Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 12:21
Static task
static1
Behavioral task
behavioral1
Sample
135738cd30018d2f2644f8a4d3dbcbf1_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
135738cd30018d2f2644f8a4d3dbcbf1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
135738cd30018d2f2644f8a4d3dbcbf1_JaffaCakes118.html
-
Size
11KB
-
MD5
135738cd30018d2f2644f8a4d3dbcbf1
-
SHA1
f8e73e9628f16690eab8a2b0f2c4d54302efc87f
-
SHA256
73e5ae86da187e11ccb4cffeae93d82cd17be58392e8a83c9d82b157f15e79af
-
SHA512
e3b0d55326b8692db6cebc3b9e478c4af53c37582e927e1ba64f4c3bbe1f01f18d55323a8b10f2b39995ebbc21b782175251606d7379bb7f1bfbacd60a0f7293
-
SSDEEP
192:2ValIsr0r57M4oxaNT8II/w1wvqa1SAuBuLbdU8d:salIcIQ4oxa1I/ggSAguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000aee7e06766c3cf6d3113ba8dec22c0eb19aaf834f026aa3a28f7267c740bd4ba000000000e8000000002000020000000b60cf3c458e8a4bcb1e093f731745e11db5f5e2d5a710f56664240b80d1cac2820000000afc041299751d24a7825150827dc879b125ddb498c11187dbbe730b41e709f9a40000000db4da7f484dac539e1e34b6e5055d759470228b488b61adff6ce70fe2fb1d13aeb48537a1a63efe500cc553988f0f9773b279d4e978f3067fddc6145c5bcef47 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434206359" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1046b22e5816db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{301C8421-824B-11EF-85B7-D6CBE06212A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2568 iexplore.exe 2568 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2172 2568 iexplore.exe 30 PID 2568 wrote to memory of 2172 2568 iexplore.exe 30 PID 2568 wrote to memory of 2172 2568 iexplore.exe 30 PID 2568 wrote to memory of 2172 2568 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\135738cd30018d2f2644f8a4d3dbcbf1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2568 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b38b4abc6b14e7d9ad03e6999c69b8ec
SHA1a9d0fac8b0a554f38212d2162ea00b40a87905e7
SHA256b82c57c915f42e66cfbcda3f76e32ac2caf2a5dcc31c82387638244562b5e24f
SHA512d41ead1a3c7f6103ef88e991aecedd147c70500db3640a9d45f9c55e7269a7642ce123d1af97858917da656ff1f72a18ee8d968e66d191a67bd255719ffe5aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5703e4c986200efbf2a18ac241a4debde
SHA171282e7833493c4f5b5a2b4b96ab422334041ccb
SHA25606e23701a37608c4922413d3a8850c53cfd12ccc5c5dd29693049c5f924ebd7f
SHA51226585c1673aaee25bfec434b419e2865a54755846a450d6be3cad88bae56043203e6a16c53a333ccf51b13e25620f517274f8e305fc9c430da122a8a8775906b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa8c0001ab9ff631b8987f0eab1e7e2d
SHA12aead9f6ff8aab77c330ad00bf9aa892ade32ebe
SHA2567f6c50881c46ca1a0c6bea84fc50c148448b2472471fa4ab831270fb65b1e417
SHA5120dbbb149d0a7c75d2e432abf0a8ad8ad9d0c4bd5231d2abe5281c76e65b5f82028375fbfc4eb96a503b606bb253b377f96c7db8f39e3637a75b53793b13b3feb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0dddabfe30a99ac6710712ae561bd1b
SHA140f2c658fceeac4d1ad8ae84dadd07aef03bad51
SHA25619ce349c9d9895b3b87f0322c046c6c4f64546b28519fdd6ac902d7581042254
SHA5122d15e86d2ba45a20ef36fd96eebaf670d539c95b79ddfdd020ffda32bd4af5d7db8095ddd3584299d6f60d94c019f0295feed10dd30d7697cd5bf7bbb115aac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd1b2a1cb2417cc80a112dfd683c1b20
SHA186c2ac5d8468a3fcff2cb589f1094baaa13ac2e7
SHA2560767e2c083c0d80aa100e94ba4be621ab9f94aca3a4bf741c0540ae34e3c2105
SHA512e2e87236282dcc8a67c2ef97e6ecfe7129bb64d9734b1aa3b81ee68b26c9a0475f02bfb323319a0caa05b6037fb736a85e2f4f136153afcaabd0e80bfa9d079e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a4f7e74aabc808472e03c6cc36dd76f
SHA1fd025331153ea4415121e62e0b4ad1aadef524e6
SHA25644db193550d77960e8dc6d35da7567a9737b2a697e417583f7e8d83193ae4265
SHA512a96d00d841d1294e45cbb1a9cfb740d5c0d79bf577b611bdd20cf8b873c689fb3d2e456a0f940927db6397069fb6b8973f73f142319bb8cf718ab19415edb2aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f2f041691fbce007e9a1201e4a8b847
SHA1231951be52935a038debfa27b36c408b01cf97ca
SHA25683262e3dec908ae20ae86013c8a9bbd54706d56d12c04ba3c390839e1917ec04
SHA512a301c649c683baea34ccf36d42d5521c86290a41a9d05e200571b5e3c57221e175b82d1cdabd79b6790315788317b59ba41cbee479bfc060c1dbcf5f2f59eb2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54abe9b328e2d096aebf8db74acae8d33
SHA1404ef486f176bb796108d3b9573fa145148e9e6d
SHA256b4255c4b176748f8a5bbfe710e1bb305e2ff7d006f614d506fadc54d3c991feb
SHA512f8845396e71c4a9df7fe7f2e59b59a96213d2fb651d4256887c44360c9f1876cd27b952d07861c33d6f39bacb2a3ab4e584f7acbb5dea8b986cba895851e9ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d34dc8b283e889b6769739ae0181d99
SHA1ebfaa0f799f3b8239e3baed5702bf3fc785d8f1c
SHA256ef3011f5a7f5f42698f741ed190c95ac9cf24d5d1825aa63b0297f15d1495cf2
SHA51254f3f3d161c37d16bf7e8c4a35e7d14df725bd9ef1e4c3882f04d53dc34d5894b43374f73643e0daa1626017f48423a944b8a39015685e80784983ea1cad2607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9ccf9e43e7ea0ee63704a54a00f6cfa
SHA1002a7c5db824f4b2ee3793300d59a3c70384b7f9
SHA25630cd62d4427e053f614ec90b812b6348e4fb008ae7d60cfe8da52ecbdce65069
SHA51290a809ad9863e84b78f0dd60785bde1f42241f2fe57cf4b39a88d0755bb84143e865fe7b3f1851525333bcdef0ea89cf794c12dde94bd062820d57e6352c43c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a2af61c2cbbde8ab3b337383e647466
SHA1e81385f28d9d1bb8135eb59f865bad0b3a547f96
SHA2569b792562110cbf065ddcbc675f3da66ac91fc6b09970efc11f459e386c6b5c15
SHA5126b571c04cbb25c96b8e02e4b29f1785802a8b0f787687d1640123e24618c95bd04e87ea88ddf5be89f03afd40acef6be33ee1d2bed0a5d72ad8a5dfdf9f9ea43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b7e58014e9656b2e7507e948357b3d5
SHA19572a401d57d91f6d17e1e9d8b01942916aea041
SHA256fa1aa61b032fe9605fb45fbcc833d0009dac865d3c3eb4761e114f199f9c5498
SHA5120dada6c8ee15010ebfbc876d44ed03bab573343fecaed764e85be07a7bc7034606135dc0e02ff6a29524edabc42b731c8c9b538c7d1695042c3972b4b449be57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bd7b43ff26904a0d11df7aebcde4d50
SHA1cb830c17ce4ec11a9e483bfa3d091a0f797175c9
SHA256e19957c02cb4efa20910ff4d2b3c9454c3318b18bfb515adba96427930624ad9
SHA5121789c24757bec40ff3aa937f9d17dac2f88d218e12a6004d6d8eb5887e3ddd8deaff1da807ca5efb3ce9de12304380cb03bd76cb9ca88ba6453b9353b4bd9aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a863a50b71a8a7aca60df5dd3883275
SHA17c7e9a91a16f0ca1229686faa66f8b33fc8db707
SHA256e4a523b9f9e0802ed4a66342b92609b2259eb44023af6322a86651f1bc98092f
SHA512e0a2f9d67e6cc3c955b6bf97410f321f617db15ca5fb257fec43a0bd768a2395d94038b33975118a554dd2f724f562ef8795fad64a9c62c3f8eb5f22fc658d3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fde0900e2e96aa769d544a5c1c9f07a2
SHA1d897a1293a9fd3dc695d245e416bee51263a9546
SHA256865b07690ffe74ad58c696e1772f83f5dcf42f81393195690b55fd20f35be8c9
SHA512a52350b9aaf0160dfd945e213e8d672101d98d32b4233900fe3787b50a6f13c67d1320b66a5eaabe134550a7645dc577eaaa11823a32cf9cd45ac00ac43d31fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fabdd6fafe71f5f7dfc9892644a1207e
SHA1c1aa4cd919ae609281bf7c995a1a0b348b1f1513
SHA256db5a841fa76e158326694e36c4d25034f4918e210e36436497f7c6da38c8ec6f
SHA51233461194d3d429af7fb6e94f14ded355258078710287238db5f4b233745ff581cc106a58e8f3864ed08d67f00b61737a60f88b07f01f6556cd6348f02328db1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4f125854759184a87c47efea410c9a0
SHA1f6f6ff10676c8613481a19671d5286d5a557a55b
SHA256f0fe52800e65d87c6ec580cf106b6806a665fde876511c0584593f52460dc3cc
SHA512782d14997105a842e5b93a0e0929b5b6e82a375c063f221be72501fd2d8bb7775992dda90df2aa2ec6fd89a50f93fe041db2177e7177c8a5f073ab14e7a74497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5333d9348ad4d223c4a112b93d440d448
SHA1670cdaea1d05d3cb5db11499ac862cbb2d44b5b1
SHA2564f444c4bf8fcddb021e951a26e1fcf1bd2e4107fcbe71e80410a878ed7b5320e
SHA51228fb0c5a302b3bf3a9d888a1f45729fb24865f9a2b598f66e8ea125abb5a71e37aa77d95aa2733d0cc9c671795e54200cf0fd65c5e42429a9be735995d5ee993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5124576e4be00c7a6b36f678e2b4cd869
SHA11f364ef3250577f0f70f20adb27017e0981b5561
SHA256ab0ca31219de862bed6a1f3129f4a683952141e82d41a3e3ece113c62ad5ac6f
SHA512252b1f108f64113b02743e5e0fa5df55afba85d8db212a3e92c21e21c8542f6dbea211e5ef1a1a6671c9a7b7ef2a0eed6736702dd64ad5159fa02b5cba26f8a5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b