Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 20:09
Static task
static1
Behavioral task
behavioral1
Sample
e0f1a9e1fb9ac52ce780751afd7f3183_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0f1a9e1fb9ac52ce780751afd7f3183_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e0f1a9e1fb9ac52ce780751afd7f3183_JaffaCakes118.html
-
Size
69KB
-
MD5
e0f1a9e1fb9ac52ce780751afd7f3183
-
SHA1
b39fd2f1360c4e0aad7229cee3ca911ddfbe5dac
-
SHA256
25455242e1772e6738942e956f4c66adcc27dd4b10a483221eb75943cb1f9d19
-
SHA512
33130e1363765ebdce391b5b4131c4850805492e0b726f5056be583dbccf49e5447eb8255598a8b61cf9b8587433d41424ba7bd14f9312c2e374b4c67fcff526
-
SSDEEP
1536:NeZee4HeeZeeN1eeZee1eZee4HeeZeeN1eeZeepeZeenxWeeZeeN1eeZeeepeZe/:2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000003a17184feb81eeae4c54c7535b2791c786d863a9d53b5848d847dc921aec60fb000000000e80000000020000200000006b94a17b4af593ec5678a3ab702fa1e3b4a3fb4e962f2de04460267f6e95c7ec20000000c402f12e5cded9e7aa3b1d80ecc6ec837ad2ff02c3d7ccd3bed819b8d50ccb5840000000a985d2c708d4a6c3256254911cfa320fb2e30e87997ec59c9127cec82e419a00e267560339881ae409681b166f0ecf7eb2989978a7940d04dc9a1bfbfad68adf iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E20BE81-72D5-11EF-A02E-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432506463" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30355426e206db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2684 2876 iexplore.exe 30 PID 2876 wrote to memory of 2684 2876 iexplore.exe 30 PID 2876 wrote to memory of 2684 2876 iexplore.exe 30 PID 2876 wrote to memory of 2684 2876 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e0f1a9e1fb9ac52ce780751afd7f3183_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546b779cc0e8e6246fd5cd0148f1725df
SHA1b84e8b55acea68d725007dac6f3f6c537b63f1e6
SHA256587c70ff51b90fbeb54344b6cc8dbd68b495a1e8d7ba1ca2168a6e852b223ad1
SHA51258bd7186e5f57566165971338bd6ec529720ad00ab66a70f0d8e4521df746c59bc3eff0a2c0d0789e797fc4bb3ac1fdef6af53d75e43c0a57f71e603ec1ee0ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c370e2c741afc3a4b36a61625367681
SHA13cc9afdf640145325813c35b607df19881ed2510
SHA25668cae5a58cda815484a9eb2691817a8036ec87325f2a59e9c16b56dddbf60010
SHA51227ca3abe35ac15e35f034e59e9fdf678db1062d321c9d3f2d6bae50bd80d146f78ae4762b4aa0923e5cec57820e97626ca0922a7625b95dde782f51d9b6de529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59019f93924b7f931eddfeba1899e8ca1
SHA1f50a71e499f9304079271b1c70cf480ad1b1d06a
SHA2565cd8f254d1f41b975ec0f7b31085cd2a7bfc3204b0c3892a4b3637c848c5b78b
SHA512b86b03ffb79ec1f71ab017b59427af76bacfab2bde48dfe3355d938d033048edae4bd3d4b72ee041749cd4154242d4d2a7dbac4a9ddb1de3198426a55bef2500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cc895ecea6e980397978ecc07adf5bf
SHA13cf7ad0016c1e57c2a15496c05f8973b8e6fe92d
SHA2566f3d550798506df5677d7879dab9cfe76229faa6bcdebb4a9062edff73130881
SHA512d6e8963468b43426b9cfce94788f5d00fa9b59e380fdfafc92a830f0e03272c926204efd6ea1e5abafde2a60c23e9cfb3807d35d46a4febfc13f7b633818ec76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b03d8a59f7924783a7d55c59293dde74
SHA1108b3a92ec396ae41e411fba3576160d6f27274b
SHA256e8761bd01b6d7bfeb9c0b9ec9b383ab8514a4289210e9e1f220cc3cc12539711
SHA5129fecd81c4fd1bbe0f29a33f5bf7ffa4c4f013aa40d94e1b56a1fc0dc3f082e7373678d7079971bef5dd9116f14ad60ec9a1fbae10a0bc66137fd55ad7778ba90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54acaa76b5647cf5e0d1048577ffd1872
SHA1f95823f21ea6e177f30538fd030cdb54474383d5
SHA2561350ed7724c71c565701cab786cd038dcc774f714b8ae100f9dabf2e48c92b9f
SHA512c1b38edf6a4b87f4d2b3718fa76c2d63c44f8465583ac290c62521ef6a225688a3135fce27439c8662ed640784bee22089b03f65e3245b1f8926de9ab24fa411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56de7bbd5a7a0ca500f55c0aaea3ba8c7
SHA1767d7c834a0f5e59c0d16de988ee22a3c2b534aa
SHA2569380733dd645ecb515ba9389a6e2c3e7c780c65fa7e3ba9927e81f634de262cd
SHA5123622ca57e2328ec7d3a83e40df16ac6b9ffd71f6242133937cea233abfa7403657f4f3e136ae211bab9793e1356fabb19b04be915effaa1afe0082871c228ef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c495f011baee4ff2886bb2a0670801
SHA1e55936030c2ee9258220b8f8ef0203f9370dc455
SHA25664f1f73319b740cf1b76c109b92c1290d12c8b43a749ca859c5880795433227a
SHA512c9dd0c9357897a85a75cf69a05223fc7a8b72edc2c82590895a89b68c2be6591e37582349e73cd41e347c01da63707aaf537757c411fba22c76f7b35e0772982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c47aa2cf16bbbfab2af7b3b39350f57d
SHA1c0d375812ae0df793771bed0189e82ade20cdccc
SHA256a5dc3d1d1b8ebd030ff54399d32c1d5dcb32f584e7e3e35aa49fce82263d684c
SHA5125989b26661ad4deb555a441936079d7db2bb66dca2b39f0efa0790b533aeecbef4a9abfd3fcba046d346b4ef4322e5f16a98a2df3c2f0b75e70f96bb992c14a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5207a4f3a109cc62cffd68857ef4f3f3e
SHA15e9b7f91bc549fcc9011446967a70ff424fabba0
SHA256485ccdaa6113ca9886560b9e9140b3400ffb673d394d2ae4a4cc22096291fb1c
SHA512cb9bf0b23382851b7eb7b8826fb9a1a752b0faf2ae21e59442bd0a72e16f797a28c2cf2f7c0c1cd36bfc24c1aa216cf41bc1deaffe9d1386ed94f63e55b11cdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f5481143e2e1eb1e8189209a424605f
SHA15d6463926a71254dcb55501984b940ce85f5137a
SHA2565001fc74f7c878d6cc80c9cf1e70c7514171997e3edc33522e5aa89f3d45582f
SHA5121e4d90d1d53f80f981ff30bf20425bf49ae3857556bcb9a6f5d0953ecaa4edf1111e115720b743d0c56b6ee2f5248a91b52890fd7d1ad16d54dc7bc4d397bba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4d52f3c4d7f6627fbafaf2f01d18264
SHA1c84444b59b0391b0d36aa42aeaab51576faa2f3c
SHA2560f7a6558bfef234d91c2323c368cb7ad47e7952d950029e097ce72cb02dde0e4
SHA512bcc3a6a60907f49282aff955887c31d74f916e62952a8dd7062ec7677d9a72cba4396608c4be8c2608ee995f1d75cd173bdb98ad2318ac24098f0466d991eb30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578e73770f1fffa922056967daa064c73
SHA1da42648b119fffdfe9dced7ec1a4178f48501763
SHA256d50c197508597e123675ebd6c8d9598d4da3445f686a36064b28ed77deb19418
SHA512c49cf89959c7e649b094fa65243efe4773b70754d7485f73119c394784efbd65fa26fa81f4dada250a29210ccaed9492969535b1abe801fa1e6ca3f24bda7d71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529edbe73385f14be23dabb60a98e212a
SHA14ebf4ed6c90d6442830ab7cecf4911cae00019e0
SHA256bcb880e49f616039a34df3722aeafeedebf127d314c7eedf6cc5702316045a1f
SHA5121ffb8bc769744ad045664ee7f42cf346183aca396ea4dfb4893329b3c7eebb7f34b3e593ee32349fbdb8e9fca4d08240984b4a7d51087726324622fde0510bf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50db849c9d2af01005ecb25b72aed7ad1
SHA12e492a600df07d2ea0905c64211d595a881ca27b
SHA25626c315e2220e0044628cd5a117aae21aa28cc3e04c1e882efa3d282a5a8b9e6a
SHA51226b35093214cb21a36c9e1cd907c91fb7c98625b7dc5d91ac4306c8b18dd03d7c46cd79f1c1fd450d6f7d70babff39edd55d006c962482649d3343d529d61c18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fabd77a99ddd0dbe9584418bc49ad654
SHA10124ac81b0c1de522e9688425ea2e830416bf984
SHA256d6d10da4bfaf0bd35914ac4a64fc675e99cbcd5727fe16d447e80d82bef11fb7
SHA512f5603babf188b4fe89dfa79e0fc01428b63fc1e9f9a48b15e80d53ea5972783dc9044dc33fe9c5297b4fe9b94d00d437bb28401038cadd219e5200e7817abc07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58af3534f13e1e3641557201aff4d91d4
SHA135185293d150b6ab69058ea2211cee2333874b40
SHA25676da29791f933135772f016bf07ce518b5fbb23236f949e7653ca3e95417d3ee
SHA5127558a7669684cc2bf4728e86d103bfc93e3c0d24e324d809f2e728fb3ef7cba9078b08c73abe2ccaf99b26f5a9c58c149b00d1f1eb5896db84b8663131ee13bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dea1f2f7db2aa4ec979e78b488b2f6ad
SHA1bba1c8a3612feac299b844d199fee188f08df2d9
SHA256e0e83c62f55dc0b2c33114ea88e8bc5a5357305093a3ea7ae156c9dd8cc18847
SHA512a5cfb94a7e94d2eb880b79cfe760eb4b2b3efeb47c7dfad4730a17876c897ca40e9775ed62a3238544e39ca09646e2081289edbf53f3c12e539946922eb15cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2f3988c3ea833249c04708cf1739345
SHA12251038bd26780e6bc3d90a9acb91d77b30ca939
SHA2566ebf4ff54909d08c34643a4cd545f4a91e508ef702cca27e8dd3c70dd1d3ecd0
SHA512956fc6c5512a72b542a8e145e3a4b9284c7138630b7d3b412689f675bd55c55f578a99b68941f51f32576c80672cc430b4f28af123ca779f94bcfa8ddf6079c0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b