Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 15:05
Static task
static1
Behavioral task
behavioral1
Sample
0f4aa8c099d8fadd6a186afd83228e5b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0f4aa8c099d8fadd6a186afd83228e5b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0f4aa8c099d8fadd6a186afd83228e5b_JaffaCakes118.html
-
Size
69KB
-
MD5
0f4aa8c099d8fadd6a186afd83228e5b
-
SHA1
1f981e3bb60fe2b081b53021c9dd34dd346cab7e
-
SHA256
ba6b9294bb8f35278f4e3f083e856eb5fa08f228a2d611a2ea0de972b1832d34
-
SHA512
2d06bd37a9ff68f2ab304833bcfcf402e883546faf3195f81912bbc27fae4fd7da5503676111c5f448311d83588a2efc4885f077c4d774cba3a27ec54c1eae94
-
SSDEEP
768:JisgcMWR3sI2PDDnd0g6sdtRoTyZ1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFVG8sB:JCcTSNen0tbrga90hcJNnspv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EBCD2161-8198-11EF-9733-46BBF83CD43C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434129793" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1087fac1a515db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000072ec0803f36f6087940b4e669f11baff3573fae88d02993329483be1aeb7dca0000000000e8000000002000020000000e53e594a4425ae00748e9d768213d0d2ede2760bc95e7186e2fe7e478008c39c2000000071870f2d7058a6da189ff1b89eab6eebdfc6e9fca7c3597cbc0fbb145d971444400000007e43db3e4a9394c2856ebd06491e03f18cbd0d99eee0db1216d8a90380eabb0cb9ac6048bf6e9a15947cb9088f2170d9d68389bddfea9c78b54e63293cf0359b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2504 iexplore.exe 2504 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2180 2504 iexplore.exe 30 PID 2504 wrote to memory of 2180 2504 iexplore.exe 30 PID 2504 wrote to memory of 2180 2504 iexplore.exe 30 PID 2504 wrote to memory of 2180 2504 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0f4aa8c099d8fadd6a186afd83228e5b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2504 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a42d457b545efe4cce88809d3ddef35
SHA1fd2cb07646f8eee317692e899b468ed27f658a70
SHA256e26a980ddb206eb73765a1d6329788a4c0761be17373f6e06fb8777c2547b1ce
SHA512d3a36d26f396ae37aebf64cf500b088f6570ee2c5b9ccf15f7b6f99a6a1dda12f6e7999d692f94e4587b449dfcc37ecd18fefb8a073469bfb172ab187d763d13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2d344145900a2f3dafefa2b377c1cdb
SHA13ae815ef2582b4c50574cfdf329ba5222258aa42
SHA256d56d8ce7a8717cabc5587f8790176302a3f591bc2c39b9912b53f9ffdded7609
SHA512654eda2363254c946f991b09ed6fe1e49d4c16af6759b479fe103dec35c8d4d0ab06e43f209041c4d7d6b843195c5dc5f9ad5042821b63bcb3936eebe7ef2978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e489469219ec0a4cdd20736430a6248
SHA165eb1082e16b93a79bf1c8550eb03935a5a07b38
SHA2565001c88d1d89cd7115139ffd4c2ae3782e81332a64141271b65e2125f0116d76
SHA512662b9877d02c29eb2ce651f376fd5e7edf5a1b2de80e0d84f3c287fe79d28d9a5ab192766ad640a669907f1eef98d25cf0ea84db7dc163f11de4b3e34dab5b27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553bfe9877e55d5c7f2d7d8c7822b4649
SHA109881c7030366371b89c7a97e97987b35ae247f4
SHA25623a2e62739861c56ca7ab232c34c1a5c6c09781a89f87501ef335e5d10085443
SHA5126d3eb5ac8e88c2999d7fe4fea867214cfd94154c194c1fa2139c6eef12db67bd6a9da3cd60bbe7622e0682f54bdaa3d8777370843b492fc7017022ecf2944de3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7fd4b14b338553e54970f41d394ed64
SHA16e5b5e06f58a104693bc4a1fe7bed94a611c047a
SHA256153922c76053ad25c22f2ba526b0db38223cc60942c961a339478b5b0090c9ed
SHA512ae4d699d935a0c9a2423fe8a567c76772730d921df6a8ec618f2f04a95f540a95bca42f79f3815c4e97a2dc1ce53e4d178047f19984605cb925cec8ce0cf8501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519ccae6a71238da5af46824241b36703
SHA1a5a87f38e45202a5cc1e8848005f3faf239edd64
SHA256207cd68f8fae2e121d22b9322baf5307f60db84ce34327795fa3a649a41877f7
SHA512cdcf3a562e1d6ecb0f788f60c3690e059ae37f88d3643705a9388abd087323b67109389415bd4f24a4527a007f04b85e2b791e02ec68b8e493fe634d41c35d49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528fe6671c98146377e51c02679a384d3
SHA184d50338e0bde3f65dfded6b0e52504be05a9726
SHA25605f0a3cb5f2f425633a4856b1e7a553e4cafab69425ebc9c7cd7d7758a1b5eea
SHA5129acbe1233db7426bda54313e6b8ee9ce3942e8fd40c2ae384be7ba0ecb230287095f2a9c0739698f28d2be5f11e2c5c23862a0f4600f889f8da50a94a9801f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f493c5c1e9a197368092556d21021ad
SHA16c91e4197eaf8ee2a6088cf3e8788fe96440ae30
SHA256db70a35d291b71d1f25f5a64e60007c307d8355646a12a89c9b355b8f4f0aae3
SHA5126b95d8cd15ddcdac648bd387ed3f870363ef0988b124759ea29d35d23990f732fc71f2531ee959447c21911bd9917ae61364537de7385d35104df6437ae0b3e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593d93a5aa653cea181aa160259cfa5a2
SHA1200f5f69e93223943b9efefec61b14b6c4a5bb31
SHA2569dc59bfb1815f8a5b6c705216a2b88fd9ffc033c2aca906c7d0db08f01bfa256
SHA51259412c2246123576763cba700a79168b0db619da0688245c731b1c2865f87b40231aa48755e229678e342bb3e4adce2f97b8737407656c36bfad965260b0190e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbab2c95011d56cdac74efcf1fb16e7f
SHA1d3874246b84f8ab8ab40cefcfb1d38f78cd609b0
SHA2560b1f2255544e74d4f4ea52a4729b92ad525b600dc1b750a19546cdb5f85d2469
SHA512b7e797dcb4159acbbd41b6ad7f344ea6879e5a3754fb57d5177987af65090f690dba2935c3f8933938f60b4761e4f171c8f9670c21945ec748a9c57c9253b28a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffa59f7eba36f9afc403202646311797
SHA1cb775402ea24e551c822dfbb12eec79b70174fb1
SHA256b4b6df69bf5c5b96037961db43590261014c62b0cc78ff64e14cf6306827860a
SHA512555da0170e38fe0a11c86588cea1b261a5d4ac271e46ecde8b12dab4d33e585246cf3d0ae52312aaed54e00a45be77ab8240e51ebc355b5fd04069aacd2e8fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598bdffb5f4aa3b22b94d786953005e23
SHA133e4a785357bf549e19b550e31aaaca1affc70af
SHA2560b47c20bf91e0c60147cd2e130cde9fc1c2d670f4438880bcbcdc9340913e294
SHA512b74577bdd2eb93081417bb9e04788a0b6cddc0147c371438cf16059f17e52e63dbc799cb323de724bbb64a4910406622e7846af60bc596d57e276d53987c7a6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571246d04e654d62e658135bc4005a9c9
SHA14a788ab30164ddaa2593c2c178dd5e86046fd59e
SHA256327cdf5ff2acb491564752d420a44df8257baff6db3755600f5a09fc9bd439ec
SHA5127d7ba6ca2f6c5f9b0d665dfe265a986830aacabe8e801c052ad17d0418e90ce4fc3ebcc7281acc97b4cec11d1d91d94ee6e804cc8df0cc631b6508be1c1efc3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551bae9a1249a29a60c6c2ddc7695c420
SHA1d56de37401189a0abae82c8c1f0bc2c850dd0c19
SHA2566d2bfd8d82d7fecfa13be1815f9302bc198438afa1623c408f9121a80de7230a
SHA512156a05bd3723be4def4a91a4eaa7bda05662eef66619e82c0d07e373264ff0bd055d61a1a160ffcf68ec56e1c784ccd83ec806fe086062b28033b533dd7b49ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b08be30bcb851fb5f5b93383877781a
SHA1e1e2ad6f88706fda7e2b5cdabbf7b0da55db1316
SHA256dd9b5b2ac7f28f22c1a941bc56699ae905a1a5bdcc98f8b51b4ef1b0e5934c48
SHA512ce7eaf6abb46a6d8e7ede6438f947940afc0c6a360641c2c561de3236a7ed52d5b433363fa8c13ee76ce664ffa7b55c7568736d60693adb882cf5a1c081a0b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d3741e94a59941fbbdea573dc34ae69
SHA1af2fa498b3217e9131c45a4f9fb9012f5b61166b
SHA256a9b0d9641cc9b1af9cb951f3139c71809e7058e60f7e032f9f0f2ca14c42e655
SHA512a25530f63f975a3569d1b5c2cf2ff93f081352dbbe42e90b50d11b23561f17ae0b60c920b373513d1a5aff0889fbe67b8a69cf1e71addebe7666fd029149844b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deb066d953d5585e175d80753207b85c
SHA1449605a87c9b78bf236f6a06aa030eede22b54e7
SHA256a5a68c5ed016246acfee7886975134fe8cc8b4814cf413e2e1f52aeb785b0f22
SHA51267580b1bfb14220a0dcfd587b6d905a2fdd4d5f36950d50e4f48c71d7ea71d81419738b0c569e2f69512103b72aff77d7d808756b8c46e2e98023a8e417af149
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e4e8fe32ae747f21e0f08431286a8f7
SHA13d6e0fce46c73b5d800da07dc8f75f6032616f0f
SHA256c04b5889d596af3bf4c4c99acc201ad279c2f40fba84658de7faf4aa7071519f
SHA512748f595898c9e491405ca9ec1fb350fd3b5be72c2dffa9931681bf1ceffe61d2b38703dc9dec31af2af0dc10c868284ed21070c42dcbfa60c1f9f84c21af35ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571f5e008990f83a1ccca0e902c0a0995
SHA1a7c3a3ba2ef05c6e58f425d82424beedf8d509da
SHA256fe818066b60e0d1d43a98c8e27838916285475c3fba02c76662511f67e1b09c9
SHA51211f354128a4fbb6970b9c6ca8cc4e0107115266a6eb3cb2a363992547bc3496399eb79dffd277b84b39871e8f19e7c90a4c0b5931627d2f76fb0b16174eb6e19
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b