Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 16:07
Static task
static1
Behavioral task
behavioral1
Sample
0f87bb117f4ea22f7b0d71095379e8e4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0f87bb117f4ea22f7b0d71095379e8e4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0f87bb117f4ea22f7b0d71095379e8e4_JaffaCakes118.html
-
Size
214KB
-
MD5
0f87bb117f4ea22f7b0d71095379e8e4
-
SHA1
578aadd53ed8d33b0e939f491589b8cc44f7a89b
-
SHA256
9716ad1220d028a8d533979a3166327782578ed69bc440a059d69c501123e6ac
-
SHA512
08378a1efcf1b6304cac40fb4ec2592b73901d0754361beec80bb7db5e4cff22eeea875e4c8749618d994bedc43e184700131b48ec92e9405258aeceabfb1a4f
-
SSDEEP
3072:wrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJj:oz9VxLY7iAVLTBQJlj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434133570" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000061ca3fc3706e62178c5eda5aa131a1704c0540a8c1851cface91f968c3d8ff88000000000e80000000020000200000009ab2244161d6ae1a0bc7e4f7ef8f7e92e81d227801f6aba5bea6a777500ac35a200000004aea1a029af914a50a70e5c2ea5305ab212bdd308a05ed9c630471b0a5a05363400000004a95fde08e26e8b3783880ecbf6281bd01bf764c080c1e50d4bad6e9f7056f39802ac4440924f7301e856c79dbbe3961f8ad2439ea7ab7a84856a645f6ff9473 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0aa15aeae15db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9A7AA771-81A1-11EF-8E5A-6EB28AAB65BF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1092 iexplore.exe 1092 iexplore.exe 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1092 wrote to memory of 2268 1092 iexplore.exe 29 PID 1092 wrote to memory of 2268 1092 iexplore.exe 29 PID 1092 wrote to memory of 2268 1092 iexplore.exe 29 PID 1092 wrote to memory of 2268 1092 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0f87bb117f4ea22f7b0d71095379e8e4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1092 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51054a57a67e780e03ede79a102c6d30e
SHA15cf270db0ab9084d80dcfae37a31caefeec62200
SHA256408b1cc8418922757859e47001d5e853ed4f418e7f10e5b160a24b6b9a327e58
SHA5126734a3f1b3de9ead062dbea7f2bcdd3f308f0e2b836e6064fa59ab1d4abbd18d86c3d147af2fcb36a0953a5696c098c1ffeebb35975f9e8327c93fcf4f792178
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceabddeb898c4cf96d741c404ee33db2
SHA102f8e7d190fdf69d13c18ca266e4a816a0e1fb1e
SHA256e5cf3ea8a4feb57aa603221be6d7ecedaba0a57d9282369046f504e5aa72f09b
SHA512d0232e654cca66ac9a4b6ec7434842e6285b583fa596e4c883acf078dd4ea30761a294cf64053cd5c3211e19d3e7e35478ea8ed0267f5e4eddf039b0fbd1485c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0beb727e000b5c31015f4a4d3e3dfa4
SHA1bbbbb8ed8cebeddd82b6ce564ec2975c41884c83
SHA25638c2d9ef53b6b0f77ee36c3801f9a4470c5a888e561ad0eeec83549199620956
SHA512b1f55cafcae48fdd8857b4e7a5262b067614e7fe045c962d817f3a3938d0310b7f120ef2291d56d2a80b122c67119059e16af4f9830ce44c4581ab689ad9c071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b6f63772cf2a51ad55d5e9fb2bfd989
SHA16a567f0c27ec4329dda862ae54ff3286b56fe60b
SHA256c1eaf8005984311348d800bd75398e0c25863836719c12d8d5baec9efdceff1f
SHA5127deaf115007848d1b42ec18275c19811f8f3a2f9d28a6fd73495a4bbf436b5adc8791e5bacc1e179376cff4481973e26ef6cde9fc76d6ff6e216c1c767d0cbff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52602b3a65c6b73914964f4ba90951337
SHA17afa82a052f6969e05f47831d4b32781464fbf7b
SHA2565526c7cd9b07af7a0ab0dd85c18b85e2e824e64dd5ba51dd5dd43a0cd0f520c3
SHA5122bf761fe1a89a480cde032417f29770148d4e40e982f6fb83b56b2ef5d8e7fd499e3eb9b21b269b28ecb29d0e2f68ee1ee37720ee792f4bb4a66367a7645527c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5010aba99bc290cac7e5d4e725d21a21a
SHA1c9733cc4aeb3f97afb4a0ff710be7c016dadc174
SHA2560f4402d72ef72202d179e550b0e6fbcd94340ce6a3fffb6832877bc4a6d7066e
SHA51284cb4ce559f55e4f8f09e0416afbd16b7dc3ce977dcb0dbb5f6e918cbe15d3f6eeb120c3b1daaf198bdd50e4015983ab0583aa1d3311808a0fb6df070e157399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5149167c52fc59775bc5d97d74d018c53
SHA1e1988d8e8a1481f087049c565d5e45fe2df5c4ea
SHA2569195de84f03e039b558d161cebd5ec09dda98c94c1983edb913238d7cf7b82a7
SHA5121b8f858490ff9fb5f7699b0247ace77101201a5923840b6a455dd2366246ad001dd842d358457d08697e48572adf99f41e82bfd416a7f884055db36e56eb6d3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505ef48e0943b68c6c0499d18b47339de
SHA1ae5d7bdefdedd76a2285141ea511b682e221a2b1
SHA256f2f7879f47e4879c13f6bca785b3cc0fca991dd9f3a9320e08208acc77903825
SHA512bfbc84b63762992feea1cba516fe45c48e13dcd54b5a9d51ae7465adf3b9a34844396efd04d41eab016844cb64f6a9ad99d63b2bc630afc5b7b88626852fb092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543917390318a4475845832a7cce3375c
SHA17c616f4dd6d915edd44ca7ac321ec1f781e08b6a
SHA2560ef2d36000d7b73408f7d7615a5a012cd11caeb8ea4c00889bcddb10a8c3c3d2
SHA512fdd9016077666e76575e6d82d446d2aabe5cd532199b2e6be366669fae3587afa418b443336f324f56c150452ecbe7d234b5f5fb0eac9fa26e309b29109bdae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b39e124d2f4cd91e902cee251bae09c6
SHA141bb862f420f169fa105636393c324f52c9ec106
SHA2564b3822cfd2d62de68d334d97afd4a8a2f817a6061e2e38e217e3f58a6ced640e
SHA512376897a5f5f01cceb942cbc9827c8d6062e04b43733ceeb9a2e9ca40a0856b71b6f0639a2493e656100a46f50f8bba4243fe8293fb2ef3f5a40e586d5cebc692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587a0166ff0cd4e54c6171350fe420d1b
SHA1e65d9557f17a42e6470bc8f0be7e600e375a2198
SHA256f47061240199d38bdc0c7b5b89351f129994dfdfa31bf39481103ca2df94dc3c
SHA51265b29c3fadc51e41bc6ec395d9947b2ee925d5daf8dfc8e7c5fefc29e721c49719126242b1a99230a58594290c297855ed07c162bb4d3a118c74279cfd38fabd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b95e1e44aa74bf7a873062426b85ad0
SHA199ddf8dbd8347933c7d050a5be65bbce9bcf77f0
SHA256e77a3d449c004302ce58447993cc54b76709f55c3bdfd05237c6bcbb77c4cc7a
SHA512d8f3880bf8ad15587b04ef6ef27720b11e8c865b8fb8ebbbecb472ec7094499ff105f5de9bf37747d7f0f2892dfe19ed373e9efd4b4bdf7a6c38ab54cb58d9b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6e8c25669b461674445bd364aa74c77
SHA1bbe8767a6a4079ed3aa00dd4da6fc5df1a507890
SHA256edb5dc7a5eaf043a25129e10f54c5d4f117de331d0f56d2de13d81b905273da6
SHA512eaaa2025b2d3f9639257aebc5bc9c3200f1793a6fb65d183440b136b5dead1765e68df4d3c35e439e012660b6ad6630e893e81d132667c7b1e612cee1f34eded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5080f6c0d347c13536022b7486b432b0f
SHA13960d334c0a359f302ad0449e9996d21ed97cef3
SHA256bf0ac265fc27448449c62b22ee42e5c15a2fe7d6e75599fb5ae1bf2a9de124ae
SHA512dcbf124f8b0dbbc4dc7eb2702ca7ee3b935c11caf58f740438f8531e0e9f5976bdfc7741abe51db9de85fec513f40424bf052badf38f4117348b445c07775267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dfb4db2ea9195ffb5b9939414cce97d
SHA19353d6d071fc2c761de5f08bf2d68244c9f9a565
SHA25604cb9dd328d736572c764db9aba59308671e77840e95871b95d97ee5f55a05a4
SHA51224c02351c2de12e79ca0d4977e48e124e9edff9d9f6140964cd0ccc1c77b9d82ded48fbabe77c32d9bff582c61f59aa0fbcd16bb4acc5f3107b15dc94817e9e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f4ed1890a57cbef21185b04bf7df506
SHA1281934520e0100d560323c97e13fb7045d1172b6
SHA256e243728d7dc0a6cab31777306f0ffa6e48d5a1295918bc25655a2adb17b9d402
SHA51253b6f6c0d0d45ae7001b6eab588595dd7671d2abd4bfcc9253f552a771e8cfae8657aa7abc49b548c20b8ce95c37b8243e82ef5e6ef64738467a5475d3943b30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569721fdb9801d812c4be91464fb82463
SHA104ebc91692d746033064bdd4ebe42752def1ddd0
SHA2566374dcff8e080fc75defc6dcdce41379330f1937232aefeda2e809adaa65004a
SHA51234dd95148535a04a88cdaed2f605e0c63baa69d8f569315e25c24f2d85715f4f09240bd598b9f5f248f928b5a05290057aa3708f45dd317124308cdded242dc7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b