Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 13:01
Static task
static1
Behavioral task
behavioral1
Sample
e03c8256660d2cdd0fb73decc56d1a21_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e03c8256660d2cdd0fb73decc56d1a21_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e03c8256660d2cdd0fb73decc56d1a21_JaffaCakes118.html
-
Size
1KB
-
MD5
e03c8256660d2cdd0fb73decc56d1a21
-
SHA1
f6647abc741ab09de299ae664b63328453f0d844
-
SHA256
707df97cee017fb75f448bb2315579062e66ead441a95a5297ea86c0f10d53af
-
SHA512
bc8212721518259bed48eb210c597b2fda1d9d53f7976e31f6987c2fe94e98ec2b7ec92f33be83511e549bf8fc2d70cd0880c9314bd78eaa1a831c046927d2ff
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432480730" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{650ABCE1-7299-11EF-946E-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0d6e839a606db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000005a80fabaf011970d2d9b4e4e029e7e1201fd55c1c503d6e918691e89c817b402000000000e80000000020000200000002fa3ceb4f5e3bee04f7873297b304e0fca3f5befe41cf64db25ac01493a7312b2000000097c7e3de2e2ffcd343f3ff24a7f7bca81055acb780465a5b80dbdc94161275c940000000d3be944c589216284ce8287696ac1af51362e7ccbceaa214696f7dc1e3ab5950521e700a18300de6486d44c8ecf6b09af91c8d3faea00adce187d06fb151f780 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 964 iexplore.exe 964 iexplore.exe 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 964 wrote to memory of 2584 964 iexplore.exe 30 PID 964 wrote to memory of 2584 964 iexplore.exe 30 PID 964 wrote to memory of 2584 964 iexplore.exe 30 PID 964 wrote to memory of 2584 964 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e03c8256660d2cdd0fb73decc56d1a21_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:964 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52942baf96264f49bd4ee85aa1f29eec9
SHA15870a3cb3550318dc5a34aa4dc5ebf84f8661023
SHA25676d9bf4023717d15abe6fc06991c24eb18fb5c08baa4ca26adf9dcc12122fc52
SHA51232298af35faea118a43ac7983df658b73b542742f1dcd102cbcbb9cea96f4f0e51461a8f73e1c50f4c31143c50af585e60339dcf6c5c90fa786334a991d0a409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a04fc7caf40d9d3b2c07065edb58304
SHA12aeda89520aaa00f03c3d9b92f676d7d8dfed81e
SHA2564d1d9f60fa46e349c2034079e37ac67974d068c961cfde9eb57df7ac3b01c466
SHA512c59499896053b7e3279b605431283358332ca39d8d27203a4cd04463f1f50f726b7eb5e525b28f272060729fa2e3cc2af20d40428989a53d8719dc122a40a369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5138b8cfed0213fdd05542df395ba8c55
SHA14ecc966d1f88e7debec6761275853c1dcebab9fa
SHA25667aceb97d1e0e8b0d7429ed4d136b7fe6a27ef1617264c4222c77736d9d788fe
SHA51223f9cb19540ba993a24971dd8e068988ff63f188af07f089a55d2c779f63637ff27d44b859a7f92092f438e0c340f373afc463f49031460d5d818d27c5ab929e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdaadac657c20f7eafb535a95cdff2c5
SHA12921346b81da3c151ac77325551093950f02f289
SHA256ebf3885d2bf3baf8fd73a9b1444653b626c0ede153947b6e8baf3df27f3af875
SHA5122aa5e3a964b34cf6f650a21759fb4ca0e0c1cae8ffbb8879cd9881484a448fd2646cf6e56b3e6f5c1cf71ac33508c999157ce0603c3e540c42a4dea279280d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e24d0de2f97a4f39f427394a0694f712
SHA19f003ccc1fe01aa6dc79a7b2eba606078b7be07d
SHA256907532d79045c53c91e7067bc53488b3bbb29685d81d487eea2179f296821083
SHA51288314398e7fa4c7ff57d32f3c536eb5d8d52ff6bc7fe5ba86c373d9b4a4226995f01536f694e5d8d86db1d85cb01a6ed781f90621d644cd1453cea9c8754c294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5052cd4a884866d6f11bd4f2f5af612a2
SHA16729727c6044b0fd85fc88db32b54fa61e896502
SHA2561db87b3733b639239c2ad39d51ee8bd110952f4d68be48fdcf1d0a981ee9791e
SHA5125ca128e78732c65fa1aa99c7d705605ee7953519f6adade215a26276a1b1f15f3bb1dd77732585cad807d93d76830d91c3a9d58ed6ae4db48fa9655801f8e8a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e5079c496b3bf1b922347046e786c7d
SHA1ae622343e33c5873ff0c5126f87183949bd78c1c
SHA2564423e2a31db1a023815a89044c5178de8700d6338d9e246d1a8d8549bddaefee
SHA512cd679a0ed8d1baa32b95ede1f279542c2aef283187b8dcef0fb93408d3141ff13649589a892e93b667bd3303a4d9f001d14c96f2a143b6dcef06aaeeb07c4bd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e567633416a9f22e315fdfb74d3cce93
SHA1c4c16b2a237d5a5c0b3e38d33a24bebcf9fccfbd
SHA2562370ab887560e451751aca23fd4ad35b5b434bf798282cb619c4b55eb531b7fe
SHA5120dbf906d9e2faea0af612d2f6ecfc4aaeac32d76f4b295eab74bf7d9bc8cf302196bcc14863ba1dcaccc1c9ee81ea9b789f0ead00d97b40690f2ba36c80f4622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd5bb6c76002316e177f0525b6203c01
SHA1386cbe19efd6efa084c345c3be70fe073537027c
SHA2562ec215774649a91b8274a69e8ab06545e5e450314b1efc3a6bdc1cbbdac5c828
SHA512c839a0a6ff2edcf6d087b37b757540190cda75e375bc0c04b574c0466f965c3ee279fee3dc0bc9aac9845e1da0f9c70a42705661caca4cfcd9497f3bd18acf51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b64ff34fe0626c7dd2c2a5532e9c98fa
SHA189b26a40c91b8fff664b1747d32a8833f0628eb8
SHA25648e109026088d4ffb09f59e5e568b713ae7d783d43c47d540d75878fe1472faf
SHA5120238f64a65c69c1d3ae87033fdc21b4a82637da48c5a5526b90cb7067c006b2982eb6c85f4f0277442191d1f8b9f7a7b834aba89ad334050a4a34b79e635932a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550b3354cf1e07a68f465f38e96f9056b
SHA1bc2d9feed0d4949ec6d5eae1e7882ba65250a38f
SHA256933e0d95d6318721ef3d7782f57da083a9e55b3d999640e4adae69efb3a440db
SHA512cdb83cb76496b41f6b467386b5462f92b639742d72bb926172fe7d4dd92cccec6e19545dcc6399fd944b12ad15f00402e231419e93c68b5ae2fc7d9125f86086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54257606257e36da1c385d600336383f4
SHA1c04220068df0012970ca0db07bf4bd7e2e420bd1
SHA2561be65f90dec6bd43b747b4714a1cf6c1962e31e6036e0fe56ea24e6321a11ea0
SHA512b442780a3edf93ab7c9462df93a25d954acdf0f2e8d61fcc44c8c56c02354e9293ab3ce157675a06882e3031bd44a22d83ee7ba3902b1ad325e8b02c23551d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b51f5bb42e19c5f72b3367c556c310b
SHA1086c6f3dee0496b615de95a9c0a19fb5af6a0f39
SHA256c72645e35f4e2381493fdb3e94f911ba414c1e63cc6493300a768111e57888f7
SHA512f7a9161af1c8068b47c9e50bdaa323c543fc0ca4488f8259ae4e5854cf3e41077dd6a848caac4efa048c13a8fb3351e1f60cd226c4566af18a47bfd9581ea62b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d31ec88712cf57c890e947c59a216fc
SHA178a07950992eca0bf019a75d2a8a20e9bf5c9f86
SHA256cd0c9bfe1abd9d9f5250bf0e8f668b31dd2a6d85a14aea59b8216d26272c9b1f
SHA512c558a714839e0b622029b63e06b095da33d8f4ccbdc3e635562b47c05c53abeb0b3a682358e37b64aab8dc72fd29668424135df18d4624e1a5a5684cdf347758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541c2da66c2f5b25fadd9b6eec4f237d7
SHA11689638a08e46f3aa921957dca760424c65e5393
SHA25615c4600a041db6a65c4ecefd4eb4c6aa14b7f9a1f5baf8eab31f6d761c246c46
SHA5121480823cd261425cb02084596cf421427c4d3b48e1e0c1b5088f735c9585dd19d2fc95d6c078b13559120ba5bc174aad0d745790e3325135af005f33382f108d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c042f8e8b640d4ce6c4323f0ae94a7c
SHA102f2ea3cddc1ce523cc99b54c5c265b85d3fd5ba
SHA2561653443bb5ce42a2fe36913c3b6bb5fb6a70eaaae4c48412117a82dd683c6141
SHA512c957422780bce0053d17a0a49888c80d4382d70be2d4cf2b8054f074d4db55d70a520f9003199c19b873298abbd015bf9dc8a42cfbb7fd6e8781dac12afac5a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52af1a2d20575c977dd9c85d7f12e87d6
SHA1b0948d9547ad6bf0a54f06919b11367b78354623
SHA256b2bd6c0e1415a761d57991f8bab333944474b1ff03b3eb1bfd59a537caebe31c
SHA51227f79543bac28b8a6df4d3332b55432482abd14fc55ab179abb2cd6a0c0e5404059331852924a4070863b459310fc2d03fb2ea98d8c282100dcee44b26804455
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b