Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 15:28
Static task
static1
Behavioral task
behavioral1
Sample
0b5b0ac59ed1bdfcf40954b3f963d6c9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b5b0ac59ed1bdfcf40954b3f963d6c9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0b5b0ac59ed1bdfcf40954b3f963d6c9_JaffaCakes118.html
-
Size
9KB
-
MD5
0b5b0ac59ed1bdfcf40954b3f963d6c9
-
SHA1
a84c59ad780476e7b1111fca6961865589642ca2
-
SHA256
119e97a237d9500ff9ba066ce0a5da46d1e6f3393008d26ec21e1d1cf1ed81d4
-
SHA512
3fd547f046455400e573b02e67ea7d17dc96002d5564bf8784253d8df2d247ef3a8ada2d7ffcf43327010344f0f5b04cb30d31ced61e0fdfa5a7dfbeed6e5c24
-
SSDEEP
192:2vwzGS2yJmae8YpUu4UsQWzqIBgd261lK0Dtg00NAgHfQS0SZ:I1lNy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434044771" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000f6ec5aa683e02fe737ef8b31bd0a7e63426aded94e10b8542bc9309d8e96aac1000000000e800000000200002000000063be962fdbc6bd82c3e19c0fc2bd765d6ea02c00f57bca16e080830a3144132620000000133719119f616f9f232440917305e30db59b8f99221e32dfef5186cfa5c6aee940000000efccb515bbe0a7df157a406e835f69f21e297681a6bbd1e9cc63be210df113ee84738574390440f1226836c300f3cf30e4377494202deb9c87b96dd2e2675cbb iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F623F5B1-80D2-11EF-86C1-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00458dcadf14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2516 iexplore.exe 2516 iexplore.exe 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2308 2516 iexplore.exe 30 PID 2516 wrote to memory of 2308 2516 iexplore.exe 30 PID 2516 wrote to memory of 2308 2516 iexplore.exe 30 PID 2516 wrote to memory of 2308 2516 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b5b0ac59ed1bdfcf40954b3f963d6c9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed963a09861151a67ca6fa41c01e46fd
SHA1761a50b1daff6a9c07583c8ad8f139bdb623b3d8
SHA2565a2aa3da1cd5cab581ed8a750096349c698d812fdfd92d1e1ab519970c9ef40d
SHA5123799747c90dced84e0236f826fb8d0a017eeb3c7d987dee06b39f050942b96818ca4dc587b9b41b382b5f8871c9c2339fd81cfcc394eacf5265e0e24fc9f7c15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58741b07fd5c34cf0150cff1363259e25
SHA15a8fe0a3c4c46c538a54adbd8235b92067f1719b
SHA256b9a08df40c59a92057f70b1e3aeda6117702e61889567028b1343cd6326342d3
SHA512953bcc4334d326455ecf78e2cd45c221e3731f542f96872230dddddd713e339a14bff5e66ac687a0b64788f88a0bd35a2a6a022b6b6a046b21b5549d4bbb8446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b0a11365ea3f043cbba9569347918a4
SHA10d5d668207360ceb57159cd4c74938218e19aaa8
SHA25688ec2e8044a3d7b5c95f7e90e90261a9b3869d15a5c967bbe5116de0db4fb301
SHA5129d0f1e3afa5cb6f17817ff6f901faf47c14d5666114454a9661a207eb5f2715e916e1f63d81987c279c4b185b0c59dd3d2fb194ce52cce4da8c0153b9504caaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fc5fd5ff79a0f11fa48de51df770707
SHA156dfab56f64cac5de3c14555b91f801017bba15d
SHA2567e4d5aa2ed0b8b7c5d86e2a651382223c412af5232761382db61e66d38770ed8
SHA512e72466b34d9f9d1e5bf4c545631078ecd911ce615465ede4dba507ca37cd43efb1402b929df2c3a4e803857dda813483cead5775a675555d37deaeaf50436c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c8f8ada7faef7599f861d393a7473d8
SHA1b162e89d0da97d65df92cc8532955adf25525d9c
SHA2560f3bf9e8cbb8daccd3be0b4017b8fd2ff806cab48bdab4d5ca09b0be64d61ccc
SHA51242247ba0fb0c4b06924a45f25827f431df345defb593c726d689b284fa85a094adc98dfdf62ef1406b7ca90485eba5954ee3998af109943f849cb3ab87a30367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef1139f5a77a90101e16bd4d1eb5590b
SHA1ea9250015727116a04a96b42d0776d1daecde6b6
SHA25620c0e23cba9b1d0c38d3f429576115053a09b9d5955432634ca9c17b906251af
SHA5128275d62bce596bdd06853e8792ffc6522214133f83a0ed3c5afca57375e1786e2cf0262b6df992ae1d6a0047dbcca457f64f4d23da530067aef14682c429a1f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54935a7bf74ca56ecddaa2f2db74435f9
SHA1aeafa7d9f7f7f722f6623c1087d4405ea9b1cbce
SHA2562ae9a98f971adfb753c9021bc15fb8825ce4a83acbb62bee51a19272d056bfa4
SHA512f9e4c4954c54f28b6df225296f4fc041eccf0d543b826e0b2e0349eba1a4f814bf5686598d08662bbf47bb6af77135b2785118dd248da9dc2db8da90d8451d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578b5ca8144ff45d31628fb8823e5fb52
SHA18331c9970a26742f4dff8a383f4203d58d93c8be
SHA256259dfd9128a0c3135fd1237382f4c4ab935a4e5ecc51d6047debcf80a432e724
SHA512d222a40a81fda9a4393c45bf77dfbe0b93e6e0106ba2370fdc3427547c1ab89b794a4990d54b686fece1c2aa1e91a1e4c714cd78fcef5155389f68db7c94b7f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550c3e3e84c5f1cfca2cd7e0a6f1cf352
SHA1b43f48e96882ddba42d7a8c2110cdadaafd8ac3c
SHA2561ef69714c6f7d82b5b4ccf7946150ffd1d8cb7c84d88c5830b1c401e65389418
SHA512283040c40351d4abbfd279ddea2be70e17735671c17daad941ab04f1999dc7360f84a9fcfcce0cff7a773d79679b603dc196bd5445bca2ae5d2980b0426fac36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547da5bae0e268584c9f33a2b70d41163
SHA1d83bf55d4eedc44962685e8cd9ff74afe607b018
SHA256c68a83b73d18b0afeff198ddbcd7e1cec461d052e1b09920402c2ed9a85d9548
SHA5124b6ad4422c99ad693555043b91cb6f7f4a73c3e57b8cf9da44f0ec83ed549d6b231b22954959ac1adde8ceee30e5355d5dea2a8fe75bf801036ec902d6365d52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55969580669b4760a03bb0141100d677f
SHA1f1cd89037eec112dc4972e26d9a65081b0d415ed
SHA256f8e97f5fb2c0413a89f71efe2d42aeb039fa356278bad38e0cc39edaecc9f49d
SHA5127db712b0c74d9014e641af0dd46622fffd978f4e0908b5bf4b89072204d908c3a9459818ee9102f91dbf501b134a76f8834636873f91aea722c9f076ef00c413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ca899517f5cd00f8250c0ca7b1cf3c4
SHA1f504320cd8c646386c566d560f1c329aeaf1ae01
SHA2564e80d274e99134f6e94955a2755fd2a58e59b09117e87df00decee8348b80f27
SHA51288ad30aab48d943dcf79fb5cb9b9917e050e49fbc1f165d8f6fb27c5b55ad3beb30ed842a326a4b40feefb47b451714d1f18a7bbf2bbe75c161c454dc8a1b37b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5385970ea9f4d2dcf45eda5d2b2d35a99
SHA143248369032de1a616d4db7985561a166d27c545
SHA256f6b8d727e96e0ef3ae609eb7d72c23859dc1c219440f41064a4de1135f82378c
SHA512b96fdb1e326929d0f72094eaf0f800388986f9dc3395f2cf6e0d74af253d605fb2807e127da05f544af92304e27ebe35159dfdcff0f03050a871cbe5b2286b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58257cf4f593be17ff9311a4343602e16
SHA132840d1123ef7494173f513925b088f1932fb55c
SHA256c5cf61e605abe2b94b192f0a742b15e42031c214003b6bfa943f3818ca4cd976
SHA512596982dc19bcbec6a9202581e2f0a6ca729ada644b13c0b20d15dc947dc17e3dc302dff48e230b416becba47846dbab570909c561ca8d33564c09d67f4653a0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b14721331ccab1e7cec9bb50f8158d30
SHA1792ed094e25d396182a0732b397b45665794d994
SHA25686b7d0c0952ade28ef6033a30330f8f1a56794dfb0c90a38bdcb9033be874434
SHA51287f36e46845587c0e60d6ad4a26a62764c1d05be2a812273a1e6cfc204dd4da26551b8866200d8ad912cfde8ea4161fb37f2b466c559c1227f48185a01d7ffc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7cc5746a215b19bebc622dc3170ee23
SHA14d4e821cb7f8e450d53db1cf9fdd8ad95cad720e
SHA2562b89feb4e5ffbc817d5983dfb07843ac383a35cdc48490bdc36d2fe57be7bcda
SHA5123c4b7c9be5376c0c67a2095a7106d2a245b55df0fb6a64f9a73d07189f64b9f82a1dee44f197d434a93175a9bb781c61682475887b0db260aa585605bada2cf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55088e027cfff61f9539869c466e8a7c1
SHA14e158a3702f0c41fd699bc941e2bf4737e761a5d
SHA2566dad14b0ed54a8b7d97a3dd9c6a3c5d047f7279f2e364f4131477a83593bcc3f
SHA5122cec6a2d776be384e9e25f6b9c68a2c9649004524f5944f9602c1807ca195cf534a985da8f4818139455f7721790212004d004ec0a99b9bfbd4e684a3d2b6717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52daca54a859e9377848cf3179d9fa5a9
SHA1d56c514fae2160d8a3ff7b1cf0e2a4c22badf8a1
SHA2564010efcecc939a8ad7335dceb29559115725f6ecf41312d5149f45b6623692ba
SHA512c9f14ec20682dfe611c44bbeba42029d5a3c9428e590a2ed7db23d7f4d7feefc630e0fd5a57e74ce4d42946875a46a83c24255999578b1d8ff186324023a553a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d465cad9c088fd20603694a9d5e3680
SHA10a3b4310da0462014ee5d5fbd4ed0d8d6750ee81
SHA25680ae66bdba2432a6cf8f6e2c127ed31f690a06a887e7e14b29b61caa23ec0ccb
SHA51201770a5a45a84f19ab6d35f51d38e85454099fa851132fb36e624ff8dba81c3d06fbfe0006e49b50977da645919977e4b11fee9a09bfa1b487d2879351b0bd6d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b