Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
67s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 06:57
Static task
static1
Behavioral task
behavioral1
Sample
169fed04b6e556c21cb285e2a4cdaccf_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
169fed04b6e556c21cb285e2a4cdaccf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
169fed04b6e556c21cb285e2a4cdaccf_JaffaCakes118.html
-
Size
6KB
-
MD5
169fed04b6e556c21cb285e2a4cdaccf
-
SHA1
064b00dd0adf579d04f49a944130a1f6e25de95e
-
SHA256
73210de18ea4f46635979dd6ec7856887a4cd37a1ac873e1bfab98cefaf1a4de
-
SHA512
e11114fc6a0ed7db50332caa62df5e6ade6f1d677d96f895d789bbb6da98ab4a7278b022f3aae693e58a32aac250d910dfedeb592c2c85bd0e7c9359cfd70196
-
SSDEEP
96:uzVs+ux7jBLLY1k9o84d12ef7CSTUFLcEZ7ru7f:csz7jBAYS/Wb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000d49d7be877504628dbc5c80a6fb4030c5f31b976d1e02162fe140c7e6d8ea479000000000e800000000200002000000081fa9b9287bebc500f29645b6bb45e8cd98bf75ae83dc1cb844433672b5d2f2c20000000b9c6cabb9250eef4fece8dfc950e142ac76b002ecb53f52f4460872e62eb692c40000000256058c2c4082b5c093af736c487d2ab9c3edf5317e752a499ec83004d45ae1610202680ddaf9d02e23a831cda6a968e257d6e6112248435c6543d8a19589096 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434273299" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0017ee0f316db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B7749B1-82E7-11EF-8E5A-6EB28AAB65BF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1860 iexplore.exe 1860 iexplore.exe 1856 IEXPLORE.EXE 1856 IEXPLORE.EXE 1856 IEXPLORE.EXE 1856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1860 wrote to memory of 1856 1860 iexplore.exe 29 PID 1860 wrote to memory of 1856 1860 iexplore.exe 29 PID 1860 wrote to memory of 1856 1860 iexplore.exe 29 PID 1860 wrote to memory of 1856 1860 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\169fed04b6e556c21cb285e2a4cdaccf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1860 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e72f1fb8acf8a3407df665e003d78d
SHA10b06547b612d3608cb1f78f01c93bbbfb3f0bd19
SHA256cdcdcf8470ba7a4bc6483d549f49277ccdd7dab4aacdcd8b2a75281df1a9af0d
SHA5128794e086431f423cadec0975c75b52bd37d283985fb53edf14e8529c513e074a64d385dbfc2971e42e00efff997bbeb7e93b7d3adcff96055ddf55c8e2209768
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef40c73717c9fa2b85841264c38f0084
SHA19037910cf318f5afb1ce965f696dc94bf4b11eb8
SHA2565c0fe0c13c09ffb9fced31ac0525b88a18badcb05a736316f5ff08351da98877
SHA512ae89cf0e2a4a53508ac878d18fc82f20da79bb72faf32d6c6cbda7d7d3dc069912537e0097c28268a3128be0eab5c55229d68145ccc027ad5232491e3880941e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a56b373a8e7dd6fce82148ce100ee887
SHA1d54503a7439e635458a0d1e052129fe5019c05d2
SHA25656932419937ee7194e7eeabcc222313d4f10c62e481a64a3cee4a56ea2cec8a1
SHA512832167a8c1ad6285a87f2a7a1e927e12a6976d9102add7d5312588d9b41f20c66789862805707bc74f3fafb2b0e153f6d0bd14e68f63f55a387ba42f14267d93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d764cfacc11d73a491518a9d2acaf5f0
SHA161c9d5ce16e1c34fe6c39c8bd7f3f0b627c64195
SHA2569539ae372cde18c2d8adc9cb286c038660b77d6e98195a3992bfb2914963807f
SHA512f2b5abb211e547b9c24411ed765803e18161170a5fcd9ee029bcae390c87a09d6497b6c481d62c91fadbce9c2842bf9d34139f150c4e1c839c6c8c18d557ea47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cba3ab60ad5bc9fa1b5b5c992228b8b
SHA182c83f5acdcaad97715e47632308222a150f384d
SHA256eaf9addabdee027fa01570e695c9788d8fcc40d88bbdba2a12c3e4d4e60a303f
SHA5120675478013459997c2d3e92c2b8521749dd958a314c72609ce7f6c0dca2780185ee63234f16cff503a5dc9f1b7afcd074ec66753c1b679cf667fffef0d068d39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55884857e40ed847202a2eb0dd75afddc
SHA1b52a3451225e825343c3984f8c5d03676cb44ca0
SHA256fd6a5e36ccd5df8f2fce624f3289dc979e3c6143afb6abef7bab318a8ceb275b
SHA512a15b2bd0769f6241676e3a13ba8f5b955f89352edc02b967049d156139d0ac1507c5bd84d841cd0d2dc7375263698b4c33871601a2a5284a974e49abbf36bcd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca9677fb0de745d6bb4dd79471603a07
SHA1ce338225fde830153735f289c479d7d6e5414529
SHA256329b075fa60dfca6039ba070b1b04c22a6275ed7a136f84a417037d59fc05b75
SHA5124ece754426387dfe95ac178bedcfbaa54fb6f6a9549d391421de827821f5247a7604e54fb4b09a9c417d7bf9481dcdc2b1e9705e1b295fb8d1b65fbe49c77464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543b2f2bfac00522098616fc914a714a3
SHA16d62388dc1cda0f98a24a6772d8e512eafc91526
SHA256e18b3941f426d5f926f747f8096bfaf4133e3a51474e306a491a78f8161f488e
SHA512e6d00c6736e2c95fb6432fb71f4b3c7ba3a06f2272eee091afa71ccbafaf00fdb07b2672a1ecc2dd44baefcc7f7121241ef5ca7e7a918ad6a98bc3744c38c60e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1f3146f157a3f40422dd645f0c58411
SHA1ed90571ac6134cd5f8f9d151c8f8c02385dd97de
SHA256a84a2fecde3b0347bcffb9300a74bbd71dd5b91ffdb3e4f9ee71543601bb7f55
SHA5120fd22919146c24f0880fb9cf1795e97b69fd875ba34a33e6a204874034a5bdf884bfe4160ef939b1dcdf09e84afaaef628b9f2ba2c0207e61a234441cf5491fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9a40235804be699e05868a51321c68d
SHA1f30d8831a6ada87b8264fdc582b7d403fe1b82bb
SHA256581e3373e43b9612d140ef859f7bcb0e02630b5076cbbbf5082c44f8c5f4328e
SHA5123e2bcff2222993d3a6898c9be2b3e958cea311e2e71bf9f25727989c4a07c405f470a4c44230ba9f6ebb4443c522cbb84ee8ce269f127a21cf7af33ccd3168e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1bbf08d4fb5237d8cff1091fff43d38
SHA1a09bc42aeacf8f0f1f2ceb20c11aa5bc6dd4c8cd
SHA256c4a6bfd1a483ef4a6110c82ff9fd1af3fb13cc4a67a7a918eecaa6fc3463c4cb
SHA512abc6a61fcff303ed4dc9d9f30e9d549974ec0b589ef4dc69a97c39398841957590796520155fee9efdb63e2168c23d131c1bcc1749f89f1b6884e5e4bc8f440b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533a04db0afe84f7229d204f40867e514
SHA12cb1b1d34a78dd76de76c42e7c41cf1756061811
SHA25658dcdf609fc3ce1ac415391eef39d477598e532bb64bb4254496f6a6e0f86143
SHA5124d4c6c04a27b04250de0e56a20d019babd22e0e15e785762080afc025489c3e968df00497b0e6eea20935a46b0101d1731577528cbff6866949641dcc5bd8910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcf95b496243183963dfe9bf7465a526
SHA1ce083f8c9fb8d69f2f983ce152bb79b23552c041
SHA25671b2bf1dd6b292fb9540c0c217e27df3ef177769c0eb3c5ca968f0c48d582167
SHA512cff7d5f29c9ed621bd4ee5f78204ed481cbeec67a6ca3847d385aef9354cc69c23a19ce88ff004676a8d7987df128aec2696e001c28367f65c9c5fcdb3573d9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d2e4c0b9b78b4ddd7ac97ee40095cd1
SHA126d9083e182c97437a4596b36fbba8a883b2090e
SHA25652b881bf0791e941bd97b140d12393b865800828dffdf4e3b9537b733cc9adeb
SHA512ca85a8a1ab81e2392288c55ff80af96bbbf91afda657da77a5238b881fc6d61fb17b3409eb4dfdcfa6b8729a8e53bdfa2dd6ed94f01a5d76d9c9b9091c1d3848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c47c5f3cc4c5c04c2d8fa698dd3e9f8f
SHA1cb227750ec5fc973155ee5d3890d6680aec401f2
SHA2569903903fde835a812b0c3ebb2fa832b28fba8860f337500265c06c7e9a09c277
SHA5120116b7a21ebd853a73fb357fcf7df40ef987101ebb59c1b78a6e6a78f26660dc6b5f49a1a44ed45992dbfa82a458208429a3f45ffb754cbda0acc42b6207e0b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b89856615c8e1f0428b3bdfb6febee64
SHA18a11e462040ab068dd94434f9151ec91438c6b52
SHA256c145daa65bfe05f03991467a6bf9782e711c9fa97b28f75f88afcc16c4c42b89
SHA512d2b9c63dd01fd70493c90fe925dd740a4188c3b36b5240ff8f5356a44d5547336f4438677f989c91831c1bf077c4a69017650126c405c30def81d33ce14738b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4cf795034ce9c2f2a111d2e99f8c939
SHA15386b0dd9f01a9c8b78bb5a028775e9cf40af111
SHA256b9ce384036630cc07e263f12453bf578e4e7849b3a197275ae6af88289aeeeca
SHA51294c5cd8ea584a6c813d4c35c08fa7b3922e035e6343475cdb456c4d695eca4cfa473d6b1aac1817f940b18f6505c7e831dda0ce933ad75179bab7fb7ce3b9e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b67cd8c197ae0aeddbd22bf925c2717e
SHA1a69b165269fc84ededf962573fdbf499d31b25b6
SHA256eb48ae49094d473c19367145179ba340a377e69d8a2626ae04e8ec2f45fd9dcd
SHA512fd9e535f66e6c5d062ca60b56cf699f5d4ae2ee321fb4a9bb6a187b717066b007caa628699eaa8e7ecbc0c080ceccb57578a1afe3cf09221227f798916d25a1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539f24b2b97ada2559d2b35fc32a76241
SHA1b7954a16d82af329e11c5ef0357ae1b27efe10ea
SHA256189bc8383d89b540c7653d535a90d326932ffc7a96b06639d76eacbe423cacd6
SHA5121ee3cfe67592dd2638859bdcdcc6d5af7c9d5e0937f7c66774486d7edbf9929ba45abea7704649e8682a1f6d20e47e5bad643c1a9ae2d9c2d0af4f7062f5c399
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b