Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 17:51
Static task
static1
Behavioral task
behavioral1
Sample
0ff21c172150804dcb8976d330eed5e9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ff21c172150804dcb8976d330eed5e9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0ff21c172150804dcb8976d330eed5e9_JaffaCakes118.html
-
Size
7KB
-
MD5
0ff21c172150804dcb8976d330eed5e9
-
SHA1
f50ccd688c8648781c16fb69944045572e10d0e1
-
SHA256
62b3494e76aa67ab4fa55d898f278f5ac3ec3b95eda1c90a6a609eb8354d6e71
-
SHA512
735cc9f3ab8284af9f116fa0c5a662d64c66abfdf53596f3399d7d7e55a3e0d89a27079cdaa72406b686744c251ef50591565b96f49b0d510220095665f166fb
-
SSDEEP
96:uzVs+ux7okLLY1k9o84d12ef7CSTUHzf0b9qQ/s6fcEZ7ru7f:csz7okAYS/Jtb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434139771" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26865621-81B0-11EF-A528-527E38F5B48B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000001f5a23c273358c3ff5e70ea2c000ea598669c8c2e4b5d37c216d7c16a1ff0340000000000e80000000020000200000005ff5a4343ce8bac957d665b445c6101711612bba096d1b1e8b0c88b48bdfa85820000000cbd7830e25d0dd4f96cba98b16ea680af14550c44af4f55528d393eafc2e1d6e40000000ef5b881ce373009363676b45572f86562c89e0b1682116ee0745ffdcca1e93c318e624388d315d13ebcd6349eb2c5d5bec2691e6ab787f239ca6024fae3ffcbc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000fdad41dbe0c8c93194c7bc6f650cb05fc3fcd0e7a14ceed975e98ab32df8cf41000000000e80000000020000200000004f2abee2d921724f92e5374502d38c4c598c4f8038de3305900f496792dc74a590000000bae1090ec5e659618b694b19f5f41631de525f8947e98334f8e21034924a95516b441647d29060f93e5a4e5600e4a5de82074fe3cbeb2c388987a42855f33934208257ff035e80e8043d45c6bdc163728c0ffdb4df29e06baa3b7552fc0c3336c7e13d49044312c075644bd8febc7ee782d051ca48960b486ee20ecd1577717a33e71b43374ee99effc782048948eb5740000000b3f9ab5b2eda0d07e0553aaf9c80d16d63d83d7a82d060a38074aa866043ff5b6cda8786ae2bca5475c70d2884758682b86b56a0687f1791242b568611f2d0af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f01359fdbc15db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2472 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2472 iexplore.exe 2472 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2824 2472 iexplore.exe 30 PID 2472 wrote to memory of 2824 2472 iexplore.exe 30 PID 2472 wrote to memory of 2824 2472 iexplore.exe 30 PID 2472 wrote to memory of 2824 2472 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ff21c172150804dcb8976d330eed5e9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2472 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5475c7f0d869db5ae2d601b0ef379e22e
SHA103fea3dadd617a1d620710b15b62cea97885e5a4
SHA25600adfa8ed9c9913930d6e2a657ccf6d92cb74511b267ba46f4e186aa1345812a
SHA51261140f7d9f4282e649dedbc95ad0de451374f4fab7b23476a7262c55810e2cf91419538aac951dc65916c3102a37ee7477b6639d8ecd84bdf6e19d31f4c62e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5765ace92a5e36113b0832a788e26df1b
SHA14fb54267be932ce34a111a25f94672e05e8b66f7
SHA256321757ce6c81abcb519d1375ef226c36df653de7ed3eeb5a2e17084be9ab3130
SHA5121e96cd96fa185c3d0e78aba55af12876275443881d3fa0b6dbe15413aa97b23032f5e3b4faf7b9dbae9acae60a62f5a7dae35baa1ad7cf3bea5ca5cdb8c8faa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bb6231ebf66e0d8eeb75b9e756d157a
SHA14c497d686bd1be254b7194f9cca272e0021c2d6b
SHA256e7a458298f12e4d55b1f5cee4d72883a9e38caf6fc3ec961a70ed6b4daf3c628
SHA512cb6ce08147dc36a9393e5ad09309c28f80910733fd2e45474ab4353afa0c41b4eba8659a9a02d15bab766da3f0b016e0c9453411010b098630bcaf52e53a181a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500da6564bfee7d29a444e2a149f1fc85
SHA1115d57025113b6d4c9e487edd2194d7c90353b67
SHA256127900cafd8ce2aaa7d9edb3a34824f97bf65e3878abe1b019a3e40da95e5b21
SHA512c330bce5de7cb483813f7b5fd7a4bb6905261647e7696e0e38e5bd1b28a60e2a88e49f778d58dedda4d37953dfd28815dc5f6b2de7d4a9ce0d07a12652328da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511c737ac2b165fea19c74f8674e307a1
SHA119f1dacb994844f17b6841cd9d4da94c105e7e0a
SHA25690c310467ca3e71bcc30a53eaad0a49f4e404962a9e7a98128e07e5e236e1155
SHA512b4eb5d766fd68c062b196ebb4c6393a819273be99aa1af402e46998b7c8c2db9619cecaac568591e5e6e19e57497f0d74296a97737fe4bb66fd76cb6b5b9d290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5355fc9c882ddd5ee634ed5061316bf0e
SHA1bd57cb09830a18a63c0a67ff1ec87c3b57873f9f
SHA256663bcc586ee48388e1f99226f10136727fac02b8eb4606a685ea6b949b1eb399
SHA512e2a3df89fd11cb282b88b312581ba6cc9a9849ecf76a6574b759d34f4d4ea400eb2091cc07363e68b518782c8ea1089be9310dd15f9e7ca5a34bc02cdd25cf30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9bd58817298f91a63b9b08a2858509f
SHA167b156d51c487871f6bae546427312162c546545
SHA25634e230f95536d6aa4c7a3b979d594d8358b003e522c124d7a14dea9c1e9ab518
SHA512c10e42ed753b86cac9e469e6b56b673ed57db0b6c94bc95468edb4dd3200947ae979945cf9bfb39913d6ad382fc8f7bb886d2c0e80b30d1718fe6fdab91065e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5292882ee2fe034e985e522f63bf57407
SHA169d799ceeeea2c09e63d01651c5dd8a58c5e011b
SHA25604e3d270d25a56858b143b5a662735e4f03060365727fe79c50c1ed442723d87
SHA512383937ccd570bed45928d16827cbc6093686fd112ee99ec846c31e940f9fa5aaa47dd957f4429a4d4c23c41f984776ec6b63d0a9f188139c4f62998f4d32a7b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50635f28d633a4ee3bbe07b604942b64e
SHA105f9348272c283cfab459da7519838a3ff3298c6
SHA25649d123f6fceb5834cfcf00fd2ad3b1cd3be118bf0be25db24dbd337a7b5de049
SHA5120597e6a00bce055c6f1dc295c844343d9de5bf0a69d7aa6c2de654880b029f757ceb8ffc1e4f3c007511c505f6711cdc12e3f73150e8c7f0bb304dee5a643afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5756223a9f29a765d9b7456cf008ad714
SHA11209db34532939532206e4a9f2811d97fffd61cf
SHA2569994960cad4b48f7d8a69d199bcedc5647c2374c71315eba6b89c4e0a3e80ddd
SHA5121032c689b4f5549e71e3e97408074565465486cd8b93ac6808c5158ddad8244768050f64dbc912d818154cd7e8a1017a2cdd6eb71ad606428d83fa2b94d7e2f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f8e95acfcccbcfc981cb5d961b4d274
SHA1b380da8fad4fa1c8e297e29ceaca9e141ccecb3c
SHA25670fee20d1dfabcc591a7009eadf5252ce78d1d74b4b09b2fa9d1d46e3e31cddc
SHA512359c522bc5ae505afc08bb9c39c56c56d06e9dbd1fd5d49e386c2bdffa03044969cb4c414bb458aefb010d124a026c494156f62779e8d18350662a718283efdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fba366a26ceaf3841ba1610ccc36627
SHA1699fba05f56844407ac8b8ee461f7467dfbb8a9b
SHA256e0f8829b851efa4e99802777c82aa640d9f46c38078c0e09ce592a5b51fa7a50
SHA51298c6aef53e26874729f8c5b793cc9da12a81331e01e4ce4d7095490a7b847c6866581c7ca0860a66cced1fde42d5069e91779225c65560a3651b28edc4492890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b04ac338ecbf44578f37db09b04940b4
SHA1676c5ac82183357d74a5dc05afac325009696cc7
SHA256d51161e9a242dff437fc380a9aba3edd33b9768ebd5a65579007007f2a5284b1
SHA512808840ac23faba63af62c11b7e361f31d9529a4f020deb807259001650b668983a64f302742b0f7a1b9c7d47743843581801d29f42290c0204984c5b34147ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579bf82ade47eb304c561658e43e542fe
SHA163adef71128b50e617c3f038c1baced6fffb0026
SHA2563e5e8e019d3bc3fe08c7eb12770abd3687ef46f9ff55421962274f689a51b7c5
SHA512aae565d2e5754193ae88b5feeecb60d18bae27684cd18235a5381e9a51d1548c39d2e3bda931c463883b5b81de0b6186c4515068404cf81c1a2f8853a879e6c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c2ecc278df2bf651479d8a185945f2e
SHA1dbbc29dcdeea0be1e09c202074ef5323adc1890e
SHA256520e1b9d4372cacb32f9815d1252be9575cb8ec28f0cb4309bd2b9b3e1c83f65
SHA512527d319f14eef8e7721522403ed23443dbfa2e1472c7103f5750c0d3f0fc5a042bd79b468a88b4527a4c40c1cdea6aa942bac08aef8a8b7486ce7bf0e097d42e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583598d0c3e418f5e07185a55c988c23c
SHA1f0759eb76b4832214644a94ee54b1c64e0f4d786
SHA25664d8a05a35bf95767b2a7dbb7b4701542f220f1eead14dd6a64984903cf02d38
SHA512aba2bb3805542d9ce578b760e3a3db1e552a580fbaa4f418194624cf617d85a5da8a2457f1707cf24ce8c79b844c43d8448e05ca7c69b86f15cc2bd5ff01473c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c315aad5df7c87bcf1cd7dba31933a3
SHA1bd1664cf64de553d2ab09bf1e0ffdab03b76c011
SHA256741bae38fa70caefc288de771860bd0c2910023c1e3b37adbc3574a3e26e10e1
SHA5122e9667d1a11aeab6fd70759fc780c7bb125208e470bb820bdc1a47f9d4b310523797493e02f4493cfe72b7411ac745c591f6f4bdd50ac3d905ed42e488766d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58625254758ca84d3e53999dff96b7aed
SHA12c76dd40a83350a96038b66bfdfdee9c94bcbd23
SHA256040eaef9f43850d622e5cd9ae2bb8952126852684dbfcf11b01ff30afe190d93
SHA512b59ad7fa5bbe6cbf36ef438fca9ad523fee58f24d3f723c20b59bc8d2900163abc32264e52865e8cb8b5deca6ca445bb8a922987dde5483cd4b47c3efd8b45d0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b