Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 17:47
Static task
static1
Behavioral task
behavioral1
Sample
14577b51e3fa10049db757838f1e5229_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14577b51e3fa10049db757838f1e5229_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
14577b51e3fa10049db757838f1e5229_JaffaCakes118.html
-
Size
6KB
-
MD5
14577b51e3fa10049db757838f1e5229
-
SHA1
bfb8dad47ad80c4a358493c76cdb25049fd3d109
-
SHA256
776282a934be3602372cb4fa70b2c61cea7499f560a411902fa8ee3916e89ed2
-
SHA512
142bcaa13129e5014b52b5f4df42af543b4ffae6d5107afb0d7397d30f29e7d724676b696ef26d44063dbefcf9be0e111e7fa12eead214ec6e8a9bbfcbf60a99
-
SSDEEP
96:uzVs+ux7t6VLLY1k9o84d12ef7CSTUS7cEZ7ru7f:csz7wVAYS/Db76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000f97544f4c2537ef2bd312ec485d54fde73fc4a4a40dac0296bb6509a1b9eac4b000000000e8000000002000020000000dded605c297a12983976bf844ce7eb961e251a8066b4d65c8b1991b5b63c68b82000000063b0b8af9146b18bd170cbee824bcc91f4a5087aa226c0ff7ae0ac3e4106d274400000007e2b30b8f02c449b8c331dae2cb6739b1f2bd4e64e09a4724b1fe3cf724ae92fea9bc182a0e87f7c8980a3e20b153a549489556158b3c0189f90b0ca737256f8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07eb2908516db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434225917" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA320F41-8278-11EF-8BB8-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2540 iexplore.exe 2540 iexplore.exe 1180 IEXPLORE.EXE 1180 IEXPLORE.EXE 1180 IEXPLORE.EXE 1180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1180 2540 iexplore.exe 30 PID 2540 wrote to memory of 1180 2540 iexplore.exe 30 PID 2540 wrote to memory of 1180 2540 iexplore.exe 30 PID 2540 wrote to memory of 1180 2540 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\14577b51e3fa10049db757838f1e5229_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4ff158c928725192a4ae9df1b2e6469
SHA149b2c0bb08454a28c406cb43dcfcfcdb8c907b38
SHA25676cf6a7cb477fcd49f0763dae2c5c369d99ad09fbaa9d681b11958987b17f022
SHA512e07ce1c766291e3eaba254a94b5c9dbc7361c9d3643cb81700ef5db1208e7cab26b650cdce7c5257124e44d64082619be228fe4ec43fed832e369578b68d4025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fe76d1b08856f9890561424c633bf99
SHA1c9c6e2788522cffaca1e42a17b0ace8078165135
SHA25690f7b60e6b7ef135c42d008994e5e5042b00440d4cbd89597a0accc24af8f869
SHA5126b5fa6f9baa8c5ef5823a320c5aecb575c15baba56ef2089258ae6e301c1524665289f073286ca6a6ba0f7785161726851c3bfb9c691903ed57b4225faecfad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a44f1dea1ca4f317cdae0c9656967847
SHA113084a46c6280aa70e5f2940692acd21c59bd67e
SHA256b1f18fd1c6fae744faa048f696d1d9efdda0cfeb589c5e98e4ef19415b3add4a
SHA512a91745eae4d9be7af334108547a4bcb57294d5bd1ee8bf99305af07397a0ff7ec058c1cedd2aa5bc305384bcca6730d08e7bd353a187ba4b47e35f7758d294b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532b9209cb23a14615f48a53c0e68b57e
SHA11913fa5c105919b70ee6bef307dd02032b2f23aa
SHA25636942674503ea3121a19acfe6e4c72f476fe669933250b364bf20a8f2845340f
SHA512f5a8147fb453615b60e6cc2970d75cb4cd11a0c8fec90d36e3ae9c7b66a294697edbac250ba50f220c477bec1c78b2157dc07031eabb97ec74ee151d265d9057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550c2f1858c3a3dec3050061f0dbf9ca1
SHA1a3d084710100cdfd64c6f1a59eebd983cdbb64f2
SHA2560014f7791787e654e83ebcd9a6257b0a02e104444fcef8faaa8812cf1c21befd
SHA512999feff7f6db9650fc708bebc09c25c6a0b39da6eabe4ddb6d13b34ead143527a301d307ee6f452abeb64430dc5e993e9a35f7b2c993838a6f1286e94ae0b57a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51927b1b76f8527022f596b0c8d4b6eba
SHA1f42f05d268d8e0cd9c7ff083f71d69d7d7ab00dd
SHA2566c10e41d0f7d10462f803feec9647e279dee5338e613476a0aa56efa59cf66df
SHA5128fada90590acecaa35db3690764ee028f65a5c769f4c67764980c655a8392f97e7f438e42007a2e4b0121756baaa6916dbf8dbf79589f26f450a723f06c66127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cff6026a08df9e1ab6d0925069f54a2
SHA1b695b709bce5800aabf8d2b76ece52b5bb6dad41
SHA2565c32ebd0552488b756b26198bd923204190221f6b610da4fc4c346fa85d0419d
SHA5125c61916a713a7fa7667df5bf656f059a79bbe3563df01f35440dbf8cf0daffe5ff890ae2da0219deef5c96a1b1c43e0938a2d5f4eef2165dd522d29e76215321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d23e0da17abe3393022783c93db67b49
SHA1c0b9aeb17b842dfcd837c3f168fd5e2cd7b69284
SHA256c8c3b8384444b09cd3e6fafe88e0b521ea953e65ed15df8dc7001d0172577c83
SHA512ba31c28476d239a37d405f6c5afda59abac7f78445cfe2125b8dd6c93d3095068c12bfd36d99230bcfc6262d127921d9253c0184b2769a0edd64cca49af5be4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f2de69ecbdf7843e437dfc79cd11f8e
SHA16e4ed364efd56be030b51c51604a5eb7dd0c3683
SHA25611483f1958008266ae99fbc25172495c8c49dab3ab5fd1ed234faa5c272e4c0f
SHA5127779858b5a422e06fb8af66275a38d07e8748a985cb35ce9d1c9f7475f95135a877f20291531bf8becfa48dfaca2d50d91f859bd915ce7f61ab611ff11a29d06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eac0011dbcdca95f1d40e6896271db10
SHA1c8a7d432bcf0ee02ec1c20a39c6f5ff110b43d5f
SHA256390fb48c827c9db29bb4f9f6d70ad4007f8464deeafc0489f7c88d0ee01f7ff1
SHA512b50d0c0b7d4b0fa776b756bb853c88327b5662a8ab6961250850c4d21e66d0d50451bf7712670547ef86dd61dc9f269adb65c4a26b51487b3acdded8350492e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd7fa05d97208974a8d05b77e1ed2463
SHA1e41afa3f8681a09da128055e81e795b2a02fc380
SHA2569e14fd56315a9c180530c3e8d5ed14db8cce7e423afefbc9633472c698ce968b
SHA512d28fa01444e1cf50d98ebdc788c90792bdd87a02eaff279f9b626f6f547ebb26931779d1ae29754bda4d7f03cf0d58371fadc4cd9a679cfe18bfcd4616230fd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b8af4ff82744e759cddd8f8148c963c
SHA18482aa2309523fdb69dbf3224d383a1b5f87fcf7
SHA2565387bfdfc4796ed235481e5c2882757c95a8f65b5055a1b77567a8c4fbad1d44
SHA512f4a0bc2e658a7dcfb5041d1a0f4368ae7f47de6016ca1ae746d66b13852695a694026991467beecf381f7a00edb79702c7a2a2c45bd90f183c76825b503bd6d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f1b1f2cea9cea683c3361376b937581
SHA1bf6187c707c2514ff89bd7af881a94473092ad9c
SHA25654f659e433b8d0a2ddb967fdd4ac195cb77ce7343d412dc004bd837ebddfcbfd
SHA512c959e3512d7d2c44ca955413a07f17f5f22e8590bdd448e948ec8a444394d60fecb0596fb75e505f8b99d89d2e08bda375189414611da572c09d6383ea81775c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c8e231b1f6f2ded1512f80f31f1b94e
SHA1de137d37ae8cc9d0621bfbae3a0f5adb2a8251d9
SHA256c3a6037ccb4cba524f0a94c8c4f1f873b23e36d20bd0fc0e245a1541b9113448
SHA512e827a339f28fb22ec3243df2c09735fa9f4728b811b424c0c2f093c28279e49e5dbf8bc7b73ee4dbfbd61d89fb7c7a0720a141264aba87188c3091af2081af8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eca13d952dcab726d24914034f95eb9
SHA1db5819820c0257c8ee933d90c172d6447723f94b
SHA256d6a468ea55fcebf686ec7e151b7fc8c4f41464bbfb9e802f609cb60eac71774c
SHA512ea45880c44bf4cbfb8ff0670e37718a48a83821ecd4139bb1bf1360357713cf838c1934a8ba7e51f670c84f0f6bff3493d3ca6717bf323999caab36caa13499f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d20f4c46213140acfc62c461119216c9
SHA1c6b47959d218cec0108954cb4e52f8915e392b67
SHA256cada9ab932fc28d7ae3d29d8ad23e4d60a428aa3633d7eb75721e912670aff30
SHA512f11c4700441af3a5a538273ea44fb87e76beff38fd0b5d14c32aca2a975aa1bbef567b4f9500470d4f22c1bd51561dff3d7a1c426d869d7a6cf735b406731b6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8d4323e13ecea94a35f19e239b6451d
SHA1cfd1eb2e2c13125473869a3b0905542a47907260
SHA256214ee7f7566cc33994444bd25cfbe6766fc1f78f788fa82b3dbe155bee5b0420
SHA512490cfcb320bb0ab9421951d4d11488c8b3bcb51490ef3b7b6538224bd9e3e26e0751b3611ee9a1d02b45a6eabf181e3614da41bc2b2dfaa236bff14f1a381b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fb393717ca7a9a86f6fe5fd0b9e4b4f
SHA14ec58e4dae2ba9a21da3726695750b2ef60419c6
SHA2565b4f38cd141cc2f0e5d91fb15b5992cc24cbf015e356e746b9c90fa164dca502
SHA512e357d6407840580c0a39cef1da16be871dd893c123a57d22f65641e2f4ce7e1413920fafaaeb4364e47972c46a2e2084e0b78de02adff3012899719c38447560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c36557e9d33db26cc825af37969ba636
SHA193e45c08c9c024a82992d522883ef0844eecb766
SHA256ca89a91d32c5e8776e971cdf6ab25fe810e969b8e8cea1bbc0d24f2e62498931
SHA5127dabc37de6d59668b15e9df8f7b4e68f565e2b14a29886665ae8f8b25236779191dd838c86d6c5d509848f24a384a3ffc0bee4db852fa7012a0a1bce8ebb32bb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b