Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 15:40
Static task
static1
Behavioral task
behavioral1
Sample
13f44a0b6fa32a8c03304af3769436f4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13f44a0b6fa32a8c03304af3769436f4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
13f44a0b6fa32a8c03304af3769436f4_JaffaCakes118.html
-
Size
6KB
-
MD5
13f44a0b6fa32a8c03304af3769436f4
-
SHA1
95a2b9f9930ef089c9c4368afdddc20acc7bb42c
-
SHA256
67babc73c9c0a1d5d560fc791ef232b32017b24702292eca7beec4680b1bf0f6
-
SHA512
94966fdb2b675610adab55f88a19a01f645156bfdbd4001c76df2c1b3e54fdd822173ec7fb6bf35d00493843fe904afb65031f829c4c60e50d03ecc08148fd8f
-
SSDEEP
96:uzVs+ux7Q/LLY1k9o84d12ef7CSTURZcEZ7ru7f:csz7Q/AYS/Mb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c63dd47316db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434218302" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000004dd146ee1cc9f64869dcdf76d0b7e2ba1a24f03ec7177ebc191454512d3fb133000000000e8000000002000020000000bf58dd78879cc859f82dd1a18b3f3467a0eea77c549948a9d440727ceb78152b9000000023d83bec3565948b19e5fd0084865afaea76af36186f96f1a9837806d8fb6c3c588ab30cd9e3d8f73c045e17781e51ef8daedf074c32d0ce7035b77035eeab4389d94ca5192489f4c124dd9ae7bcc1a2ab9677a9d451000f0dca190e50d29f72a447cc548b77dade2e5033ea06fb850bc01eacff90f39e0550449d024631cd0e515fb9f3a18984712e50045a840834e740000000740ebef9d53ddf510bd7ee104f1b7b83fb9ff8eaafc51fbdd2ace8129c452e0f15c314169b36ebb14490230cfb3791f463b1a48b39fdbb637f3089886dfa6e69 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000012a294a43dbd5e08c4ad695bc5b478e62f67f14d5cfad91c0c2abb010a8015bc000000000e80000000020000200000001497fe93cc4d00a84a4518ec7f9a7fa28a421ede309c940ebb46f3d9879c136f20000000ede5c9c5ffaeec8a36a9174064e10f120606c1dfb3c77420e55eccb0d82741f140000000aced2c22fd61ad3b3ba703cc446b557ae7b8cb57a2470ca3db99c56afa1cdcac9f9e961ef0dca51d69f8c04d40e7ac6562ff31f35d1b53efe739734bc2903fec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF448391-8266-11EF-A914-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2164 2088 iexplore.exe 30 PID 2088 wrote to memory of 2164 2088 iexplore.exe 30 PID 2088 wrote to memory of 2164 2088 iexplore.exe 30 PID 2088 wrote to memory of 2164 2088 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\13f44a0b6fa32a8c03304af3769436f4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd4f099efab6e1016dc65413fb457122
SHA192da8a7620c855778143b01b9e3583dcd3bcaab9
SHA2562bd246ddd477d35f15d6d41e4be415a4d0953341306d31651703238c3497d919
SHA512d813d7b9a3ce1ffad92bff313fc828e4a70a37e4870ec63be02a79d70d7040042e03338080eb24413402700522b67f6b82c46a7e9176684c6e4b390189793202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d4d426035e652fa9b3dc762fca90700
SHA1d07480874a552c20ab30c34a4115c4abff855118
SHA25698724603ed2f03375e743574e58ef37346adac9c55d332d3e0a1ee47c3614e30
SHA512f56e720e8a61722ec05ae4c7b7f4ba3fdb40ff3de14b6d2dd7d9ea57a4dee38598b7e6f710d751a1da59cf853a390996a7f130bda728081439c6406a0330575d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2976883bea7014a13e4069bff3a42f5
SHA1454e350a108f2eaa061e2556196dff2bb41e5e8c
SHA256a8b8075f9aaf1f4a54d0e095ae7289355aa41091abe1dce0f7ae924efb7d79d3
SHA512e060a975652ee5665cbcb01e1142d4ed575be1ee9d86fa831caaaf9804571ca7bc1777bbbca95bedba67a1e3efa9323ea9ed48beb55714258996f5110e54764f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566dd66b4c0c3f989ae82f0754e0b48bb
SHA16238aaf08c61bfff8952164f40904a704d1ace9e
SHA2560e3e1268a7f3c679172f0dab215105653efd65b256112f9b319ebec9d1a08c1b
SHA512fc1287c13a117d8b9e7d8f8ae0a0a85492db430932b7880a1df63da9882290e4ef3c7a4c9ef8ffc0975f8f5b836108304b7cb8ab633c2ab0af4ac28fef0dc6b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5126a0727d0006305afd59d32dd30be87
SHA1cb72c210afdd793f6e36c8f599479df638518419
SHA256fe82921191e9d13888f9f5ad45b9a8232198b46eab569d548dbaaf40cb7f9cfa
SHA51232f21cbc96cc7df88e81f166caa1f387f6c9d153c4f49c142d40288b9d707d16a1f9c849f78ba57ff20649d053abfa2ddf50eea7a1139739e47281cd7a8887d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2b7657a04b29af607cc3ca3a125fa8b
SHA11c14916fe300e14f5b3c047aa8585a191eb66e80
SHA2565895987e09f3dc0c70b984db150f8250ffd7154c7d04163b41a8d5a18573f12c
SHA51244764436c699d5f76e6143a9e570257e0fca8d721b3bdcaaf840924c45b00147caf54d911502fa5e6fbe647677e5a2fca6c13dc50c3f05f87123defee3885e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae668b44f88836d78811e94b4b7c5fcb
SHA143cf3a0902b8b4e06bc2fd9c90c48dd3d9b69449
SHA256d211f0723f0168fa01ac1850f80503cf7e180c1b54571feeb65dd6a7f21fedd8
SHA512dee50dfb0d01eff72684880bbc40d68010e051c2d0ecb4bdb184c33e3c7f21c5df2cb0b239163d4ae839e5f2542231e7509cdb0f402388d8f2c24a65dbc83778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1b3272686d7648a6a3d680a8c439581
SHA1000be60317e77332f4f3d030251a76f16a699c83
SHA256448c07774b76d7afb64286d861ffcb7b9392fe8fb7c698ab171287d120ae2393
SHA512107c3d972fc4f1c0eda8fc72cc31fa31bf71a902a0fb9dc6f1504d694cbb59cd584213cf3ced3bd2d347e4acd3f53a6902817b45b1643dccb4a8dd4bc9ea3c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51213387b258a455430549d6ccf3c3ebe
SHA1a083279e7c382f000474549861cdd1b87cfaefa3
SHA256fa547d6310cf8c86234eb8b900eeeefeed000a40437526501cf6c518618cb21e
SHA512cfb04484d4a6e450538ac9a197b2c61f1bda02e807e6427514a502f310934cd996804a0d9e92ee7b6ac8e5e2cccfac180e40d324b6f1ede8545af8cf899768ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e12451cbef415460f1571863c3334c19
SHA19f102ddab5147a255959354b8e02ae6c5ee2ae44
SHA25659aa10bdfd7a2df4908b5639df1378e01e9000180648f00d178f3ecb6e23ce22
SHA5120c8fa7a7b961d55977d279eeb18db3b2b2114b065af16396eb2e0b54df0e1ef386f9abbc285cd68bbef14c86ed52a8316cfa98048b844860aecd78c956e368e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a5efd7a1a1a74ca883b3dd64ade0e99
SHA1204fc8fbf67ea4e5e366ef53594763f9b9524a52
SHA256483dc07e07e9379b17daabbe9c60be631e65dcff4c5106f467586380bd4d8051
SHA51216dc7ae28ff4ab1bf52f91e2d7469e664fb01a95586890cfd07868c3cb45eaffd124938930e02c8180a534b73c0f6ef8284a83cc7352cbbb1d13954afcfe9cad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55447013563005f35b9016fbb1acc8cc6
SHA18e00ea82ce04250a6e46137487ce596718f10e59
SHA25617dedaf1364f495ef95d84bb16810b367bee51dbedbf4cd621b08b5e1322499c
SHA5128484f33cec792623ba08b637331952fb04c2ad340594ae1faf1607f49883dcb95e08e5857b8ff8920dbf6c84f3eb3f6eff3c7884e424af7d49148185e3c928f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52597f43d4ac7c95606fa69d5f224fc10
SHA1c0ef70915624826ed94ac826d0f78c37acf94070
SHA256d1416456d03232a58b6c369f673000c3725461764065c85963e2692b206a320b
SHA512118e35de59c9f97317be20fef220deb9a0f4af0f467bea5e9b36961830d2a0996d6fb010e224bc28358c773ebe0254ba32daff0be21b867dfc98a02ba4f88b46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbf09be820f5e07775af00c091f15258
SHA1af131a47aa14597ffd6ca378f920f9b22db594a3
SHA25673bce8c3a6bee8831f517979dd88cea245bcf495be71ede0203347b9a353a9e1
SHA51206455fb671464d90b20396f70af453d11a5d4ba865a3697f70bf5872838667a4960559441daed3fb1711e0cde7b2c2fccc59523b4cd14e5d8dbf712366656681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a1cda692c713ba4edd329fd26c40135
SHA1e5462abad4b9ff35279ac5a1291b408cbf6d4c4b
SHA2564e8058a1b2dd4f5503f5d5a82a7846acd3542134bd90cbdfcce74a0653a6e00b
SHA512b7aa5cc1e3c2e48086e6147d3827f222ec38729887b29640fe1b49a18806b351ba106f8d16cbb39c42f5d8178cf026205f851e0b801779d49ece8bc951dde3b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59630770ba98c9d59404b9b477393e4af
SHA1c9d98162286bcd8e643777d6e004dd0e95a04553
SHA2563b5b9d0c0566540dd620295c81426c9a4ef87ca834effbd2c6ce1675c90c9e08
SHA512469b892b92fe56625be4642d25237c3045846851ac050da797cb0269374bcfb9b2fbce738a4a2839fca6699e1e310060839ed1f3cda7e30c9fe9a31b9d705271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbfc4d9e39e84bf613c0ea9b19990ee6
SHA1a6c69197f4664c9550892f7d620e8b0eb14fb308
SHA256e9271375f5d29b66fe80bdb03f4c5ae42361c42b35c012bdde8124c772548021
SHA512014befd79c71fb94e7441863cdb0c8809f3aaa49a823cd5a276f57c1ea6f150757c97bab9681e0639675ab468a72919455fffd2d3514c232e681cd10fa25be7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecedfe3927bbebde71ebb1723062a2b9
SHA1a345bcb40ddb139a4c511fd627d0852f43e086f6
SHA25655b7f5e4e13c4ab48374097e9c163bc3e4190ea3ccfb8f5328bf424b974d3c1f
SHA51271b9dd6e9a93fd84d13269155d02164f140ddd80ac375af107a7c1ae0998d57f3ad9dbb20bb4af5597533e2c621faae213373622acbcb3a4571d50403601553d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b