Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 06:29
Static task
static1
Behavioral task
behavioral1
Sample
123738804b59ae1b5b2a26218b12d232_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
123738804b59ae1b5b2a26218b12d232_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
123738804b59ae1b5b2a26218b12d232_JaffaCakes118.html
-
Size
18KB
-
MD5
123738804b59ae1b5b2a26218b12d232
-
SHA1
d08219250eaf0fa59cea60a6f3f62fb2de96cd91
-
SHA256
2cee7b567480d4ac67a33224ba85b22ea4e7115082a8be7763a6632fd33ab525
-
SHA512
67ac6a6544ad9d50f2fd30e56264d6ce6a20c9381b2ac366518420b99566a84acb56dab608715226b783d5694e3e92203b5a7342db8f5f52fbac65e9c0ee6ca5
-
SSDEEP
96:ciSvWB1STuNmTzSTWSTVqD6zaaaaeoVORoV5nL7B58B2/GcRLcNioL3VtI5oI5EZ:ciAskaP3X1rP9uHPug06uUER2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434185223" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F8C84B21-8219-11EF-87F4-7694D31B45CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000009dbba50609e63f29e8cbdd5fd28ffe3a379f63aab6decb2fc11fcd802aff6db6000000000e8000000002000020000000b4bc3b963d49d959e9d9df7fe200ca660a62241ca6d48c5993797549ba399be5200000002e06d319b9abdc387f164dc367e925e6703500ab487693e55e79f4286bb8fb3d40000000baf6654d725b484577bbf6bdecefce285a0ce485c9fbcf353a433a4f0337c0d7c0a1e602a27b64b7b8d9f08d9b9e6b5abd54ae1b1aad617785400cdbb2feb0ca iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c045a1d02616db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2828 2112 iexplore.exe 30 PID 2112 wrote to memory of 2828 2112 iexplore.exe 30 PID 2112 wrote to memory of 2828 2112 iexplore.exe 30 PID 2112 wrote to memory of 2828 2112 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\123738804b59ae1b5b2a26218b12d232_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1135174422f2dfececcdb20778a16ba
SHA166d3813e9f3925f211087c98081c54ac00ef2a88
SHA2569123af384614156426d3b3ca20093b1516db7fb3dd7767ff1c4e85105f2827a2
SHA512a6d0c60a4efa63d01bde571da77a6c22bf774582575b659d4474510730d538ddecdbd33f1f5c4e032a1dd1de380c8d25f50bcca02644fa5a8270be051b67e738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bcac689bce168069289f394dc0ab6d0
SHA1b07193d6e4125a10b0fb075276a26795815c8dae
SHA256cccfef5fd086c1a97e4ca9e59ddd89a61948dafe1d444d90d74a25f4e6081a65
SHA512e6c2b8635b919839d7ddfc8b9c382333ff245c984d6d4b988ed487ba1f7d55621c70f2622e2982d18fc41ccb5ab25b56d970128db07fab445d6a4ce852b0d3b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58288034b1b5705e36b683a332792c939
SHA1c288ffd971f7ffc0f23684b6eccd13014d7a8aba
SHA25683c81637ffe39e55d8b780ec7e53a188d6156c53b8b31d720d39d5a0c2c9c343
SHA512fa3a676087b8fe78c347cf198de8ce988e798ed649383b813ed20347be89e2d4dba3037fa94fb2500893de2fced3bedd99508fbb1235e7b9c8bb4982c37b1229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dee6cb6cf91d7be90234b9587273740
SHA1b5b2be15fa6c317e3eed83ed768125a9c8e122ca
SHA256a5182053e2300eac0c25edb4f70e78d7757f34b4966175ac0d3cd4cc107b68a5
SHA51247d361ad6a670f7f36496627c94ad2fd11eb789ba2900d1c72a07aab943c20110be4f57dbbc818de5a56361ef87d2939e2b140f3b16955ed6bfbcd97501f707b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c026ed7d5510bade32da3d83b9374989
SHA1b4f2dc78a6d43305840b1676168afdac415e720d
SHA25670dc697ab2ae0005e8a4545bc0c28099af8238a9dd18803c25b009f35e76709a
SHA512800c32592b7c6533539bf6380688c8ddac8717ce1825b949ca41535bc48590870b26cebef293a0c7e9e81ca44064bcd089c052b144bd9e5b64a29a1995664a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57048c07ffcfe296e0667ca6a55ac530a
SHA183e39f599462b3c9ac84510fe023912a390a078c
SHA25659232ef0d431a749a66a0f538cb40a72f6102116b1c44f94333f50fb3ea40ae9
SHA5125cfc42a55d73e5974e88a2d97a129105d554fb223c0c2fdf3017c76470c2606ed972aca43641daf406464923712d0f5e836dbd057bff4895d43ecc71433ed355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1db5411e7a3766f506895e445acea8c
SHA12708b27ca8838cb5ac7c187bfc242408e617c827
SHA256f6386d8ceaec6e17108baff206f17a1d0a9befe8ca4f345b61e31b137c194403
SHA512354889541634b74ab46878796eea20cc84ad3ded8e8f9f4612c385086f107118516672d6efa8f6d5425fca58b2061b89ba015f475ca7bfa15f8e43714d48892b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e5ae69dbde380833be31596b1c6fd92
SHA1aec42ce7c4d93b831659797d31bc344d9afd86c2
SHA256beee88b271e1d2c86466ab50940a3d6c2d8d3106c0ad9e4ca629b73da6b53279
SHA5124c5b5c6e621b3d1f97a1919082ddb0089d46ec1979ddc2ea3dcde1f287682e4a699526584b2ec6dde990dc11925191aaaffdcade194c9acad79c8fda5a56a033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523a548bab0ddfce14eec5c74be7bfc82
SHA18a3777896e106b5b608cceab31c2935233aac8a1
SHA25609f68aa19e34b95906e229998fc5e9d68abcedf5fa38de0b125f63b5356a322a
SHA5127ad6c8b208d873fd5c9e67d7e0e2377295d14344e5dd3ac8f897bde07b65e724fc91fc5667e741e7aba835191b91a777a110574dc614ce5d80f8fed77c8baace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508394717f3ac3774b3f29904ffa40a75
SHA12890a8eba05478576007c47bac16e99fcd4b4135
SHA256b182968098e0bc17409fd31e12327dabbd1edab3a88116c84c41914aebd212ce
SHA512f71ba2d423822650b42939a435a360f6a3cca7ef5b8ba9d7385bc66019c28577b14e5f0fec59eabedcb5fb763a8f6191fdd6ab22ba69c80994f8c7bc8b4631ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f03dabbc130bd7407324335863f9d2a2
SHA1a75999cb9f68a3676f647c47b1e6990cd91dba74
SHA25624111ef2b4b8a682a1d44b019fc27ec787c2c2062a0de121c1a18dba7cae5ceb
SHA512749fb05a920374be3a991f79e212b3c9cd71bca297715864203bff73d6beced1d1cc207adca3d1091995390eaf128af333b5062bbc308f1bbb4b1deaf2b5ac89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53de0de209d18a94bb293cf7e5f0213f4
SHA104e6cac14598d4ee18603bb0255acacf7d3e983e
SHA256aaed3d523a0afb7e6184e706bc1e8be0fb2ddea04ee61720ea7416c8a72eb27b
SHA5128da8218540264edddccfc2dc0a4d61047e4e374ebb5d07ce766eb0fec6556c69b1dbc287098cb8211c15e1694c1c663a7bc6e19205c0ac2f891b0b34d93418e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d997c0f71494960356ea98b41145c32
SHA16223929457e0adf477df8f12b9f3ac49c335e177
SHA25642b0619e7aee37188ff7624385eb5e68470c51f4dc8a227e7fca916ba6326e0c
SHA51278663c374b8031c444b3f2c2851cdbac99eae77df483835c47a946fdb481ad6298b80348a246a7f0590c0746d6171c20f910efca8607cf8e188820fd5e393247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58193b66d0deead1e81a3573ae774134f
SHA1a742aa2eac1e33ee74271f506d3d4db89828147f
SHA256fbb1e7aca85be175cbbe6cd2a61e3a6ec941b84b5d957bf7299f25474239bbe8
SHA5127d9b735316fe506e3d75adf7f24cc5575cb910f171cdf9b9618eda16d6e3656634d08022691d2a5bcd77a01db4221e76ba065d3db22af62ca1149c9e6c4a4a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aa790bc9a6359cb1644ef2084e07181
SHA11722d6cdc167b66b95dd6eecbe0789c82a159a4a
SHA256eab6fadc77bb2f0d82aa0578f03cf57894dcc9531ab607c3824971370683a632
SHA5124e3b7906925e446cd7ba7c4495ff31bf92a5dd8b01ede42b85aad5b056b18385b198dbbd58ef01e1aeabf218dbd93f6f219a618f61adaf3323715620f58a78c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5769c369ba4f08916c3253ea7f12979fb
SHA132cb7e0b28be9a99ded74938e91bcffcb40c6432
SHA25690c099c651d7dc12e4278a07b5c04d7b978da6a4a5c07f21c37ec77894d10b81
SHA512610292c20e84f815630936e01fdc960a88f0fbf3088bb914da31649003167b83ca70b782928eb42ab8165d03cffe3213ab26b83d7eced106b4e12a0116b800d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527e750f3d022427366292a800d963cec
SHA19f326760e1cacb83fc3cb440501a15569da8d244
SHA25611224210679b4ddabacf3ec8ce0452288faa571663ea34f55a697de3a7640164
SHA512d351efaf979d677d26bf9e9541555c9e7d713620a4355455ccfb5b6d5837ad9e1774d3a930892df0a9eb99fc02cc64c683de83ad5655cb0dcfba5a47d394d272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5839e68f13754720b1773f8d368a03609
SHA16d25199da501a8e8b2752763af820c9f86bdfdfc
SHA256cbc6810183058978765a44d92c091913c49602548abd44c9a9f78558f5bd9686
SHA5128a54e8d10b405d9f727f22dc4e6e1abdfce8ea91df90a0bdb3fc8635bc5e6d2a0622ace4a8f66048b1b084bba8e9f263347eafa5b1a1e1e793af6db70dfa2003
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b