Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 14:55
Static task
static1
Behavioral task
behavioral1
Sample
0b3b73c8a0d2417423cafcb7518c438d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0b3b73c8a0d2417423cafcb7518c438d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0b3b73c8a0d2417423cafcb7518c438d_JaffaCakes118.html
-
Size
10KB
-
MD5
0b3b73c8a0d2417423cafcb7518c438d
-
SHA1
ece41c0b3e704ec9f2642df250da464c69b8743b
-
SHA256
a1733fe922a05e3ce22d275d96eed501a556ac9fc9a4c8d122ce080c5db4a238
-
SHA512
54e0a0be12329435e9dede70411585c6b3e53ded7c1408b15604cca0e40c3faa0acdf9f9419dcfc65779addf791f58dff9d0394eda5094b0afde3c513f5e3598
-
SSDEEP
96:uzVs+ux7V6LLY1k9o84d12ef7CSTUSGT/klUpBJ7/qOUIootOlkqlVHcEZ7ru7f:csz7V6AYS/zIv/qOUHlkqPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434042807" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6418D4F1-80CE-11EF-988C-4E66A3E0FBF8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20221c39db14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000003ff85a2c1dc9bbb282417870ccf02da0acbed5ff178091be1dbd3556823bfc37000000000e80000000020000200000003096f3d4a3db97f90e6f9c08e0288d2db7e0edaa7826da1dd2ab722887774c5f20000000ccfad8cd48a495625e8fdd951c25190ba2c9f7014669da175c1716d692fd355340000000d9eebbef42ad9eda9f84611e4fb98eb5e51afc6a93966712ad5795d73c3dd1863c70058fc443b6a1999b47a6d1896c02e6bdc6b02d92b8419150e9f110f9cf74 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2916 iexplore.exe 2916 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2704 2916 iexplore.exe 30 PID 2916 wrote to memory of 2704 2916 iexplore.exe 30 PID 2916 wrote to memory of 2704 2916 iexplore.exe 30 PID 2916 wrote to memory of 2704 2916 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b3b73c8a0d2417423cafcb7518c438d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508472b5e717f120a5c030725aa544367
SHA123ade725350856e4760818013c3140e5cfe8c40a
SHA256b716dc752fbf77b4e98a3e1bf32a4bdc14491189d05f7c785a15981a1f980435
SHA512df6e5d38f74aea59183c3ec21e590a64a8ffbd3d3898f49a25fc84274de650e1acd9b8c7445d3f0909df787c5a3acaedffd56d047e9caccb62c1a6eed89bad4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f25e4a72dca6e20f29272a23bd7c0bd6
SHA13246e0ced1f313683f3ae27658bc643fcdf4c2d9
SHA2562fc41696c3706041cf18877b7b33a6eff1a0a2484d39954d8855a09a5cc057cd
SHA512e81c5140f3a77eb0a333a66a8d48cbc465122dcbd5be2f13d38c2f92fbee1d8bef9594cb6b347da06b12058a2743b4043504291a17a79d591d1bca3ac6c6c47c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7c99ac3fa5153ab8e9dc1e1f7f224e1
SHA192dd548343322f56b8cd98c00693cefac459bc2f
SHA25654e320795aaacfc47d6e8ce7bb87d262216ebdd1bfbdad8c20ea4ff2e1107da9
SHA512703cbc0870251d8768a99f94987ad7974322e341f43cf3c201bac25b4e908809cfb23980324bf4b3596fd7df132d948566fd960d836ec763d72d97062226820b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5170686f7ef1e2e0df1649af7472c3693
SHA1540a9f16ec68ebe72dc4324ab03c3459c0603b78
SHA2564ad60516abd72bde3506a5e09e6a3d70608e9fb1e5d063444e2397d586d427b9
SHA512d0bcfc745cd61240ffe9c71f194cfafb9daeea59c7d8d7b52cc4e30bb7454a81cfc3503d5a90a122b22b04e6e5a155899457a97df191c22a70007e486cf4eacc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa3615973f66e06730ebd319d511d36
SHA1554bc68e0a3d4d1f88f9289e90beb1a0acc8c54b
SHA256581bc11ea81f0799665d0cc5f6fc2dba76aaae9fe4179733bac1950f479e684f
SHA5122ca6b5ebb6f2f321cf45801abda6495a1dd583fecac6becfc74ca896e00544fad42b6fc55d56050cede594ad62b2d2bc08ddf67bde10e73d8cffcc1b11b51d0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dba34b4aa8a7f5a2986b9ee66a28a21
SHA119b7bf0e9f47b524f58487d1227f402587d3c7d8
SHA256729804c847012541d706b9797fdf2eba18772998a069e9bea4b43d16c1511e9a
SHA5128c1838ebe37b1440af7015c1c3d2a91f4052415f6ca1dcd5afb938820345ea86cb6e872f8f679293bad65cfd73bd8e9fa909f591255e34449f6287ff26b980d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54168163a0d116fea1785b947921df39f
SHA1a9f5cf608250b5d32fc55ec0150f9cc19f132766
SHA2562390b3a1d488d072196998f9da7cb3da3bd0daa93c532954b86a9f8460eb77fd
SHA51297eee806498aa573ef84fa3d36816c5d7ecb40104591e8231e2a238ca99ddc899654cd17fbf57910004bbaec76810e7b9c7b9a724f0f4b9b50e8ce132ca912bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b06b34475cba874fed8cbf1d48d22980
SHA128bc2a2e281c4639854642e661961ae04da44e38
SHA256564636f7bfa6bc8faca4b024a27f52c9ba4bbea3917453819055fadd5284b124
SHA512a844f06c3434775d27f4a1e285e44aca9940cf0399c8bef294c2afff9e2d879fa2576f823645b4c133d292ceb3c6dd52f8f457bc75c51aae21e711eb65223663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55232af99231e7e1b7b54f57d6151f2d7
SHA1b675b4b775345d21650c34fcf8d096d14821ebf1
SHA256f753f2c2b7b39204b5a449bdca26f4ad9074fe11a12bc2b91ff28a98fb1e4af0
SHA5128204127d3c08b09368f76fd90ed9b0f184102e26075decdba49d2695aea1d4bd0843d5c086cc70d437c0d0c15bbff992d5571426f45c240994dab8389ad15655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7239f9eb94dcdc1ec436a3aed875965
SHA1c01f254e86f39118c2834aab25cc266e585d5bd2
SHA2568c16c435162dce42a653fc2cd9a8b088a53e8ed89e4973fe0df30064bb981e8f
SHA51273acaece42203fca42505ca54792d4f1d4f76570b5c5c042f3fc836428d89fee0e25f3a80afbe36c25f44bcf35e7a7ca83de9a3de96b67d7c32e56634eadb60d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52132c1d013ccf2ec0b1029e817bdfcb8
SHA11bc40120d1e457167b894419f19308b312d6be46
SHA256ea50fb5aad5fa71b7807268d32f9cf5b800c70f79fee02eeb557ab6d17ad9b2b
SHA512a717a7916619d0beea37ea09bd562091213ca4b2d50ef863cd5ee9e309ad1570c04f8e0998299ec009204de7ae6a17e26580c042114c74bab07dfd1df0f796c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5986b0e566130bfb95abef3ce23ab1be9
SHA19168ed83311cd725f2a7edbb9e6952f03a3e0f40
SHA25609d1924f9b1fea78d3a81f4b7b43b954a2ff81720b2ac06c9b639a953718bf1e
SHA5125a14073a101a62a6905b63a0ffbc9de029c917b0517a798933acea5ff8f3e3a6fdf1d01bfd05caa7fd87598d41533ce89721840225690a4c9805b22ee9c5c648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55be2956a4659b7994005755328aa7558
SHA1d4365edbeb3b45ef36d26e91c04aeba034d22a16
SHA256340f2908443a2e6de43b3b510d56d8ca8d57db06c1e8842ee9bd974a94e4e0cb
SHA5121fc19288869af209b16e17e11270c6cafe2c361335107586646c9d46a2806f848809ae96d7b8d1527c00a5a2dd6a3525d4644abcb57039157c242ba037606457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d44d9be7e1cc214b4093b48244cef826
SHA1100e90c2dd8286875e6ba4c7d0220908d62fcf3a
SHA256ce06e106dd0042326b53a79cf01c88d5f63354a2590164dfed5575a9764b5ad3
SHA512c842f805a11503b4006dcec58d3110adde9d7a236d8936a3306c9396e8b4d15547c668510d8a016bdd2d53c5412a225fe1a02d2cd8b7a93356b92dc80beb4d13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556c32ac1e71310d22c51a0352d55a333
SHA11e551583d38769076f4ae8e687d07fa5b61f2f08
SHA256310770291f5010dba52d027a7225e4a2ff55938b9e181e350df5ca508d6d3377
SHA512a9739db71c9c402b586de4f71f498b36b338074e379930e7fe4f076e76c483ca36e66f4f50ed3116bae7deb2eb8c87255f487f6fdce48f3ddc9321f2e629950c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fc118099811fa314350e546537950b2
SHA19ed8b3c08dce5e2c503bea26546e489d0256e2b1
SHA25630cfb40ea920ae5e590bb40135d7545dbbed59c0524fac44abcc4b3e0c302153
SHA512b1da0d26af47625283ec8aad007a1c65c17eaf38c1b8c087ff85b5eef1dd1a4d0dbdb4ae1e17d045076d6dda7275d15513984eb2139522ab793fc062494eb917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a102d7d154b96f52143e90264417587
SHA1fb41b923027e847bdaee530b369c00f61ea06d6d
SHA256cea75c0357504c0bf2fee1b539b6ce0f9b18bf3ff654982e5df1feb817b0a794
SHA51270479a1e75f8102097dde1a6bfc1aea3e7f1e6716f597a14082c428420d9bcb3279fbd13ee7782bd9362a7315a16b02c86df0ad6a979c883891e24bed84e9b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffdfc4ef9cd898a68c23fb93468e0b2a
SHA1b2d98d55d5b01b95e84c7e1f20e2a36765fcb474
SHA25656c2ccdbf6dab4e6c7be5af018dd4ed2d5a26f9063e7aee1f067cfc7baef06cd
SHA5125ae4424e9421dcf181b3400ddfe0f9994836ff6f5c0cb3f07e0420dcfe4e956f355808628f8ca626963780f3ec5c8a35a83327115b1c994a73f0bcec53ddcdcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547ea6ba2c5f81748c08126541529321c
SHA12378e876271f908502cdc66ab38c9a26a406d55f
SHA2569f4b481098c252c480cd838fd5c9e9f8f45b63764b64fcd4d9aa20ab0d9e3458
SHA512d5004cbf56a2bedac83b2476686407e04b1d2fc84c7c3e6b618f54afd5e82c02c7c5fffa5cf61e73d031e53cc92e45bb97fe96ce916276845cd50ec0bd04ae36
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b