Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
0c4ffbcfec3710f6950580c862391c73_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c4ffbcfec3710f6950580c862391c73_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
0c4ffbcfec3710f6950580c862391c73_JaffaCakes118.html
-
Size
20KB
-
MD5
0c4ffbcfec3710f6950580c862391c73
-
SHA1
217073e4ba27f6e08fadee9dd1d2fbfd11b0f9d1
-
SHA256
7bbcb40662cf8b7d41d34029a5be5bdc846874373825c2e0bc744509d65df249
-
SHA512
ea939acca0f2fc01aa9029ba6e609bd0ffa6b218dc5b3a98d288eaa8d5829815e7ce79c5c81ece03a01a95356a3a0fda679d178c60c365e4c6da6bfb6cbde2b7
-
SSDEEP
384:4+QfPFd9QZBC7mOdMI4uKfpC5IgSnbmFe7Ac3a6uWHtPd:Zcd9QZBC7mOdMI+pC5I9nC4ztPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4A3E0D71-80FB-11EF-B2A2-C6DA928D33CD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000009ebd83a2cd8cb88c7f0cfee550bd0d402e0c88c12df8b9108feb29796dc6e83a000000000e80000000020000200000001c7450ed24d88b6f623babcadccd8a4f01ae8ad7f6896e31fe315ea1a4a42ce320000000387560029c2d4663896295ed0543a61b6e0b797f7c914bcced6977c22a98929d40000000a080011b2e31e54f27296c4094e9bf549b31c11ae12b46b5cc1439ae4fc3bb886065fbb72cf0a8b80b54cfc70e534a1c6ef08229851684fc480ff3c01cbcabc1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20abb5200815db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434062094" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1956 iexplore.exe 1956 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2704 1956 iexplore.exe 29 PID 1956 wrote to memory of 2704 1956 iexplore.exe 29 PID 1956 wrote to memory of 2704 1956 iexplore.exe 29 PID 1956 wrote to memory of 2704 1956 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0c4ffbcfec3710f6950580c862391c73_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f969aad4b7683fc47e9ddf54caa909d7
SHA13e5dde886e0ddd46e4c13d1538345ef25db354b2
SHA256421c5f2477306d32c0048b078c5fc6a8d475d481d364ff621c14bbe59e142ba5
SHA5129c7439ed8ede103209d9059dc289a9cc7c821b582bb2603eb74f0d7c2b586509ee068a07115c05493470d772f44627f36f0a161a870607b75240bc33fae40171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e9c0c64f492febcd4f78f3f86db3d8f
SHA10bda76c1efec895650ee3a1caa28c1412b40ef81
SHA256c052ec9e70a6f6fc6e99c308093504df48de4127a394d413febed8eb27914d40
SHA512f964a5fb5c11938fc23730947bb2fda7e4deafa9de3cc0ca7ba34b198a73d1354303e318b5fd2a1a49ac36fb3d0b792ad4416b3a7a7abd04729575d60e431f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5327326f0c5e3d984b4c4c7d5421d18da
SHA1fd85ec2972a04defd004a765eba0ca324cd5154a
SHA2569d18222529f940783e6b08f1ce4c253608ca8affe5e332203838ce2dde09b8eb
SHA5127118b66d463cad8bf0f2ee9f99991ac66a3f821ff4a9be9387d94f34e727451f1d89033dc29f388d4608149b2b0498d39d0882963791398c9b1950a7db3c29f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6692d56e043e66819d9d9861b6492e5
SHA130922043a1d6ef33319b3940288ba93ece8f3873
SHA2563401b97f49ae1b31e8d944ff52a2a7e3dad30764cee3dd5c2cf3b15268f07be7
SHA5126fc8bb09b54f454ac9ae4ff55e61985335da0616f5f85589e5e5cb64000f7386cc9ab7ee8ea2bc365dae7385ce5c7a1a60288ff097404fef2a049d11ae3b2073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc9d78ad0b9e16e8749fac6d165d4a3a
SHA18cfa494d02152b5c8e05c385bd1b05417623427b
SHA2560c1d45d159785e878f6da4e5b5bb8b628db672f94e0aa6548f05c34c6d2514bb
SHA51223039dd8a739af1e339478d974334bf64bb585984cfd676356c4bc40b1f6a049fb19d057923a120d0108a9d94f5cb6b67ca0d729769da186fb89f10b41690226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccb1652d49c85e5942838e4e56352dbe
SHA1642c301ddb9ed5dfa77c3f20d01589b1ccf2aa0c
SHA2565470d1e89a7c72e875419fd6a8500152b37320860c1f2b82d3becdad18180e49
SHA5124ee2d2c7a463c77554fb37a34f3ea8a04890fd27da400b3efeb61cc332c0a149865209782690cbaf3899fc364125b6eda82118020de5350572c678e86d6363ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585b4bb7cb18f9699ea34e73115f333d4
SHA1212def980866ad416d6c3fb7a70a430b910bfe90
SHA256d37e50e8423d8308f2bc917fcbf754564e5b4614e0adcbcd5b35a9b984621811
SHA512f96bcbad6d7561b3bdb4bbe46aa59db051fa509d21c26594c166418dd869aa1d2448dc422adff683ba8857121547d3e95f344e1a2f31e75d21c20ea06bd06cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d38194059eaf8f34b13b2c9ac8054f9
SHA1a73985df32d7f1d60e0a09f7c581f5e7813895f5
SHA256b7d449b08ce0d8bec8a070f940f9173be8a71e5d7afbfba3b2a97cd2885f5cd6
SHA51247d8ac4702dbd3505b1471a825b46b9133aab31e2277005fa39e7cd34b88b2116db56593ba90423ce689acd56fe050abb05b9d93f8311b97ad825b78d0377e5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f6c703a0312357c7a9199ecb2fa4ebc
SHA1e11ffeaae8985e7bdcb3fa0e376ea5af0f1506ad
SHA256b2d8ef0b19768122fab1839c251e47809d1777363682b55fdec863537c826e6f
SHA51223af01bd67789c465b757fe230430ad54992cc0f0d383654e83b5ea01191866d0962e24eb2e46cf638deb6d7beaac99722dade9b7e56d0d8b04f327afd5a02c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c69f129fe3b0ab558772de883c63b2e
SHA1498f6255a143b10c77093c98b41d30eca29ca693
SHA256e7b752102ade987be1ad9ce1dafeca428012a55285d36babbd723a3fa2bdd8de
SHA512070574e52b3dacb8f7c5d9e73c86791bab41038527b699e1813d2c8ace89c323a3ebdb62c58142d19c59307c666d9c42d9d18e428b95b57306c531e133b67b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b3b1ca39d3dee168a456b32bb121b88
SHA1d8abb2dc54fba8aebb55c557610f13dccdd8e896
SHA256ebff700a57d82f0c130b151f9bd4ebe825850377a7df9ec33359a7ca282a4d9c
SHA512e089fe4daa4e5cb748b4ce989d87724756323a1d7b4156388d2a8341028064d276b91c31e598d2aadb07c4f2a289d31a373af823d944801bfe324308ca6647b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d0076b597d9b39ad3f322c28f6ae7c2
SHA1b7cc630d6f9f08f074af49791e7eacd3d568d1d6
SHA25681da4bd85779e7f4686f40e4b3d298a78184a29fd722f046d039fc8fc2281ffe
SHA512c3b0b39a8b5d0692564d9db7f6fc8f059ff73eeefed0d2dce99fa3ce066a14147d3ee55a11ee789d7079fac7c56989abcb995398070db5ef0261782fede8ee30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59499a8fd8826fb1095870facb59bc659
SHA1267f69bdf1e9dc20dc1c9e25d1b2bfff4dd484c7
SHA25674d42649920fc2ee4c4e8ab2941b72ef805d3f2361325356e944c182ab0d44cc
SHA5123af86df1b2d59e2df6b27094b289a31cada43435eab32b7f2c58d106a277b96f8cc96c5cbe614f7dddb47d5da6b0b32ea6dc2164e6697c00a351039593c41a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d13a7f0abade21a3d39c24cfd3664928
SHA149918aa3d126a8dcdbdf284753801768a169a415
SHA25673d81fe1d7d650049d687e389f0e727e3bb1925a4c51f402608c9e69b3f434ac
SHA5122d37f45200296db23d5247c183ced45b0b98d41fb2d36de8f5942b1c76e40b3653a12abb57b3d4ec96371c465e8c35a7ca4bdff6bf8affb690d8e031378274d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5445162b2317852ee00d4acc6c5b74fc2
SHA1f79db715997f61262aca454a8890f94f1162645f
SHA256485de5aec71f2dce7abdfe6763fe72e6121660e876153e05e944eb8881c3b16b
SHA512aa37133f007a9340b91a6cc1dd969b6393ddb4986fb558b7055746733ecada5a69604be965c8de4494b29f2699161ba54822b631604f9eb6d248d42c4924ffa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533fd27951acda9de9001b6d3ae1e46a2
SHA18ebf6c369919f400adf778d63f3a4cde5b0d6122
SHA256479a7f17f8ad526287c6db8f3f17d3eb2f295d341814bca21ce5e4176dddc099
SHA512238e98a44506ae8ba85469de39e5a2df82f2be5f0f87d46e8a56361dcf54cb9f2c0866978d24ac41362f89ccbfbb3097b2ad13836b2a3816b068a4b6a37bb543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5640decd54e207afbed2ecc86dbbd6653
SHA12c7510c5b7b048bdd5466b4558d2d08d9f00ecca
SHA256966d3dca90523266bb63e60551abaf265b4d52e8f8d3a63a5eb05bab283e646f
SHA51224e042510c71656dd2492eb69e9234fe9db1c62fce17635164b4d89dbc955badfb0abc88d6f948d1910489981dd264db3de12351b654badd091b665e9640d184
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b