Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 10:19
Static task
static1
Behavioral task
behavioral1
Sample
1748321ad5f4be0295290cbbcc6f7c95_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1748321ad5f4be0295290cbbcc6f7c95_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
1748321ad5f4be0295290cbbcc6f7c95_JaffaCakes118.html
-
Size
26KB
-
MD5
1748321ad5f4be0295290cbbcc6f7c95
-
SHA1
8a9abf8d60cfc1605699dce94c563491b90036d8
-
SHA256
daa78dfca3ff1caff1690415c977a07f497f1fe358ee4acd8940c07aed373db5
-
SHA512
10b9003f2c62ed61efb64cbe3214df7eefd0c817da764efe645f41c875c07903793a4047e9ff88eebd383dab9d1285a4289a9072a02cb39a12b92936e7ff8514
-
SSDEEP
768:SLfEH1HRzYlAxFN/xr0ExgE77r8pPBrmTe+OAc7rj:SLaHRzYlAxL/d0ggqr41+Gnj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4A2044C1-8303-11EF-B557-C20DC8CB8E9E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000000dce477a5fa8d503817e63457d716170d6cd1af44844da323642a94c8d7d693a000000000e80000000020000200000009595c39fbfe9c55e85eaaa9f6767e02554ace75bf6a5bade8109f3c8666c6863200000007cb814ab43ae21cbb6a535fc0998ff0fd7ffb0baf94f84ed031b1b0f2f6aa04040000000d316fecba2b04617273ebb0169a5137b1cd1b3248a4bc069f57aade1082212be104597e04d7fcb217df6bf36d4e7694678a5c356257151f33e565d980d982ba3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434285430" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2065a8371017db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2624 iexplore.exe 2624 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2776 2624 iexplore.exe 30 PID 2624 wrote to memory of 2776 2624 iexplore.exe 30 PID 2624 wrote to memory of 2776 2624 iexplore.exe 30 PID 2624 wrote to memory of 2776 2624 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1748321ad5f4be0295290cbbcc6f7c95_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e59215b45316d6d5dca5c853769c23cb
SHA19d278d0307d551bccf8d731c69ffb911fc069829
SHA2566b4a9e6e50205b4006d89942b39b78e34f9d33203b697c1999a00c8d67b89101
SHA512526ebbf7cf9fa1e7fcc354a2fb9153fb1bfe8dc5e187d80ee9d16677fdfe5682502854170e9db88901e1ca3aeb38e36549991e075a9239b10f459282cda761e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508703ec56631d875a2d11215ccd2a10d
SHA1c1443a00d288838f6f9a13126e240a185decb726
SHA256d54cce92d36dc61256c7bb97d139df9d94f1846011bde5698048b60a16ce246f
SHA5125160fe7bbe2e4af423de7eac9064e9524fac614659524cbc94d52cf0346ea6df746dff6be5fe529483066d0e8878af3ac462f3bd19d0921349270b4847c2e133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b5c7799d7af0789d88fad3c0178c3a9
SHA13be6ddeaa343eafb28f43951059bfb7294e19246
SHA2560a81d291198df61132ebfcef865e311f35fed596f4e1029f8311a91d9a4297ae
SHA512c96028f9ae6e1116ac9615837e852b72f09f4c3c9aa5395630defd2dacd401756e4d883d2f88e0fbda4af59e597fe2595886074292065f7904e8d12057e159a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535b94465bd3da142f8e96fede51e160a
SHA17f7e26bea3f7bb7467593afdf512249f768b1ea9
SHA256b165f5f682079cd90dfd09a5cbe4a9535ca78f50f7fb2875c4a13674453222f4
SHA512da3a7c43dcfaf03ecd86784d5d65c980e9413a60abaec224d42b2b976b901e87bdd6d170dbebe2b96143280b20bd7d2a5e13bf651f7723fbcd3cb68250a81726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d27913edf50e4f7cbdd18ca7656f659e
SHA101584e365f1478c72f1aad138d43bd46a1003dd4
SHA2564ecd1830a364f90ae8cd1badc54e261631cfd28353b749ea23335a7227ffeb39
SHA512f8f420bfcc6dc74dd5e2b0ac663dd4d345680ac46b5ac06cb9352e237663cab4ec6e8575c971b114c6c5caea697c6d0fd97fb3848db841634171238198987352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6cd4d0c5b8e9024bf44c1fa52890e54
SHA12046579e18c4ddd943b56917dd7d890ed5c428d8
SHA256c687d079ee30b9cf6eff298d169b24f4e60c2ed74c7a4798cb1c6f44de44cdfc
SHA512ba614d899f04eaabf7f90151c40f3e5c1ec0d33aa48a00a07d656b6296df555ce3cdf23bad4409cb948273c909d0c08270c888d3f93992697743c4da57ad1f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5498ff3df59184c51150f45467c71f64f
SHA13ac11695ff8ef427cb7c05e5ca9180b0e89e1b0d
SHA2562f942402e9a1cddb642bd86c91e07bde197befd4dd27b2425e51a823ed71ea64
SHA512029739a1cc6b8015079b895608df98b8537709fc81fff9269968b70a3f884d42579f9db68033c8f1cc66d3e34b2e6564f5ecf1c3b2e18ad37193d6f281443ca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff18243592f9a3f8f6aaa40a50189653
SHA145208b110404c623b0033dccc215bc5a31002e6a
SHA25678a1b3c38e1b510fb8a1c568664834de625aef4705e37397378e984fe5d5e5af
SHA51237df8b66e73b5538c44a4e59428dc3d160679d79b724eef8ea87378622cbf6b055b27fd4049b456f32772ab3cc3b0ab799ed2b027943e415f4c93a227a777c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599cc2b73f383e4a02b77c78c84ab319d
SHA1f5085e26cfa196d402ae0a7e308eaf4ba0a7ce28
SHA25624e8bbcce95718e29ece31664c720c8c9c531d7800670291d34bd9c3bc62f2a8
SHA5124a1d167e3055207e2f59e839f06d20101f64a127c092827d1f8f992b389d56fd5b7ea06a675e31668a2f2340f8ee7a0690bffdb8806aa56490c497b8a4fade7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfd3f8ef72d56060ab7f146ed05532e6
SHA10e9255745be7839f5a6d488bdaa099a6ff8b9e6d
SHA25624e8e16c28ebb06a4ac0bfd7eb531623afb2ece0608db782a1245e5c10f2a3c2
SHA5122c3445eed4ab5c3c163e50b526824d86e22104111550a224b091baefde5692b1f9d36175fd5b14c92335ea9f53bb2c89859ce530ce24468244398c89e425bf5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519c2300d6003c2e582489784ef361f97
SHA1408b4a59c41caf10a63d70e685194489773fa26b
SHA2567985dd3f3909468aef2d7c916c231a96cdac034eca88d543e3315723af997bbc
SHA5124f8d2454a17b6a0d39069cdb379527dd27a6cb904ec5c44a112e039592f989e8b62e8f0d96123d010c2565a6700722068600eb92d835d4cd33c8a4a4382d6ac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597cdb56cb19dc0108b4ed1cc40b29300
SHA1af3ced4139f12eac55851efa2c351010695e80d3
SHA256a4998e0ab6dcbb626114ef94f3a1653de097567a020880bef9f80e20f9a2ddaa
SHA5120176e97fcaa43dfd4b3e28f7597fab99fc8b6dea4bb2c1c9688bc43f83c5b8cee878b6e7dda2a99755ca472b0d9748b89db569240eddeafae5692351d3f27a6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd59f3d6f7cd4ce10044178c53c8ae9e
SHA1c7e3d38f9a98e2aacd464d4947d1509bd8b85344
SHA25659ca5fa5246098f1c3272b105f41fbb3d5386758801ae0c76e33add07ee5ab5f
SHA51228a0a855c224196b7930cc1324992e6ec40298d4d166874fb60e8539e32b482ceff7e4ddd1c25fbde093994b23970b5f72b2f24e04ef310bbfcea09312158f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524968cd51fe8b1f264eab0b64ac308ab
SHA133c6203457e1e0da98cefd117521db2524430b33
SHA2568134de8ee53af9521da10d1373488227be155c61ee2ed109d79381d7251cab2e
SHA512ee4ec00d70bcdfd0dc7e2c18e09b115bf3a176b8550214cad592baa772a190a4e808f15d18fd4943b0ed82bf947f9ec0528d12ff692927b26f55435761e6b022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0d47ecac3e2e915e248fa5f13c46c54
SHA140dd53275086a9e36a8fbb9a16919002d0fc482d
SHA25663d9e9a41a9b406b1cbfff8023fc3d64228272dd446cd6553123e4292d45fe36
SHA512ee6963878e5602c52a9aa0a0858e2dab726027770b1257753c4dd1ec77c851394c930af98e5638fe4b6ff7f9c568c5fd93f29684624dd8b1528e8d9366711fb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5c600b2920c1130bc8f48c02a337e85
SHA16afae29f44bc7a2bcee2721e133cb918bfd2c92e
SHA2566b74d2de2b145e60155f03ca8d251e8fefe6fb3836c9ac66fda2c8f5743c7b37
SHA512e5459ec6ec6ecfcccf04cfeba7cd06a517aa02aeeb2fa8af7fa014180849afe5ef81a01ddbce82e5584f708d0e7768f619023eb920125e26fb4a7d1b5f84ac44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff60bd125a63b7351e04eb4e999f983d
SHA1b7fb193cc53adcc68040ce2692e2697336e09228
SHA256e3154cfe657510cc1966261286284c90ade239482516c51773b0ef4f17d8504c
SHA512f2c78139daca680ae60dd8341c5443fe0fe67f997f60d690a000a962b00bf445d4f76e77673272d5231f2f8f65f5742c4785ce7e27f1fab32c4a940a29d2ae93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562ae1815163a3fd09c616052f34a41ee
SHA18bfd1d24e4c629b50282da33f43ddfea54aef561
SHA256479da7e5617146acf5ca7b5cce42af2e45dd02a8160ea0db8faef3b8df1d2e57
SHA5123e0b4c98e44b1949410a26417f680eeaa71db5a5262c8dda7f6b59a3b534c9f8644c38f831336651494dbc62e5f4fbc02f26e7ad74dabc5f2413116f32e03a00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50915ba5ab6300626482f1ff3e86cf52f
SHA1a3571db31b686286f2b4dfb84f75720988c4c470
SHA25690d1b76bfb45da3a66007e10e56652115b5425cd30aad9a59e8e05f6565fa5a6
SHA512d890f34587c6a83c73ecbcf3452b402e0e4fd9fa28af24e1fecf2b4566130c271a418fcb1b4c5d53b33482039e635c213aba773957d397309d72262c65f707cb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b