Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 11:16
Static task
static1
Behavioral task
behavioral1
Sample
e012790ea6bcc6ba6fa7f5853ee3a2f3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e012790ea6bcc6ba6fa7f5853ee3a2f3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e012790ea6bcc6ba6fa7f5853ee3a2f3_JaffaCakes118.html
-
Size
9KB
-
MD5
e012790ea6bcc6ba6fa7f5853ee3a2f3
-
SHA1
56f42c7bc4b6ee9b4f90641bb64faf01c261255d
-
SHA256
c379c002cc3032c6e6d29ea50dcf8217d37b7eb94c7fc12c73abc68320c2de13
-
SHA512
d659cf416a23f10082dfbc3855ce6901a990d5a881f296e9fe0e7e5efc9ecc3ee9abeef7cf41709f9c1874e44d1c88edbf920bf3bc6a083734ee2156f66e3c5d
-
SSDEEP
192:MrZLbg9BMfgY1b65Pwb2JOIwHyGW8oiPNdsxs30:6bcwbuOIwSG7oiPNdsl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90ce20b09706db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432474483" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000009f3400001af26270e7ae62a4080a6ab333430b3cbafe3ccc3e763c8cf0dcc6d6000000000e80000000020000200000004461690aa204841c622eb6af27019ec1277b74c50a57fef681b82164203b0b0a200000003e3585b67fb8535c70753775ca3d5d25b0b18739757daefc0c26aaeddbc525444000000060bac0bcb2adce7e05660137773a477aade25a6a09a79c08d79a84ced3fa69962ed178e8580248be9c3e69a4e3261a5950d6e5fbb11c13f0b78e94f291722155 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D989D1A1-728A-11EF-86C1-D60C98DC526F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2508 3000 iexplore.exe 30 PID 3000 wrote to memory of 2508 3000 iexplore.exe 30 PID 3000 wrote to memory of 2508 3000 iexplore.exe 30 PID 3000 wrote to memory of 2508 3000 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e012790ea6bcc6ba6fa7f5853ee3a2f3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a956505c0e2c27e61375c5e7206c0de
SHA10d504c04fe0368848a274318c59883c899c34a13
SHA256be63cb334935ef8a2e76c974fb13ed1ac974d1698fe4a3d1b30144d3059e65ea
SHA512b5ce4bb26dcf2301b010a165d6a002e1b342ffb2d71834224b5f11d7962ebf1a80f235f4a355cfe5820388319bbe2db8ad20c548de5b6f1e166f3b0c9e558603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558d5d8e0e6157c64a899008c07b6e295
SHA1a1828277acaba9ab5ff05029556b17c3692d43db
SHA256fff7f4e12e9d14dfdeca8cbb06bfb26c7f5df87e05e728d33de17b96c0672303
SHA512ea8060574d590ac2b36242b5e83f1c2b0b90df0c849415e878425e35fbb7370666dc5034482be9ae5dd89ac413262003524660af92af7e364617fe9852a08851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fd79b9f720cf8310cedaf27005f5322
SHA1fa8971c9a48ba1444712fb39bc5a7c26b8dba305
SHA25683dc6890f6b0083075117ac450e4e04c4d8eefed9265ded509946871a6f41565
SHA5125e7cec67408a693eaf2768463ad8bd027524514b7b8bf30326487b590522c8713bf02271449edb0e6350d06cc15a66a755c70e3e6ef9e3c4cfd39c2a377bac06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548122219656a95d26b5fc5eb3f2fdf81
SHA144594de5dcb79577c25839cd3f09629ce97b7649
SHA2560661f96517c06c37dd3b6434a6ae36ec763dc7832265e5f290ed265498dafee1
SHA51222c717440337270e340ba62d04688afa3ba25d1614243bb5ec157c1d4386814f29fb0ad9b2ca1129de8d3e2e6f9a26dcef23bb1d63fcb58366578362b43ed335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df67abb14145c563e9086e96f26a4411
SHA1cedb6cebedb734545eaadedee12da024e9086485
SHA2561f208af12e35ccee0c36e761efadfd6159c4559883412175fb4c7b070c09ee44
SHA512d4ef7434fbe38e08c3e711a76f922ef9ddbf6a674b8111a19ec8a3560d5f68c9decfc330d2fb459adcfd40b5de24532ab8483adb798f7fe804db1389cb125e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55669eae81f69ef44b87edad6c250ecdf
SHA1a681bbe1de6fdcbb0203c8556de00523d6afab7f
SHA256900324b0e1afd933f9ebf7f183766ad8aa60d39c04e4f889d8f760f2c1f02ba8
SHA5125413240017a216a31b6a89c5ca49f4cf8ddaae771ad46a20144b9f669b6cfeb0d48c7a61191ca1cdd89d1ea7c8da17efe82c0607448ecd158efdc70d0b517dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee42a824d4870951e3b19fb2349718b2
SHA14f0c4165d04108c6d41e7e31f71d618499b08114
SHA25661ec2041357d2d4c0a397ff71a369062b17078a74fc82fd583c33a8cded1de2d
SHA5128ef33b9acfbfabab1021e2d4823e151b2987a38fc73e1308e27668e1c3b4617104f95658c4d2761d77825ac7b6ea69e372614984e507b5752fd3ea4689306b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f25c35ee8117f6de27dd52690e445180
SHA1e8022a5fe4b8edd865cb9b75b6560d27a291214c
SHA256058de4bd60a88e291d5c3c255e982f95515cc30334459989d58b8f78e709a27e
SHA5120f4f661ad2956670ab1c2af10114bdf1075490c55b7af883dcdb47b0fef21f41827385fb0d7befdb71033ef5c3c31820863bb0e81f75e80f5ebbe32d8267a4cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518e666dd743ea68f2e44e0a779737714
SHA1f068c617d12fc46cf38dd41ae6395d896abfc0ea
SHA256f82d926c6f363bb218a4c2879549538adb604916863508524c6915abcd752693
SHA5122124e31962baba3f90a01a893173e162e5a2fdb8907480c4a46bae070fbba6e00a7cd43bc907e72174176d1701b54c9201431002e443bc3c8b2f7112c87666e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518c99e1205aaafd622a639c4b6149043
SHA1fe08c274286743c95dbd3a7aa68bade57b8ff394
SHA256d9ae50e3995456b66adb0e4b5099260dc28516c51743f0a23f127cb721824517
SHA512ce9f40b6aa6cab48b844120cb28aafef692401e941e867808f61dc97af9f35f997693d3b3984e5d0472c4c813c2bb2bf065f00734d301323fd064f0ca2f19cfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5148b98c34bca386c52ec9730ec3f3a4a
SHA1452ac6f1b29eb176b69193d7a1d5d097d35a1d14
SHA256a14147bd0939fd83c103043e82c1e7580c5bc664949931465189a4aed9c75443
SHA5120065b54ab68c59fe6c5e4d967b9998ab6758352e4124faf3eb4c930352e506748d8394733590a8d3abd0bbf8f0d5a580bbe71ce78964822eaeca9154ecb926a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c9956cc05be8ac5b054a8a6897a8006
SHA158cc394f445c97e90a821c2f995f3747b60181cc
SHA256f916a2d905827cd99a02b7f16bf399baf814552d3b73d4029ba1a8fd007c60b2
SHA51285cc1e5dbb19449ad70955af045341172144c2e6464ef5584c6f46bf6307315bbbd1272dbde590ae71b02ddf5d2d5a92d17fd3d4089e3c66a95bb9c292c20b94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c208229c219eb224724b0cf5239dd0de
SHA1ef8e3994731c42570551f4ef93d3d8a54d2d90d8
SHA256fbc4a0ce92ca2a5a8324250a4e194a23d4511a8797ba21f5210c915830504587
SHA512847a7666bec975539d0fb83463e0fa299337d8270a55d62beeb6fd215ecd8fb87e790280aa5fae1126f06836cdcc7f98a2aa1912552ebdafd18d226a0ed91796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b531ca91d64dff5767cf2f11e89abbc4
SHA1c6f06aba1ec346e9cf9fde1648d22c55f3550993
SHA2560b649279f4da5f80bcc29f56e7c1d35e2795d0e48289fc928dadc3828de67ea0
SHA5125c166048394490247f6165a38949a77c3803fd2a97357ee59d93f55256155412add543c8c32afac5b9fc77febb6ffd72a751fa8285fce1a30075817a0a5a4aeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7860a9576686d5cd1f343d5d448bb21
SHA1b41a42ede6d3a018e9a2e9e14fc7775fd9217d88
SHA2565c0cd2599e27361c49b2e128c3da09e1e17cbcb655701636123361cd9437e024
SHA5124ed955bae0340d3d55d62c1f51a04780e62031c6d7f2a7f33818c5d8950a407ebb2fe1770bc3a20aaab4566bd370762097d4a821d634908ae6ccd90be04c345d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1eb8c4740a105d72b771a1ed762d6a3
SHA1f498ccd8daecfb64ecc8993fc42a9b2e451bb4e8
SHA256445fe26d921f38cdc1216e61c9b3d3531916bab07965d51913e57cfd2c96ec86
SHA512c27e8c69d928e4b5c300e2f0059abecf264aadb96d9b0b8528a9a5356ec9543e2c34f014c2c4056e6994ed4b1e22aac2bed7edfd141809b66713e825d9146c4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba84428c6887ac0838c2bfe08136bf8c
SHA113ba4d6c66e2c3afd005bb07fda4cf5efb82d805
SHA2566d106568ac531dafc534feb28a017f1ba3fbf6733103cfafa00c769c416f0b1a
SHA512293c28ccd9c568f12ecc315fd59be8d51c9f2d08dc8c7a69030df4c0c4fa00edcc3c81e5ab921569ec74db9bb305bbf13b8078103a906d4c26e82c807c8fc23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5276294d2ca7bbc1aa3f91dc770c245d6
SHA15a57cd403d005ba14f51e37688ec7a6e5e00064e
SHA256e214e25bd90a7cf7de4ee4683f72e2a0615ee02067f9f86417bcb1a116d1a0ec
SHA51234140d639d59c26ec5339dd0458aa987d3ba1b6c93cc6ee8ac9f6f6c3d4e407c0c0648fe2c8f9d37ca1b4ad368216a9bf524b92cfef8ae501c94cc4db239d1af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520b7a8a79e349a8f9c2a5378307862af
SHA1cfd4be5ccce16f6cc19ddf64534901a4448c5f4f
SHA256f2a779a4eddb129be8a525cf3c802ad35d36f0bded33dafc0670dae3694a44ae
SHA512f3b198d54f0e823bbc6dc2ee1c53ac3481be9bc4ac74b40f5cad140424b3c5cda85c9a8d7a95b05172bba45a165a9cbd63245ccf5e4694f17b8ce3c719e7fe17
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b