee5c
SHA1223288980cda0f971a0cd4e96965bde3917dfd25
SHA256ee8e95bf97bfc605f35598c8082c1f8cc8b563e1f4a48f8d1b262058b822242d
SHA51273f75528c4cfc2b5d95d6d2ccc2ba694de19470973a0f08cb61b1b61361c300281ae3f5bae8af63477c01095d84994f9b8ae4948f6a2336e50c1bb65a476aac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a52b73d5c26914f94869c2becc4015fa
SHA1620264d15ae8bb647a93fc3aea9d1f5b4fd08d5a
SHA256e53b86b4133bc90394ee5de9a88b8a09c14e359c6796543da612fa43592e02a4
SHA512fc45a86ae83371da2c892cfad32d44065638a3066281b4402618381b871242c84af40b16ce2d105b1b0bdfd370bad79c5ffe2274b14f24861d26f26853a22f9a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b