Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 04:09
Static task
static1
Behavioral task
behavioral1
Sample
e1ad8c4dd7f6baf6a51ce58c91a877ab_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1ad8c4dd7f6baf6a51ce58c91a877ab_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1ad8c4dd7f6baf6a51ce58c91a877ab_JaffaCakes118.html
-
Size
77KB
-
MD5
e1ad8c4dd7f6baf6a51ce58c91a877ab
-
SHA1
58082d57ad54e62f311be995bb81672eeda0efdd
-
SHA256
49cbffe5f8bc560e65754addb0e51cfdd81ef5837b5c8f5d397157a0f5907662
-
SHA512
0adc7e4e3f5641c80b2449c81ba9cbd2c69d0deb3797759d04b22e8ae5efda2a7be5519555f9e6f230fa769f66c129917e6011ec87f84082aa573c60eee3cec6
-
SSDEEP
768:Zcd9QZBC7mOdMw7pC5I9nC42SXhuc+I1Pd:gQZBCCOdb0IxCaeI1Pd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 302e2d2a2507db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5319CD81-7318-11EF-809B-F2DF7204BD4F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000eae8ad93050f5a44845cb01c816ee5bb2f983e840fecd1c0af6c5d80cd7800c2000000000e80000000020000200000000fc61796f8e08156ef4a223e28f0cef2da671c954c2928cec3d251e6c608c0a220000000380c63cc12efae5aa28f483eb322e82b9af04466d5586cec286d14e3eef3f2fd400000004d356239523acdc6d9739f9c43e804bf83545628bb2d3f5265f8ed4a3bfd512397378df812d51a815dcc83fc93a442a590791a1f91826c4ce11835db6884ad5c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432535246" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2420 2148 iexplore.exe 30 PID 2148 wrote to memory of 2420 2148 iexplore.exe 30 PID 2148 wrote to memory of 2420 2148 iexplore.exe 30 PID 2148 wrote to memory of 2420 2148 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1ad8c4dd7f6baf6a51ce58c91a877ab_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be1f47ff23765c0442a7b6ab97874c94
SHA16f1bd9c150aa6a0257b86163388140d9e8f19b36
SHA256907bafec5d71090f32498f3b221c1b02e80a7aed79161dea1ab5e96c62efc07f
SHA512c960d3c9d7c332a842fd70d3a52604a8c38415883cef78832a046498f1e9e9be3050a413429671f7d2f159fd14cb09fff49b16f82c489f2a8c962086749775d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550a25772f86d9ecb46f3640bf18c21f4
SHA1f5c6549868ff1d6298cb423cf3d9e3734cb29e70
SHA256003fd8a65adb223ed098b646e55c8e366f1f23bc7c99f4579d90c74a68b1edc8
SHA5125aa48c5f3bd19007c591c37ef5e96589c3b219a737671b62d008e30cbec2fc80fd7509b1f7845717417076e475bb958109bd912eed13efdf1edf391502c447e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5479cb6e0b7edf6d6c678567721f0472a
SHA11d9b47b7b9ab70679214d4a3ec1de5546ce2c13f
SHA2560dde9f3c17ab0f901092a38266b63aca14f89ccca1e57178d6d1a9ff07923d72
SHA5126d95c412351ddef4e1d7f1264032e0faf063a7c93f6c7d67a949b612dd58717a9935942223fde99d5d70b76807eda27dd4bb2c7a57c6b813b538a480ec365f82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f41ca96bdde860b05168d4a02de50f3c
SHA1af1aa367dfc567f7cd6f33f759881edd940e831a
SHA256b65d84d756c2269e5d58205a35f557b0f2292e6ea61b8e860c9513ca24205f52
SHA512c2311f613d84aca8a5354ee125d09d201810aa050b864824c69ce287a0874f5502930069ffdc211ece1d557f7ac3d38e71efd8062569f11142899d5fa96cdbd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dab9281706ed7f19063098cbaaafe17
SHA132d2958252dc5aa617f4b49e3a51fe67c7c8bae4
SHA256ba8f4f8de5322f319e9cbcc5a00c1ac7d866fbb69acacc207215d8d59707e6e7
SHA512b15ec299ae262befcf5064c0453982a705ac707c55f729d2b431a562dc403dfaf64af6592089504eb2532277900a3bd887bb8d21e940ea1e3b555367d27e804f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563f05f35b4f9c33ae3e8f299d24d0e6e
SHA14ac3968b684406ea0abfbac94d90308018767629
SHA2569d37167b98769e71fdcb58d2827c0e6a07be30e6b6e805730a25688c6d9b4986
SHA5122af2e3deb527c04ae581996a7368ed7afd83e13c8e430c8dda2db1a698092fff95a45c6cdc925110a80c2e152eecb120850a5022ca5c89c1009db57c9b7652f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7007f809ac33094532108d73a20b60c
SHA10bd1743c05f60142e62fd1c6d47a689d13e2f1f4
SHA256219da9e96024bd457f999a18d6de02bbeb7cfd352846e14c11e37594dba70486
SHA512f28a9818baa90b3e462cff78c1c3fd9ca539288c49799a6bb8dca614ec037991693fecf9e69f10ca6d75af618a48f1712a944feaa35102e7dd2317769ccf8620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7c20bc105fa243f6610782e273ec31f
SHA1ede65916aa9f60f0ec78e2f15988647e2a1497b3
SHA25658b42a590da48fd29c83f3e06a88eb3301c9048bf7a2d067a1cbf0e309dad376
SHA51261f51f851fbfe9a7a2f6de6f598151adb26a1c487d639c6f175059355989de5eb7a3cc0ae177b0c25bc901463ce3e72c740e4e2916bb47c7d070b5e9c325e8d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ae2921caa84d084c35d46a8c53a3ba8
SHA1a9b4ed1cf5a2b4e814b31629d26a4c239286ee77
SHA2561558899c7e5a4c2147f1c9ea2f0f2dcd25c8292d8cd5363a4d51377b67323631
SHA512d0459eba2caf12e9607ee66bf774f56cf27953332d060542446cbf455ec25839ce04c537d4d1db554973a800c09faf2414377d222b40649cd2f4d3b0b40aed08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516d9f5a79d102014c5b6ea6ce503c889
SHA1f4243cf10ba8014bb4c3b76cd53d077c5be3445d
SHA25692461bcf087cd5f0b022111af77f8750769db72a37f38d8229823a7ea354d19e
SHA512a6b3a9e73691cdf90d34930aac61732970acc738183fb431661496b180fabc59d89405bf3d28e8ecf5f7087ffb0e5e3cb898f3dae5a1e6c73f1439167caa5736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5919272750362004a207b5fe1908b1a42
SHA196b389a3859e8131062160d5ee0cdd465ef605ec
SHA25602202fe5982b4ee7836d2d0911a061387e9deb0ea39313d5437c99e6382cd6e6
SHA512321698ff5948ee7f175c38258bc256ac4a078bbdc06723fdd6eceb5b206707fc737787f6de1d466b903b5932a736216d2fb4fd1a2862061abecedfaf5a1bf065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571f6743e05a5aab55913c44939c820a2
SHA149e510fb83498e8348b3c35cababd38a5439089f
SHA256b67ab498125cfaa7d2c41a3cd9070ad7a9dbde89b28fa1c68a087ccc7ac0f990
SHA512fed636107f245c5b77f964870c28470ef49a69902199093c6121de06e891a521cfdb31cecc7a3ba23e2315b9f26e4dbcaff64cff30858eeecd23f5d9455f7037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51535e4a738554bb8b86d5c07bc74c656
SHA1ff3a58d0f7998f43b034e0ea983276fadd31893c
SHA256feb541ad9a3bac91157e9c2cf61ba7afa65bd4395c16da282c888fbc9a8b02bd
SHA512d1a6b3b628d1ad1627d3458597098fd41c043c6a86d25302e26cbab039b3ea8d50fd58ae64d86f4dbdda14274020239f51e53b3597fb8fb0a2d3745ab38ca433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544d3e28ffacfc3ade231d3e338c53f2a
SHA1387c1041f021d14ab7d4652025faa0ca6ecefdd6
SHA256aa86cae404784ba0453f4b096b1e0aae86d54f9beea6327741b472e67a1a656a
SHA512daaea4e2df921c7b924e7d29793dc21dc84a85be6b3db65e9b7b30c48c5a95f482ae70232abbe91e5f5c5dc5e960435ba6dfb3df8ce21b1ae61c3d5a65b4f482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596e7fdb346d8267e1584d8d51fd498f1
SHA1c1fe66d12ba6a456aec4c52efaadf051d80a7668
SHA2568dac78a09fa546392f6e40cf9565655dc8e87b779a3826fc8c18260aa53f7bbf
SHA5125517ed4f519b27a0ddb0fc9b5ebf94a5ca18efd8903100221d11626b72018688af50e6e0e28535006adcdc6837ef2a4735ca7ca88401497494b868069a95beaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5591e75becc8468159ec4d9ae101bae44
SHA1c142c5829319f7453ac6eff019416cd9558f21b9
SHA256dad9d83745711b4945f602c100cd472866a46a321efe3a4fb9f45721006e42ad
SHA5126a10d194919369d24a530dae4f81cf4ac9135a364ebbf79373ce6db96f9bf59d8375827f06284cb3e3827075a21e158ac25edc8a7a76facd064aa01c810e0f21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac0f67ec2d3f10bb129b40e169e449d4
SHA173e078b835c6d58c4118b07cf74a4fef5e41733a
SHA25622a5ec884c9dbddc6f3721a4e92749255503e0aeb7bb0c1b548743f7d675806e
SHA512fa09f96f354f34be9be2dc89b1aee59666971b3637491b6b4329fc5c808188610dccb2872aa1dd23f74dde4681c00c83b646faa16c2d152b5cfe12c32871b218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dab8a049855b7026008ad29a7fc03833
SHA12d10f4426bca69d5cb0c09f6217663fca245047b
SHA256aeef473690e6366787b5e3162dba894a7ec877e8720d5619785d45b23374b518
SHA51201d3c2d5c492f887e77baaa44232fba3378121168c84291943a3aef0f68f260b34f93ace8e8df0b2131595dab7229607602bf6b83c0ea0acb513f28256fb02d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5012b40a915f50b881efc65e1c0e20c8e
SHA142f92ddc719592a4f7c67d945fb918866d092a19
SHA256ddaad4f1af9fe17e4a509f3dfdac629b80ef48e0346f4070ed0257ae8f4abbe3
SHA5128b6c0cf0e23d5e5d5fdba6475ccb27e12a545eb85e716c42294b9bf65dbd3eb2a95aedb957ffbeabaa20a55cfad5435fae362b7aef95f97a8faf6bab3bf7da28
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b