Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 17:24
Static task
static1
Behavioral task
behavioral1
Sample
e0aa0a559f7c338ef45181c38a78a3ec_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0aa0a559f7c338ef45181c38a78a3ec_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e0aa0a559f7c338ef45181c38a78a3ec_JaffaCakes118.html
-
Size
29KB
-
MD5
e0aa0a559f7c338ef45181c38a78a3ec
-
SHA1
b86839b138b733dc1591be891306eafb214b74aa
-
SHA256
dbe956d64c6fde21c830f3ecf7b1d6d8dc90c5a75ab3db4a900e832a31fec9c2
-
SHA512
20081b42483159a8fbbd4fea85d224156160371bdbd9794ee241c835bc9e78c7b803f9a000239a0f93a716fa0179276d92f590b1d46f31dbe2a498bfa11d5c91
-
SSDEEP
384:dmjpmMGrwqIvZ88XKiEqL9bya9D3QhlUav7Nand+DZl8e6SjgTJ7wbTE:EdmM2IxPpTxd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000003f95b213679aed457a901035db1f0d34907637b3e64af4ffd513c517dde4f822000000000e8000000002000020000000cd23ff4b12b4854c4f6286176e20c94b23b194890997c194494c989a13e4dc34200000005c1c0216a507a3df666777d60a7c3d59595ec95e9aaa21d3b8fc67b58e2cfa7240000000ab0417f9e69c2f9d90e1502bb9d59993b69d597e89cdd36922184598bef02ece1fe83bdf222f99b3f6b11778f6feb066a50ac45ec5b450da2fae9c4e064fa362 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c00e4a01cb06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432496524" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2A710791-72BE-11EF-9A35-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2384 2096 iexplore.exe 30 PID 2096 wrote to memory of 2384 2096 iexplore.exe 30 PID 2096 wrote to memory of 2384 2096 iexplore.exe 30 PID 2096 wrote to memory of 2384 2096 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e0aa0a559f7c338ef45181c38a78a3ec_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e47d71589b839fa34520fee035829f9
SHA14630f667f9cf2fed6231cdae69c6c8099eea5322
SHA256365237d033a7051ea172d6edbcef3aedf9cac84efac45b789992c59825c23cd5
SHA5126327b2fa3cb755fbc8d3addf5c804dc245a106c475834e0d1126056ea8fa0d2f0cf280f79771aeabe2387eadb102e76f65edfe0f50142d598154c89e8bdcd77a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e96ab249f8675c819af89341359586f
SHA1c916aeab24ee8b5a4845183af5e3293ca2ba169a
SHA2561d65bfdddca37241c3761bc8602cb26995805588f08e7b1c5b3335b4ba525de4
SHA512e2001d1c4d79fc3bcb445f09f7e86eaaee02f6f79460103aadb138f64f343051fda2fcf8672e72846629b0d7f4d732ad0954b192010e2a448a52b4ca37b49efc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570ae1a6a4bbd8b2f6ab763a1c70721dd
SHA1704bb85152dffb0be83e25459980b6d7023e4306
SHA256edec2a235c00c08b81bb105d380c0d0bd43c23727d069ebec230079819376bc9
SHA51284a1dd87ef638b5650edc2b504f9f2e7425a8d4635193c436db9f794386a3cde5a70fc69ffcb2b0945f2916bdf9637bb139887df3bda375c598ee2bae0444bb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532c1dc5d38a19ccb8e2785c4fa585da8
SHA1e16fa681ee14af8fe0bfe824578c4ba65f815758
SHA256f564c92ef2f2348abb796048a66c70fa56ff3f0ecbca36a798b806046819ca25
SHA51230cddf7d535b88766d6316d45001fd3ea6839c7d01076e5c0d1d84609518c910a880a43b6705e6606b72ea53f914388cacf0f3c91e7ef8bec7ad089aa584350d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd3856367704c78560551cd9157f9066
SHA1d325015552b9a2d940a4b0cdbe99385d9aad373e
SHA256fc640e400a2107535fd8a1ef86b31602c16e49df84c9853aec11bf4e83fc43ef
SHA5124f082513774ebe78c9f41e966cfcbd631ff67d7f263433d07c356d643fab05822aea5952acec1be81e2e8acc1175ceac04a6036a785dd6445291c360ea6c491d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c5f351455d8b92211b85a31cfde055f
SHA16079d9706f57ec143623c5b173c2cf3e27ce9a8a
SHA2564eabc5b547c957444cf4fffee993e90149c0f4294d6f7884c92d87118827599b
SHA51296485c33884c446c0283ad7166fc95d3326ef4f7c727d5672df36b95da5c9bf8e0ab733e215526fe478788e5355aece18e770e4bd19a46fb5584b2c3597ca68a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54172ab0a2d57fffc47628fb74442ee18
SHA1695d488060f703a78b03ca979aa11d68f049dc56
SHA256ce476739151185597f55bb9f4d2f4744cbbdb362c56af23c00ba64b65828069a
SHA512233b3370a8328af71a35e44a38288cfbe1c5f88572f46abcf02dd8d6ac3525541b4017ee5d0a2a17594c1841bea8b73714b258b1ea3d08577e533028e2f763cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502aea63b603b68d6252a68e6bb8b42f0
SHA109407288e6e9c3b9380452ea91fb4dda8bd5d6fd
SHA25621787824a2307ab5456f878b5e7d2af400b56e6c429bbd028c9be3e6fc28b5ac
SHA51203d37d29fab7b1ea300969de63411d1eac7fb76e2f55c4b74eb03b7ec82ed0218e438b600c88dcc025997fd9d07ab16d9c0ee51d21c191917c8a36c2f0f89254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5252c0a1be6023f587be07a81da78129f
SHA1f2c504eed2be9ebdf2cdb9b06b134b7d359f0d00
SHA2562066fdf44f3466fe5ce82ccd1e505299a2d985878d3a10d87f66110d1da69cce
SHA512ccb140d96faa07048223e1820b8b6712360a61f306e9a12396071a725d99d0f36a7a4c20a40d1a09c8c3c656084b8332bdf54f0169020fbb107c64c963f9211c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e7d39f33eee241c759fa28ff2a24944
SHA144cf8697a58c90b3ea55dc448f10da2aa7cad418
SHA256611cc31f777bc66b9abee17bae204ba383ccc60c97638a13a343482ad50dc4f4
SHA512ac9622a6883fddc64717d447f2c2f558210b414d1b230a0da5c420c7f10cbd56b2b53b835a917903973a32ae0b1f0b1971e4add53ead6fce18252f9985f56373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58353453e7416f11db4b2fe2f2013a6a2
SHA19d4eafd8df8edd3370b7a8f5b22ed18643759a8c
SHA256c53001353d2dfe96754c71849b52030bf0f7d96099d6159e80d8fce8c94e9643
SHA512497c0c852fb45e9251a953aff994713a43878ae1f23123cf5fdb376a94ebecc268ec33f34bb11ef5f26a31b4b12fa4e31a84294203d8f6b83598c6bd4aaab71d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dd72174c40228fc76ee630147309672
SHA156f3fb77767b9dec6143a4bf12f9a2f0ede65a2b
SHA256b12c6d2bbc16e83516c2da3bbec329ecf6d56df195ed37e05149ccaff118ae3a
SHA5126b3ca7a22a2146b0e5b520b3d67a5b0626bca4b27545a7fd77d1415f6997d6f20fe7cc16e3855091900602362f550306ccb8f024af9260f56f50a0030ab83deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511c729904ed51dc6b07af1fe4d47e636
SHA1657dd68577460fd95751f6c3bbf2f43c777b81a4
SHA256a575a477f226511f133737b0dc4837dc8f46bcaf7590e08df2630533c218d5ad
SHA512325c628bf4cc31f12a31e611460f0a875c22936cd2b92ddbc0176dba40191af6d5aad2c1137a86445b47f4d4b204bccde540d0182f57495653ef8089278504f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a68bdabd77951772a8f2cf4a09f6119
SHA1aa36b5406843937bc9b17ac093181ba34659f287
SHA256619152a5d12ae03476939e65aaf9c75825542d3487a0edd593786f2894a4bb67
SHA51296e1c9b252e05d038338b36078804406529f17260db15778185c2dd4b53813951f4532bc9d21c7d8e6e249b089c9865b66b7f36dd8bded113c2d1193e8a4c020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5711c4e6fb9cddd8d56e392f103137ed1
SHA19910245839a1e9db3f6e47e9e8f75d280f6172ae
SHA256e59378d68ac2156bc394500c338f5d9843e17008af7579ca038af76c1f40561e
SHA512b6c362cd2510dc4c03affd0aeba30d1b1dfa26ad87a61dd956cbbb9bb3408ee1dee095e86e51d6b8b5f15919baea52915945d740b9e0953e8320b81b6314f0db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a50a2f02f232090093de98472016a45e
SHA19bf5ca79bfbd0abc282560320d3b6ae7f7551286
SHA256aa63db2d33c4aecfc459ff7690207eee7d393d7d053dbd7d63d6e9887f1d64bd
SHA5126bc42f9e43baa4eb89a7bc9ac61202bd167f45f45851737f6015d613784b39e4a769ddf93612d65bc7dcb7ea51a118cc23290dceefd38fa122d7cd3a77e29089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529875ef65d16b858016007f9debdbcee
SHA1030d6a04c158ecf92b84cac13e6d9aa3ded9ec73
SHA2569226eda686c30ee2407a44f22e050d6fce04945379555eba76bfffa433f4311b
SHA512aea95aa9b5248e1dbad943748d8e2f07cafd4fed36429cfbfe382e8729d0bd5c6340460f6d72d653385100987e37c6ccac3fb6512633c11df4975fccd6d18601
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\f[1].txt
Filesize40KB
MD5424705b358127b12acfe44d4512a3a1e
SHA17695c0b06bb06127db0d308bcdee5652579964a4
SHA2568ff853a942f40f47e1a9ff2c4ca2b2eb03a677243f1b275f8f5fb86bbf973354
SHA5124554a9c6a1aa99a0148d40d2b113c971e52f8f41f478e1dff51835087c4416934da272d594973247154a45d208d81dafadf1507d98fe82c2620545f05dfda61f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b