Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 12:31
Static task
static1
Behavioral task
behavioral1
Sample
135ecd9e007abe2843fcd821a8c5891d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
135ecd9e007abe2843fcd821a8c5891d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
135ecd9e007abe2843fcd821a8c5891d_JaffaCakes118.html
-
Size
10KB
-
MD5
135ecd9e007abe2843fcd821a8c5891d
-
SHA1
4c53af5b99a07c51abe998e77188c38b3680b7b7
-
SHA256
a0d235f43f4929fe341be165fa3a62fa44b6de2f68b515eae5cca5247bfa49bf
-
SHA512
0bb89cc08cabe8c313ff736972429938a0fc99aa4e49b7f947223abd0a247ea7d44156297a201d7561b8fb413313ea2648258af3d4f0c5ffaa93d600f14b6c31
-
SSDEEP
192:2VjlIsr03aP8k/w1wvqVkZ/B5AncpXrlf01PSbauBuLbdU8d:sjlIcuaJ/gY/B5AncpXrlf0YaguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00264a895916db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000f061091d2eab5fc1c8d7dc5a94b79a2a59cd1c78db0106df17b6a1c341e11352000000000e8000000002000020000000c39190c2250e5ef265ad11b4c51754699ec3d8c59e03ae0d0cc204efa3b883e52000000069e4aa88e542c4dd0fddb7619e6f9876d1d11703930607a56f42d472c8a13ee040000000e2a476461117fe08cdf651895707c6732a4ded4b2f0db4198d75e0e84196376cb3566dc44e8aef95a7200f88caa6dedd521c0bb1b4483f35920782ffcd1242e7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434206945" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8D627CB1-824C-11EF-A207-6A2ECC9B5790} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2428 2384 iexplore.exe 30 PID 2384 wrote to memory of 2428 2384 iexplore.exe 30 PID 2384 wrote to memory of 2428 2384 iexplore.exe 30 PID 2384 wrote to memory of 2428 2384 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\135ecd9e007abe2843fcd821a8c5891d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee45d0ef85f7d773bc998373215a2d44
SHA127cf97d7ccaf8628a214953a74d9f486ba78004b
SHA2564309af4cb755f22ef1e3ae69eb0e8706418a5a74bcb95ff004cf3c62d98522a3
SHA512ae5212b4dd19e8ccb3197a55dc8be1c37008e53ef29d1a6ea4e448033bb1186d1bba33e93aa4a87a365164e200df29f92654105dd33009c275044264a6562191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ec128dd375d1d0b43dddd2ab2dda88
SHA18e270f65f1781f525b351d0929a3f5d818aae34c
SHA256d718e8a16d83f6eac1d7f71387b175c713c61bc7b018fae4c8d0104abd98476b
SHA512bec3edc22e8409460f3c44e1fdeadfad6c8e74aeded00092e061190781df3b184fa049c58c1420b48acce8b8317ed15fdd3a99c03f73bb6d0f8a486452a10af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c00602d652b6889264bea582a7cb795d
SHA13156e2ea21344c8dc500803963af5b9cff53810a
SHA256f412ee7563a4cd6755acab0990e77192b2e50d76c3adedd53ac0939297bea1ca
SHA512e932810a64a01fd1b3dfc4873def27210067fcb142fd35878ab1049066daed59371c76cd75fafdc556b3de90ae98c8f28e4a928b6714f86175c0b5210edd3510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519db68f69f9f966774e37ec60c661980
SHA1b567968ff0a4fd4ccc17c280447a1027d4e6a9d9
SHA25603bf9dc15844dbe21b2039185d6acbba7bbc80a5271bbbfe1ebe9524ee63d9cc
SHA5124400943cf873a1d7443a3c88218caa3d2626386b42f7e4d836a23570db9308178cf3f94b7e7f650ec1077afbd80ca3526d3fa2f0700a5d4cab12e83eeb2f1d9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db194a3130ca71e6828774db61c2f6be
SHA1c7a53c3926852ba894dd3b4a21491226c91f6357
SHA2563c8ebb959c31753defbc7abe71a22845232a9b4245f5c2bbac5464cdb7c543f8
SHA512a99f5299bc353650836df2659327c84c11b6be3f7caad40ac852a47c8435770f55e19331b872fdbd3c1ca98296ab960f631e0c5cc80af4078b3de39234655d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7b0369f37e07df0d57c3903e2797c98
SHA17261233defe3018bc0374358f871893696b05ac0
SHA256d0b3a1e056f1d8ad7558c28992ac33b0654ebcfcc0f41d06033ceeeaa7fcf6e0
SHA512e272db2419573cf6075e4f966a1b3138dd405a0b8117810ada758cac859a8a37337cb305db2d45bb17635eb8289887340d209efe65cf1cbe948990d8f0ec16bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511fc765f6105e74fe7a0ce33afaa1eed
SHA12666644e15d7f4c3579c921be22a32996fea3292
SHA256dfe9de11488b68d6ae2e30bb385b12be108b50660692ff86fe9e65f77200b7e5
SHA5129aa2a52c965fffc828d318c0fcbbaeae792ffd1ff5828c30d4f6bbb8795ba2c6e9dae005b93efa8b55080b1b8b491438e20cdc4a22d3dc76c22348284715f8f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3004674004ddd466046ae08d7c340f2
SHA139f2e052e3b13ebbec9790417e8b130b0c286d9f
SHA256a8dde70b6c2a083bcf31ae415e1790a60394f47127caa2f2d877f2376a9074b9
SHA512954f512470d35630eb2dab7a7f3bd62992a0182cc69bbfc3ddef3baa6ba76c17964e65c236cafacd43f4503f9643020785f359d795a6db6d0e2c804e28ccf6cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547781f8ef0e66d68eb310c3ac3590f38
SHA10f59987cff52a242f89808bd3ca271be4a334eac
SHA2567396bb10887295f2b261cc8010625ff4dd90a51e20ae968083a28ee02bf2be3b
SHA512e549cf9f51a89091c58e91b2ef6b538760194b550ba5ddc9c51725b702c95a422251202ba30e467896fe9301a58bd88b2d9ead85975ea319d6995767760f3c12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5193da48f5336e4d18160ade45ac0cc7d
SHA1e3ff6ff098531934c6e9e888ae771bbe5662ab71
SHA2560d71218de560305f526e82a173a723e2edadbd388ae7344be1aad6d7ba823300
SHA51210f8bb19a9ac3faa1b61b900316e0f9d73cf6399b5ea0976740756e9e3746c06588496798e9a20b00a9e64b2dfdfb7abae138c6059ff265a52e9364971c9738f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538b56c8faf24eb08824c0eee467f429f
SHA1bdf0b5573ab18f52c09b6c22840b5ef0421a6906
SHA256e66d8f1f28457a68b4e726f248752ef65e5a0545804053c30603095a0e70df2b
SHA512985c00fb1274b502b7fb8d1437820c9f4a71ff390541beb0ee9a31ff9202b6fe2b681be79db5e15549100153536a130e0718fa75be8d95dc05237a3cea7d9031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf571ea740e88cae960c6202c55817c2
SHA14c18a693bffa05de0f53483338d446c6a7cfc3aa
SHA256d3ba22042078872f36d34195427c2f4e31cb324f44d9fa6337b7acd6dcacbf02
SHA512720a9baf3744f8571abcbb167897342221a62eac98a85d357ea00493d5423445edb7999ca2fbf9a80f4e98e2470851eab3607dbb080452aa33ac7bdf95f5b539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f23e19b50594668993887391949a250a
SHA110d33af02536d85ac8485cc8904c513be486ee1e
SHA25643814cb25fdf715d6a22e79f74fdce3930d2641628784ab614f11c692f4a44f2
SHA51271241e5a38b7ccd7d21ee5ed31e71e5fff635685b950357ce5301307624427fe9c672063360439a9b4d83513fba00abab5489e8fd8bd1246b5c1037b826143a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4006f799e135fa1b67bfd8a43f652e6
SHA15d0b69ae478e695225c8bd5a72f7b3796313ecae
SHA256ffb3a44b6e9630ba83e4f345ddda5ba23276ec9a6839fee7b28d9df278c6d066
SHA51258c5641e9127226516375fb6b5a44b0b644126eaae4a7fdb561bce4ea56f313942f4b413b52e001bf46594250603d7d5460c3d8cd0c80c98222f400aa192f6f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0945dcc2b5c42efe7b43db0392ac0e9
SHA17c661af036d8a493e388ae39ca94078024274731
SHA256f4fc356572f30693537c4640d484a37ae89a7185ed6102c1050e9ed245c007e5
SHA51229f03b9f0d95524df7e0dc64c12a4c013ec15cf17faeee78c35f0a3b41a3a6da2f1fbe63bd841e61c16a6bb1c8d0b3b3f7029cd61d60cdba32baf3d1ce0b4b79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5300ecc77be8398d454b321aa08602eb8
SHA1c4c44482cfe32cd8e0a5865550a0fbf4078ae0a1
SHA2560668626445f9768287dbb693f02697b3c4d47fa24068e1f176d3e74438875006
SHA512c3e11923d5bd2a2e2796bb244a4859b22e0800b56038876478cff49b3293cbb181c4bea81376d08300a726b938dad000948cf726e04d46d8dd73fa895ed9eed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5794f96fa084690092e437247345a3338
SHA1114ec04bd694bec6c3b7beabce199ec4e56e86e3
SHA256d1f47c44d5daee70a0e2649fe9e96ecf6d7a341184cf475331e68747ddc876a0
SHA5128f785e5ea3c08b39ef333cd200184f419fc3868fa8ed4c77a3bef2060de7d91d0d0321e21653fe952acbde7338abdc2f645dc8969f46a0174d2f40d507a003c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec29905ca6042cd2ba9e44021207a937
SHA127f93f42670ed6d1b5f341621e001c9e833efc6b
SHA256bcaf8116be353b1b2a6642a3cf5cd2d54ad4a88500fd0774dbe475e4690e9a54
SHA51296967d98b663f2132604d3ed5c5adce1ee3a281b30dadab92456c2a3570e0a5eb99de43808731dc75b300ff9d4a4e4711d6c2ca1f33c960116a927a1e057beea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536de9c4e84a814ccf9c2ceac509a06ca
SHA197030cc106d2d2119bf65c0c0ee2a8ca4fd32e36
SHA256a5dca5f3f0be2c30896468d3224db87a6a70adfe8ca03baf75ed470cdef71e37
SHA51267b491507a22b058b6e3eef49effa3a7803aff4d8951573b57fc7b42f99f55430f082c8af4702de746e065d1ba19c3414caadab759d90d01cf6858227804eb8c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b