Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 05:51
Static task
static1
Behavioral task
behavioral1
Sample
121920b293ca944694d48375224bba3e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
121920b293ca944694d48375224bba3e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
121920b293ca944694d48375224bba3e_JaffaCakes118.html
-
Size
7KB
-
MD5
121920b293ca944694d48375224bba3e
-
SHA1
a27629bc476724cdc890b5c2053c0d12da944e14
-
SHA256
b47981f278a12f6433b45a2d459583c8ee33fe42996a35370ef65cd40c0e9fdc
-
SHA512
bc8f9ca6dc1d9cbb699716bb03a68abe040d2a3285215715daa6e65b1ddf199050f27f86fc957e0db10617c40a69ee5cba65b043fdcba06ab1a50df830ce4a99
-
SSDEEP
96:uzVs+ux7tx0LLY1k9o84d12ef7CSTUszf+Ch92UccEZ7ru7f:csz7tx0AYS/+jb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000005273439a3a01f0687446caf63e461a408700c974369478c1e4c2dbc34f1883b000000000e800000000200002000000055e3f13f516cbcec28642f7708fac77780c2a5636797eb8bd708da07d78ab3db20000000f22e023eb3f9bf9eb420c4456ae459aadf2f65139a6669dbb0bd0a3d455105f440000000eabd75406cc10a032fa61e9ebc3d9167111fd4be6e3edf70203afe3ad97036eeaa45e970931384fb18a9570ce0de26d5261196c35a2c6a948e758451849b6cba iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434182947" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 804606832116db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE0F8C11-8214-11EF-ABFC-465533733A50} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2804 2168 iexplore.exe 30 PID 2168 wrote to memory of 2804 2168 iexplore.exe 30 PID 2168 wrote to memory of 2804 2168 iexplore.exe 30 PID 2168 wrote to memory of 2804 2168 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\121920b293ca944694d48375224bba3e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aacd89aff8925b64a8485868c442f2b5
SHA132e0e1bd1b36140322a868b3825058e4dd4429e8
SHA256cb11d0dbff6f590681fee94742193f7035ca6f789e1862f5360e1c388a399659
SHA5124da96812e869e1ec95f060c4be0b26724eba8a974569cbf3d22127eddd11ccacf9eea858b5ab4823fd6453561fa8c722d42ba04b3b4e229a72fe797ab1a1f88a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a978aa681b0f614a45c0945a5bef815
SHA131ea73937552a3a308d98330d9727bc01f051094
SHA256292e918916ff95a68821d5882c2cd36a172bc444ebb365d4152378ab2c0c84c6
SHA5125d8a415780557670b40a5cc3ac463c23a8b38c39c043ca5a1453eb442494a4c5d0e319506251963ccbf9f73aba481c3e60d4eb7d020ba5e7e9e87a9e61905b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4f70304e10bbc8e4f561db44b31ccee
SHA1489552926b8e3fd9d608672e9a4aa76b7683e22c
SHA256722679cca249ae8f871090beef1c7ebf53267653c3d79315d52cf1c997d40fcb
SHA512622493fe182227daf7297213a7c01ec591c2c27fea8e5cc853258c906cd96acfb12a23c252cfcabe97818da87bacf08f62aaf6bc162ade57ffd76fa92f603fdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5237000b01d0d0c38cf65a4dbbe733c7c
SHA1ef6c966ccd01cd3e84b129e2e74d448c85eaf3d7
SHA256e3b7a0d1beb0ce14b4e8b14c4f6180539a9a4f50c9987bb08975abfcf5c9845a
SHA5124828b71e0a9b35f34e09f9d8860060ce7259617a00abfee22407eb764b5779989b7db96d4d065a747c972e9e191598159093b25e7011a33e5b0e6a9b0926ee36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51930524d3edbffaf8726750e8c37dbd0
SHA1cb7891def59ecfc1add6d5a316f2186b2064ec3f
SHA25602bb252aac7d026be0f0a153e7ea5b12417f704560eb217a3b0bc04d11394290
SHA512bf9960071c8c9475d4362891561a2852075ca00f7c6d14c381d677cf156b0c0de825e88e10282689226c37609988595a113b8a985b2a7411d848ae55e4f15f82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baa2aac4d7607f1513fa49a37514c679
SHA1171491ae4e6680fcf942dcfbb2181a98454616be
SHA2564eac457fd244452df3ea6e94bf95b6e1a9cc202c76ec370175209c7210d8eb14
SHA512a6a73a2079bde528bd9885aa1be5c201a5fb513efc3973189dc85f3b082c93c18c6af870ae72b534f9166894d528b1c469a12b048949fcd04536b707a8ecf1d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c180c047830a543818e0ac3ac833c345
SHA18c2e50d4004a547d70508836c10ef28252f6e6b1
SHA2568abd303a90074766871c824c3c9ed079f9add20f7e1c71a0f6fc643ad62fa874
SHA5121ce14c68f04826fdf0a026298400c2d1dadb61dc3b87f676c8a5d2fea3d3ab2f31f0ff71a37481019835ef04a4dedd7b27acd08cdae926094f4906917e4509fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f54e250436a7da8ea41056970a31fbff
SHA1b14273b09cd98b9a7f4a2642fd486b113be06c3f
SHA256e17fb07381c020555862977f82f8864532b00e4ba1f55a68523884160f0b4aa2
SHA512c7548ed3bc552dcf1a925772214496826c55ae881dbe7b809b3508209adf0799d96df93652e75241d65a375cfe49f2831aeba88d99669af3540b63cb95ee9ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0f82bcfbc3b3ecf113aad58c6a86adf
SHA100bfa0d9af0684d83209dca11e11d5ccb41d04f3
SHA256060201a0cb940466f10885025d29a99c74f21c21b655832858aba789f37ea8e0
SHA5126122bb6f4a3e10198db09398a08003030275695bb7da41cb7994f758dbceb84ade1226b4ae032419482604220f850416e5402f1c82eeeb0336200f6135650eac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed1c67d0936c56bcf08f67f29dd1f897
SHA12bab749a6566896a147aada4622a9d283b9c6958
SHA256b54ccf53c2d7786dcf6e1362a20a1ac8ec0c2ace736b9285325ff7556356c07d
SHA512b35be5a2b00323452caa066b3f79335ad048c2e4bbe8b3e4449db8c9cc83aa56fc838d39d59f73b0ca77ca0526ae1358973d7b4ead9be207f6f828593c3dc926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5125ee97164896d0b89c74c395f652204
SHA1cb24eac2b6e89ad5b643fbda16df820473f46cb8
SHA256f9db0c7e8c19544a41665665e66afe5842c8da5a6fd0f4d8467cfec9b845a21d
SHA51273c3b2c6a106654c5525bc19e2ec5209c19216db42762b2d9c99cf272407baa03ed26bc04a35faa01216f54554fe7f56e2f56bac4c8edad2c40aeb4d760a3e9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5070becfd5da8471eef322d20936bb8c0
SHA11819161de298359cc9173d526104dc7a58754e70
SHA256e5d07773ac6576559fdec8356fa456f08acfcf13d06371258226ad5da1414418
SHA5128c17b9eb3b80b4dfb8650161e5f2568854c541b7dbddd6e561696277d86247121c01079743271e66afa2754434ff038b13420679580afd21b577bbe177ba8b34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef77cc548ce45846d73e7600d04ccfbe
SHA1390e4f6befdaf693c95a2424f8e6a5e1ef6a6a27
SHA256e28c96b455dc5842ba3336a775abfd36a2daa27d6af24c2a6cb35d3fcfa3ee8a
SHA512573c884c1f316722fc0ea97e36c017edf7e4ae3885ae11546397becf71c39683a5aae72b0267fde7af02009777fa6069b071777ebfc59257c64bb8c64d6beec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593d7e66d8187678118ac26058b3e95fd
SHA19c5fd77a77c1221394a5ffe89d78895b75cdafdc
SHA256bc5f16e4144145185a501af6662ab0e103457732fe952dc2f30539912357dfe1
SHA51259091fd8854d200b78125a75dcd47786812ee8298972b20d74efc08aecef46111969af622dd01c075ed415fb234df776f6bde6aac52bb23cafc247dca7e627be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5f0b06ace8a4b77ae9871c3ed4fb5c8
SHA1eeb3ae4115ceb2ce4bd6970a7f70284a2ce30f79
SHA2564406259c318a07e70e1f876113a72b39038f6be7af08e249bcdd40f9f54e33b8
SHA512500734af541c40fc62b70d4f668b582214559d269f3fb25786731c49f383d6b92860a843c6c57f2b5a8bbfeb56a0f7570688ef957ca5c9d46022bdf6ac63a3a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deb342f03c6bacae2ac7d071d2b2f2c4
SHA13b4092c14fdae3c5131c5474097cc8f2e4aba689
SHA256a395aa34238a011bb26716017662f88a49b2d110eb4638b0cb3fcdacc2857403
SHA5122aa88390c176dcf1d7165971d1a430b087d4207fab611ad9dc6c293b60eaf973e06351912a905f49407a6b4c4dd7d243725f07b85842b2766094f487a92b9d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ed5c50d7a931e0a01a5526104998a66
SHA13d02b1e9df38538c1fe55c4af78f65fa610804a1
SHA25627d57e24e7e463515d7ead49d7ff8274ed42a7558661c4de2d009c88b51f6332
SHA512934494a7580545b52ba30793c5989d16f206f5ac97d17a218e0659c4f546132311768150f1dd2cabfc2f4082e375f7f6eaa16954cc2a02529da90b2ebafa5121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee6c89b06aff2b66dcbddd58a2337b0e
SHA1fe95dc6854b38296f54d8a9757821d06084c3a57
SHA256953b32b14e68fb59cb000d8d6755ab59d15fcc08e5fdc40ac9f1f18f97349a56
SHA512f2725524a77f6d06c05180db01f6caeac053106076815421b1695ffe93ff2fa4d21a184703dcb267e2d8333e0a1b92b31d7b43d92dfc3f21d979b67a31781542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a9ed1864a52f25ae503e3ac66424df4
SHA1d4bfa923515609c4b8578354f7c20a045e328f51
SHA25607e12a8db1a8f74c4ee10a3d965615c53db2af177d5686b576f6784486a0685d
SHA5129b1a49b58f74f8c521ca2566df8195323b3cbeae99559e17c8cc5438ba1ba6a57a48658a378f7559d9ba6dcde68b4fb4850600c286dd87476236b721386b49a0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b