Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
73s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 06:23
Static task
static1
Behavioral task
behavioral1
Sample
16838e8b6a5d1d47983d685219018ec0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
16838e8b6a5d1d47983d685219018ec0_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
16838e8b6a5d1d47983d685219018ec0_JaffaCakes118.html
-
Size
10KB
-
MD5
16838e8b6a5d1d47983d685219018ec0
-
SHA1
30dd42475b633a49a42158f3db3661204e0a29e9
-
SHA256
7660628178d02b1c7a68efab1603c128d49df6ad3b777b255aa2812c62db5555
-
SHA512
a1311909042c16e9cc1d3f6829cfc73d5e37669bb29bdba9a50fa5273809476f18f65dc8a219b75fc37757906b8a3f35c06292788a64cda9b8a83e5eed5f4d69
-
SSDEEP
192:tWaS3H+ui3MXAXA0+fiybBUAyNQ6JfM/J9dBgSRh8ma3M:kae+hoEe8O224C
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000006ae3411a92f1e7c7312cc5bc03fac20c101625a3865ff6bdd12532adb65f7fa8000000000e8000000002000020000000ade78882b943b98225a1dbec931d883d56897af57da2e52f8fbcd89d7b9573d92000000006b1e0fa10009a15c18409c38db08ef715b509360926cd269eb60c61fddedb25400000008588a8b931d1b6c31a33c648036d4b9f32fd6c68df6adf50909cfd35350fb0ec4354465ded43a65d3ec8bae512e77a28c55687eecf8339ce102885a03ca7fd1b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000ded16f1d1d1a8d5adc6e1e0768a69ad9491ef6e4e93ba07dbd656c6939ab2e6b000000000e8000000002000020000000ca8ec4bbe3a9d3196b7d88feed261fa03b0583e2ecb6cb5e8d8965cce3fb8a9f90000000d591a3e202f2fcfa4c680f5c49cef9b3525413ef0e04e7de07eecfd45ceab308ff30641c2a9400388c53c50569d13d6e05e5abdc6189d20075c72b981ae737e67335ddf88a85f0930b677e6a43789b26d1e93865e257edf1fbe8e7ca144e2f91adc2119110f55a06d4a705eaaa55ab447d1d55887bbf45c32eaf5db526204f6ffe8d2be8ebcfd861b1d499d0d938750d40000000f625bf328453efd42afbb81c20ec8742c6bdcce1c3a0a60c63a1334392e9704201ff9a2328afe710ab00395aab10aabd883dbdb6ddcf63932c533ef218e3b541 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6236C8C1-82E2-11EF-9F7F-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434271297" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0d70250ef16db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 880 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 880 iexplore.exe 880 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 880 wrote to memory of 2812 880 iexplore.exe 30 PID 880 wrote to memory of 2812 880 iexplore.exe 30 PID 880 wrote to memory of 2812 880 iexplore.exe 30 PID 880 wrote to memory of 2812 880 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\16838e8b6a5d1d47983d685219018ec0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:880 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556c89bd5943058175066d2e03ef30ac4
SHA1c464ab23de8275eb49f266ca01bc6b4aaed11286
SHA256ce3321ba1f10b811e3453a40a128ea55ba127d80b778b90544c959be4a7d1706
SHA5122380eb9328c9951c51d6bbd05b4c07c408fbc083da3476663e896bf4b8f2fc9184d7c994020e249819f59396786759afb2f3c9224b2612b305fc23f53799b498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d31540acb20b8cb60527bd1d0e6b309
SHA1f70abf172dad5183432aca5315ce4a0eb667dc80
SHA256538bdf058655aa46748e97e76d7e5efc0fc5a5efa2d217cf15b07d3a56c4342b
SHA512f162c4cbedb62a29bf6e8b9125d319ac7e021985f6e7a76a51dbfbcc55dd46a756e68153ac6885b3a69120eb103abeecb727e43fe15c44c48ef1c62b0eceec5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f52621febccf585b4b47c66df296ac4
SHA1dc6115f380b25ad7634e0462bbca99210f43cc93
SHA256883311e227fc7735952241f04dfe7f14de6dfd10b4ed09bcd846722caedf238a
SHA5120f2ffb6382f432388642691b38e7b466500bd9b6a38db4b0edb238f07c53bae1a6342f40904555498f190119bf8b2ba8c0a47680c440da620f9f3e1baf8900c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5375c9ac95e45d31a8d945a8dd521837f
SHA18b647dd6211c0b662a87439808512aa6ebc08b52
SHA256f9fe7f718eaf7031cc9286803fb490c0848a087a161d0f5e779740be1f344a7c
SHA5127c9434b51c7d70c7a67d25bfbce5f8083d30f9185faa31a70bbb1a75e3a5e97206d38e474bb3e94d2b03f14e637576d0ff89a24493d3d4d0d5265d33e204cbd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f2a2d2793a8d0bf3afb31110acb0225
SHA1da50103d48e80b66c30d0ca67a92a56a84efb3d8
SHA2567a31632e8e7495c12a7596c51f4ba6c0c372a87ee6ab4fdcfb140c81076d3031
SHA512389e9ad97d0feb54cc14afafcbabef52e1b48970a57f815a64406e0da0becd407fc42f84606eb39a17338d7a98ef93fc3c4cbf2b7f9bd6d0246718bf60587df4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57906f96b48404e49cd4022305b269d49
SHA1c9156f2e983c02671a2b4cfade2aae902e33fcdf
SHA256f6757a5acc363a7703dd1ad7ea38c8abb8c4f15511e0a8dbe8ce11e4567b7d93
SHA512cd49e296fd6dae0f2a84222cc091dd1352372b069aee2f0ee807c2c42e0ab81012dddddbd8910dbcfecfa9fc20eeaedcae8a428a0265d35459ddde17cf758fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a8006c6b6a87eddb504ef629032cf7a
SHA1d247e84ab53fd8ebec69224042f299ce54f8c198
SHA256868ed57482a0181b1926f41cba0915e8d565dcc69d9b084652a66e47e24656c8
SHA51269bb0abb8a2fdd2f4d5c560740bc70289c3743065e6a9721304159d7d6a03f55400f9b6bf531d28c006d183c71d6a8eff335c2bf5a9aaa2168abc68c29515d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da9be7500ed9b4016a3d429cf27b8025
SHA1674dd204e8c29cbf55e767ee8984f4ef81e30192
SHA25653a8b9dcf2bb6bb295300fba16123b558ef11f726eb38f173e0a9bad8023e99f
SHA51293d943ed50ecba972bd063b4bc610d82f2fe3cdbb6f69acbcdb73fceaa44d8e4e78914dcfbb6b67081a83a51eec2b8f682970166c7819c1b6522875f7109912e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5233f91b690852f2d48ecfecba963cba2
SHA19064d82e981d9a62625e0d8ce3ebb38ebda6894b
SHA2567d443d5aead672fc6a8ec91bc3d66d5543d3097469ddaa78e9b6debb515a8e1e
SHA5127a0f4a192f0cab242287102815306442da8b7a399634fac20c3fe4f2fc41f1af46e6fdeb87b555be995d0a8970cfb975522c6d6a977c3b19f6365cf4ec11d054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5811715232c4234555261a43cca8a25cd
SHA1aa64575a163a37720c8322d11e3fb45575afb9e1
SHA256c3ca980aeec1809d3a3a4f84481ce71615f417793ba24aa0d89af1ffa42efd68
SHA512d3aa3449521ed40cd35891e917ce76fd4c817f1436d1a93f1902233b12dbdc12c797ad3adf338bee7f56c4a91a835e1f087f1d4d08c751460c7f5bbeee4f57f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6a130dab357020964ed732cc97e2fa2
SHA1d54e2808fa6157e2cdd3bd52a06dd88f4cf63cb2
SHA256227adde4994888e48d76b9e0804d659da4c84c4b4703d49948d29e0ab53e3df2
SHA512d52eebe5dca28d1832fe41b56ce64c1ef7560293bf0641ec75f8eea5c078699afe3026989c4a0cfbd1891af2847805d71f2564199f2566c9f8528bf1cd54c562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5193423a5a9bb1321c632af1c982b5274
SHA19d4d0a999542dc8a01e50104e39b75b07d74f4c9
SHA256fa8e681d8ad445ffae535a326c7b61006a34d249dc4437a0fcc80c6b2d17816b
SHA5126428e0e43abf7a4faec008763fc3fe11d988fd1bf007a65792070b9ca5e0f5f428a54757bdedbf2c11cd9bf931a8deb2d7070e66e3e5a5b47481a0bdc9c43da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528ca00489b7463c1d482198c1612c8ec
SHA19f77623547ee827548ee160c648b6f66a802428a
SHA256a740f40a009c7161003ddc32115d01f72edc6f8a3b1be131e46b6aa4b5927950
SHA512bb4023f772088cc6e3d43a6d435dc870d4f53f1305ffd43ddf0609016f22443bae2c9a425dfa5c9401a3c893c657092ad35c28b7db6eb754af99262a03df4fde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4e017117f3bd8d8139113ecd9921657
SHA11fc6ef37172aa264b9ee337e05cde575f4b4bbf7
SHA2569c929f5fa5c491e1e5a5fb076da2780c1cd4d3a34c6d40d6a9dc7e9b93f260cb
SHA5124b2250a0ce063164b5cb741766e913b8258a46083e8eb930c51526923b3b91a5bd262994f562502d17a55ba07567b9c7b728c3f365da3bc88683fcdcfd0521de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53371d8632fd2e58a74cdd90d970885cf
SHA1abe0e284cd43db13722bd49d5ba80e6b8a42d53d
SHA2560e197a922b44a25953a8ddd5f717a9547ac2203220f54e0b029c2a21d2c689be
SHA512557983c43b4b6a68493fad5ef7f31f411ca31eefc9f851cace75a2ff8e8091dc280cb041fc43de50ef430cdf2b5fb25d8ff3d55080b420d3def2890c9323fc1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5100747ec3af9fbc5c9817acaa58c57f6
SHA12bee68fffddd6ff1f292d9fadb19efd790829988
SHA2568ed02c0aa46ef780b61ad367a0582279610385745e84677845793faa8d621189
SHA5124a0d357bc1702e227db93d66375868e03f43f264345069c7e640d47f303a88aea5e0001935538b8afefa38ed1ceabc564ed0875f9e4f35ec7553039fe8594e7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54064dc73df44122fde7e16f544446851
SHA184182310d6357045ef4ad32e128df5e44b8612e8
SHA25691528402c91c351ca98ae4a1517f1240219c8eff0ab32ee147f64be9e8e435d6
SHA5127edba501f5805093e9c95d5ef1af5c7ba26c5e4131da8c51e776edb77574184ea62e2b3880ae73575fab8e0023cc6b28f4e9a521bc405d0f27b12145f21fe22f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ab0de191105f08d38ae3078c93ca271
SHA1223535127de4598e273694aa290f3507b7f3144d
SHA256bf0cf7fe6187c12d9c69f8f62604227344dfe841aa8da35c7ac056d11cc398d0
SHA512c834a905b1e2a904c65c8f564c87eaddf8474d50ebff0f726af5473762a2b507ee1a776f7a4c379f2082ea5bee6975dd62c288be78f96b396aaedfb1bc083ee3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b