Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 14:42
Static task
static1
Behavioral task
behavioral1
Sample
0b2d84d68eed6538c45a95190b4b3e0c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b2d84d68eed6538c45a95190b4b3e0c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0b2d84d68eed6538c45a95190b4b3e0c_JaffaCakes118.html
-
Size
22KB
-
MD5
0b2d84d68eed6538c45a95190b4b3e0c
-
SHA1
d548d29afda4e1dd6ae5cd60524d4d14b8201d94
-
SHA256
7e0c6ef8b9e695134eab263f6282f523a2b740590666dbe5a83bca09aaa60595
-
SHA512
6b507c765a4a5e7dcdc795f4f50f45daf09706ab0a46991f285f6bd039e3601e5b6e882d7d59696b46d7779efdbd04b2e9bdfa28e5e775decd818b97d1ace3ab
-
SSDEEP
384:m9XZXwX9uOBtZKh58+J4JBJtc0VkYe3L685Hn++aXQyhygFPHR:QXZ5OBtZKDiHkT3ewaXfoU5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434041994" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F8D5FF1-80CC-11EF-81BB-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000900126c42eff53d78c50af8e2f2ba759fed4244751328fd28d371946aed2f008000000000e8000000002000020000000030934b338eaee2a80c0c7c606a7edd6b48e08229e1ba3ac060645bde23ca793200000001a3efb6cc100203830f1bdfd99f1e3ae6e1a7cdb6b8e3ba873de3a79cf2564f140000000e6bbbfe9f734ae4af08952e065efbdec4515b8435bfb4f54a30542c13dead9699fa35db636811bfb318ca25dcae9b3628283123cab126fbb90bb83c21c60b6e2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20c50f54d914db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2392 2072 iexplore.exe 31 PID 2072 wrote to memory of 2392 2072 iexplore.exe 31 PID 2072 wrote to memory of 2392 2072 iexplore.exe 31 PID 2072 wrote to memory of 2392 2072 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b2d84d68eed6538c45a95190b4b3e0c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2dc15659a18bf3364a747fcbca12fe8
SHA1b8d61bcebbddcd41cf88520dead486496d881d51
SHA2564afd5c2ca591e59e05a638ac66049c9433d609751391ee92d218afebd3b1b0b4
SHA512e83eb318c9445556d77c5a63c94e036f5c7852d3feb3d6154d77d70a5e609fbc805a0730b2f3c4b0298fb4c8a16ef757bdf0af160f4e2f10b8402060e7a93778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f39850db70036ed4e50cbd69d33a5d53
SHA1bd49363f287866b01754183affae85ec71ba5445
SHA25622112a7ab2c3eb56a216d79cb99f51a82ddcbfbadc66474a3f923a1d66aa1960
SHA512e374ba0bfdc01af967c6f768c8c46b5b774141c138d2985ce1d18c5b970f5d351fbef4e20af0b411c5780adac585261a4d1e36e2ec391b158bdf8bfab16eb324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541bf5a1fc26737475848f7f9a5c4b02d
SHA12d15b151a2a5dbf9368ffc7a89cbf7990de5161a
SHA256ac91f9de58936e8b34e06d380d767a7874b90aa2e12e8c98a01e833cb884425b
SHA512f6c245863aee2ccce909ec143676a2de338a652ccc5d71c5039990480bf4b200e99bc2faf8f9bd428d7425a37de1f3a93bd07bddcbae5d4487dc708c05c7a701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b00e2380359649e46ed6e703ba7f55c
SHA19f59d40efdfd25e7a4d80e7b8954aaffa7a43f03
SHA25675e8d50c65a7b536501aaae2edf32753e1725e16a40b8dc256c9c5072e8b0868
SHA512d03164c3f0c4ec7c332838b50b6a4a95f9454c5704cc982f0900696bbbf0f7e494938ec08cf6d9923fdb271a251077fbdabdb1288f5db8cff2064f3ab052e301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd94e2d2075d86eb6e0d18334575b516
SHA149869bebc1cfbca86a5c7fb7ae6e313284dd5925
SHA256576bfa14978b5f383fde5ed8a9a13bb4265addd6db8015020c33a7c71b080ba2
SHA512d9a559bc783e429170e30aa80945126e3488aeb2ffbb74f3600abed69e904c38bd1a2a5b5be06ccd46c092e7bd8edf1c47e6e2d2e3cc5c114b22c52f8e445bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56396cbc8ca2b54156b62a99a51ee4f04
SHA1b1bf47b3d087129afe56518de0450b1111cb5477
SHA256d3eae121b327b2f779cd2b1a1b892730a54c15c5eb1debae589e8502390430e7
SHA51274081b450a43a3c1fd31f5fe53a0a81cdf91ffc4f80e3dfce513ac0ced306e75aac93d0561315d5df16a589b5b2e62f871f91cbfba1f21c34376a2370da2cbbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d1f65e1cfe6f75a5385fa69a6c4d677
SHA1a117a1bd3954a4838d4b6638bae7429212fd8074
SHA2566f76ffd09d7abecb8be68528a3e1c52926f357be88328465e7b755aceff83db9
SHA51281024173a7b87c292986692e33fabddc256214287fb013f0a16867ef3e58207edbded75c57001f696ee84d7f72962f5071518c6bc03017a910f24b478e4ec229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d0d641e148c49ea6173b2063e473423
SHA1b757f197a587503bdb67db06ba1e23d7c385c052
SHA256bee7389af5abc83d040a01e343d998c032207b5e10ebac9a2f6ab1e37c7aedb9
SHA5126a7ba93af12955257f3cc6541fbac745eeafd1990c3e16cf1840a1320b7d7418fdf1277b32668c8ecbe8eba50502a4ed220e61573d18dc6225f7b441cd546807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c207d4f914e82fb6e27539a86a7a26e1
SHA1af41074da010ea26c0f10e0c594cb51467b05507
SHA25642bbe245c7dbee60f755a1e85be949232a74c85daf7b4c5bdf7d9eb5d3a4efc9
SHA5122c33e00a9162efb7da460e2107d2e41940da81d8f2d4a27e78c1105d57117f38530218e91e1ee0baf9907b847a8f21d9f9de66fc6c5d13a94edcc1c4f080bf6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c7a1046a68923249eb12dc9d17020de
SHA188de9aa1b14db03a9968a1e52d1ecb82fc39abc0
SHA256ae9e8a8f82b8685b31bf2a5cfcc6c7d3726195327cc6b195a0fb4609efa6e80a
SHA512837f5dc9f6b948013dab6b473bd4ad7b764756f52244c965c56963471cfaea8430fcca5e9db862c2244d1a8e9a5c934648231fb85b98aa7b367943ad510feb6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e49d0b839285fb0307af19f36fe92c45
SHA1d591b3f366f390a11272848ab72be7cba4c69d91
SHA256f695ce8b1d216414fdaa92a309063e88eec9f2b76e765cad3492e3bd934d7a7b
SHA51229b308f4d68f4691394a5e147b696445e8a1990e936eb8ad0cdc5ef98495057d8decefbc09e9ae09d3b5a8683c36ccdfe30527c69ac80259bce8d4c2b11088b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596cf456fb260a306df0b1dae77428d4e
SHA1efe4289ce44b7f593ad02a1044d94a9f65dc2b2e
SHA2569bf501fdd02b5a11837da8bc380ba339dd12d3f06fbe799594885d9d306175bd
SHA5126e73901f9e71ca7481c1e6249fb19df5b878aa022d84208a6f0fb87834f216fc219a0dc63be523be3b8075707225ab3898e1d4a2b1690352c70f0f3c7133f730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b09389d2cf4b6a5a0c219cb656aa7cf
SHA1053c9edf4b1bf0153e89185176e192d08019a904
SHA25652d975bfbf67349cc7716c4858c590599b1ba8aa840910befc88fd2d282b9b7d
SHA51232afe5239dcc61dd72ef7449a0c211997e38035cf3a52062b18f7f4e24d1d33615c12be081161bc5f5085566ecec5096aef0a3a88919d7f34f720da8c6a30273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a4ed9fc28520a8ad98970c49772bcbc
SHA1f421bf15aeea55bb32fe46992ad093bb10c54c54
SHA256fbd71593bc2d1641ed55c21a8fd3b189e7df34f26792e1e14c95c962c7b1b5b8
SHA5126c4b80ddfaabe276543f62058abe0a07a046d433f79bfa4c87680b6761ace3c84ccbee795b6671997f33e67eb47f49e2202b0b11751e1cb903ec3e15ce8e9c4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b2131c27d3287f64bb3d4ac7016ed12
SHA10a795376004a9356983bb06d4dfd758f6d34982e
SHA2566c0bba6eec4c5a186de5a9721d499dc73096a2ad2a1f10cc7565021bc56fdd90
SHA5120f71a06005919b97d0c54cd3256637eb12c13bac2a130d5ee445d8d707849f2d063923e26615197cd4de4851537be372f9ece62d5fc8c4651c459aa340fc68cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a6b835096686256e8eaee911bd0c460
SHA1a329fd8e16404cbbfd3373dad5922b96c8166766
SHA2563efd7013416313207c42a3bc9e86a667bddad3e7e9b0b12dd72d7849d490878c
SHA512dac1312c48cd3bb3963544e5956fb15602a2375804f8c26a624ed66a1960e44c78163c4b9bb74e9405b5054d3045ab15f549cef3cb2cbd1b13726335bdcb0da2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc370ffe2ee073284162e53f03cee584
SHA14e35a49c7b39ee988fc998fc89878ffd77b2f4b5
SHA2563a303d31aa4d8bd7847e796cf5fce30198207701b27415b28dc3d4d93a4c921e
SHA512e104e6f94882e0321c79c767a78cc1f96dcdeb5e630d7ff0b28b45ec01f66a461bc724ee5f8cc70f3a7bdff4d8b3df5ff6d346d2c0b47f52b9c7db6e3aed6fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f06beb5b857e5d0deaee40a2797a76d
SHA19eacc3b52e1eb95da592c982c45748e6fb3dd570
SHA256a9e817ff8708f21f0f4fac79ca9f705b7081a5383619035044bdda66146dd1c6
SHA51252c3a061a6a2e95303f1e928484b880bb19611f473d97a7beec29f9c8c9524f2454520c1418fa1f4a318a24e979ab7c6f68202434290a57680789e27de2739be
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b