Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 15:40
Static task
static1
Behavioral task
behavioral1
Sample
0b657df12ee95217bb2b3b76db62b081_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0b657df12ee95217bb2b3b76db62b081_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0b657df12ee95217bb2b3b76db62b081_JaffaCakes118.html
-
Size
40KB
-
MD5
0b657df12ee95217bb2b3b76db62b081
-
SHA1
7b52a8f984c7b60ff3c28c6b066ea459f026ed58
-
SHA256
b8794bf58f72da9ad3ac09b0f51491aca2486676ec87dc7b16e6d19eb8d474c4
-
SHA512
62c5e2ab47284a3295356fe28877f15495dba13ea7c3f08e0d67aaa2352696dbbe4d5cd6b1eaaeb49bf197c3e1cb765c08948fe027b5e5a447b458dfb1a8455e
-
SSDEEP
768:3uzg4xmA2CvUVLEBCgbzX/IrFKhC8avqJCFwzAO9AoyTwqT28DM:3XumA2CvUVLEBCgbzQrg7AFwzAO9AoyS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434045472" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4054cf6ee114db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{988D9B71-80D4-11EF-88C1-C26A93CEF43F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000797445b4ee16225053d1ed52075130b33b3813477c72c5c14be452403893a2a4000000000e8000000002000020000000ce8f25f10659ee9856cacc56e5f50076babef33c6af3ee3d327db1877346283a20000000f6edd58138e59ac5381c296cf0336d9c84bf26db077a49384de4c7247eed2ebe40000000e1566168eccb5e4440bfb33e35e4053d7dd68a830fbfa25feb68dd4809957821e42b0f9c12f4aeebfc3aa83a75c74e4c243074de7ec29fda2183b49dc2fd5915 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1440 iexplore.exe 1440 iexplore.exe 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1440 wrote to memory of 1632 1440 iexplore.exe 30 PID 1440 wrote to memory of 1632 1440 iexplore.exe 30 PID 1440 wrote to memory of 1632 1440 iexplore.exe 30 PID 1440 wrote to memory of 1632 1440 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b657df12ee95217bb2b3b76db62b081_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1440 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a881eb32fa2dab028b6697b69c441dc
SHA11c4b32b58598ae2e57cd9c86c885c5d7420ed66a
SHA25676a8da0e3976694f25095392e86874efa0df7b9365d084ed37d36fb7b39f9d0c
SHA512b57dc48650e9daecc4a694aa25813a2f3b9fe1f22914079691114ba46a25656e75fcc973a3c9400dc6fd27bd06aaa33d77ecd21592d34c4e9c3a281a1602a72a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df9b91906fd1039a47b10a0bda9b2f69
SHA164a0eb51cc7f5f00246e06a7e56251fe4bc7c4e8
SHA2569a448140eff74ff60b704f534adee863184b3e341865071db1df44051a96548a
SHA512dcbf3050a1b7f95d6a049ec7cd305dbecf424c6aef00c17ed83603db48c551ebf1629c3411967dabb367af10e202a259ad8c82e344b5b4a1866b12944e11f92b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52169f55f0d7872e27d9ef2a5b603ce68
SHA1756e583c0e0aa8b34a5b6edd7d5ff319b75214e7
SHA256de1ef69f5c454de46c9179d00c299738415773e3b3f0ad8fb93fc0236f577683
SHA5120e4d91e23cd20449fa93d46bcd0a4c647de22bc5e4cf883f2b5d5af46ba2a5fb42e34b3e7c0dc664d6794052fdbfc096ea46cf6e72fa4c1d5da630a7172cd2c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ad29dc45af13321e5f1a31e59f7ff8c
SHA13f50bd2c4ca2d98b95eefa978eee83411daf4b36
SHA256ef9de5e542983f8f654fbb680f5da7e88eb7ab6d953194c83e9164b5e5904267
SHA51289711c195bfe55e9b8ab6d7ec437a0bed2ea576bb04c2684c92e6f36982d83e4a70e69ceb345bbd724f3dedbeae155c7348006f497ae4f8a39d4932725e1c9c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50145f321e9f21a05b7f798538a7b5ac9
SHA1e18ca64dd657e0b3eb68ea70e796b38bcf4d5ded
SHA256fed699431b2d5bc4a21aac7295c4c8fac81487e19d22246c178cd037e8360925
SHA512069c6c24d780aabcda6e24d566f4f87e4cf854214402e507ab59748e970ae67e22f503580819fc5fc2185304b15822cb95c32bfd794bd85179e16e901c07c4f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abe8366ec4634bc528dce4db0ebbc482
SHA1009a520003a6ed89c9b5eaa1b61e6f906eac15c4
SHA256b99b90ad64fc8eb8585e54f8157a3bc4831e4fe2ef466dff9ea4ab4ac0a302e3
SHA51235531e33f73b87198a95454e35f3abcd9a426491bb2a9f89e9179a98f80f2c708da0c599fdaf423a9e14d9fd3ea504dabe11c11592fca4524c8d97345294f8e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584fcd217d841a3b3e83a4e285a4c1e82
SHA1a4b1aabbbde51614ba519575d3ee9df4c18ddb9a
SHA256f15b64d729ca8d412385d2d50193e9d0b2eec9d7949aae88a606865db183e496
SHA512e309e1d153d909237ddc8426f8b55bb84c5d3a22d8575f0f1a4d2fcac397abacf550aa9281786ab80c2f0288e2230fb4704d931dd5b8c7494e7e063f14e6d46d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c8398c35b8d72dace8dcfdcf1c21f01
SHA18257b3835044298865fda31e0b2aeff2e8362739
SHA2569fbf9f4720b6934a1a92ce3bad902112b39ad07f2a6c5b99b7e719cfc4d97471
SHA512cb1a5f1b7e103dd42e53e881b565998e1ff0e5b1cfac2fc35786c7f05bc64c9240d04ec72ae6ed1d12027ab6f6a4076a8bb29ebd2346a0f4a0b735a260bd71a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e679e3242d51a84b9ba66944f7cea88
SHA14d30959a170af09eff638e620a51556cf99d2d31
SHA2564c877287cc49c0451afd32e1c9f7804feb2ac9c67207b854a60722a5c4d955a8
SHA512b4e1247122d56f1d11cbd6cad911fc74000ddcddee444a12fcc816d2f653861638b83e837d8115aefddc072c1be3bfabdd47ea33bad047e40015c18d61339709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5754eb4ec62cdf607ed1449dded09726c
SHA11d98862f47c6f8e23d2807f319f9679892906117
SHA25601aa029883f0d8d2ec0846393a33f4ba8b185b4c2bbbb5375a4c98af3ed12e69
SHA512d13a57ad24da0086d804aa79da12269cc369603985393ba21bd005c366b9238788fd8517eb5e3f40d386091958023eb3f294c8070fbf3928811db4fc558cccdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b41d1b97ac48918ffc8debb7a1f9f1f5
SHA197c68b92047e88a780fe07f3937184d2b7e01393
SHA256dad2123eabf0bbafc280bbefdea267de1d0b3e5112dfb13d2081042d2684dc11
SHA512611e7046b13ed33f3b227024f2565cc8ffd67b3409da0287ee72faf8bfa49cde08a489f52d68193b4a430d89f42900abe5dabde026607b5fadb50756f21c3590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5049aea268d7e09427e43402a906cd3c9
SHA1d6ec26cd5f36a70af06469aa7d3ad6abef7631b0
SHA256d6b91d521177390ab8276bfa58d4291651e7068e14e392b38a4c528d9bfa0623
SHA5124f6c8ef20bf960cca0a1e8099d34baf21c120753dfed3c5550e6b6ed412049fd84922d11803b83550e3d33358d372f17602c3a3272ca79bdcce4033d0bcbc42f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c918b2c6b4e0856609324bb63cf6b055
SHA1b91b5ddefee47d7b985376dae1f045550a0ce431
SHA256ac85ad338d5df61037c8be8b4fb4f61a0930f8fa9882fc27cc57bf86d92c3d9e
SHA512d5f57eef8edc174e0b3d22c2fcf5b4b01cf9b25e2d1448b6123704d234a09d1c4b4218f68c6468ba50c9b9e5ed0c900384df6c9a2e45bca992769cde18a0b2d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f958b1fd866fa09c0727418751a30218
SHA1daf86ce2ebaed04bed049bfaf29190c999db58cb
SHA2565643f4f1efda1a4d95e9b910da41d280f206855f6d6fd65e5e588f792c771a02
SHA5129417f257ff82c715b2197691f790816db2bfebea0a4831c04dec092082a6b26039979474d8a6eac4e3e62c49ef21cb0075b6b0fce6a27509c67cc19d76387062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c6ac608f3ac64f73b295a45d22108b2
SHA177b477a5d901c666ea5088d047f8c96167cdf658
SHA256f5d03dcb32aeecab6f72d7538c4850b05b5f11b8d2dfeac58cb1d6c6be65a751
SHA512ffa64d1aa6492d3764df46d3a8e6c9650e09cc57d6333bf5dc07e8a1606b0a5d865f333ff8886c99c4db53d7c7a46d0d10935e89b6d13881f841a8d1593e4506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f97425fc4734912bf5cf008553110d2
SHA11691d349bbbc4fd14ced1e3c4ddd8486e102cbe2
SHA2563da9726f3b1107baa9fce0617fde74142443be4b49622c239fbcee13464da15c
SHA5124f582188ddcd23107708741e50ffbaaddb4cffd21db26bc3491c7b9714e7e02472566b94d987a13e2108cb677d4fd1e6dceb6a23d3ce4a6b058157981f51c571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b503e2b8e157cb071536408336940132
SHA1911e951c5b54263a383c020758d0653dbdfe0efd
SHA25646ec03d80642ada63cda5fbe8a315fabf9a85ecac479464cc4397bfe5a615d21
SHA512f8bd7162298afc34d24b4000119a4081a21a7c77123fd0c2776622c319d7b4cdad1c6c60863154e43d4cde8af5a9900dbd1dd78a3cf4d98ce2ac8c55054f49a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560767325e7e991d30eb5d364abaec56f
SHA159cde99c8bb54c8dc252f2aad8a005c1de88fc00
SHA25619187eb7a4b258714817696f57043dd32f6f74b169ed449252005dea68e79a59
SHA512685243496a66ea292b05150bfd526fa596735eb65b6f52ebe06004920c9e9831bb13fdab8580331a57dccb8484a84a843f0d9294a5ffb79570c96af79a4720e9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b