Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 14:28
Static task
static1
Behavioral task
behavioral1
Sample
13bbf6f3afa704dea30225504ca1a238_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13bbf6f3afa704dea30225504ca1a238_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
13bbf6f3afa704dea30225504ca1a238_JaffaCakes118.html
-
Size
103KB
-
MD5
13bbf6f3afa704dea30225504ca1a238
-
SHA1
4377ba21330be9cf6f2764acd0f051e4717d69d7
-
SHA256
79277a6b234eb5ce25b0ab051cc2212d4beaaed93ee799269a32d0d32534f18c
-
SHA512
096b858ab1937a50a2a686a788e57dcb6b29b6d5283086880339558c88d8a40a7f59a4ff08252c3f8515d45c50b9f668ac5628a2bb7b282e064f02afd2225098
-
SSDEEP
1536:SwSMJzbL+v38p/F9mWCWzZ2wQzRnkFZWJRigGEFhH2csw:SwS+AENkWC5TzR+IigGQH2cF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434213985" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000002d8ab6ad91425cb565cf418bc2549979fa3145c84cbebe0ea776a607638f2435000000000e800000000200002000000018a542dd399122f495359f2fa7907f3cf2a61d2cc841d1c1e2934fd72166a9db200000002d242b39b8857185578c0e02c845079295f41f103ab2319a492ce6a909bde689400000005c2da96af248d112f614d065b656b304c9a0d0bc288120b7cf0ad42a2475caca8af1f275fdb90c43c4d43e08f5f6ec919341dea05be754df479b3e7c6562eeaf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2262151-825C-11EF-BA16-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d04470e16916db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2084 1712 iexplore.exe 30 PID 1712 wrote to memory of 2084 1712 iexplore.exe 30 PID 1712 wrote to memory of 2084 1712 iexplore.exe 30 PID 1712 wrote to memory of 2084 1712 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\13bbf6f3afa704dea30225504ca1a238_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fa8d6b45dc183ab1fe9e23328d019d9
SHA184b711fc18273c68960ed050ffdc6377cbba565c
SHA256dfad6425fd3bab6a0d6d8832fd414e634d7adae96ca8127f93ae675f20091911
SHA512392573028059e3250246bfb831ffb241975b010c289eafe7b73b5b295f2d9af2f6652800b4c1d557f6ccf7fa8ba6613489763f82e22b7931abe4c9ab6014f72b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8a78bb96c8143a1d90482aae1a45c8f
SHA1874c3a384a67c9b880db72cab1ce90daa98bb7f9
SHA2566f23f70e8af5346a84c95a67d5c3582088389fb5de89425e4f0cc3e304e88de3
SHA5128f398dcd953a1c64d4bb679b903e88ab0e38a8c7d804a93c3f832f5889f59fab942fa20b5c77761c01d720124c148302763bd3f6cb59914542e64f75517ffacc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f057bcce1a4c6693746cc992048e2d69
SHA150cf74a0756995cedd3b6018e8c486571c22280d
SHA256f8a6300ad6eec898aac6d38260017b0c7e78ef181ea823a503575b8728860a64
SHA51231c05a99a0c7009fed434d090ef156c7cef34725e1c9d5f9c81ffc66e348066f055f82c64a59f322f4f958443b823b30e5cdcbff1fa5bb19dcc2707778a7cdff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fa5129210fcb56649fec2ee2176f038
SHA1185ca85e297bac0f58c920cd184265e618883c5a
SHA2565735999cd4a074e0a0be6e23d537efc35d2bd27e55395661c4c718250878ddd1
SHA5127eeaa4a77bb301fff864c46640a147d89fa6c51f855b3f7b9a12089032b3d32af3567ad4718eda6a6bd0dd5626e9812adde1f6a54ebd31d5576b1052228cef5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5124c896f12f511683bd09cf2728f02
SHA1bab63f15ced2b89793c66213edcb3c4b598b86a4
SHA256543f258ab4042077388ca8824e473c6b9061b5d8800f044f12da9d9a1deae679
SHA51222c24f25fb803895037c975d264f43757e690d1de51dc3d165c4b6f9a10c0577a2e09e0f4b7b09dd30e113a334443a9d935ef947a7e0223714dd7f1c28aa3216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca56525fb682783c51d03042db824bd3
SHA19578b1fc8c9705377966cc4c1399dc17909f1358
SHA256ab448dfdf179182dadd958a469801539621cd64338a29724f3a4b7006a6837ba
SHA5123f466faeba3be1d7ae8ca07fe5009e811f590c7ef13cebde65c80c0de5863c3647a3b9ed0b4c708429cc403bec73780d9d822ea0889e95713c436378dd7b63c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dd165133cb800391b0d8fe0a43e5d67
SHA16dfff4f9d2b63c8049df59e30c36500ced8ca298
SHA25606cd7125535b64584ec9a6bf00d2e3266e61fa529b974193f4301d7da685e3f5
SHA512efc10176005c11aa5c7c4eed3cef31477dc1e34beaf81eaa93111feb3a7919356c82312d965a034d793ddde97a8453de72ea72c1cbd00eef0a91e2ff199b25b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4df1a5b42f407bd80c53ca967fe9eac
SHA1638caf09ab4a4e305c1493f2db987aa28decd840
SHA25648e9964f9796b585801004b1a3de5f048222b70c37729e37a6b936f0970b85cf
SHA512d9b7d1a5d8c073ef66258d531b66bb8245cee8905194f76d9391731fed14ecdeca712f82400b276f4d0c4bae0f398344999346d9181bff90c28a00add88670de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b34a9504a2d954e106452663d863831
SHA187f0a3736b45cacc965c2db5ce9efe718abee76c
SHA25684e3fbbe9c37072053ae3ac76cfa7eaccacb51713ce3bcc9a43962e6b5e4ead7
SHA51292fba59881fb35cb10fba7e58ee339d54f89e45abe138d6e18d5994ad65965c048ce603b679e68692d43948460df8fc77d0ba7bde1c81d51f9b7e79b9fbffbf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1ab5a4474b631aebddfe0e9239e255c
SHA15b06dd333b507ff0c0b9fcab8909ffec21d186e6
SHA256acd12191b3ded25dabed33160de421446d5b400ade90925e483af66d77eb683a
SHA512233d927954cda70e311b16d5a5e5e5bfc078353eef6039bf071a267c2b8bf47a41a8291ecbed2770e29043fe04d66ffd54fbf32db542fe26a28d28f4fd25a09b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5431ce545296e223b7c36fd533e47a84a
SHA1f2012265b9e7a6aac69c1449d3bbf54f947d1e84
SHA2562d09b6a0d0a024920d99bac8b0a1248db0ba517199c83c18735cdd86d3a37edf
SHA51242a687bd6c8fc6fd256a2e42164ca3ccf5620d1b0a3c2fa466e66a9ec2d9816fb0127da880148d5c1041a1577b047369e9690e878dbd69cfdee59856f9caeb5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c375ac1c96d734234818b6dbf2a1674
SHA1f4642259500ad0f06ebb179a577297278c0bbf51
SHA256c30a6cfde4416a9bec33c1b24ce8e56708329840657d408a072e0a7b57fd00b0
SHA5128d64a0b080a4a322a11a22a6d069e46f7086f586a9d603762db7caab4aa8eccda6497d3ac3bdd42f08c9c0f44f9be109d27eacec08de38476fd19551b92474d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587d3900b7b4d307bba4f070e58910e95
SHA1a6a07bb1ede29480f3d424e878d1bd097c8e8de0
SHA256fa2a095dc4eab915739cefd2064596d286c162753948ee0de7388962a0c8da32
SHA5120125c2f396c25d9e1c6e83bd1cc74ab65a2e0a0af3b8faa4f238af3d702be108898b2de9b9aaef777459bfa8f560415f4036bbe32f79fa8e483bcbba27491913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f92ccb6c320482b27eb4cc6394eddd9f
SHA1d3beee74c88fd33a69c38c4f5aa7baae055e1890
SHA256009aececcc8cb793f28a5a0eae0a8af1c5a5fbebc14b632ee6c2a1331ea14164
SHA512a313852641f8abef083bd932520c0286b72964c238435b20c49cb6ccf9c67a123db23e64e7066116481d2a8e67b8bdb267eca2ef159466a4059422fad175933d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da67eb52579e161479abb327fd37d38d
SHA17b8492349bf8695997bc6cb39ead2fb0afe7854d
SHA2564fe18e36cc7de5b0ff1f9c90cabb2a9464234b8393d81e7f316966fb52817ce6
SHA512df21eb861afd26c95c3cab3a4ce1eb13e2d1e633bff18947fbc863bf387fca56666971d033fe3f61426b4f9c635f7af693b07decba0e70eee27f74867f5a46c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ab6a53d66b5d9a14576f129bb2a9b2c
SHA14376c8704288ef201cf90c4a405ab19b6fd55e98
SHA25693aea28941f525a74d410710ee01191ab7df08fdbe88c1a3bd9ce23e4c1e40ed
SHA512ae36262bda2b062c2fe820cc9d60d5f77bf566efb9dcfa69f8928b06db0850e78b4a8feed840445ad642664be4c990d325415741783bc64574f9fce37152c402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b396f1a4a2e63e385fbf11d32b1ca01
SHA146ad46264872aad89a8ddca91ddd36fc3793fd0a
SHA2562b1d4fce3c9cdcfc7b6aa5bdd4b70609cc04b8be9223165c4b8214ddc8fd35ee
SHA512c85017a39bd5c081b0e2eb6905e99cb29652eb93dcd58ac1ea8922cb5429e2ccffaa2d1a4cd2140906de66ba94168f18fdc1c5fc49d586bac57c9dabf54b87f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dddd84c0de2c9229b5bbd885b837d519
SHA1ffa479e34019145e7aa1de4b2252e824dfa6219b
SHA256360aa192e39ca26c017d46e5401f1b7293c5d94ad79a7af5bde01addf327023f
SHA512f07694283ae56d9eca8a912ee45e40e588ae81cf991f286c4b5b0c843ef42ea2810ace1004dcd8a39ad112fcfa2d465f57e79010b27d83170d5c0df4ab19138f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542fa9a6aa066f003e045570d71ab656d
SHA158aa94388f5cc7fd4819fa2e4a21e4673ac581e8
SHA2563b788f0be7ad562ab80dbe51932a830268d2f94aa2075b1738e2d4c6b1c7c022
SHA512320ce4e4318b7d43429b37316ddf519bd200b7ce279c251bb3de10e03df8f3fbb366169bd5572eba154674e4896845604a3673937303982f146bd463f5fdeaed
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b