Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 03:07
Static task
static1
Behavioral task
behavioral1
Sample
e19649c31fe2d25f075ad61ebcd8b2f7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e19649c31fe2d25f075ad61ebcd8b2f7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e19649c31fe2d25f075ad61ebcd8b2f7_JaffaCakes118.html
-
Size
461KB
-
MD5
e19649c31fe2d25f075ad61ebcd8b2f7
-
SHA1
2d7eea0efc76b3d78afea291319e92ca1d5b1126
-
SHA256
ade19d5612805fbd51dfb2cf8e2164405adc752b7ee1392f5ca34d46c6b31223
-
SHA512
716a75b6d4a3b67ee3d31ef82834266cf44507b4d27268a2c590ea2d2715c23afbd08bf9a8f79f970e444e00e3880cf98595ef2d42dd9d455b69c8e84787bfdb
-
SSDEEP
6144:SjosMYod+X3oI+YM7sMYod+X3oI+YzsMYod+X3oI+YLsMYod+X3oI+YQ:C25d+X3yP5d+X3R5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 008cd58e1c07db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B497AEF1-730F-11EF-A76B-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000a0178765c4a564dc1167a0e0d05c2c88f8bd0d60085df4e9a7655db5243e9f6c000000000e8000000002000020000000c6304c98d4e22ee7294f123cbb5673a150d66e5783ac4c9d3b3a846870a7b9e7200000001c4cf76e9d9d4d0e9cfb5c3d13c2aefd5005729a56a6d7ccab33d4e5c4848860400000001d58b7055f5aff1ae6fbc71f4b4fdc0fdbf34b4dd8e7b0fc2f9664332bd12929b2365af24096e605c803f7a3686c0a5eb2bf722d357b684da1448582c4877110 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432531543" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1708 iexplore.exe 1708 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2352 1708 iexplore.exe 31 PID 1708 wrote to memory of 2352 1708 iexplore.exe 31 PID 1708 wrote to memory of 2352 1708 iexplore.exe 31 PID 1708 wrote to memory of 2352 1708 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e19649c31fe2d25f075ad61ebcd8b2f7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bff941872aa29d83d61867d544340e73
SHA12961f32454fc377f195f9464d933d752567efada
SHA25621d1fb7796f9b27f609ff2a7c1d722cc4be597c1648d9584ce99f68a6ab6c492
SHA512efefb08f237cb4c2628a9cb95774ae02ee4f5028014e76ce755bbec9842941076568cc8530c30b558d6d7231518292c35de91e060cd52dbb3c4007d0f7bf24a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d9e051ffbd7dda16ccb69b23ea704dc
SHA1f6014cdd15a8f538dffff0923b830aa3fbfe222e
SHA256df922115e9171bd743d4c7af0c9ffa6050c6c9934d20a54b06f2187cd3271a2b
SHA5125d0c2bea42e738ee2f72c0b83db74a93623f2f606fd93672c9e6417342732cfc6b534e6efa3941926afe8720f217e4e6fcf14e652ae330385a3c6037e336795f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58539aec5d74ee7cc1456daf51a702a92
SHA1fcef820b8dcfc8c804ef8d2cda58d04e1aa2e23f
SHA2561990d57bbac4843da9822e1135d7b607eebc7742265f1ec75d3bf8ae52665e27
SHA512e358d433cdc79792873645afefdb2779ba704fb69bcc065f63d2c6213d7344523761e2adff01d5c91df2cfc17d24de9adc5120dbadb0dafabf1662bc16515c09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525f3801a346267a446ba6df1e02f4324
SHA142bbd65ee884d2f69d5c5f751deee01f2be54de9
SHA25662f633bb156c53750370a27a00c5e4c56bbb5e44dfeff95dda2836b4ed1b5e39
SHA512f4462c7b6c1a9ec11a8e0c021135cf2ca679981eb73503d3dddb3832ce5bd64b225e36eefc163b54aa32054543bf2d7e047d2eaa9c9239fe5e843caaf87c29cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556d97993eee891ccf248319a6b35c531
SHA1a6b6b3f0e278052ad6ef1405a1dfa3c95fd31eab
SHA25678197356bc7d81e322e43cb6651477431c6a56bc2a80304fc6d6cfb381512b3e
SHA5129ee2acd54a18ee563eff2a75042a837c3e6014f1177e81a4621fc32820f34d166c738ae1ab02e2fc38359993375fcc004b84a80e842b0ee796fa454b14f5638a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff0e36650053e3faab4e82ba5198318f
SHA1f50238c42bc716a147f3d4f4fcf33b328602a716
SHA2565d4089059ceab7b02a234a9cee0b536d3fe13fbe51c0408ec0dcb085aa88eaca
SHA512f8c4ead2a6cef2df459f8928fb0c80856372fa94d44f4c9d3abd52f8a18d2a7270198d90d506616b177422bce89fd699ca5656f02c7e23cd4efaef6f2b469fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5654b372fe2d71c5a6af59bfe4a94e37d
SHA1a95c41629e59af2dd9ca8ee314e358b042428051
SHA256557e9640ed5affd79ac247c116e4ad7e82928795356a98bb3c927507191e88a0
SHA5125002f1161405ab7fe7a569ec0edf2cbac54ff3fa4f6a936e8e360e060f3917a057b21285fea2f8ee926b3d7b15ea500e0301ebf995863602b5b5f4e2576354ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5580016abe2af2bab800b7cfc826f30fd
SHA195f012117498185c11940a7f0197c8ae64cfa3dd
SHA2564b185e7d13fc564f566b3b172bc5ceb938b29c8054e32d6222e08182a487884f
SHA5126ef67cd56e125247fb74457cf1a8ff41c7d44619fd8a9504ff2428bf2aea0adf5f621f63bb23ac394fc76cff6d4a7c2e697954c7ddf899828bd6fb47abe4c4d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e8fd58148853e45d543e756c4355b08
SHA10fbcd485cf915085ce62adf02f1098963c8746a3
SHA25674c568d31ae7a471e308a6d2fa4320e9030487c5b05c2013b6f91b902f8d63fc
SHA512ef21a93687f2d06c8a37b44ae5a08fd81aeea7796337adda780551c360913b1794a5daa2767074173421f221124ab4c289c96972d3cb85746fc590214faef947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b8b7bd3a1a6dec9099c38eb5be8d74c
SHA139227a780e4d40e8010b4536f0af03d1f6d3f6d4
SHA256c91d08cdf8b4b22a6a44c4e4c1b23178b0685ba4a789489e41eafc6d56ba0de6
SHA5123678f773dca9831497161df5b5f7bac042efc6f7fa6b0bb50c02972b630db8b73f0ffb8a1d5aace4cb212533fa837b8aa8138818e4b96278d0e5259149792341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5964d14933b1d4a2cc0ac1cbc04d701d6
SHA1af5a4e430994babf2e1ba94640ee3749670ed687
SHA256a8de2e8ba8c951c36ecda4cd519e30ae84d6547ec654bef22904dc266d01c064
SHA512d58ec2aea0e4c3f83a7b13c503d67d760d3231e7741d41da1a453e815eec725968a9e547b37df39791e93ca94d8805369b2b948f9287fcb7f95f0f5238f408d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593d1e90c24bcc6749545c94be48770d4
SHA171a84fb86341154604e23b12cf828a2b5318d629
SHA256f5d06d1e60b76c6ba152f59cb8b7fe7328792691927984f4037f4a24c3505993
SHA51210f051342ed732462d8d19cb109ac7a87e7783723c318031d1bc9bef60e5cacba771ba507bb73f251259555074dbd44ea3a008003e6d449a12e4feaeec4b8be9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5748f381a7bbdf4f2cccbacf9faa65e71
SHA16adc2420cd121965cb8abb0b0ac66f510b01a924
SHA256d985c9e8b96b30d2fe1ecce84c6d75241b4e9574189434d0ccfa31b861ab9647
SHA512a5b482887df9576f2a57e4339e2dffe6e5122aca1027c794817cb6ae1b4f7a61dc6d7504ecad29070e7d9aeea1dac8b7b37fdab2e259004a2c9ed4ec188602f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578c01e21af024f6131b41616e2c14954
SHA130a8657116df5a23d79e66c1268b9d39dd1b5897
SHA256b6c2500faeec36ea9d34513a9cf945ae8f4d1b0b4e6655fbc7f4744df808add4
SHA5126cfd385044b6078576090788d4f9ceca59755001d7b9f05a7f5a6470b7eeda0a3e42f6004015db81c0fc3ca47e8ceacfc3b0c8962feb6d69f47c5b571be0cfff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e407fa0e0b5590b2c9eadb170d1d1af3
SHA1562c55bb596ea63f90aae2aec2dbead90044cabf
SHA25600c99c012c949e28a213d88fe77b62a59b0324b078e68608fda29e969ec19712
SHA512d92b5fd90a6131c808627d977174cd2888e44d240244d6ddad0d0faa541a6272ee7d44947a26f82fbb680efe949737cab1d4516774879ece4441ae14caf14d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5488dee76c487b3350f24d58e05d76864
SHA1cc15b2a5d468ca0e7a01be1a4fe65edcc8de760c
SHA256db3ec84c2dc1228f7a1bf3c5782a799211bd82155f46fc2a8a3e9ec7e7a4b46b
SHA512f2f7d5b5afc7e3e9254dc241fe9ab312778f0746b868d15a936c071f7cadcd98d28015da1d04073e652ec5799fe4180e3a5d0e6a8ac5f4221c7d6e7548338683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad19b2345702531f71b43e7d5f620387
SHA126d4233022f15babf8d49c0092a7a6357c3989c5
SHA256b29a662a4f793068db9726050c2ed8ea6095330090fa5c4cb1481544c2a6d4e2
SHA512b7f7734cbd8ed3e4d98961305352be20c392dccdfb0b94df33f40eb158d7b0565a02f7487a06cfa63f42a2e51207110dc1ee24bb16f0bca74903f56ae6bcd201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0c34aaf972f29154d80fa6234e31d48
SHA162cd5e05ab74991c6fe489dbce4c93cbbcb58cb4
SHA256dd18e456023ad35dbd23d9c66d5355dc28ff3bc0a952dc7afc4cf3ae7a78caaa
SHA5126261ae213eba9e8e00d13f6c39e02cf5fbdd7309303bd7ce91816be2c391340080d1d56e806453cb541db8f21146b4de1ee5c2cd7fd7dc9d608f2585ef92a24f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b