Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
106s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 16:09
Static task
static1
Behavioral task
behavioral1
Sample
e08b433aee048a2d8102b0e6618762a6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e08b433aee048a2d8102b0e6618762a6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e08b433aee048a2d8102b0e6618762a6_JaffaCakes118.html
-
Size
39KB
-
MD5
e08b433aee048a2d8102b0e6618762a6
-
SHA1
dd6cde74604502525ab98f6c5420f11a456cd4ba
-
SHA256
440a5ebfcfc96c854dfbcb4fcc7e9e1dee446c33e6162311a4bde5da4ad478e2
-
SHA512
730cea7424d8ed6c5b1672b4ae990c202927d556b0b0698f63639bcb0c1dc526fbf66d271d0541a0925b1077ede04988797d387e3ca560a241718119a0756442
-
SSDEEP
768:d022miteee5eeeeeedeeeajeeebeeeSOjeeedeee4eeZeeujeeZee8jee4eeepeR:d0Pteee5eeeeeedeeeajeeebeeeSOjeI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000038f193db232b4c0177be5d7a4c740768824382553f0cf2e01651a6c6e184a739000000000e80000000020000200000009aa25a545fcfe4897f545921f6a25f112fe2c7ff05a32c3357898d12775967772000000079e8072a56d6eb7a62a92e4ba925221d0d6b231fbe68b0e75f4c99b3b6072f5940000000e631d23d4ab305614650fbcd2c762647155b88f89706d3dd19886607463b1d32194da3f14f8180e03979a0e4854f7bf592bbc94539f8e9bfdd5f687c8ae1a067 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a09215c3c006db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432492054" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C182EC31-72B3-11EF-A02E-E67A421F41DB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 1624 3020 iexplore.exe 30 PID 3020 wrote to memory of 1624 3020 iexplore.exe 30 PID 3020 wrote to memory of 1624 3020 iexplore.exe 30 PID 3020 wrote to memory of 1624 3020 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e08b433aee048a2d8102b0e6618762a6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5630f3f520c282ad0768e57b5c9f8acb7
SHA1923b8845da26f26c82fe20b891c70a33004c5aa5
SHA2563c946199fa5edc1316596dbacf9ac865fa41076592068581d3fb8c932a776ca6
SHA512d79377f29deed0a19c8edd1a65419c79ddcec6660affccdb3b0f31a603fbd4b0d1681bf2d3e9a3cedfb7310feda29a823ff34d32b1c9562ec9e8ef2b25798afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a049a86ae266b81cbeaf124750183ba
SHA1171e7ec799c4ca2abb370467af4f53bda9091e43
SHA256ffd119df45981296e6ceb68779685eff789c8d4264a41b7ebf7ee0a9b900e512
SHA5125f9bf428fda2b232d6fa5e8eee04d582fad4284c9949cdff69cfd87a862f9f2b00adb63444006db50284a39c886d14eaa35a2344cd1f72def112639767b3527d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0cc2371603980f1ae0a4d445075f9d5
SHA12e551c14fb27437b6ed8c343ecf20fad0dfbcd84
SHA256793972059dc2f0b2ef4a16e4fb340ab66a0237db4ca3ac0c0b36be023755d576
SHA512a2fc68a0345dae188679437cc1c7c560ae2865b07673f967076bbae3fa6ce373742f8a5ae253bffce1e4f5f066d8f393a8cffe2a3574b5d94ad9dde36e4ab847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9a6523c6dc77c25ba140506d9db0415
SHA1c84e1bf6cbbcd8397c48728c0d034bd58d630b5f
SHA2560375020ca09f2b49d9810b842616a5c21096f24f0fca27295072638dc25a93d7
SHA512ebc90ad5058a1bd5e6a609bec8e4adc2b85a4a6e1c229d32ff3933edd4cb564a6fee5af9eab56634680fdae896c7fc875e6a04754f5c274af9eb5f6cb2d136ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fe55b9ec5e2d207f35a94f9f8359aca
SHA19b6b9b107c917fa258b979b2a03a659f7751c47b
SHA256d5a2a1389b168268e95f833467fc07d687fe4d062d8f497291d6a1629a46e287
SHA512524e5045e5b3b60d6494254320a401251a140a67e9a45dded2ac651b2432fe125fe2b31ca66f9aa5337367645f249f5e4912be5a6905ce3af6597ad0cb0b2f38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54263fd6896341fa746076981d9caaaad
SHA1b4ac6c1099df14e73406be03dfbcd3e7f4b2500c
SHA25630f382bbe66bf98b9d56d8f97de4addd2a4a47f055cdb6a34176ccfd3fc8cd3b
SHA51222b3778dd3b3c454e69795e32165d91869fe5ea115901ec425cdf4ec361f71600973a82b11b40ca836a413ceb94275dd665e501bfed5608e0cc0121331891a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f470815366a437bc320032b819bcb3de
SHA177f343cd67cc82ffc819a6b9a0253552a30b8714
SHA2561677e6184b4eb8e5cc6d626cf4289a1028a8e416e001f933ef60d3a341da06f1
SHA51216af48804fbafcaee15012465ad94aeb5de3ccc2b5d84107c85b928d6ad988ad247b571efa59c890363968f4329d69033f48aa8d7e07dd28c65750351f322a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578d2aada18b8a5afafb6b83d1f758653
SHA1b37a1b9d4c31f83a3d4b63251a0bc38ca32d1578
SHA256b36ee0c8bcbdbd0ef6235dc269a25cb704ea3bbf28b065742cdeb4c5334cf157
SHA512f8ba6a482175b530dbc46f8c9aa788bd60d64f653446b3a78407083af28975da277ad8aa3b3988c95a05673dfcced1c61336761a3c8dd684439381ea0f06517f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c812e15bacf0a3951949fc2e4eb34df
SHA193bfed1881738691d9a71eb49fe75d7fcabc8302
SHA256d7939f0bfe6c6e5a60d9217c1b4dd0487c78e1fd76bb074faf8f34aa52a7a7e0
SHA51262f1db27a62d9c018d0c0e69faa86ae6eb30b1afe193d0e7e0f78f11e95a6dd19f45475d8fea0daa7fee452ae67316a8d3d8cf1269cb6d55683cff6c1e1a6598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e40a0b5bab8a70f0a016b94a64f4bb9f
SHA1582a742d4b71468008e0355e32ffd60c248d4c2b
SHA256b1a9b5c1b7742d1b0ac6649ccd3a0cc4ef5f7c93a4baa6e0001e685ba4a2b113
SHA5126899867f72fee0054eb8504b8f6d8880f3649fa1034a4d4d85e92d19c1af8b83750cc5a4dd252685546624be2fbf05a70fad61c1ff558a23d5a3adb9776cf71f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514273dd9722b6d9c20bde8f6503dc863
SHA1c36ba8f10e8cbbf74bf2413165f1b3c4d4fb24d7
SHA25662e9ab898e4acb70403c83e3b125b115172aa7eec61eadc71d546a3b332207ac
SHA51238f5a6fa8cab0c86916dee8f52e04515db762ef6ad66580857b8a28cf111cadc228b95cb6ef50b74bf2a4ef940eb6da2b32c241cf6cd10a25a8fd20762874f3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4803626035856c5eff2a307b6d6904a
SHA1e025c3e26766964fc111eb0e6ba8796e76ecb2e1
SHA2562bcbcc4e8cd5d40278ca88c4f9fda5859c3da20726efd6461e624838307a52b7
SHA512127a1846f08044e8f782e4828a298d11fad240a912d82bc788172ac71fe3ec733cefde9698d3cd624cc27aeb8cd7dfc4d267627102a044591c7cb713b638dfbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b81540af84e868ffbb68cc1dedc1f534
SHA1fb23635e33f27672387b140136ac848b44143c87
SHA2561e6e95a7ffd9f73c53ce8791c9ffde184f9d1d4d7ba81e90ea5df14668ccfa2d
SHA5120c7e8ddf1f1afa1e947fa0a27dcff820b6b084569e1e37d7a72595a43c8d0c7cdfa1151e0409e827e104e57f6a51a632342d744dc9b5cabf61d856d04b445862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b61b7fa3c04d5bd0c0a6e584fd22a31
SHA1af605baa4550cb179e2ac6d045f4a0d539d00a7d
SHA2566cb7fc6dfc9c45e9e29c8b3fc7efcc514bbb47bcef8a74f73aa40f4c5978c2e4
SHA5129842cc2ac39f17519caf6af80e6cea76dfd351cfbb425e8e25b8761c400325549d22db4e6d22ea685108042e65db062e4f3e8edbfbf2d138d6131d5dc18bdec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a42f1138678d15812fb8144723550247
SHA1059afd32f733dcd63c7ecbb6d0284fe56c7584d7
SHA256f4c1c8db0dfff10b8c3af0a94abceedd6926c32d6e73f4356f4d97142064c706
SHA512dcccf54aa8db04b6a652b9252bcaf6c18e159193be255b65e291a98ce131b5a7adb5715b67cc35c19b4a09723669ca70f040d6c0f2a877e7716bd4ee44f21935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e612726f7c589165ead4ddc278c49b5
SHA129b0d77df45be1d7c4d236a248f082cc3703dbf5
SHA2569d967a0d39f8317a29d775a18c92e5cb523dbafca301fb7c9ad6d09ba97b81c1
SHA5124ac6bb957c37e7902362248abe0ae2fd0df50d954be1ce2567ea24a5784a966f7b402531b8b22225f18acaead52c1a12e78ec6ef47cc1b59b0da416706da1464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fb1987ce7ea93e660beb197a5622e14
SHA137fe5e843f2161fd305fa092cd624b42028560fe
SHA256bc572c73fdb0ffc906ea278e7e460dee69bdd509d7de48ac0955657e43742e68
SHA5126a88953ce144f69698a8e0c5dac887bf507fcca9dc6a1a225b5c6488e8d5b96c1f41ec1f116fe165f27ed10120275411f3dba9015bf55c48aa4ea51bb50d3316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50faabe9bc0c6cda3d7bb9d5bc65db1fc
SHA126b2308dc3eca62be8e27bd415b02a02f9bdd369
SHA256fd661c8191eadd3d26e83b812f9ae5b12e438ba35f358fac582e2b1d995357b7
SHA512fd61c6bbecc3fc261dfaf2765a3e10807dbe12fef6f0f597bcde5e94a33b8c0cc722e2f1818afe36730ca718f0ce4cc2cedb1824c3069bbc8e449b617f7d4320
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b