Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 04:17
Static task
static1
Behavioral task
behavioral1
Sample
0de1a18b9b1c08f2dbef56a91cf2804a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0de1a18b9b1c08f2dbef56a91cf2804a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0de1a18b9b1c08f2dbef56a91cf2804a_JaffaCakes118.html
-
Size
43KB
-
MD5
0de1a18b9b1c08f2dbef56a91cf2804a
-
SHA1
d733262fb953dc2174cfd530b3b55b3a05e02be2
-
SHA256
b20c125fb28957d3ccf506e5a700f9ec11d3b195777d5d763c6cb7f8a7f93bc5
-
SHA512
444f4a0d81f428ef985cec43654392177b2442024c2f4bbace72261e44e80b1dc0a3f01599dbea3a5f9368293c1ca263de92c06e31a399114ebda1b4198a024d
-
SSDEEP
768:Zcd9QZBC7mOdMdFpC5I9nC43+vbTkjH6QPd:gQZBCCOdy0IxCe+vbTlQPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c08691444b15db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F13F0E1-813E-11EF-BB15-5A85C185DB3E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000285ae050b0c3521c9c876eefbdfe62142b6366185bd5b60589461d469dbe6a64000000000e8000000002000020000000166cd7cb9ef396ff5414b67c9506013f3f019cafd1ef0fd73360d6e6bb8da87f20000000da646d93cd55be8e7a6187d38f5e51176b1259af3d257d504bcff0eb3a5de87c40000000e5166598a4fc13bd3aa6617e4a32deaff18967433c5e1fcc13213a10bacf5479f642a534b4c88a41ac972dffa2cdc96dba167e3f4236fc888bd6bf52c3da280a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434090930" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2704 2668 iexplore.exe 30 PID 2668 wrote to memory of 2704 2668 iexplore.exe 30 PID 2668 wrote to memory of 2704 2668 iexplore.exe 30 PID 2668 wrote to memory of 2704 2668 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0de1a18b9b1c08f2dbef56a91cf2804a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffc56d6ce4baead279fc27b203327dd2
SHA164bfec9cb13c71f2830120dca199b1b8c3b672b0
SHA256a2851b0193788e8080265f8e4e40e52173767bd0abd0a55d9d68acc631d87004
SHA512914a25050edf89a878b55aad0015cb3da9032ca041e073a4406254a7b47085c0f003d1e81c13b468885c3461348c539ebfa38bd55cb6c490d8fd5af825e723a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eb258af2b63640dd4df8e0a8c2c3b39
SHA1cef5c7a831e9c8389759392c547c3ce29dde7c2c
SHA256dd5ad7ecac15db4227e917519209ccf1d41d9ff43322c1168056eebb211d0d93
SHA512f75bb83528ca3260ab32472913850f79e281d7c0dafc9fcc155e3b8a5987339d1c487c7294f67e29500f03a92044daac25a66c05f1371d8a333571d0b5b21c35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e939db32b9f6880583c2383f2ead7fec
SHA1a2f291d15d30f64fc69f228878a38db0076f2159
SHA256f813120673cdcef5c16524c0fe648b3f7a89fc606abd841727017c1c0eb3f0cb
SHA5127d6399a46ac89e183e411a63ee2170e8c0e069c47de080b4782993b20b6df45a5593113cf33e5949c88fd39a9e599e5da113652737875dd2288afe9ad22d07f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bc2484790f5c39a522cc79829dcfed8
SHA120e69876773227c0fe66cb356cea0abfc29b72e9
SHA2567967010a8c81b6d36bfd46d965bedcf25c85baf65ef622bc533125d436aa150c
SHA512365c0fc5d2a04a35785bb5beb63bdaef287037ee7a5f21256007635cd9a8cfda84bb6ce47bc6675dab14bd686bf8eeb5aac0e0cbc234d10534097416920ad102
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5048f686af7c3a8e97099dce08e67d6bb
SHA1917ce98f584a93003e4a57e6e9fc6e8cdfc3936f
SHA256847a12a14a794a1c519c14ccc89d9f5d33863888b62b77fc5e00a5ff8e5a728b
SHA5128507d8398d6c9e2af2b1c0f22a31fb7d80198c9736c15a2a3aea016c2eebbbc15ec88c15a912169ee1407a5e4ed7db378851fe42d05e128e2153368c2a6a57ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d61ce620659328864ac4f34ebcbaede4
SHA1ca0af291bcdbd5f30c6a743015f355ff1c6f5111
SHA256e12f3ba685e91d7ebb015a94ffc1bfda5817b0bae19fe897229f1434d1140dfe
SHA5125a003c5f8976aa76fd349a93b081b1eea3ac3b5084153f211177eac45dd403af3f1e5c06ba26acb7f27e1d726b2e0549307a6d6ecd7032412c6308875e19f6c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cbee326d0c4ffc76ff75beb4c702ee2
SHA17713cb7035d4813aee7e1b5b3e31223d868b5ed6
SHA256f6d474925e581baea072cf4c4ad83903f743409ab8b7c4e92367901490f17b7b
SHA512be49a099df855e3a5774ade7c94b325efcdab8693f9509d8ce1c5bf43c31fd41efa0d2eaf9df1d5a9712939b7afde17378f5fabde7f805625a6693d0999bbb7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586792db547804d181c989568da92b703
SHA1092fe11e819dc21c931136b60724c2023c154c8f
SHA256dc10808299f688ffd460664ae17510732f92b564a693adb138b723e20701e033
SHA51293ef214fd49103272ffb99d1abfc71833ce0ecf4df320d8b4c9d991d5f2198780c6515f79ef51dffe7f191d1e7f2c2f1325f91f84191fe7c6f1d7e94858abd56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0fb1cddd067200363cad959950c3bb2
SHA1f3dcd517ccd9f68caac1f4305f2c625a5c9a9e4c
SHA256c41011901e7409c003fcd63bb3eea2844572132e9afaa53422a56c54600bf2fd
SHA512b7cfa670ce6855cedd065830f7e72e8fd88a5ec8475cde74f7347f781ed1f9a78ddbcf97f46171a21fca4aa3677eb3637f697148f1675254dc9055e0743b08d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5651cd84ddc8f60220eca83e5c33ee890
SHA1cca4b62a56eacc1bedd9de2ac6d9b3a2c6b93c2b
SHA2565c1dcd32162a5115a77493ac4c110cb2f94cfa734be0b7175febf32ccf01fde4
SHA5121c26142bfb9160b42bfdd66fc95ea1c768bd228a2f38aeeddd7ca4fda0f969f486a033e3d2351acad298a0a95a7a6913caebdb9123be082932540003bdb17ba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ebc03f41efd467823628d3f71f96720
SHA1d974419653c6073aa89c17e385d5568ae20bbf0f
SHA256be87fcab448ac362a4010dcc577771dbfc5faeea7cf3ab3818e27dfee47bc923
SHA5120787e3a49a3a697089204d781ebf884231f77c6ae240412bd0d85104d4f56428f45bede8592dd1d06af4763375080147998b81b256e19aa7f0ce1bda0f7d94fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee0d0562f4bb92da608481dff166d525
SHA15353b49d4b040b0a48ac3f0023879e7f25dc8b84
SHA2567fce46d5ae32840ce55443aab5bb3772886734f1f66f6d0d815cf8a8bbe8eb64
SHA51290bec8e1b2d2cb204a662a0fd4d5cc699c2beb607ebbec97c7ad5068fe7367a5aee86769349f3f97116e264ab9ba5e76d10c3fe5ebf32bcffe28d19998e154be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b5b290d590cb4ba922aeef5fffdb43c
SHA1f4bd954c3f9e5e26cb17aa699654fc3daef85304
SHA256af86b12f551d35317ed6ed4fe704b2d186368fdce30b3eb77c4b193eb959ba30
SHA512047334f8a6fede5d19b57ff2cf0b427eb866fcdc5a05b4c70f4fb0e86bffee00e6b83a715eaeac22c0f43b808764bb416777dcaf2bf40329370d0919d71f2189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52abbbc7899a2cd7a3f73aa27333b56fc
SHA10ee87fad030660c1d6fcac82e67acc9305436a81
SHA25632a26cb7888383ad6275d88b909c60132c1cf8e80c7cc3e6661e2a116186f206
SHA512dbac53e8a847a2a5285682155b32c5ecfb027d35beec3544a75f647b79f2c6449f28c2f191c9fa5723b4137fd1858987b9e98ffb7a242edbe4f8a32660906b24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6503817a29ac181c37e3ea8237a7263
SHA1ef1cb8381cb446f87333f990f4090769e560be21
SHA25639e67da9876ef9daac07d94c65634f75b0cffd09e91c2b2fa59c464ac40fb91d
SHA512e7874f8a2468074d92a36894f849930316d0419a2a34d272cfbbbb222ff7c7ac06949b735111720255b8b434c23ffb297f4dbe0ec5ade132dcc276357c5e34d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f99cd847e76b919ddf615fce6e92ba27
SHA106d1aa66940fc11599da8c0aa91d2edcbb86c9fb
SHA2568fdd889bf316fba1aaa3000cdcc2f3c5c2b9cb143b405ba74edb2bf279ac8cf5
SHA5126501207ce426bf7a77e02dd7136364f65a36977fef748762fff2e1621644bbdb651db50a9ae18f63a9f76e0fbca0ab9c64f78c083ec47f0536f63e3e9052f4c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e62cf92f287604e71873ec58f5b57445
SHA13587f75d0e6867c00a7482140885af7055961858
SHA256d08a44dbf8e25d6f14f43a854ad7e7f3e7a43126db65d37c4293a2e2fcf2644e
SHA512eaacffbc7860cf668baa418b7896392bb9acfebaf1dd5471976a88d71c19fe50727af6c0404b35cd067576590e3d4c53c4ca826793cbdc6d91ecabcc3488e567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f6ad0b8187959b0ece4ada5300b02af
SHA13ea130ca3f441e1ab24824c812a02519fe656cec
SHA256c670fcaaa7427f994a25ac253bbf32f0b2560604721ebe90f9f970d05404d599
SHA512009cf7d2d1d40689290df1f979620275db6e923a8f808052c8819650bd632caebb0ce8eaf6f2d3c3910815f5daf2a879b2877b93429c704b722090acf07da236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535b9c878b86d2c2f616d6a80f4479831
SHA1bd35622179cdfc9e6c7f26e45be592c897f4f677
SHA256d4dbfe24605e04d311b9474269464ac5417a26a42a9b073528c737164334dec9
SHA512da60e70acc5bba110436718b4517ee67242106f8330d3dfb022ee560ac724c7a6e966fcdbe6454233d40f52b11e0fa21f11c9f213f596cf5a3140535f8df3426
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b