Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
0ff776e2bc762f9796f97190ab45d560_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ff776e2bc762f9796f97190ab45d560_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
0ff776e2bc762f9796f97190ab45d560_JaffaCakes118.html
-
Size
43KB
-
MD5
0ff776e2bc762f9796f97190ab45d560
-
SHA1
dfcd97c948d64bc3371443eb944caa4ce4bef227
-
SHA256
50c1a160fc48d690ce011c9e1b2a18f5d08968e726a467f3cfa92d39ddd36dcd
-
SHA512
12285d2efb880507fc30e57769aa0e01ec8ddac48ccd5d10c634d8a8e0d99ef1641ae3578225e0c88f79723c8a28b5ea46cea136d67cb9e1b45c29f5cdf75441
-
SSDEEP
384:+sw3m604vwuXDadbX8504v9WKGDirTEwgM90y3AqsE:+sw3/0ZuXDGMOSMvDirQZ0AqD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CFDE0561-81B0-11EF-A3C4-46BBF83CD43C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ae63a4bd15db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434140054" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000027ab6c9b33fc71f821a03c9144da14a69f1edd477ce191c912fd052690b669ea000000000e80000000020000200000009b7a4104236fd232c39ee20345e67d5b6df646515bcd9ae343b818fd983e94ba20000000d4a574e8396dd81151a1c2e90a959f6a41ac4dd63ab8bb38597c85870000b06240000000ef8a6566de27389ab2a54a2848b426e99b21930aa460deb2528a7b6cce1ac57f253093d17741090fd948c74f53f0245860f5ab826772f50fc9934cc31de456be iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1628 iexplore.exe 1628 iexplore.exe 856 IEXPLORE.EXE 856 IEXPLORE.EXE 856 IEXPLORE.EXE 856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 856 1628 iexplore.exe 28 PID 1628 wrote to memory of 856 1628 iexplore.exe 28 PID 1628 wrote to memory of 856 1628 iexplore.exe 28 PID 1628 wrote to memory of 856 1628 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ff776e2bc762f9796f97190ab45d560_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574a9ba8a5052eefa7aba8ab888589716
SHA1f762cb669f898bfb8e751d698debc486299a878e
SHA256f984239e78b722a335487f62813cb9ddf7dc4cda37234ff273ab5c307668fb0d
SHA512beeecb8e4f23a9fb59005ed13c0600c62e79a536f392d6f9f7b24aa9a27f18916f7b72d6034f804375415fb62258e530ebecb65b5a25bba537ae1ead49a22c1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2baa68bb4c3cf080fe6f07b1fb35b84
SHA1d396cfb04db42dcb27cc09fa40857b1bde9ac55a
SHA256efab4f3e84ef5a33996033bfff17483ff14fcb513f341f3a3986f9bdc975410f
SHA51297be6d4024b14cc6322fc020606c0ee68a8d0db5955175c137a7633515257ba81d786b486cadc732140209aad96cb609daad518d9b428e110264ece08cc3c445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dab8c2db49f1727aa15fd58060ecf3ac
SHA1eac4f23a93ed5cba30b51d2e18f14f677faae432
SHA256eb9e13be58f35a0e0b8a5a00da371cec00934088c5751c8bbdedf5bb5d4c6bb6
SHA5124ac1f6bd0f406cec1e544a13415f311216626c469d026c5fd87a6d7c99d2a4ee39d90806e3dc29009e10df788fe215aed0772618a66686467426db4198c9d88c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5799e29bdefaee46a23111668e835d1e3
SHA12a98c1e655c3e80e58759fa1d0ab4e56e55a183b
SHA25601b8d7ad2cd69fe31fb8d8a247e5f5847fdeba6c9a2242f7f17c7ded8e6f3bcc
SHA51255c06b372041ea3d7716b3cba4c5037a0ca9a2e0c2d35d7f7f50464af228c198ff92ef63307a087dc6397371b7876504309f6bb55603418522c5f3f926e38b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546e86b28473b063da096651f76ec7eea
SHA1cf22947cbd19fde67490b9e913cf97aa97fe004f
SHA256025cfcc838151cada21fb098f57dcc2ce17936d44cc9d890002507eb6f86e739
SHA512c297fc133ec326eb864e137da93071017785e16d22fb6c257a75e510f8338286bd1608a693a3e9b91829ff7844ef4b2a1f97cb4eac66108d2582888f64491bb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a29a05207a9c5bf371aa109d70b07857
SHA114c1bda8310111261f7a94345a034179f7ff407a
SHA256c9818537fa3f889b6215e22f40736ffbb5e75073d978070e96a5b3be3f86ca78
SHA5127b7fe3854aebe19cec286abc2404cc5dddb9722b2498e96aceb2914ff789832cbd49e87b00e26b9b54f1ca0686198888f950dffb82a5d4f1e8289b4f8a71e62e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568b26d0f2bf99d06009dab22bfdbd3f6
SHA18de511a42d487f88000f9b43fd868e6da9675ce3
SHA25629015de13ff54edc116b85d07df3494595ec720d8b17c4341f3856443afff858
SHA512b9bec65656e5bfa6367c84043eb70801354e86c3bfcfd3a3ea73a3f3a57854da3c324ef8e7cab46a492f537334d986db8ff2eb58d19de1ac23af46a265fb18c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5845747eb3781dbba66924d6e6b70b104
SHA1fa7dd19d1e9bf652b21109a16ee074f8853b14d4
SHA256e63f50c95e096d5a436fa38d48081b40b95cb32865589d4c633aa002f5f14758
SHA51201978cdc9be235743e340bd3ef04d0c6c8f7c752ca0920070af0eda05a1b5f9303bf60414ba362ceee4410cd652c850049691cb79bd91ef14be7140956ba4789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef7d74034f2fbe0fa4f3695020833566
SHA14c260c5682117d6df371c282bd20874b6049cfd5
SHA256754dffa94f31a4d07b585f7a15534c857c11cf5931e4a4a1fb79f7c4e7946e06
SHA51222d91b660adceac1b32e419e93f8574743135da4a67b45aef9045f0b7267fb5a04a73bb49e7416476e6610a0fcfaf250aa3270fb1a88844abc6aaba259a7bfaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5269bc15e7725ea13883f3dc32150cc72
SHA1b1e0d2f6c3c9524085035557bb669dd738467ef5
SHA2563a201c70567a846589e85ba665c910fa20a5b319ece4505bef6c805ee64caa80
SHA5128b81aa49bda2d969212db84fbcc56fa7b6d886567e7d4ec87b9937df389632c8ac58079166cd5f624f717ef18ba9a9776880ac555e31ae3d4a4e9fadb622edb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536fae4d6fe50fb55b5e49bd717fb57ff
SHA16e152db4fca11f838c3f7bf68919f9f553bab204
SHA2568d2029e02d4079125023cb599cb7fff644b5a169714b656a0e1378b076789ee2
SHA512f96eaa9b778701acda6bb68ef540a93eac9393f0b0ff5e725e47326c9998e1a15fa6525a96c68452be47460750c3eb4ceda2c599b746b27a845b7d9736e1861b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb2452e6407e41c1f094cf3d08a9c94a
SHA12c749ffffc9dd57db43a9735cbffce6362da21ab
SHA2561c0e7ed5e07a9849fbaacb65ff14e6c0da83aabded57fc6b3cdb319d45621aac
SHA512b911640d5a14639806c6e5a0c6c12290c9c2aa9f72c625156efba595f22b6068fb092235899b0b88f9a3d5a7737efc318920833fd682ad4e2a7dee8ba3b3efe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eb62841e3d66c90d4046759d6f44995
SHA16e4b08cc0a1dd5db85bcaa4d7f47f6e6a5d63c34
SHA25627c645f9b38853f3d3fef95058426b288f9eb26306230b07f9f1a44b20e5347b
SHA5120d1f031821ad953c4d5ed3df769ecff0f9bc4099aa12b70f63ee8dd07b701f048cf7fb3004e75865b7d0455508c59e0c4f96cb4c57791d89990cd04525156273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1115832824280e86cab487a31778294
SHA16a6b8861d7d0b0b2a4566a682c45ef60e1d43ddd
SHA2564d07813f2903d629893bd9c21c774704c4496f885e4e1646287055bf3df01f4d
SHA512ea954547e7aad2f74527dac7cf690b153e1cb34a40dd8a7700cf66398adec4f0a2a90365eaa613dcea66ed655fa45c809630f29cd2b1bafcd4b96e6cd50e55b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5481a3da515512c13e62710a00bec9d36
SHA1480f91cb5ad7fe4d3dabd3e3dfc5a0b8a74b9a58
SHA2566649eec85d979fd668818a4277668b9d03a8a26a135e30b70cf50681a5bca126
SHA512ac03210b453681e36974dfe5593d59b69e44b948c043bd1a59fbbe3a504bc0d2b22daa33059fa58df422475c9e3f2372d13deef2f5d8ea12a23929d5841f3e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d7b2de20562b9ce3dcde88b3eb5cec3
SHA1303636524b9d8930514401d61b6e6c948bdf8846
SHA256037f1d0b2a661f7888392c3f50834d49ab44b3b8accc1d284f43464691b5d7db
SHA512b5597998fa300d1259d416084875201cea1be7ab4ae29ac486df3616e5bc7cd7864b83ac247c2bfd6312d212b43d8a22e50ec77e41f4f87d2278c8a00ef8627c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54802c1f707a991c7fe14a3abc4fdb334
SHA1b7affed1dfa06947ede46acca389fa171e96d1ed
SHA2566b255be0f45a6326f3e278f3e92ca04d1de6dcc67950d1d5cd20a188ec157ae3
SHA512e06b6736eb11d3fd898ee556fb253d0948f9e9e34c89a24a8dfdd54c4ceadf6f546b337b530cebf1a726cfc52de0bdd367b635db7f517dfe407c9c998e950b3f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b