Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
10b5fbee1d757221e2fc9bdea94d1984_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10b5fbee1d757221e2fc9bdea94d1984_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
10b5fbee1d757221e2fc9bdea94d1984_JaffaCakes118.html
-
Size
16KB
-
MD5
10b5fbee1d757221e2fc9bdea94d1984
-
SHA1
1bc68173195b9f26ef4328e6e6e84e72070af9a1
-
SHA256
2d56f243c342ac03be0532b2a00e3612c2816aff631379689e3323c4f8620017
-
SHA512
9170d9ca537bb676525bbfc947b21f802323f299d58a90194be4ac64d06a4285b25dd885b1a4815bb061ac6a775097dd1b805b91b4ebf6579b720fd15e3aaf78
-
SSDEEP
384:O8dJ5CW5iz5oziBed0/e0TnxpEpOXWWeySbNA7sIthBvz8z8kn808JtEnlWWabR1:DMGP02KE67+Ex
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{25B8F431-81D5-11EF-9303-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20a91308e215db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434155660" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000091f7b2bb42d35058551b59a30763369f1417f85a10c3de51d6ee2a7f8113208e000000000e80000000020000200000001f1a7911806875164a690b82221ef716e3cf09655a2b2db43b2fd48f373a1fcf20000000a830d3e8fd4f42024f13f0365d2a94d63fcd95d42295f9ba99b1f99477e2dc1040000000101c6864cf78566583a765dfc8084eb05cb69867098ef32936dae6cd26b1481c4a935a816f04dbad0238fd2425a09ed3fa734ef3221962785bd343633b039387 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1620 iexplore.exe 1620 iexplore.exe 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1216 1620 iexplore.exe 30 PID 1620 wrote to memory of 1216 1620 iexplore.exe 30 PID 1620 wrote to memory of 1216 1620 iexplore.exe 30 PID 1620 wrote to memory of 1216 1620 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10b5fbee1d757221e2fc9bdea94d1984_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a03d4337ddf99547a805e1d4b01166a5
SHA1ff6304bb4ddfa4d073cc9530c420868b39d4be0a
SHA256847440a73e644af302f4106380c795c064655b9a355bb52a9e68bda936c13f8a
SHA5123f2e75bd73c57d59637bc4f63cf6208ee9fd1c72f3d4d30c857186d34d6ba08c9f97b3d4b18d8444594c29157198ba354341336fc9ae15e6dc021b006ac3bbec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51688e7d3c7eb26d74d170f9d0b9eb9eb
SHA1f4daeb03d7ca983531608c5eeebb6c7f22afe4ae
SHA25673ec29ed9aeab56dfe66aa9bb72ea85345ed871961c3036397cdf95867fb8304
SHA512614154b5066a4da159d697e7a2e1419463c3b657feced97222eee5742c80b93dcabcd55fc1d8b8b1da75f4e9e6f3e96c31524665ea7c3a3ddaa35245539cceef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dacc1459d51c14ee03b4ae0ed555f5c4
SHA1e14d9ba3b0dd710473424d954efba7d0dfcffe91
SHA256fc9befd9b58df089f6ef068f67e35689fac72d2c36d40496d5b1e0e5c9fc4561
SHA5127e6355041618791cb0e5cce47c61afe54a5fb1831404d9a5674492dfd827a3ce6e3020b63246ad1cf5ccd74539659e9700d76806919679e3f62a0cfb6a5dd3a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5b3a4f80d00a55bde79799c3261f788
SHA17ac05bc068ae1ce061e6f55d3ea4c4090b673896
SHA256433845b491034d1e71174429c0611b2adc902ca0e59858bd7c01c8332523e1ab
SHA5122c417e56b834df2a164010e4be65109bab65316101ba7a914e82ab71ea6c1890d4ba6be586c4fb6cbc66ca06aed32ac8bf1fabb5eb7a43e91ce2f653512c588e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e712e9c63b45c85459da9052fd93a6f4
SHA1ba9f41c65fc98707372748d181f72b67b686f113
SHA25613e35da043125c7163019310bff19441380aebcb02d426dd7e51e3a4d5e67028
SHA51274317ffd1a658db2a8be6fc07da839c4adf548401f3363a6a4892a00a6c6b3810d6269bb2a3924e724dde1b4099a82e4199a2f31628a55ee64eb3bf695c8b6a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5414a2cc0a8e31390c833d47074f16a8b
SHA1e0a60aa2944f9fc5119e6361e3b0baae7e35c617
SHA2560e4811daeff00ddfb280f45505900d87b4b6c681b03096a17efd37289e82626d
SHA5125b5eed52505361817289c536ef84c4c095569ef3c5d65eca021b80d714b9c2e9c2da9cc5ffed83717abe813fa1208a64e0139e31fb8c4306a92a08a4aa9d07ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511a5ae5ff57628f9042a4eda42c161dd
SHA10901e8c69b055ee54a0b51864fa4ba11402ade36
SHA25682081d72c547e012bc802626d26c162075846ded492fdfc3ffd958b4d27e9c33
SHA5127ae09c7aff7b9ee9aef1536e2b3447921e4f423389f68ce7dac843bdffad76184dfdfadf3a754c38a988be9dc7191727188d0698a0c5140048051d0140025d7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a60e93677e82e8d0594dff98d36bc6f
SHA108da52394127925576ca551cf39a8b138ba8ab19
SHA2561e9252de9b7be70e3e6c9862f5da99ad357d7cf6f7aca9546e06f06d29c7b8bb
SHA512d7a1197622097c5435dce421481d91ddbb62548b00b86c53429b87fcd99ad15249b86d2d2aac910dfd44e084e7be7197cd366e34d68fad3857a75947cd0c4239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52db943ce7ca53fc3321d3235673db11f
SHA128480c2184dc10c6ee244e9fbfdda88c6c035b3b
SHA256af8fd607a22ebe4a8095edfdba9d2d490b5e554202bca93bbdbdf6654a396351
SHA5122b0e59f8287cec5d10d63ad0619798cdf37e13e3d621e6d1d7777e7ce442924f39ea619217adc7b8198f7189c80ce525bb1cefddc36587adc0ab3773ab12b62d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b513c080fea854c3d9183749578cc39f
SHA1bb1ce548c6f0f183dcf1846946fca5eeb328d329
SHA256a815081c080cc2a846a1b0230339554f951c361dd27d933914203b91e7b27602
SHA5127b281ff6dbc721509d8113c2498555666b30978171bae5f508084c53a3b36020abd588698bc4f3790a5eda81d0688be1a99dfd9c88ccd4fb4dd726a837943748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50964d0b1d381c155ed440f7e2d61d64d
SHA1f333b02424c3dad3754558525a87568e4d9a6570
SHA256da2782908e49e7af03398875c0c381603e824d6fd1b85986ed2cba9d51992226
SHA5125ae5435adeaed191d938204fcf778f7ca0869999446fdfeab4f15c5023b248cefc0f1d1f47ad5aab348a067a9141a5459aa8b283c79929651da24270bc677ad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528bfbaa6c1fe3114db4b06d6f3b6468e
SHA131bdfa57ed9f1a4ef66a6ceb01aa37866074919d
SHA25692638ecf747538a0eea6c9fb999d91bed974b64f7abc2f36d3cd5a4beba64dd7
SHA512505e1aa49dff6d4bd77ba751e963e7a40b1a1a4c07943486d830221ba4c49222f5cd71305b03a3db8e8651a66101b40ab274eb318ff5203cee30b506c7ea2608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c43b6d3f36b2803392876976103e1ac
SHA141603a286c730057c69f9c13b9d24b4524ffd9b6
SHA25678bc0cf0dd504f2224d0fb1e5867c266c3ca628d09950acdff1f7c0d34bc2aa7
SHA5121a4dca44ac000f8c9ed0fc7bb2a7a230fe131838dfcf808ee6f43b0ee4f9e1abfb4dbbe28a6612f634c6eee9ea54c8f850c56aad08f7c4b8dd6e37732a3f79e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bbedac67d10ecd393467b8771427840
SHA13362c4a186297c3f1b851ddb5b1e68bc625a5d98
SHA256bf46d1a2df2f9f984c131d89ac5f0be59c531c2d9f52487e2383d0ec8024d400
SHA5123d6cafa31db32b057fa8bd68365e1afeb58a8cc73f93521e6a5379c1e61a371a2832aff43b95841c0c123f080fd3fea8bcdd52b34f8d36b4cfc4702d4fe56c94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580bd8267389f6def342868058ff88eb2
SHA192c91595dc204b6c8bb4180870ed9b8794c44760
SHA256959b414d19bdd23d2cd0e5a7a26912c889045304ce137e80661390c53312291c
SHA5126990206fdd2d0c84fc85728a2f9d679f0b366c68cb50248e77d0002950d16f39d093ee92f7163eed436212496797ef80a57efc99a2c4eebb96d2e392b1d4ee58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b896dd550c5d5e787cf207b38c4fc395
SHA1b382db6acb3fcd3d1bb9c21d3d7cfdae83518c8b
SHA256697a6655ede34786473a3cd8719d780694aa4d4b23938eda837efcea22c9bf64
SHA512328a0ba9d577ef1ebc33383eb39f36cb35caac289b06378c20c02936aacbb95c2203e1a7c4a3905ec649d4344fc3054927ecab7f959b1dd30b55b5ac27e5ca10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56667253694c9458b24ee51e16a43bdff
SHA1ab83c3e309de519af0c484dd3df765cb880c2f40
SHA2560674615a661d3b108975d085008ec205d2a24ad451b8d019c78af3ce2c350f69
SHA512fac2d5aaa28ed1ec795327f86965862a02805a906243ce7674a7c74b0f55db90a1cbe55a4887ca4c729ff80f38502493e49841a1dc5907bf7c81235c1a600646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a592968340d5d22b7a21ee74423ab19
SHA180d64dc8fe3a66ced4d13b4b396e7d95b623a11c
SHA256bf4a6661be0bfe4a2a9a14e88748646a3a9dc161d8d518262fc9c17450957a66
SHA51235ab499f2c8a1ab7e3be8acd8fb5d7ddb6206b49100e32d50366f9b6970da2ebb895a4de3eb957f36e9d0d708867e41145e2b4efa4c7c84781b0eed039545007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535b676820d0049084fdd05ffed19d261
SHA149c869d69be2e27228099c4d8338ba8027ec182a
SHA2565e2847946ff7338eb1520de5ac522dd3594f6032a2407e55f05f7ae134c8530c
SHA51234e8019809df2b60533818e43f40c29fe301353ec85990a37e50fe1b98bbb70ccfaf65f3edf59e152de9ed88bc5c2be9ad89609b921cdb1b2bb7a3edf624d82e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b