Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
e0c120dbacebad83d70679fa0591ab74_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0c120dbacebad83d70679fa0591ab74_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e0c120dbacebad83d70679fa0591ab74_JaffaCakes118.html
-
Size
70KB
-
MD5
e0c120dbacebad83d70679fa0591ab74
-
SHA1
2656969c8941df48779c4f34d28d60811337752c
-
SHA256
e4276495b6906e6385f45155198a58d85c6d13f056f81c0fd86c45ca6febf1ce
-
SHA512
1f0fbde5c06a6c2172cea60568612e71d897206d46fce3a437a49d85c4cc3091928cbc8fd7195fc2521d68d7bdb121062c16891017a3dd6d7dee1bd7a9adad51
-
SSDEEP
768:Ji2gcMWR3sI2PDDnd0g6recJoCR2oTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFA:JuIhTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000dd82baa039ffdf282532e5f5c3c7c294838c5b578fb262ca5beda9d761c18f38000000000e80000000020000200000004e3835e35ea8b4aeca7fdf2ee6aa12a5b93d0208b2df19cd2cfa52afa05eefb62000000020842ebf17285515770d0e779d82efb3fc80e22cdf644b6af82940e6047a312240000000096ee126beb9d0056d66fdc81a8230e77775490ff0b4062797a6c6aae1a67437fda02d277354d028a455c0ab827bd80c456278a35dbba02afb92249975f40b3a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432499590" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0be2223d206db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E8E5041-72C5-11EF-8F2E-E67A421F41DB} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2704 2688 iexplore.exe 30 PID 2688 wrote to memory of 2704 2688 iexplore.exe 30 PID 2688 wrote to memory of 2704 2688 iexplore.exe 30 PID 2688 wrote to memory of 2704 2688 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e0c120dbacebad83d70679fa0591ab74_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af3269aa8a6516c63abc6da82b58471
SHA11f05e911a1c6e3377508bba9f664df567f257d1a
SHA2568e74325210db70de23691763f0b6f6561e1c50acbf938fe8889ac6ff7dc9bc6a
SHA5125c70af2495111c0fe29e07b9ee2fcf9029408af920df242dc3b74ebf102fcc46aba4c875b9986af9eaceac07f5ee5a1c811d0de2d996fb2a6984e95fd3f8afe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d70fc7f1899e594543fc0a4f9dd781f
SHA18fe78ec194de277bb6ba78fa1a8e9be31c1acbfc
SHA256693e2a06f14bf4f21d5c84e06a1e026eef9ea180a77240d14279673292a76b02
SHA5121056491bd29850cce065f534cc093faef888ee1c2173466bfb09ee0c7f11a468fff409e04b8e1b0a76556b2e218db05548f35219dc8a157581e979df198a7f67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523081d8693a01072609d9d477839c58a
SHA1611a54ba121f1405a6a4db5604b3887c3f8ad427
SHA256e30415ed56aa2ad9dee8cce2f273c7eee3e03d991899483d7f073aedb55f9bc5
SHA51249142d0b319f525a77b593be9dc97e5f95d3964d89c51e45f99752875d5a8e1d08e326eb4c20f3fb802178ec23fdb710c050db155e7e908aa66b3dd3b62e7a5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5696aff84fcaddc611eab9311a81a4e7d
SHA153ca6d36d0d0eb9bc640690ae153cf7c07ac6d46
SHA25624a4444877c50206cee8ad102b16be0c0d62849517c62def6cd30733a264506a
SHA5124c43f7feb4e3cbd47a3e76718b7881335c88b7282b1c0c08c0850b9a681ea7582393328d3543f68d9c04edf804cff7a29cf5a40f922fb42b14ecdc8b3c4d7c20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5481da1963f0d93b9d183f531f51070c0
SHA18a09603f1316647616dabd1b3dd02588a13eb253
SHA2567788bb8217583aea54726bd60117808582506962491e458e2c619b05c7cfc101
SHA5128edc51e60c7858a138884d67e8e67230e63ae14104ce6a538578a8c68889de728a192aa06b04f9170eef0bc4d75b4f823b3269b72b0dc65164914c78042d7eac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fed14aade6196b1c4afb8a83e66820b1
SHA146be8d8605510fa525aaa0482923dffde7e90301
SHA256a04fee1673a399f2e7ce090fc0dceba2635a2d8a4e4429241bd8329ed5690f25
SHA512f7b8baadd7d1e93fb179cec33ed0233ac7cc27ec3873d53dd46daecda8c7178d2169ce0db7215bfdd1ae74cf33610bd121d56eb3a0517ceb099d7bf398029103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ea1b94c15c9624c312bb409354d9a2a
SHA1fc6555745d569a3837832d2ab6e6942505b89b1f
SHA25662db29aa1330385f90e4e7290c7172826627b67f33bbb05208fffd846e33041f
SHA5122bb44af368d086abaf85a4f5ff8064c3e5037e5dd8222641c7843346a4aab1ab23dff977a54d55c973a280bb6754a8e0a59c3043392f43832a934098c77b6842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5902796356f809531f1f2ccfebab3c64d
SHA19106ae14b30c2c2f72572c8ebc94a8a69a10efd6
SHA25606eee65b490b5cea4d16c71081ed315ff9f2849c9e99b701bae3e83149ca923a
SHA512006c81cefc8118fad1f38ed4297a95f0ee7675683024893617da7cfd10b29c742b17f32672646195a67e0257a49bc4f52bb8b6f3e446123422d36c4a816813b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0e9b6caeb2f56bd145006821c7bb82e
SHA1290bd3e1cf016d7223e79538171843b24a838726
SHA256d28b164be5ccdc3c81f3344771dc8015e85d1458cec17f186b48e2b621c9f859
SHA512a61624708276b62c4906ffb0f99f2dddd81024ebf0a5cf8cab17396af7fa57e2a0733481b0060c7f9196372d86b5ee85335fe0069fc7b5978539dc4f60f807ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522a4609c830471d463f66bea4a982050
SHA109ec7f8dfb59f6e95bab53958b4d5dedd5515027
SHA256bea11d5e5bba4a7d285c159cda3891758031b252211c502d64e32fd4372aca14
SHA51217593be35b62450f87263381c937a94524a530a8abc8f188edb0ffd55efcf800422db472567f7e24a4e5df17c0cd8e32036fff4e43c6a6328b0883207a74b792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b04fd1636bed90684f5a8d908bb5a76
SHA17a83dbedcda436f1ad4ce8b152fd1f77ed3635fd
SHA256e8ca2ce28249aab137f41a4d4b4521e4c4f6a078cafe4c7800583bece136c787
SHA512e40cfd10e24d9c6057ffcef47d2b1dbcb2572897f104ad03e1fc4818e871596aa7cc87a4066a53ae0e472f63b0a44068532b994ec5aabcb09fd4999f29414f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f0e80837341e50d60522b762aec39b3
SHA18ec1648f0c194a0095f8f9453083be2f55ada4eb
SHA2568fb5058d76f6bf115f616e1576c44e029f749a4f082c63c58148c510e15b7beb
SHA51250313044e7abea7a6ed14f79917e98c8ec629ba71f7e43ad227100bcb8a66ac1d604d6837eb6d79506ee2f759fcfe9e230e2d68b9d7b4ed634f26297e186082e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5dae1deb6ba7c8c89571b5dd7c898bd
SHA11503fa6359e6ab0658cc1814a5f4d5ef009164ad
SHA2561dcd67674f5d72ab65a1e8c9d9ca7257a9ed9129ba065b0bd66b1527d8adb377
SHA512c165317cacd9bd9afa134649b23dc0a6d0751bb466fe1ab08c09df220b943534c2c02f203107729121b3ae1410dbc9a1d27c1224a5562b28a47057da0b810a8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58223eab9bc754baf897feec17af4aa0e
SHA1b395b76af32498215a1023968760833ccafaf2e3
SHA256d1e7472985b97451a11fe5da0aa4aa6390fe5046980a285dce7738d082fe50c4
SHA512984081eaac6e01f3cbe0cbd8468ef1d7681b855ec0384e021e6d3ec5063553a538693311401b9b0d9a804bca3014fb3a9eeeecab9065da6131905b78e4faa379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521d5a9e3ed7c39f62c4bcfbf15e441b9
SHA1085d4eba586f85ad063d08a21fba34beaea76983
SHA2563573840f0b4238f90bfbabc62fea55bdf374fd960e234b90174fae96c880a4aa
SHA512790cb0b50ef278d06cafc043535dbd076e99a5af2b560c0b2df85b5f9f40fe62b5ab6aef34b202dac73bb2c133dc53f067a0848788f54f8de35cc03a902026ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c6cba4321f079288fa3dbac7073eeec
SHA1bffda136034d068eae22a6eeff88966649810a77
SHA256007bfe613432128fef7f66485636cfaa3ce5ea96714bfac2a63126290edda509
SHA5123d53bb4c9e1b17fba8dc1d2f87eba97062c3eda25a4ab421d57b924776963605f2025ed95f58e032d9edda402d6d05dbd780949938e2df6c58ef4d5eed76d67d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e91e47775ae846af3204354ff462bf4
SHA16c0b40ec1695f18555a4ecca59f37a770da17245
SHA2564382987aa3a69354ddc98b8aa3460cfd6cf59d627910254ebfb9a86866a5ff20
SHA5124cdd2fc258e369e6b3692c02efa165b6b39982e80da694a9d03f61eafd48721d0fb77a43357c3beacbb4bd98dcfab5bbb81bd5ce99fa0db1965b069f58a2cdc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a8d625deaaf72f872d6401215b5bb6f
SHA198362f0ba7dc18c19e31c0f2c00f11ec6883f371
SHA256f39e5a01e11fbe7893f7ad54bdbcccf08c13c34c7583fc09855236a71e2c1d2d
SHA5129c4e6863cff108c14af17fba3bb1fd8a11323eb2c11fafe260f8342b5944aa7abf19ae1df8c3737239a89b7f64162aad46d803b29901516b585ccfbf0a7e5aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5265b617c4b3238c870822a9ec9d07bfe
SHA157bdf564206b0d18fae176b8a2eec0251df49eda
SHA2565c01c35cec9206a2b792abb043e3cf1d52ac74fd93d0470e5397a5b52bd38b83
SHA512f3918fd0bc1eebf650380ce81f6b2c43db7ede8ec309f1d2310d283894d9cb7dd4b76f00b788008ceb27c1b84fb16c99b6e4245182125e8b0e3434798a5a16b1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b