Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 14:25
Static task
static1
Behavioral task
behavioral1
Sample
e05e7628f88883840edf345a02188de8_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e05e7628f88883840edf345a02188de8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e05e7628f88883840edf345a02188de8_JaffaCakes118.html
-
Size
53KB
-
MD5
e05e7628f88883840edf345a02188de8
-
SHA1
7a5fa25b6befec5d407afe546f33a27c492e90b8
-
SHA256
1c665fbd0678517c1d8d8d5ddfafef110c915e84a67ec4310bf29326dbdc6106
-
SHA512
2685dc926cda74b437a441a02754d8a16e934f9316477bca9a75ed9e2cb601946982f4f7d21721f42cd6814400fc16c5a021d2b6f67a969a0a3f4ada418880cb
-
SSDEEP
1536:CkgUiIakTqGivi+PyULrunlYH63Nj+q5Vy0R0w2AzTICbbbo0/t9M/dNwIUTDmDC:CkgUiIakTqGivi+PyULrunlYH63Nj+qx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{24203EB1-72A5-11EF-9438-E643F72B7232} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000062e1fd25ddca31d5173a27bd2ee8ddc4273e0a47b8e895aa5df6b09f2be52043000000000e80000000020000200000008b3df585a08a160233f0399c785a4629e2f433d3842fc01383a691bffd8674dd20000000c0b6084936c6510d36bd0a6abab2ee4239ee3984285b6f631a9fe0488fe557e5400000005c0ace18e42b28c121487aca2b6dff21816bd9b44afedba03a4ec4bb43a56834a88ebd8c1398bc7776ceeaebbc0855648246a91ef5f5ddb4839441c45963ba9b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07f0cfbb106db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432485777" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1384 iexplore.exe 1384 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1384 wrote to memory of 2100 1384 iexplore.exe 31 PID 1384 wrote to memory of 2100 1384 iexplore.exe 31 PID 1384 wrote to memory of 2100 1384 iexplore.exe 31 PID 1384 wrote to memory of 2100 1384 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e05e7628f88883840edf345a02188de8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563c69410099e4d3fd3382d0993685e17
SHA1b1d4ebd816ca10e20579fe5f8050c9d6a3d80196
SHA2564a2f0d8676f207de1e6670617109fdc1f4917b79c8c043ed190c629b91961ddf
SHA51239be40cef970b82885463c8ed5ddd3411c343cd41905c3a61aa43110c8f370ee49fbf8c3ae7944ac39c63e04b49a49e4f7980055490bf9bd6fbb1f0408479451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9ddb594d3aa9d381bb587009234d629
SHA13047b62f71a233c483a487200b2a24c760fbe22b
SHA256532682214253c4dd4c639558c02f7be394d41ce26ea01b984fc9e5da89e8102f
SHA5123c511a6b1f9dce261ea6363f77379ef43c15cbcf6c9548f8f55611b7038d3d29b7a96c49537fdbb6e40ad6c6f4c27f3c5214a80b8b9d989edd84695b1ae8d0f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4ecba2557f17b2304ff0779e0820100
SHA111af2aa553b14fe8c1b621886f8fb71913fed9ee
SHA25661631d17374ebc4f85c17e6ddba2bf66af03a2fb74629eef4c92a051b45d3954
SHA512142455bcac4c6f3b39ecc474865eccdde92826994d3e9a93a9c50f2d807517adeba8b9929e9403728d9c5a3e59e19ea7ef39fb2902433455d733f7a5c6c814e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544b71dbbb70e3afb93333b943767a1e1
SHA1e8babce92090a469bc2d5e342aff9afc10ed0613
SHA256e79db14c0f2322eaaddd347df4d00dc12740667feb0be6bd2079a9efb420b0b4
SHA512297fa6481cfbac1a890cface065ad2a366d56f372653662f377cfe85b4836be69497b625624c10b207483ac4d01ef07bd873fa830609ae8beaa2181a9e7cda57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508a0bf22cbe1b449e707a2c2022a38f8
SHA151eb9bd3ce56ee22713c0c7a86e1976ab17de5e6
SHA256de7c83784e40a706c97d46d626383a67660806914143621938de7b151b6c6bdd
SHA512ceae4a657fa5e5834f5517a87ba7e3ea0610d3e35951ba6bcfa254bb227b606738302e958ff42863e88e10a8ba94a64726e2eb3488e52adcb5020cf3defbd807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c93fcead5fe127105d43d117028dc027
SHA162e514cd107d904cc2f2938eb1de186743517a66
SHA256e5d090740a10784581f02fd5ab16856482fe78f0cedfffebbfe7a55d6bc34265
SHA5125812bd2ab9878afed0888f99b54008f92a14d0663d208bb2fda09648e089116cf3a20574b31963115708a7450a4d1e611396e4e7d54b364d493af7a46bfcd95b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505aa8bb7563e7e0a62c34b526bc0a114
SHA1aac2b57d022ff358483ab9fef6b97b833c70a6fc
SHA256262da5facbdfdac01a80494db5dd7c1718c8955db3e7a59d7d7147c8a2fd0690
SHA5120f4261a633ec6c7d9e2d8d0c1be14c9d2c2d2d86e45d2dce75338f1f698556863a97bb4ba311214491f3f24741d1daab54c76aac4fa6fdcb9969906a5f673ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b05ac1a8e30ec87c730fe2e3583b634
SHA19dcb8669f4070c0c81be21b4154fbb615cfb4d10
SHA256e0a9893e51d035b8a919c8f6de19dc4da54f895f418e112158f35f073b21e1a2
SHA51214e4d260a5f74936be73fa4274e3352f9dac7bb56fe21c8477e4d27d6774cbf751a733eafdd1249d18bbcdbb73d2ea8fe6e53a6e8b9406e3b42ab7723a9f2cae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef06156f0d46dae4b1e6af02fda831d6
SHA1629fb0eaaba4667fca1d63e8f70fc484d46a9b99
SHA2562753f6fbc08fd540fd2afd45c777f03c4701c49927afbc1c6bb0b92f76b60f88
SHA5123ed88716c98bacea5f90d415111c68f367043ad71ef87a3453f4eac47ac704524b691c1631d4188dca7384d8739f2b592fd1d06ba83a1432c1072771f7ad8f53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534bfdf3e459c99bc7777abd0da5b4595
SHA10af6306070eebaecaf152ffd5bae917f69978c1e
SHA2560270f3da181e436285ce06b6ec9930867fa55ec683b2c421fc2c21e72378b155
SHA512182a359e8df375577ece4dc85222734e192640141b295ee09724849a768d609128790e302edf28f79e4985bdc2a261ec0c2ceee4bd6c71873915c9b640c99e45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7d2fe2cdb41a51c46bd02da917e7b5e
SHA10b6b5cdd50a7eaf9eb82c4b37f3ac6a4fab1097b
SHA256effb63cd9dec67a572fc806d3709bdecdf5861f94be4b172d7fc17dbca0260b9
SHA512a6144863c68bcac4d9f19bb36cb841574983436ff26aee17e6d323937e88440fd034fbabdd9f7184b8cc4225d4113eacab53ee709d33c906e9242cb0bd341008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5733b6f3cf088e986c7aeb32d17582d3a
SHA16ca4480709e6afc982d8af202e4d8a1db5676091
SHA256c07223ec6ff093939bba201e847c69f8bb3168608bdfbb24cecd1904aa962f90
SHA5126fb901e26aece4b3227db814b3a0855a7df9b84e42d29e438810b3c3d590752beea13676a0ada5058399ec3896ca5c5730dc930837d0368a674e75e23ef65fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a89464c0f83516fb48d8abde8f3ed24
SHA166163f7bc0d22947bd6716f28e5ad38ec183246c
SHA256e2fb892a139f38c575680dfed6b82125b996f57d609b1883ebe478c3fffb90bc
SHA512d269bc3d814e864cfb196bf46fb7318c79ef50067cfbde2fdb61bf2d1b63e7421435bf5bdd2dfa7ad679fa7152c34131f94f2a83d29d3ac39a8c91f8331854d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5effa5be5f3bd90be688cf2988569cafd
SHA125f299d35a2f8d3adbfe51b5c6b3e307006434bd
SHA25636166a0123e7ec7328857229354116db11d271608638ab569f9f46af29b3c7b5
SHA512735a6203ab66ac149f190b4f49f273ccf19aee948d1058fec1d0afd340a4644a7798e75ea24a05e383ec8b3723e657caed2b96b1dfbcf1361e30b24397514830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500aefa9d298b9697d73bbd1fd9e87fe3
SHA1e8c26d48acecbe1ead6fb389f935eb185b5545bb
SHA256443cae3009db4408629b9018fb9c530430ca6ca3cdbca75676f02ccb7c50a493
SHA512053ad4b2beb2c48be9dac8d4dcd42afede4965edaf90bb1645846085af527c50ab142806c3fca37a89ecb05deb688922acb0dcc5d9195bc6378899fd0bdbf0b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5532057c559693abd74ce51c41a08aa08
SHA105ac40ff0f17e669f680badef172dcddc9078a12
SHA2569130d63bed6c5ed08f63fba704fdac292e8c097da1bdf39a446620adf74e044c
SHA5129fab8568cda5fc24cab3a3b09e9a115f8c85f3fa8371c3f1a3fd6b9cc981613d10b92f018236efcd929d7a6983ad1e173a0a44ed916c6bf2d0b03b3877dad065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ffe9745906b079e5d8fa72e5aafe036
SHA13b7f8ba001b452fa786811142fb55b6ab86773d4
SHA256b9a9c160d6eacfc37f65d26814af50a942c3fd730aebdad2341209b12d0125b4
SHA5120d27461d450300bb3defa9a5f5dbfa622e7af157605f1ede97f37631daa9b3c24d03d653a1fab41ef988ae370ee7c3b8379c476891fb5a1e97ab56819b5cb820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a27bde49a7f85e2b2405e4add7c3be6
SHA1ae235e52a5a63820e9420c6f2034f2d59671cf4a
SHA2569ad435cf23f7380be1857f0726cfc6475614e52c26d5c2e064a81d2375dc1a35
SHA5127ac776ba390525fd8f66ea1ccfb38676a7a94a1ac3ad3799b1ed3dabcb3d2f9bf07ffd0ecf4d1bfe4d3cd3b8aa2994ca9087eab180b3d9328387ff2113be0561
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b