Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
e06968568eb4170e985f319fbd1ff0f3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e06968568eb4170e985f319fbd1ff0f3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e06968568eb4170e985f319fbd1ff0f3_JaffaCakes118.html
-
Size
6KB
-
MD5
e06968568eb4170e985f319fbd1ff0f3
-
SHA1
3880be80ea039202c3c85bb721f42be04ac97b72
-
SHA256
c375f609d4e8b5971533c83299036a2825e24634c7315ea20f98c9c35218daf5
-
SHA512
bdf0030823b29d339d811927c162f813c55a7463c85c229fed7fb95fbab1ac82162355454220a68dbc85bb178867e1fb3e13eeb93dfc349fc928575b0336c93b
-
SSDEEP
96:u37afC0cbgR3qRaCbVlJ6ZRUhpQ0LOfAonoyiOZf4oTC:gaK0cs3qRpbVvaRUhpQnXNZO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7C08C361-72A8-11EF-BCE0-DECC44E0FF92} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0ce7b50b506db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000f3e1e71727874fc4dc00aed2a85422727376dce16fcb52541e2b82a99b0fd874000000000e8000000002000020000000b43a01eac0051621a06a8375c030760991b1d7575e3857c7bc680e199e2484382000000022e3121a66eee33c8622aa88f4abaa8e06f80ad637d9f0fb64020aba798b162640000000ae4050d96aa2fc7d18b50f1e0d2d2257814fb7c0e8a0cdc9be45b984947337c50522defda68c977fe8fa07eecd5106951f7c102545fa3b834da28bd7511c4658 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432487211" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2056 iexplore.exe 2056 iexplore.exe 980 IEXPLORE.EXE 980 IEXPLORE.EXE 980 IEXPLORE.EXE 980 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 980 2056 iexplore.exe 30 PID 2056 wrote to memory of 980 2056 iexplore.exe 30 PID 2056 wrote to memory of 980 2056 iexplore.exe 30 PID 2056 wrote to memory of 980 2056 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e06968568eb4170e985f319fbd1ff0f3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d5ac56b912677d629cf6560ed3aa2f3
SHA1b23cbbcc55a12748a8ed0ad47760592929b4acec
SHA2564a33a86423dd066630931a8bd1f92067d915beef0ebff031c511b450087e52fa
SHA512bf26fb2ae9d2d84d53204f1f6c9ca848f987cb0a0d56e0a5c04c93c94b81c7e653aa04cda013e39566578e4fbaf11bbd5d202c593ab7f3c6d9bc9a4e7a5cff12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5019ed090e5105395dde35538c49b53f3
SHA17e1257b8e07252826a30d001302dfab616e88d90
SHA256341cfb6fb9b8edd4e1ee2288a2e2bb041445340dcb1cd7c017a7e2b37fd5177f
SHA5123db50f16a47bb1f26bb9e6683246d35b933411bf5896e88f8b1e9541e97a786f8edee1a309863599549c14aac6bf23275ea93d32fdc7d83d7b6c136289bb11d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d61de09d206a1feae8dcbfe384b7ba07
SHA18bfd721594a278cfb0b14249be05599c888fcec1
SHA256948c46e1b526b6a8ddd9ed70acca29e4bd54d47e7ece1b435f2e20376fbec461
SHA51255d9916df81c7a9d3deb21a07ff0860a501dbb1e60c430245aa2ffc99e59d7bff697ed58a35c4b3a364847e347ca3a0504e1dd1987c232db7d0393686ab5f22e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558067d985e71671cf2bd970dd0ed1a3c
SHA174fc787e62d98dee649a79b7812a91329bbaecca
SHA256f12db3532fac866605086ada0eff3fa6e7dbf19e4060f9f3a32d0524f3acc4a3
SHA512dcb0d99cd0f17759cffa31ec05389dbc857dbe138a3123ea9e94a4362fc45d9d47d1725873d055f9630b5037b45fe01c0a976de0ad2be47e597359cef955960f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531b86ead78042ac4bbfe15ddf2a2a47b
SHA1c967c44cb873165cc8aa839577898e35ead79b52
SHA25664145ab21c446b30023292d3ec66d02592631e3147d71f5362febb8bfdc8fc85
SHA51237bee11fbc0bf0f3eac5f2b548fc760251ee6e1ae8e40e2376048cd713007a92b61ea4dd9f3324ee38963ea1b475779e9fc187b8f20a2c7bbbd3c03d404a5af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5468f7d63905e4a88c26f914fb48ba989
SHA11c9a095bebd6425c272a9e7b20d3872b4ab5baa8
SHA25601e5c1f16149023eb9df42a591729caed90836105ab2623ac40077ba8fa42aa9
SHA51269111c8a5abf983a9ff1ce25a80ac0adeea84aba559c20888410f686664b72c230e4b5118a260dfd178e7045fa555448429492d6b146d689b310ee5b7f62057e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5accf7b6dc56dc7c6645ead47c3c6c8cd
SHA148beba846927d1cb479c6e379493c3727b5410d6
SHA2564f3a974be56cd38bfee767265a7443ad8cdd4cdb01837e2e0e8d24c40f108c7b
SHA51273332216908488f4517bf65a5aba095578e760114c018173b7b50af9fa118e16f492b2b36c695a66ab44c09d39766fc6e604dd1941fdb1e2a66e8ea30c05426c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aac44b56342ba46b1fe57eacd4d17a6f
SHA184dedf696af05737645c0065ff14fdc580000f08
SHA256844cd1dd2bdd2063f91e09eec80fb992f1f88ef587a5a15a51cdd9a42c53053f
SHA512af44bd7d207d0f3505e18c2dc7ba17ebc61089f6c25a50bc81d6ece48035afa1e443513684c9ab1590d95cab99496a8e3264027a229c7fad2edb163a1544bf6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54add356bb036256c398493ed36a9503f
SHA19cc11ea9a16b835ea30d4c5e882322a5249e37ba
SHA256a1f763a2e357a2f2523f7a604de7d042ef63004e6eb3b810a5a2d88a8c67cd27
SHA512f42ab67b7c8b477edebf86212e863291928777296973feeb7c7da28371ff59ea526be3c6170166b42c5d09de3d306a2e3ee3ccbc689a922e1007117aa482ca94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598d3de513ca34539a5319e02a55d303a
SHA10fdeb1190e38668b232cc6ae17804723fc7f0669
SHA25690e7ee7b8c10b193235c5792266181cf51850facf167ef0efcd10e7ec191cc62
SHA5125a0ecc8547ffb91f2b75f991e054783c1af54d1671ed75ad049a7b99d44914887cbf3c829abb33ef9c61eaa34cac9db2a62a25863be4428851a41c5fa8f78075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588539e195b9e9b2750dbd30b9920dc73
SHA15e3a91ed0445192e28142ce7151395e0f3170d4a
SHA25625edcefcf86e9b7db39a40ef004d30fb4a776e26e3726df1b482ab5bc3faa3ca
SHA51235bcbb28f9d5d7f71fa7119b5f87441e21b16b7019003543f4814f9c9b1fbe79f7c83bf075521ca0c052de712107c4d541d16f2af03e6b08fc618c094826e021
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc545b04d1a3bdce18bead02add556aa
SHA15070d46c462ed4919a569ee1568b4b1d14387d08
SHA256f9241b1d21424b9b8cd52299c93eb3cc50693835de33d1ae2442d5c9df74c332
SHA5121e894cc83f906226c903b3b7c1e1cb684122e8c9d611cefc6dd37a35d0497c71bfcbb688433bd15708999757862aa7f5bb4113d5fa84857e4d1cffb497c2f4bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c804e019b423d06ae2720d2733f6e906
SHA1212a63b718609230f141e6a952141a9ea0d2a820
SHA25668d9e561491f8841b4b5ffe61fcd8bb4c8cec708d31233042c7a31ea58d0e5c2
SHA51272608b8444004fc1915c25fcf3aad9219ad77ab6186e9bbf523cfedbeeb7cfde7f22f135302f60c002c15c6e6141abd6e08e5f0e5a156f7e659dd79d6347b5bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c78f8304ff9c64f0ccbcdc6deb2d0c0a
SHA124677de686748b8b7ae25f7ad407220b454d37cd
SHA256438babca002732267e172a7b4cdc1736dcfa6c0a13d59a8ea40e4dc11d28300c
SHA512126f875a747f9e49259ca47aa85313e94b61c9eb4ab62ceb9a83465366cbd1fa47b25cbf85e1753bf783d485bbed48f957793f2bf853b58f2fae3c90bacf7ed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9f25ff56b903127bb69d58fb1a134c3
SHA17308a345f3fd286cf4334a890da43debe68dcf6f
SHA256a6018bd85c47cdb01b4d09c7b0abd848a48aa00bb9d192c2331d5f14678a05fd
SHA512bc5a7b13976fb48bd1d6a22e94972ba86b392d05e55d57709ea071cba6a3d685fd74722ce2b49e65c0c08aa5c0885951e488d423e4af7e4d46c8f3003f75a4d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526b081cda2c02e7c5a211d1340d45c1b
SHA13936e58c09206707f6820668b63ec63808c8d4cf
SHA256529f54cfdfabad117b96e95af6a101e760d9c9afa3bcffb850725f364f640bbf
SHA512fbeb4612136cc63da87f9db3b8d36efc8bbf0bf3c016a6d75c9424e253e51873bbd768e6ddbcbace839cf78e1aa4fb5dfac5815f56492cdaf3fb0047f352cc6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4246a5686a6a992e6b6ab59637e102b
SHA11f2f565d2763e9d094ed497f6c711b6a96e09b39
SHA2566a639d415019cf2f802109fb822765452cb5794212cdb2f6a6073572fb46181c
SHA51216a66f0411e18a172d204f4fcaf2234560b650721737a4663422dc3faac896f89656c5bc13a738ddbd335e77c3e1432640f9c9e3aa8a7490041dbd1189a265f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d499fe592f8ec9efcc8e46f698bdf69
SHA1b5d6237f86ba640df2ea83eedb62a1d50a70e4ea
SHA2566abcba59bc0176501f7518c8cad2a6fe6fa05e0843c69ec041adae065abcaa3e
SHA5127b363d4d0394db9a6ab17c7fc872374b8379658627576b8985e6434e86ebc76c7b25c4b345e8328509542d0d05b5e2de91fd3d60977f4f13938c8221ea0d717e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be46086336a66888fbac1d7ca7ed4000
SHA161e38395ffe0c4cb6d0d7f5e73bd6f8933c85020
SHA256e61b044ff2471d1194dfc8c2dde63f577142ce8431539ebcdb795fc0b7dcae3d
SHA5121237c30882e760d7a95cb465312ed56b3a983127c2897f0f38b2645f19a9935756a84a1dd87f4f07af057b70a67efeac9e0ba9002682b2f3e1ff4ed2f4abe5dd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b