Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 07:48
Static task
static1
Behavioral task
behavioral1
Sample
0ea79958430bf550c550acf2251c346f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ea79958430bf550c550acf2251c346f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0ea79958430bf550c550acf2251c346f_JaffaCakes118.html
-
Size
56KB
-
MD5
0ea79958430bf550c550acf2251c346f
-
SHA1
15ab82fad9abcbe0d1f0265718cfb12e8fc357e3
-
SHA256
63f93a84c02d709c08fe91c886735dcadf2b74a935dd77ef9725eb57f53b4327
-
SHA512
616bb55d103a0ecfd82ef9d402ecb2ba0e6c7bb494ecfb71ade38bffdee3de33f5a04eab2730957bab888837c8528759b33778d7e751e15ed0cc897e94d1f021
-
SSDEEP
768:Zcd9QZBC7mOdMYnpC5I9nC4L0obKVi/HUy/Pd:gQZBCCOdj0IxCU1x/7/Pd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000c48ea6bab18948f8f71f4aae9c680362e93a35cec1b1e48c66be1501ffa4aec7000000000e80000000020000200000007ea99a25e3cd9082a11a7e6a5311cea2db5818da6fff23ef024c922d17c27591200000007d2a82640766820a4c93991b675fb2d35e129cd9ceeecfcdbbe909f8111af8d440000000b1f94aa30c928b494f45a265f9090220c3ef3cc1a2b03fd22d924d13f763d4ca53bea0f75aed931d88c9f8bdfb98f225d430a4c30ca97ccc2a660c3288d8e3de iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b9a8b46815db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DDA98C51-815B-11EF-A364-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434103570" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2572 1924 iexplore.exe 30 PID 1924 wrote to memory of 2572 1924 iexplore.exe 30 PID 1924 wrote to memory of 2572 1924 iexplore.exe 30 PID 1924 wrote to memory of 2572 1924 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ea79958430bf550c550acf2251c346f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aa96c5ffacd6f14123a868df603e9f5
SHA13df55e9440b9c24a43bb1744b95114570c72ff05
SHA2561ea715f8abab79639830d94a782c7147b3044966daa7425ffcbab6ad132028e8
SHA5123ea503751972467117d02808791bf3a64606130730f9f3bd006071970ca166981ef83c581eba633f2c01a8897dbf7458b9e9982c2773d41932633af09e7f4a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd268fd0d0db46e4bab8ccb4f2784a78
SHA1a1eebdbf6b55a4a91fb986a32dcd4903cbc359bd
SHA256e2a65b2242fd5c3e211b9feb493c69b9955816127c9bbe27666f9281fa380749
SHA512a77af2b25acb88d00eb5e8ad4cf76044e4c1079de208ff56868ddf21ae5ff1d2c8170821832d032072444e8fe8b10a95541662e8f06e474726e2fb8b18440818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d855ea63a01b09c8dc10b373e0f787b4
SHA16e3a33f8a41211e34dc5ba8da38d39111fb6b082
SHA256401573f1894f959716c2e08a252b321cfd8929aa246518451ba3f86a0be80d1b
SHA5124bb7dabc672570f19e79ca44958c60309a7a48b025f87fb86b6b917b68adf99835228e8a24c6a0295e1e73ce3a22aa7253406d3ea0b07ca125385e2c89622c53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee1e2b3f8a2fe3cf17f8e461a111ef43
SHA11007537ffab151180f4fdbbb92c28fa74c183f67
SHA256c03fe0795ad78a5eef8052fd53be362130b3d802f94840683e456f37c9e7bd0e
SHA512aa9ff3506140a41499544ba149200452fa19bd13bf2fa19c5b187594d6e7f1f5ae65d90f04263270569da89b24b3793814d2ea8d13701674b98e643b4ef2b86d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3d701381c2f2ff8ee7be46aee7c9cfd
SHA1e7cb9b40bdba8ea2ef40081c640ef275d8cb5161
SHA25674fbdb4901b9eee34cb09df5c145ca9e18f7d5e8ff7b17a7c118e7060c9e8554
SHA512f5695fdd7db8e8ce169a7c9a20974eb477d6b8e1e454f91aa7dee1ab35cf682d44674242abb343286ea562364a54db1e884d3294aaf968a080fdba89a6199061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9194ba4cff3d122290a8ed4aa2b35f8
SHA12d1e7d6d04d0d86ff3643260664faefa256c6b4e
SHA256ea0d89d105a35f4b2930ad1bb21dd0b2b19265835ac1659d9bfa1ea97f55f063
SHA5123ba3f63a21e5c233f6374c1117cb670d25eb3e83adebe9732858483b3060d66f67f75fdd982c29da5775e43e5f47cc4c4154047803b1bc20464903f28d7e77d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c560033c1d77bd88ee041e7a64301107
SHA1c7b92cfff4e24cebe6df4d7e9a0aeb7883e0b275
SHA2564f2bbb827e50288bd83a43cc5a495ec8fe1e3ac373715509af75d50896aae240
SHA512caa5cc955b0c47d1f5ae6ee1f236ecb3c968dcbfc8414d7213f96f7b9429a97b1467ba68116f8b8a132f7a87c39d33d340b81fd8cf19787e44cc9a786879710c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c91a438f08eabe4847d59f0db0e44139
SHA132ff17c4a86aea03d6d3838d08f1eb173c2b53df
SHA2569ddf5622035ba176bb5a27fa9e1001985a24728c6de91b5091fc01f6fd88e0f5
SHA5127f8f78ccd9873b397d82743d26e15561a61ef5505cae44e8f8d5c6a9c8716d91e17caadaeddfba8063e49dda89381fcbee8d90a8a4531d84d600c187df3797cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5289e4e1ae4b424b8184a69db1a2f13f3
SHA1b76d777c52ac865dafb1987dbe899b3d88cc1470
SHA2569b2981a39daf20b9cd7b9997942792a566e87927a26549e6cb54cdad6c4dcd69
SHA51269ad103b6f8f7159c69f438137f8882fde1706663e76ac402c0723e6f28131da7c2a72cf420e3d67886e00cc4c1a57448902bc26f3e3e9a5d96f131e1a60e182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f9a5474afbe57e181b3b8fddcd8f2d0
SHA1ba58b016f0cc2c93c0e3ec3cb8c0c281f4068e7d
SHA256e589a7f6e2508c77bd684fcf5eae2f96e8e95f552caaacad5a73c5658db2d10e
SHA5128c2af024c7d77bebcd9a15e6aa1b723d538379c616472ce58894f0c34a744a7fd1100ca90fd7889f8ebad910b702a448ef711320edd306881009f214430b2c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f16694777238a1a30a6f11099955b6d4
SHA1ff9e437774ff8f9d8d8b760eb6791ff5cb116469
SHA2563d2961ed4972bda730b9b44e7cdc8541fbe73fcefd0d252a2f8f3ccb5bf867a3
SHA51275b7f4544aac662d6595b5fd101b31b504dd8186f17ffb0f4345a2cbe3ae9d9e5a58db67f217a0ead8e4f87f668677573c6e64868d856d75f26e8f4cf2d189a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50596523e66583188385e0ec53de8778a
SHA1ede95038a0c7bc093cc3ea3f754537f4a62a1f56
SHA256964693fe5433d130f178033bcfc36d54a405a1fd1057588bcd392e1bd7421295
SHA51201b5cd1f3384218ab7f58663ce84bf9ce687fa00bd2adb3395b2b13fe71c49acbe1212264ed18745ce881412e63314e34242bebbb922416a8171598a3ec68646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d66fdd679143ec807ea83a9b94428c8
SHA1cd74b5af1398a2b36c9e458e4d9c57d1a29514ac
SHA256c44140273a13febf5626cfe7764cd96ea464ab43af4278d49384ffb035e83f7d
SHA512c09338ac1abe42c7d6942cbca70d7bcb3fbd1723df85cc5c3dd2368204fef48169ba96da4aa54840e9700f06bf39b2e8c1714b368855191981ae9febc08414c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586743b3a639651844b25653f1c3e0541
SHA13dc16d38c3800ea990adb8ee7324ebc0f393b806
SHA256a913f0f75973bfea40d79d6554265f9f19521a42797880e8c09cb327acd85b43
SHA512cd895ada8fcc9e0c3b77b4a3cda7461e73832dcfcc8767ac0b0dbe2f2935f4cdd8d533af8fb48fa60e809017eb7ef78d8f8b899d87d7d141657a7b8a965c9402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5365f563a67b5ce168521b912a327ba62
SHA1a540d5bd62cda5a802a4948c788fab19ce853cb9
SHA2567191c8dfae2d5cb379644ae20ad9d4de21cab5bd5f1aee073cab98b14ea52a11
SHA51241d825bedd8f1b469e8365b6df561d477ee2d83b00eabfa2fedcd423497abc6f6c8ee3012a9a93e508a34f3e4d56e6c17d7f43a4236a13cbb0b10d2cc222c43d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537ba85e50752d247245f9ace5c686abf
SHA18a92c9b55c8034e47077a09d59d9ebe373e44f53
SHA2561d4cbce45a94456250c2d6ebda61fa219dedee46260147b2cf4b310f1a5c9c48
SHA51262f3ca60016786f2fa31c7e2fadf958112f80fb8cfc197beb23548b020fed20afe94351f312871dcf8fd491cadb2990b2434c4b51a4bbcfd423d7ee4f7e26cee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552e13593d5c9288eef815d594a8b906f
SHA167fc6d1bf1949e2cf0051897ba448f81d9668f64
SHA2562ab2e126310095ca0266183effe98644a6589e7f4e88f397e13298190a95b08f
SHA512e803e32eaf99762b6febe018bf458c0c84122da65c26d3c9b34ef779c13c38a106124fa8f23bd4203dab18b180ef304422d647c4536831b55938594488fed043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50478762dd9e7fbe421b558ac03225fd8
SHA14f39ac06b2205a855ba8b1b94d9bf653cfcc2eea
SHA256d4be6e88134ac9ce4d971238e2e4dc7fc68c5ae17ff7cc1dba94abe4d3bd8132
SHA512790b61b053967483df03a2a503b25948f7dd229bdd1e8bc9f06a1c39e6574df798636101571303b609b9cc1b4afc1d71a1ddf013c95ebc9154698eedd25e61a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586345f487e0818f8cc11620cad831368
SHA10ccce85412e5ce71007fa5804b1e87cf33b66d2e
SHA256c9d722c3e22f266622575cd7c55ce94dab3d759d6d7aadbca2bfcc1d178ea616
SHA512e5b983b908c65011b5b38dc369022feca72c7e6cd5bc1e78d645fb364e4a0cd5b7b66461a9b0642cf11f2c9307ba1906e35f98150e23e8b790ae32ac09245045
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b