Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
0ef55cd4a584098a2050a635e182be73_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ef55cd4a584098a2050a635e182be73_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0ef55cd4a584098a2050a635e182be73_JaffaCakes118.html
-
Size
34KB
-
MD5
0ef55cd4a584098a2050a635e182be73
-
SHA1
8e3f327043423a4b62c264dd194e2a7437ac6179
-
SHA256
7455d2e47e201246e75d71aafb3f08bc48f1f48e68b116cbbf0f2a989c2a492d
-
SHA512
20e4ed9e9a19677d2ee2f6adee1d50ad95b9daec728faa1e2d077ad36a8e243619c7f959103ae96ee62aebb2ecb0e2b0eae99589e28b20f989fd0412151249a4
-
SSDEEP
768:C+GKXg0izp22imawA+eFyvP3++8nU6pCcPeTux1/:aKqzp24awm4vP58nU6pCOeTuxl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 608b6da77615db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434109566" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000942c9fa076fddc0de16b1a141964ebe8c6f469f1b4726326824e9c0a041ebe3f000000000e80000000020000200000004b3265a2e6a2e34a31fbc91489c92403cf604a79176abe39dfb42cb182543faf200000002c1f5daff3b76b5bc58aad9ef45ef4649708c9750172b4b3895aa7dfc99ae95640000000a94ca2e1ccdf63940bc9fc27c67622c5972bbc90dbf15458375c6287c1de0fc311ada93197436e4f9accdf2ca0f72abc79aeffd8e32d199c4603904daa4dfa3e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D268AFC1-8169-11EF-91A4-527E38F5B48B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2784 iexplore.exe 2784 iexplore.exe 2196 IEXPLORE.EXE 2196 IEXPLORE.EXE 2196 IEXPLORE.EXE 2196 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2196 2784 iexplore.exe 30 PID 2784 wrote to memory of 2196 2784 iexplore.exe 30 PID 2784 wrote to memory of 2196 2784 iexplore.exe 30 PID 2784 wrote to memory of 2196 2784 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ef55cd4a584098a2050a635e182be73_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558515c04bf4c0441acb9713f2000fc6d
SHA11e02b75966ecbcb9965953107c39fe382cfcd77d
SHA2562ba9216b840df86b2e5ab34d38a15bf454ec147d2bb667b3b63ebcd79004be12
SHA512e17abd82d71c92bd3245cf067e3d418ba72730a380d10d108cb4f0bf017f999cab64e1db7639e968a982fdbe00905de99df38019bd5e51771ee4605766454e86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5138b4fd3e6c76dab6359685c62e5e400
SHA1258b85a7f920324578aa8e96e3da89ae6d4488d3
SHA256d15dfd136dfdfde561548b5e0231650babdded49896baaf34fa953d4fb63def9
SHA512a01ab2c7e847bccd46b2574302e09f4f1ffcebf669f67413521c2f004c8995d6749804d056e3355b1cc61670977398adb82244c5d93a882151b958ecd80490a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511b69ec491b7e94607554a07963a6e5f
SHA135e58aa477fc554ff343c9044a1c0a7dffdd9393
SHA2560d0a97e30858cd8560d4947effbdb73f693886077e14fe4a096e74dc9ea5c70e
SHA512dedddbf3afc1ef3dabb071253da64d5da5cf072d911adb83bcff1bcc7ad2451bce331b4d087b03e473fc4b90b2b3b525e53c2203d0a712c92b4a3aa295c28b91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ef239a69be43cb1a6e4415095670d2a
SHA1a82c9b11c7bb4e44331a06598554eda1ab63d0d8
SHA256ad26a0cc90b5e79a12cf0d5eede61139a40b288e4ff7ed6081feebff8838341b
SHA512c6cfad6f39e76c797e63ae0358381ab60544c312a2a4f0ff14e7915e73e2b0a626d5303dfe49d9f0098c37485fa43a710126299d25ba4b52e4f84dacd80806c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57647291a7644bb053226e7ab946c2e29
SHA113fb3149765907c0d16eef3a99832a10543055b7
SHA256fa7f9f478c0edd389aaad673010ca31c2c7428605957b7c47186e9e905597d69
SHA5120c50b62f5171c04379213daeedbf6afe7e8ceecddc3014e360330a6103d27c215939afd4d0d3d4f5b7bead99425a91e18b71fb05064faedc99ae89ad3ad8a8e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d67bebee186ab377f6a342125fefdcdf
SHA1e5fcf46a37acc5d8e90700bbf89f437be2e4c7e7
SHA256e4a08736f2cb63baa2ad3ca84141ce6c5a81cf6bab4ae3f3d5b6c47fba2e439c
SHA5124aaa1722c059aba55f7244628839c18c9988beb12a4b70d029a49504d9b136d65b5632fad4336dfb972dd2508d4be5463d1257a2c954fb4cd28591fcda21bc9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5618785c2fca01019ed0a1409f48c09e5
SHA1d94b6c606cba076abf742f4241721011a865156d
SHA256ad3c5b2ecf6009aff0bc54614a3c2daeceaa9808fc76e5ee0435e94952468e6d
SHA51218298f2fbab954c18d3b3d89306ff2c713b581b105ca13eac166214c3f91d1979155a609a9eb1897d500b09f102c192269862b3a716234ad8cf911ea7633b4ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c24c9470c41298c3653b700d98fff420
SHA1e39d4a44203c3f68b125a0ee07bbbabd4f881001
SHA2568e3da858fa9e4529d61c7d13b6bad69545c9889826fceca2c98738e1bd95d5a6
SHA51252515cf1d1268fc0198f1f7c23805340a241433d534b154ccf04e50603f6996dd172583909dc1c8dfbbab7c28beec6fc7da5d73d11fb263bdcb754d85565d36e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aec98d4fc73fa4cfbb2d30a8c7eac80
SHA111e80ed925110b0c00f0362a6900162a05eafff6
SHA256f95a0d11a8ad59054b10c001f88f1349f34f033008796f79d15df86b4cdb900e
SHA512794b363ab6b87c3153b381ac7951f3fe3b672ca3d771bb10f614887fe7aa2dc3dd0002de9602fc489f24ef51685950ccd1b85f86f8b588df1d007c8b8f6c6c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7f3b5c8d311680cc0c2a0664c8d5a24
SHA15698f7fa2fe3043af1e980d0c96ca835ff523762
SHA256bacfbfe59b4816085bceccf9b6823845cef3cd59757c2a93e1745686031978df
SHA512970a15f53ba8939152102040bf94ed1b88378181e61f626c65209e6488288053de1967623b6de8de34f1c1ddb4e33ff92f93201669370dff28cc731511ca355c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50040985f70bf57d5f2451b9c237e9700
SHA14d9478db4b1b6b268ec76ca4740763109bd976df
SHA2567875a1012c91aff8784150956d06bee0c9dfbf152697be42b2fe34c564aefc4c
SHA512fa50f916c694c76ba3de6cd6e48c25a9f8a113ae5a06c0bd7cac5d5631d22744a8d9d0f850e74ea4448d692d94979ebca5716e1987c87e119a942726357f63ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bf1fb9615700c21fe7281caaeb092da
SHA1eee502a34b4c183f5f96f45aa6ce2801acbb0252
SHA256f8ee36bc0d77bcb885158a5a0d40dd65b17c192e4b87af91ea744145f926f369
SHA51277ad9494c93d8bb5f1b7d843fb5e30f96fc769f768cdddfd89c2e123a1877ce925b15a63bb8447d2c9b649c7f15ed6fa0c99a74b022e89378e7c46b5f1c27688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507cfb09b0d8319b73893dbba8679f7f3
SHA13ef305c1393469a1075781f92f5e6bb931ff2e91
SHA256106d52924776227e3574e2092b798e8750d8d9045f22bab1339b5887687e7875
SHA512adb7959d004f212aaa483670e9c722c534fc459e8413ecb60be8a9d2f18afc5908e87adeb924e1e29837759b019aef2e42488ddc6e4f72cf43447fd429f54fcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df3b4753b36322d6c7ef956dd322c301
SHA1077cebb042e728d80b637e8219e660577cea4da8
SHA256499afb5affd1972e6742c8be6aba98f76d7f3b8d8c582a8c8aab12f59178cc38
SHA512677d179f4496712792a7ccca24777811435b3bf8a9a5f482ba4361b8ed4cbe4dd1594a6814514be02156e95db67967a915951edfb1e7fd1c330b932a55d374c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b208640ba2dc66f7f26dcb131d351ee
SHA1006cd2e32f7a16aed8546a1b3245abc75823351c
SHA256f2c8748015b12ed4b5380e5892db9695463d04690e31718c2c1adf3628465b95
SHA512a1858067cedcee9c6ee2f1ad2d92603e3069d5c7862fc23da37e7ff7c40e4028730c3af8669ab444e06333abb504d4ea072e2223fa477ce0ff8e7fa29a84bdb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4996db403a406d91f2447adefc2322a
SHA19aa5adfe9a4cbe0c548d06e6cb0b942bcd9c900b
SHA25654f008ba07f26d1805c16bc0974298b5ae9fe41205d0b4de801b8db5f8c37d20
SHA512bd56c955062fb4c35f6fa46166452de635916ff74fbafb641a3ca976eff4db83a7cbe3d54d2d6b512077f511686fc27531403b1153620f49a3a175e635669fe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1cdda1f1b14b73cfe682bbf9a1928d1
SHA1e284a59ef187faca60aee0acff780ea827175f85
SHA256c00d46ae410d896b6972faf5fe5ec46610634d572b94e4937ec6f59f133de03c
SHA512adf092a05bd12b764ae7784a6d98011ba8cfc2094408cb2962d0e01c7e5edb6287ee211a0ee66ddc5ce8cab2c0352623fc04888042d8de642184f9a81fe005d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50023d2a8402ca2243f8778dabb1aa237
SHA161400372f2a65ecd00a126316577cc11b1a44978
SHA2563ed418ba47d2dea53989f2a2af1cc8f8eadfe4572c867917dba36e066191f90d
SHA51255083cc80b4574112cfc7d98377dfa5d224881063be68946664dc36b1914fee0f481c4ab618bda43313fc1ede96ac35db467e8a0e20721733ff27c12371138ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e7f769375a280aca8e0d8015dd1289f
SHA1885b1c3358fe9f46e86fefbed8a5992a0dea0748
SHA2565ea5f98ecf24262060d91dd7cd5f7e513a45b640510c523392d4032dca6ad521
SHA512183a698fd88539d0af66769913f585ce0c48c9b2b276edcf07c26af4fe8def4b61cc279a070ca3245dacd9357def238e5ba1a3e297e0e8acf71cf8a65881194a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b