Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 22:07
Static task
static1
Behavioral task
behavioral1
Sample
e121d651716e14d392cae5e6fb8e7f79_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e121d651716e14d392cae5e6fb8e7f79_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e121d651716e14d392cae5e6fb8e7f79_JaffaCakes118.html
-
Size
19KB
-
MD5
e121d651716e14d392cae5e6fb8e7f79
-
SHA1
51d0859d29aab65316d66157a9ada8fd65730343
-
SHA256
387df85973ca4fc6fb63a4f2c2c6e1251c164ccacde92982a9754bdb1ec97499
-
SHA512
557fc260029bacf60e6e9f9927b0e467b7978c18be078811ab29d44cc17a69f59ed6cd7ea0d996361aa4745900eb0ee615d065318c0b34aa14c31c7c4f150bbc
-
SSDEEP
384:mQijFU/8bUXB8XoENBW/ijDbXC5lC+aAM78:mQqe/8bUXB84ENBT2WX4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3058ad8af206db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432513504" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000e9bfb8babcb5df61ce9811a7bda0dc1f47bb4c09f6d89702fe8fdbd0f87b8812000000000e8000000002000020000000b4be77a31240baa10b3bfde4fd335a91bf061ae466640460cf1e2a492e7be7bc20000000b2f49c6709b569e231e666475a9b8046e2aca8e523dcf8e98d8828686fa8d1b9400000000f13cf5434b517781807917b4f63d40e137049362202f9951a5b311a7e57659df916f98ad5b5a3f17a3fd362ced910847e9bf50027a2fef19bdac74379f6d92f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3E05721-72E5-11EF-AF94-46A49AEEEEC8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2064 iexplore.exe 2064 iexplore.exe 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2592 2064 iexplore.exe 31 PID 2064 wrote to memory of 2592 2064 iexplore.exe 31 PID 2064 wrote to memory of 2592 2064 iexplore.exe 31 PID 2064 wrote to memory of 2592 2064 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e121d651716e14d392cae5e6fb8e7f79_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5327620d0246c2f8623dac4045c39689c
SHA1621ffe0eaae73de174c975f993596b819272d9cf
SHA256d96970eaa50e2330639ff9f8a76e9ee133b647d9f934f3a601f8e10356a232fa
SHA51291becefc04acba4fbb399bd6721720c30b9f5e46e53ebe1013c07c3476cc18b5934b8a9e33763273f23f343b19830d196bcaba0b12d75f4178459afbf2c0dc70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7952ffea3c758d1f572135e1a1e05ca
SHA1bd257b581cbb91a083183c3b083891998b7fff8a
SHA2566d0f483097c3340e08ad64c81dcd5ac7c2ada7318cd49ddba0e78e53cecae039
SHA512bdf44847f0f4797ff9b764be33e03ec46f2cfbf3cecba8be270135d71bc7455a52a1433f10745afc5bdaf1c763afa4e497a8c5670cf0c9593c6b5e63bfc28f3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d225457e289d0450af0837bf654c1f71
SHA189467e2ae286201d7ab715c06076d27480ad356c
SHA256e9bf5aa4aaa7c01e18735fb1a73b64c17202a58896b7fc79204d6481bf866c73
SHA512d8b492de9fb7436fce985bdb3353011fd2cbdc95db12338aadc3347517c34c0c9aa1ca4d8290e0af0bd96dd8079526365ac54573e58ad5249232e508474e93af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab6fd182f48aa59a0d0ad53693488906
SHA1092c3d424efbbd7cf74edf557fd54918020c289b
SHA25631889518643a6ff3ab9525ce16c8046dd0592daf5304d7ef1839d663e3f93e53
SHA5121ea74092fff47056faa7dc596f044b003c476c72e0e5c00934c5166d395abfd616821b274c32919e9aec64ae07f5c4aa13f7a478a423198172989bb613c87e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5add3ed1cc15cf1f446849d9a49562819
SHA1669cd5142aa12e2deefc5dc3310a5224011666bf
SHA2568578a48484c6cfa817b96c6b789c90834d062fbbff5e22ee60aafbf65eef7504
SHA5128c6f195b9e265d51524bae58c942632b667c0191e4135cb5980aed0ce7b55bb490689605f61b6692137b792a999a58b8c918175c02cfa5d985affc4d8f8b342f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5053488dec3f5c024a1216d9dc363155a
SHA1428c0481f22a3b667bb60b582203ff717e52e0f7
SHA256b7dfec5d750ac615578a35b83041300b257e349015315ad1014c9069d087a709
SHA5125ba2072845b5a404d6676e1ba2c6a894e99c32bc88ce1b1cd82b125e45c3a8e3636a624ac01721ab06d44803fe97412230dd0e94eb14a6a0f47758c62e23153d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503cd824e39b3ac1a40b091409de25c3d
SHA1741309531dc2427bbf48cd1d51a237f7f4b48eed
SHA2563559b2011a5751cd10f99203e122bf09d5b2d35c9e81d9d00aa620fd9487ed1d
SHA51283a2a76855e24836c33b8b1e3328c88edd01d6791636b34a814f8e8ecc93e9d8f31f9f1537abe65f91d50f35483bc144186ab0933e9445de90afa56952c80932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551e8a704aa30b5e18012619b32d7c040
SHA1cc3a8c385eb60c236e4ec65f7cf380cf39572520
SHA256144f93ea94e4e38814a0e1860cce39a15c2b32d7aa6b17b77212511bcad9f983
SHA5124e5889a52aeb29e41bcf31254800396c46962d67640b38caaab82698ed0fe821388c2ee2203574039498206b211d6f9e118ae731e7ff75223971f465f36fc7b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540d3f633d49b3d9a92df30bb081b0c52
SHA18936e3f373da3df98b1447e41343dd77c1af2873
SHA2563f2cd58cac55a17904471aefb7d52c6be27e80930e4dd9d891bc36e837c704a7
SHA51202e608ead381625bd3d3898231966e648d25359b3ac282108987db03fbddd05b6bfe8958de2cf784dffc138d5236cabd197f69aa1f606484a019b8682d1b49a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0408b56c34105af9a9e1f61c2b536f1
SHA17414efe87cf1aad4b19ff20a3f75b92d8bda6035
SHA256216b986dc39b6d7b62eac7a4ef548711cd71103c84bbd72255cc2d24d93c30ee
SHA512d6b08a6c081013342269335f3808a34173a036f1162775738a64b878061d9694396baad667897819c4afed04fa7fba08edcad1a842b88326a4e54466cfc4150e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6aba45ed1d2b7785d44fb25946b79d9
SHA14c08fdc94daf3ef8a417e3b1a704efc442d70fff
SHA2561003f0c419c0c8eb07afe69ac53ba13e69e462fbc518a9ec1f86a2bb01d8dd60
SHA51256b3f1aeab2dafcecad48738c3d33950458eea7e45ba28efb04e9539a8035701a2ed21ef2206ec4f4c94d27a67b7b0cee7914d98836f08eb1fd2ea11a63edb64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591b047a3d01070fd7bd311710c2c4681
SHA1d44735d02dd835b0e9a04835239fac3e1db8a288
SHA256e8e572c25324318fb8fd1c86af1c1348ea9b66de277ba879ae2df6c528148028
SHA5127867fdbe3b806158a6c3e3d982bd154d19902825759f6b05f236abe363e07b051682c1df07f233d94426be5889b05ae7e35de3ceb2342c42bc72e39159be9863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df8fb14e692b25c23b46e2fcecd8b602
SHA1a1811a4b7e324335985f8e64a6a02badc5068ece
SHA25615c12e824b9eac58242f56991a6f736740e31f7ab346d4747db5a8376709509b
SHA512a43ccfa49520e23a7f266b97df5efa39c7a4253ed5a96cc026369222efa17418b8f7494eb89bfc6a6ceaf8a551b505cf87b368772ea028d1d70000ca547d5ac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eee85c2bed83cb9b17fa7d77c572d53a
SHA159cc5efa3f94953aa99b12ead3f9be0dad25b3f5
SHA2562b8fc8048dea7b398e10f9292db523d3863eb28b51b7547abc598756f7af1214
SHA512fa5dbb8783d8ff37ee96942fca48cade50f7ee78baab27d4c093d7f15bd64375b5fdd162008effffd99fc35005968c564d003980d6d42a86af88841fd4cd5ed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554624775693191423c124bcc37b098c0
SHA15696f2653b80926c88c9f66ce3bc7ee3005a7ff4
SHA25655aedffcc1eaa20c1ba3f76771af7feb35d1d25f5b46c35ff8ecbd26e5640a51
SHA512c6a50e383374f08ca6a7d635a3cd1498532ab30c927cf980ae1dfad14d91eb39b0867c4524600923c0f045cfc2ff9d24506ab5c36c36961c956228e4da31ef15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592cb2d5bb8877fde7d7b3728c5776631
SHA154715b61cc084a32e2aca9e602020d2431cfe38b
SHA2560724e85f5e0d0c3887622f40987d8143de43a3965561ceaf24aab28da5b67896
SHA51209c0bd02d1f63d01b878950c462eb254f52640e0fb3f1706b9cffffd2e5312a26335b56f25dd9e2441b3bbb2aad93bec458d95ec4f24112c8083f09cbdc6180e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb42cf37ce4e5946ec20a30caac42518
SHA1b3ebe7e4773efeced07404c338f0a2dcae70f1c9
SHA2560212d86825f5bf46bd00ebcde771c4c28236bf8ddc3bc3e7a32252d6ce43bc63
SHA512585d90c9a87446d75b6d35547f0e6b933cab48480d921f7dbe4ddd45045b5fe001ba0bb526d849076f170c19666c6456051242833b93fa18cc00117c93ad1855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bacacef55954a435943fe7bd6be0a3a
SHA167abdbd9eb99aa4edde93bcef604aa5a0c265084
SHA256ed2ded6b7e08cbcc87accc7a9c1a184bb27321286ff0ba3a5744d0bfdaab57c9
SHA51272c6b2c25c70da9bba1988e3bc6b2bec2492a5395215a57c5da266e683f0b7eb81ec4795114757677fdbe0a40191247b3d0b0b4c25502a52eb170331bc20a31f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b