Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 01:39
Static task
static1
Behavioral task
behavioral1
Sample
114e29300c8c2b0719ebcae23ece2643_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
114e29300c8c2b0719ebcae23ece2643_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
114e29300c8c2b0719ebcae23ece2643_JaffaCakes118.html
-
Size
10KB
-
MD5
114e29300c8c2b0719ebcae23ece2643
-
SHA1
c6b01f5ece2d532956deeaeb428a31cb278c888e
-
SHA256
7531311af83fb838276fbb3f1f5f1b66a4ae05c48a13858074ee129b756a9716
-
SHA512
999b8eee59a60408858c97e34a6741404b5be08ecc955a15a5ca68af38fdd74e06f42e7cfdb3bddbd6311e822dc84c16d495be9f59e1f791dc7ecb4039659138
-
SSDEEP
96:uzVs+ux7z0LLY1k9o84d12ef7CSTUQGT/klspO1usdBQSlVHcEZ7ru7f:csz7z0AYS/RIyN9PHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BBA0C31-81F1-11EF-9BF6-6AE4CEDF004B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3037c460fe15db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434167858" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000005b9c50fccb1802c7b577ef0586d6cb280230c546b7bbec3d8f98491761ab44de000000000e8000000002000020000000242a0ff56ba698c56eb8f73733389f884c7b97ce3efa184f44fea91be9fc267b20000000a05c9dbc3abbb9c36fd498e326a385584e66f8cc78b103d2469bfca15158a87e40000000f881ef8cc2b6322bb0158b103a266b661a1fed1b4838757000f1bfc837e815184fdc9be260431616de207f09b5e6411f991b96fa662333eb4bf35e5ea0eba3c2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1064 2080 iexplore.exe 30 PID 2080 wrote to memory of 1064 2080 iexplore.exe 30 PID 2080 wrote to memory of 1064 2080 iexplore.exe 30 PID 2080 wrote to memory of 1064 2080 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\114e29300c8c2b0719ebcae23ece2643_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57506b93a87f428f79b1687b467bc34e0
SHA1c6cc9feca2698588869e0be360ff46284200860c
SHA2569169b213e2f3d1c4f3077df7566958e22e43d20d633636f5cab9e71f6bd663f1
SHA5127ab62578282c0a967df0df028ba6c7471086732efa377b1b00d0439cb59296f211d6176bba962a48173b87e939f9ee01ac85b28ae2c90251ce9fc747b9b86ae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e12b71722b1fcdf13502a81a11278ed2
SHA140844ffe906ce4e34f543c30a2e62213eebe6c6a
SHA256490344286d6b3e0e1a32a5dceefb2b1aee175a4825b8d0535479f994695cf873
SHA512d3d3e59f83668ba83a2b955f2df131dba77c8b1830973856e9fcc58931c9768212a09718f99f7b32a1c886b47e1d93c8526af68d7b1c30e2130f25bad4858cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d346241bf55175b302d36fa8df513f94
SHA1b2e5cc79e107a0b1982bedf7c5dda20c3c2579d8
SHA2566fe5c04378d7f0259bdbb7f29bbbc1b766e4702f2adc1959beb18f15f745a31c
SHA51243905e3e27039e04ad2573f9bad7ec989b175884196af5845618491fadff2e91d1056cab2d1bcc712ea18d6b6207fe77f77d6b851660b3c340930863baa7d4ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594f04e056ac7960548a05b48986e8a97
SHA1d5fba76abd63dfb5a7deac56125a806659eb311c
SHA2562d54ef7b903bfdc427b875381bc2738ab76ee149a6afe917834078eb0a452079
SHA5128a431e84a559854400b2f4ba35137f41ac745b2feaa5b22981108951add399bd63c11fa9799755e08c90d2212995484b3c05f74ba797b8e10034cc64d4269b36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50918499415eae196f283dd7a71f4d738
SHA12d95824f94475d9122191eb2a9b27dfdc165b88e
SHA256866f882f35b6ee097de7badf0aa6e58527b0fe24e53b6bd970d117dab455c72b
SHA512b12b5863f100a55b6a89d1852d1c09f5087bb1902953476ae0daa08f9fd914f1f80b98d28198503c3d2bceb22c0681c5ab63ab4cccd987b5953b79809d59dcd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bb1a68638eb48681b8850b131bfdb3a
SHA11845f33558b5d05ade48e8953a00d8463d870918
SHA25652284d86e3f59450d0acbf98b67b776b92445c829bb3a27b3f7a6093ae61ec62
SHA512c4b09059c8a44e16a6abdacc1115ca235dae5c48e0e795dd1b09b8b269681021dbbde845d4b6b6c3f437b4668680712da1b86c28d3357b25a4709723397600e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1e45cd01cc3aae0d4be3c918ec288d9
SHA1c0fd792ff7973c8e5d1fe18ffab41b80b998cbd0
SHA256f99daf576bda4e2faa2064657cfa2e2cd6ed6ccce79aa9e797fc04a031412fc9
SHA512ff4ce5ee5632e38c7a097420392dcb7e2c9e3f508055e3cb4d5bef5d291e84cc566e34182febbd0ff648d27fd65ed689278614010b6166fb6c8d2aeaaa16f825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f50c2963252d5c70bff8561a78eaed9e
SHA1178c0c51e14d41551f3fc9e007a0ca45f0e7b486
SHA256881b50c1d9c99f550815e35365421bdb98c552dc3d59cd1fbc4708993858cb1d
SHA5125c44072047d38ece38d4166932c8406fc37deed34a86725c01802a9203398a1bf40bf287ba8518bec9ab1fb7996e098fd9c96c762cd4c09ddaff85f63cc9524c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505e9c76643fcc756c7e58cbef11560f0
SHA1b456fa26e7665c38e49038511fba0979f3512b9f
SHA256f0c76b3591f8b18c5f7fb2232dba7566f9b01ef4b0868fc985a8739fca6c5b2f
SHA512eae17abd232b515d29b9e7448ca95c803ba2790c57f5371a57c3e796e94dd584c730e18a72336551279c58e3434e3c49e3aeb4b886de6caef4e4a6f766c0ec2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59850584f3274605b9aaf09fd8f7c55f1
SHA1bac6db31dd60025f17842931276dfd67f4d778e5
SHA25643d423d39f068e936a28a73270fd5a236d99c35a275a18606f3e60d764e1fe74
SHA51232a2c9f2f7ae5a60606c66d2a93468484e2d23d2a6fbdfebd3939317374686199621cdf82adfd0b295e8de2be08df8badfd441ff5185ede7aad363bc0da9603e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef60e88801be6185b0eb69ccd7f9e43e
SHA185935bc9f9538e77eacd04886af679fc87392891
SHA256bd86693ac2811e9ebd8db58e6cfc6854761384b08bf87655813f91e3b462b9a9
SHA512d39da77f0ede3278d304f05f3f47e5f9d23bd30e5a42a92a0d9ca70ed908783c1400b6b559fe6aab27e757424df52e14eca7372372abded2e246187298724ec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563c72af0c2a8eea1a071c3a472d6f155
SHA117168cc44300a87aaf21f90088f166bec91ebe5d
SHA2568ed44b49baad6bd3aada48ea4b21c40b06660cb6f8081fa66a1910d58949e8c0
SHA5120f70bfb402573cfaa2481f263d6b844d9adad8d987db47d66d08c86c0feb77287929e7079ef54d2c81314c61fe9ff1fc3ae5885cce9deaa14628cfeb0cb7d20a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568a26d436e6f6c7e8271af0dc058f4cb
SHA1aeeddeabb02dff51244e5c1b5b61896b5696eaa9
SHA2564b0ae4df35f99822776ea159f12aa0cf3d63e15b89df72c32522e1603876cd38
SHA5122b5ef3cc8594ed352c1f383ec9b1f3e3e96cf5901100122ee91491ea5722e9b08e20e6b777b02170e4503003213b0a29c42f26160d3f55f99376c27e7728ee83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6dd818c5107a411843fb197bd8dddc0
SHA16cf8feeb3434259fa27607d96157905243436175
SHA25601d18892b5a3d1a69a41ec5381d116edc2234ec4ca392f80e6ca7d83b72d1446
SHA5125bcb58d41a56cb093862b6f04d1e45bc33277a3bf5c1b9cd0e1992497249b7d3d515bad31491fcd0f06912c13b70a4ea8f79278fadeb9b4b1ccbb086e7a81991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fa418418e0862cf61431ae74a638ccd
SHA1c92f93d22cbadfeaaec4667312570af1a85de917
SHA256175c336da86a650901570715c506b22ac8e8c88e4184f8911352f5b605c8d0d9
SHA512b5e479fd9c30384706e7f7cdced4b6de334c21cd04b398e0df4a8dd272a310ffc554bb21f04fa8fa425f033653a470de426771b71649f05a8c280d90838fe723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5fe7bedc980bfc19bd8aa930deebecc
SHA1f91cb0b3b4a581015be2bee955adafa4527e7894
SHA256e33562d1c29990aea00d146b08ac438de7d898706b83576e5b1bca058ef9b9ac
SHA512b8b3a3ac899d0e94e1c7880206eed2a4280adf1202eceeb7b246cc1e3c441af8d26f303989f989f0d9b346f28d0921dc5db396821cf0b25251eb110352faf44e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e105856e8ad72d5ff0fe78a0967dbdc
SHA1fd1bceac472bdff40675bd0e0939d5e8e9d17b37
SHA256e3cd931b603f547b10775379e8ef7791e00445c021e09d2fc8b337f29715142e
SHA512007bfeff2c88d4fdc988e14025b3a3f18692b8d48f695859173d737b343ef1927e28d14a29659343c976819b0b975d2b8570cf90e1d17c71106449da831148b1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b