Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 01:50
Static task
static1
Behavioral task
behavioral1
Sample
e178b86bf64c85a6a88c988daf753aeb_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e178b86bf64c85a6a88c988daf753aeb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e178b86bf64c85a6a88c988daf753aeb_JaffaCakes118.html
-
Size
68KB
-
MD5
e178b86bf64c85a6a88c988daf753aeb
-
SHA1
5a4228c6d7af86a46b8bf4d6d740afe29987d49d
-
SHA256
f4543985f35e059bd6af13c6db620caa189ba9a4c6bba39d186a4cedaf319a0f
-
SHA512
df44304972d0d57b937a952b70e03d4b77988a53d678bbfee599dd7096e78f772f1927a0631254d611da53c73c11497ef42b6eadbd3a4ce063bf73637aa6019f
-
SSDEEP
768:JimgcMiR3sI2PDDnX0g6N8m0DYSDToTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:Jex3bgTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432526922" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F1A8C641-7304-11EF-9D58-7EBFE1D0DDB4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000ea2b3e0ce7f5a06d99decbccb47c9957cfb28701431e9ef56a51c54fc1baa6a2000000000e80000000020000200000006a50f069a9fb1297be32497bd54ba8d31f94519a7ea8b4f5d4d5df25fa4f3d0f20000000f1effddd8ae3cde6774e1f5c9fa16d3cdfc279a7bfaf5c5e98c4bd4ef1f1fec44000000040c4e897f7c139a31cadb255be06933483a115affc5cd33a97f34f1de62931c1aefceaa2fc85e72d07ea437890be3ff0bea422ac1351ff238b7e83269c089cc1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2024d6c71107db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2376 1728 iexplore.exe 30 PID 1728 wrote to memory of 2376 1728 iexplore.exe 30 PID 1728 wrote to memory of 2376 1728 iexplore.exe 30 PID 1728 wrote to memory of 2376 1728 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e178b86bf64c85a6a88c988daf753aeb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cee51ac36dce45142c674a6d5ffa202c
SHA17134ff7402ba028524d2e4dbddb3a385f042ac56
SHA256acead2968f3e08d94514bf0ac2765b2c37ba0e263380233c6c9cffb3e0064bdd
SHA512b67076caa22d334380e69adf39454df65743975ad6c3a646b1e0d41ac02b8d40cb3ed582c82301e93bbb37f7e2f0bc192e25610f96125a0cead26346ef188918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5052c66202333308b4d63065c186d107c
SHA13d226277be4d145625ab40d9a68e53165a0c49c2
SHA256c9735570a8dd511e9d5ea94fb84d39aa482e480a69089e8795b0df43033a42bf
SHA512fed4321a8e640ddd2bf29c944de6986fc41cc3b561fcb26542c37b0d64eea9f14f01f509bc11763d5a3359c682affbe63caca4d8b84431488844f310fd88d4b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5662efc711390ec1e4381c631ed97f799
SHA12d438631915ef7fee7a554ad0f45ff99d87065a8
SHA2565b9aef3231c468e6b21037c9d975ecb6337832f33df8972095ce1021c4f6828a
SHA5121ae70ae128ca41d7c48d1c5151c6db9fce208b25638459398d20ec6ebfebd691c863477ba16a1dc9574bbdf4adc15457e180bd6b8f65de14463fdf31dfc2c803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5191ae2ba8c4dbe6dbfae3bfa3fdc9f4b
SHA133ea3207eef60c51d0a24e4fd4bdb13823c5c54e
SHA2561882424f45db383b17f8d81178a4f61c7a48c0d0d0cca1f08660a3b15970fc95
SHA51240b7efcbb25b0cf2571d66bae6c088c3e4c1f52af837804f94275bcef01ed5bc3ce3e42f9a7ad30996fd65e033820e630c67b3a153b44e4bddab5f0c693d4979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f395f6153149cdbcbedbfd9c193e110e
SHA1b1896f56b67def261f943ec75e39d94083494bd2
SHA2564f2c3044e18d39185fedd53c10cf1b77d0b35052d02504f3e6bc1a26e7cfaac9
SHA512003c6d250e7b2db1db94200fbd16fe5eed5a404f7a1b05392cbc8840624beb1756f85725c519f4041dbe5e4545d1624d464cac4100b32c1c2d6d72fa4c0e0f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc4162a6271b6be32a3ee9775b7c6477
SHA1391f9e48aa930bad3be0755fe9aaf2f16a8320ee
SHA256f0961fdda3a64593c7b03ebb69fd3a9187cbbba135b73c0c271868e257d4114f
SHA512b66753cf4c3b221c9ce9a91ac6d31efd699a3f77e7b285998b056aadb12585a7c0c9cfbde6bcfb0749bb89595390c8e223e8911a1cd29f938ebdd1f14b95fc53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5791344c06ffe449e9f8d9140d6b2ea4b
SHA1b4839666b191498b6483913daa9caf7cefffeb48
SHA256a99a52277d570d514af87b81b41695ff7724da0dc0ccf7e3acba193985765bbd
SHA51219af22b8e04e4b61938e336d0ca77a034d331f27e4b40b7d21a891097a4087a1c9565308a33eef47b840843fe4ba8cba5eab6ec251276b44b43380e080322e3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb3f2411fc89b0c932231f848a9f10b6
SHA16036ae211a1a29d2a84011015b24ac6f3acd1a4b
SHA2568d9b12ce9f907e48e1875baa6bdd5e744ad60030de02a7eba47515dfe9a16546
SHA51292dac6f9682c4afa9529616e8f7f3b843ff1bd603f6f988b8f024dd007d03e2d47620ea56737b34435803af28dd267508778eb04ac99ebe87b11d786d7299308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a1d42b374e595201734541a244b861
SHA1b47bc9e8f3fd691fa0b9ff62cb5b93cdf112e440
SHA2563d0d3c0f883b4af32bead6d1258e88c056d8a86504b67e10e5a2347b06c88eb4
SHA5129f177d90d4b5d6ab17f8de6e176266b2b5424d7e959d5e7729a3353497cf61ff04c72cea8f862841a035db653d7477d07e08f86d1e30ed148ffa27c69d45a21a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536f283adfb34686f6631fdeb72c80488
SHA139e89b049b681064781e1b94311fec0ee60a501b
SHA2569d0db159fe4ea552d31d950f8aecfb0bf719e4b76a9b7e4ae107625ba866a291
SHA5121eebcee6dee29bdf4c5ae51287b9e5a0e0d4c260976377689b04c63e342173da031e1272d5aa9f86b8e29cfe02bcb68bec9914c81687475bfb8697171ebb5412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca5168283f7bd5929a852f7362055ea7
SHA161d32546f6b64195955c14dafb235c5fd39f2a32
SHA256138d94b3ea566f934613559b85b468c39f1f7ff8e28e4be6cc5964aa066a4a7b
SHA51215cab7770bf92a0f99ea853bd5c6cd5a17551d0ba5afdd659ab25f556a387510270a2db6995615671593904d82e71f683894baabf8217d4513dc5cb1e8464ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b7eb9b193fa51535a584261e6aca712
SHA12d54a4da26efb0f12649384f38ec6b2dd4513924
SHA256b08787e8f522ca1d8e39044509e8f7baabe9567de14a9696fa93be28b277d72f
SHA5126455b318535c17346dbbb54e05a87f8aaf39aad82b7922550784239d76c9e8614ee1d52166b46e4d568577a9b256a9e70add705036d91eca6f636bebe3297939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bfb243ca8c388c3cac7061d6c26297e
SHA1bfb2bbf8c0d278e37d0a46e46aabafbeaba1efaf
SHA25642bdcf63796bdad885555528bc8cc8c7dbce9a5fa19a00baaeb69439b13babbc
SHA512dadfb5e0d5bc8b3bf1cde76c906169707e4d46faa3a746cbe1c6bedc6dde48901f8d4d0959f7893c8965038aeb645be07ce6b2f1c6298a5ca04c147555d312cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5549243f3ae05ec483c072811e7a37639
SHA1c8c4bb8f6a097f2a4a93b458d6bb6e50df05aebe
SHA256aad0859b1b16d661acd93be387489a2718066e772f50fb64b23dabfda138a970
SHA5122dbba803e78b98df3adfce92b327eafe7f79877d21c63ddd6be38da55ab8156a84cf68b1f141755338fa980ea6a62b15ce85c662cbe6b868a0348e53dbbf92db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552dbbe336257ccfa381127199d09a72f
SHA1ebd609a8903f2e85d723d93e837e05e9f550ceec
SHA25682b5eab71543e14862d88b6c0b5c4a47546b854c742e5131ec74abff39f25c08
SHA51249f0b5c4dde3885f0696091230f9f895134c5f826554f6b0b319e95ccc5e3c426116cbfcb7142f1f3bc74495918259caf632b486088c3ce66eed48631284ef7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d38cdd2c977f625c926f360dfe4e73f
SHA1978d67a5960d2a872a2c3ac4c69b37d69165cec4
SHA256f60a7c5c4a74735585bdb41b16bbfdfacc9cc9e944870c189cda3c5c6acff7a4
SHA5125ed878746376a522c4b3a60b480a7cd89fadf89c5a9955bd68ebd4b427af191fc50d072cb088bed1deaf28555455572706e6795717b422c5c324d67996e6ba0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5383d8122762e99176e6aad671cd74c8c
SHA13c46cee6d195813e9e343ac3ee5e45b6dd56983a
SHA256226dff91221da06423ebb3f15fe13ad455103823c7bdc2168cc368c073b7a61c
SHA512c688288540df1fd0752526c78b5fdc4ea03cde3dee327e643bfc662891d7cec525b33277628d34a8538cdd59c6814ab1cafec592d8c4a86e8d4331b88f043e35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554b054b5058b38518c321906e2c7e583
SHA1cc70381ef81395150341bd6e5e3d69e7d468c04a
SHA256bbd945f58290119dd15d65a67fdc0aa11ab574b80294ed492d77dcba3a243e69
SHA51232a47470b49f69ff4251902c3c4a63c332773a0d567b124f37167719359f3c7c15d7d92892ce5f5b8f5f65c1157942b566864c187f4c27451d4b93da2a22ab9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d2c76768264b5d16226bca75489d896
SHA1e532d8c5774c07f5b9016169283574cd9a967b5e
SHA256e5b7f31f2ecbadb4cd6b8079bbc8058baa5e4c25f2f59cac63b63ea6787a57ac
SHA512fcd54dac9e60a07be4eae5e6398b43e30642de73e9d28c73a9e1eb60c77ad12b1c00487d857f5f6246b8f371b32d2e7682234eb498d8803af3813b28d0f31bd4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b