Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 10:29
Static task
static1
Behavioral task
behavioral1
Sample
e0018191a04c7f8b187dd093e5b00c90_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0018191a04c7f8b187dd093e5b00c90_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e0018191a04c7f8b187dd093e5b00c90_JaffaCakes118.html
-
Size
7KB
-
MD5
e0018191a04c7f8b187dd093e5b00c90
-
SHA1
1576dfbe664b812881bfc6ac0e0c288a076973fd
-
SHA256
6c5320e6bf0235319e1c3b10f6115be4760d940e422ff6a22e3d4cd2234bdb15
-
SHA512
a92c9429cb7ab297eedd0abe745d16ff1ae88db252c0c472f5fb221b071052ba554d10195750e99ab59aabbc842dbcc3bfe62e58366fa84ae7d1cf2338684f4e
-
SSDEEP
192:SITpKjeO5zlyQSSXSGkMmKUldcztVWLh6:SINKje0zVkHKUdetVWo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{422CC2F1-7284-11EF-972C-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000ccc1514da673b7eb66d374969e9ec8f7d6b20c4c76375b32bc7ef4f5dff6f5af000000000e8000000002000020000000332fd421d842144fea120b96181b4fbcdd7469add8e7860149caf0428b61faee20000000b8a33f1acf3497855618815ce6c47cb1437858d1ef2226ec56079bdef03033a840000000983c826279a1f60feeb66aa8d9c5ea2550b40ec33b958fa8c3112ae05b13d5b40d49c0c4f07130a247b0487ca1a88f12165a95de7c508a856dc0e9b8d0b63737 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 306e83199106db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432471651" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2796 3028 iexplore.exe 30 PID 3028 wrote to memory of 2796 3028 iexplore.exe 30 PID 3028 wrote to memory of 2796 3028 iexplore.exe 30 PID 3028 wrote to memory of 2796 3028 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e0018191a04c7f8b187dd093e5b00c90_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcf80bce6c4c3c406dc9369806577a91
SHA121b547a48b9cfa71366e481b9c63f0d2f3cfa8e2
SHA2568472949e41ca9922272177af0b0740dc2fde882aebfb7121c05ccf8da4fc5bed
SHA5120b20e0c8f861e562e935164ba63d75dbf79d70ab0171ed62e00c87c37d2d66780bc4d3a04818ce97799042f0cf09833a1a269917c1f72d35902977938a379ce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b54819d8c6fcd1a04bf1971877531a7
SHA165e38d902ff2ae922c24e6dd78c4a408c76171b1
SHA2566b0ec2d055648fad146ff1e20803469271a70bdb5b88fbdc56568d112818eec1
SHA512d87115fe3757a9005de81f0678b3c8ce9530ff30b73bd0dcf3b9e9826d400f9e9983bb4c716f4f634a9cba48c99d55cdb656737f3e15312553a15d70d5af6cb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f383333022bfd00c597bfccc4d639e9
SHA1e757ebec816c478b15462fcff79d2140b40f28fb
SHA25600182ffa1986012a91babddf8703fab9d8ac35a4ed101c29ac02f05f6600484d
SHA51234368d7af988283819b26de76d259c26f3505f9716f365ac0ca561360f1d277884e77723e79deb4c6ef70f88629bc095dae77a29a412bd62fc5d98b81f3eead5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cb2a1e5f424c6482335da8af44d5a52
SHA1021b35c97848f6abebf507c3d4c2aa7d024124c6
SHA2560b7aa881ee275cdff188e1d8c770cdb7c09539391e7d12130f4af2c8a8e1298d
SHA5123898bebfa166c248d11d761b14fe5d313401a38d99625335e502d50ae2fa536e586bc46173dad0716c4a428eddda79d6c28ea6e9f0c534f9220334b1537a8868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e96d5aee591e6efaffe7147fb7f241c
SHA161a26581428ea82c1a9ea9fb31c49af2e2130db0
SHA256c0d7297ae8bd525176c82ac081e8e55174aa9e429f3101c3f625591201b55b3b
SHA51282586850c4f8e87954166cc64a43c674891305abe66d6b3d03d56b9b7853310f3afe94b16fe207d518c928b14493cfd59b226d5aa87b4582c0b379e43a504c5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d7ec975b4a6f7e0b5f6bfd38e735808
SHA1672570a6f8b25db7f96a079b29acf80089cb07d0
SHA256de5e088ae5c433eca6cbf02dd3f93abf615e7defe3fe212baa85297321a50bbd
SHA512da49ca35aa0f9971b9f46556eb0ceddb2c3d52e0f319bca470fff99e56a98a19505ba45ec9c404c441ca581c899dbe64025bb575b7d87da38ee5dfb946d3a45b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58664d2346215b18b950709eeb94b1c1c
SHA1debaf61edfefcd9ffbfb0b2f9f07495300612f68
SHA256b80b69eed8ff709b1d65d7ca782cacc467f676f0978bfee9e836812f35fda93e
SHA512bd10eee5440127f09263a9bb2fd9145a82183e0b68af7fba2060fa546df2cc13f4bdd96a276c2aba08541725fc74728b6a7e4afac1a08c14369e6c7b3c2d4ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c03694b20d65070043f66d63f812137
SHA1be8dfb7d5957318cd61f4e82e273026ef1fefb95
SHA256e575e8bfb5616938a06e0f26e52e2c6b846c62085e73f2add6d7ec080009c764
SHA51234f034495fc012e923f17d653fe5050dedba3841a0067afa0f3a015e0fa9221cc83cbe37a37f8b757c8c4dab1a916679975a307bb5af3cf89c3c0d174890fe45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d383897fc59b754293189bc34ef59a6
SHA1c7bece7b14f5c8d2d327c2a3f5f03118a35dc515
SHA2562ddcb84de27deb0bf7395d8f6c58a525dd8f18886afd98231e9a3e2f25d97365
SHA51241cbb474888121089e1949eb3bb395d709efcd2b79a40ed293ac8883d56bc9766e7346b077a862a318b730e5b29faec5db65d1b16591ef5e3cc78cea933660a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d715717243cdbadc48a10b6f0174f0ca
SHA181482eea2aede3b30d7c9a3cece61e173ccc6eca
SHA256a3d8123fcf84e88c7573d48310aee6e21d03d76e06f634054ad75e5e47f0f3c3
SHA5122a59afa59d45750cfb94c58abfe42a9b29cd21f97534f63c7419d0db14c4f5bac1c6da9e52d303a57db6516d303ea53600196a72471d5a2a241c21f1a7d94744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f9b893ce55a27d61cca0e6d11b42cbd
SHA1742fd6a891c064a48a9d710bf3ba1cd1305e36d6
SHA25685f37a7c6a30a3df3aca41126986ca11812959bc7ee2e418e80811ab38f9f884
SHA512064aecbe70732d1c96d70980bb0450a2a9cf7611a6de66ce3fe4a119d52270dd4c67edb2b3839bc637993e99eb564647c68701de6d09f35041ced94a802f2ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff261191db2d5f3bc0d04c6d7b0e3106
SHA1aebaf3767783d5f49835dab1a7df6de5049f3d4e
SHA2561648802ff5e21c815e51078f789a4620c84d9c7d3c7e3f68b4b6d007f1950643
SHA5126608ddfedb8fa988a7f929e048f3f6b3a9aa4e507ea6453192fd08c4fe35905d9aff06f6dce709c9193b8d9b119fb267b1fcbe4ea7ce6f3880ebdb95becd1c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547f618ed1d4ff51cb7f52b5ca3bbcd26
SHA1255d6c1fc64c46ebfaaacaab0bb7f2e27b46e43c
SHA256f9459ec217d2444c3a609382ed61f5c1cd3d093c0f8bec465f667a952627f7bf
SHA512dcfdd49c95d966833ecab3c09d9dfa2448b6a4c23fb13e275a01c07a2e83885e401f458d10a588cf6cdf8e491c8792f91a696c512b11a7fb92cfbfa9f9232612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547b29f6f2cfeab31135d3176e969b7c6
SHA1d100d39f375e3b1467bf6410869275a318519721
SHA25649f2865c2e115fb675c45d04248d4778c6e0847d924595cad446a11a4aba4d52
SHA512e92d80d1f4a748cfc30775fcfaa337f4708f6b6e276f4ed25153b63c224e1fae619e931bcabfe8694f8445639d589cc839244afb5dabf395de3a63fbd991d4ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535b886416ab8888b2d7a46b59eecfde7
SHA190d78edfd1ce2aa66682b33173c222f5b8ff414b
SHA2568eacccd2183b8dd39c65fb87191af5e4657d1c28d23c4cb33ce56437b10da862
SHA51226f9bf8df5196e599410db23c9393acdb73eb324ea7cba7b9b216d6ec0fae1ed780f0991958ff5bbf0f6e866b0950c593fb41bf25eabade17cffd2a82bc260bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582aafbcdab883282b2ad252959f199b6
SHA1904bc0b478b608565e1d21887847286115fd642b
SHA256f9969f8058d42864e0589ed496ca27a1b9c3cc61a6d678fb642e7f56c6aeaf7c
SHA512c5ac39f794ab72705aafabfa313db7271583de829abbd1a431f66454412a2e067b27fbee166337e69882bfdff2604888f5d272cc19016cc9d12cfaca7ced9f24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1d44b7a1dfef1afe913826f4bc85414
SHA1e2ccc61fd8878a5b4e5e13a29fa975803da6d074
SHA256b56c7c128d5a116ba3cb2f3a08a2b57f55bea80d6616deaa52d92951e296a0d0
SHA512e8b72eea2d1bc1aca97917635cf32e724fe71ab03f885e637dab3f6377e01c36f329a7c1cc54a7acc65b7aebf7f785d75cc6197a6330a1f387af82dcebab2d32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598040262826fb42e80a1a2118528f04f
SHA17ab66d35d8d687d3792e9f27fff99618c45c60a1
SHA25643d003d13ca6ea5d827a770896d6eb271021188ee12a0506317c8148c25bf765
SHA512951e03b35fac65b580550763a10b40cd50ab672646902ba0728438c7616f880d21cf86b88dd7e2df5e223f329ab74eb98ceacd77493af4d6d9babba9c0ad98fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57214be00a1ac08a9173bbbf915f8a0a3
SHA11b022ad5f52d9f25e5ecab4540357e2facdba135
SHA256ac006ab037d3b5e890ae14c77e741a3c35143bccc56dfc14c5e0a48c1c697680
SHA5126959df0eb2dc3b2d3d5ff145947ec504c82604fac64baf08f42ac67d0afdb280bf5ef0eeabf43e6bf0e233d89a07a2939615e4eb7b5b708988e59e8b4be2638a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b