Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 05:18
Static task
static1
Behavioral task
behavioral1
Sample
e1c5af28a40a6cb310c9e147a4a344d6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1c5af28a40a6cb310c9e147a4a344d6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1c5af28a40a6cb310c9e147a4a344d6_JaffaCakes118.html
-
Size
461KB
-
MD5
e1c5af28a40a6cb310c9e147a4a344d6
-
SHA1
de857b2ce8af4030c27ee15251c2c7f20226f147
-
SHA256
5cfebedfa9145c9f0d6c0685603930c16eea355606f3c41138a7531b050738f8
-
SHA512
cbdea917108046066e7ec5494c9f7a94342e67e627d8f2c142c3c5807aed5c4d489a470440a3c11155760f04bbc212473954a60c90a9b14f4f25e7bec5d44b7b
-
SSDEEP
6144:SvsMYod+X3oI+YIQKsMYod+X3oI+YqsMYod+X3oI+YLsMYod+X3oI+YQ:W5d+X3S5d+X3a5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000027a8615550dac106801a063e60d9d717ef51214f4bcd3b98be8807b20a514bc1000000000e8000000002000020000000798f79a9373d43acb4ebe03718459a5d450e5285e3b7736e437a8ebb34856eb220000000c36370b6b70e9ae3da0f44bdbaad1a16d6f52985c36e1f3e016d65aa1f4fad1040000000358c91ad8e74b6a0e36eeb0100a3c26c872d634534367d7fbe5b0dc990521c1cea2dfc2444715dd785ec4f16ec17da839bd5e2d70a31441fb32a639e373fdda2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432539352" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60402bbd2e07db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E314D8E1-7321-11EF-A7C1-EA7747D117E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2408 2512 iexplore.exe 30 PID 2512 wrote to memory of 2408 2512 iexplore.exe 30 PID 2512 wrote to memory of 2408 2512 iexplore.exe 30 PID 2512 wrote to memory of 2408 2512 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1c5af28a40a6cb310c9e147a4a344d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517f5e6e5d59a5daad2312afbb41a0a34
SHA1275a163585ca628d08ff8780af854a8116fcc3f0
SHA25644163eb8c492149bf726c4cfe95f22a4769429eee9046b907d5b923e12884ae7
SHA51249c3bf60fdd1189b95e8a93977fb08d39ebd6ae1ebb5104fca1c8c41932c0bca03289f6ea09bf340190dc5cf9e6baefb0b2dd23b7531111ad71f8acc798d679b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b31532d0cb647a758308ada4b166a68
SHA18680e6c5e36647f4d999d476a3f74c9bd1b64d13
SHA25668e87630cf7ddd4eaa07de5210a0ca300e2874dd878757992403b66fde431c78
SHA512f2065bbf7551ac99d750885f5fb2599302b37a9bf5ba6a83f5324e3cfeee1a261e82db0520c0f460687166a5e6309d407be55f6126a073ed8454265c00277e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1b4739b13c4527459e068fcea8f8472
SHA10e779ec795e890effb4f84521395431dd5d91f7d
SHA256c9b102f99fa1a948d3394963523f0e5388dfabc6a52fd56afb77dbb3adca9e24
SHA512967012804aafd7c20c120735894193ece1f0ff10017d93098fe7e574bf24ce939a3b0d09240bf5eba68c12da67421eb006011d18a305806ff5b37963d4d589d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591fcfa83a36a37cfd0b011cc3cbb4c6b
SHA1b3cb50eca83b9316cbe07ffba40023c8782a5d62
SHA256c74f13987ac86ffc837a78cbba0ba3ae166eeea1eecee9204a99363018c69a46
SHA5127cd8747a1e65191478e0736bdcd28d0ed7687ce876639359642833e87db3a96c6434beb4a8e60f943dd8f3e664a223ec3e3edeab121cb5af91878163700b4815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579a57c5d3acfcc024e380643fd6492fa
SHA1e7dfa78d701e258b80878f4f9d95f931a6caf07e
SHA2564743c0bf95b8985deb6fb315660ffc63fde2770f8a58688fab8c226c249c44ab
SHA512f7f98fbe30a1b17402ab2ae082980ecb4dae2be981bc90a63f3bf7b2d674c1716c7f904cd1c0fdfe74dfe1d0d65d560016ef1584944a2dd13dd99adced51b22d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da08a74148452e61a38a73c9ac2e8e02
SHA11ee768119306e64b198f7cd2c7613c3c678984e4
SHA2561b01c0cf2a3fbbe8d42d13b9e8fb20d5ff716d9c779d00974bdaa3c464831e73
SHA5129346d09d2229acf288dea1030ffbd0c685ef12b08615b48f948b851ba3ec42580d0213c83c173c1e41ea6fe2b176e9d96cd00619cd51d859051c03e62a6ebf4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b93c12afc9cf8d0ad8fc74c40ba260b8
SHA1657d508263507d7d47c0398d50bc723297a7c250
SHA256e8e6372feb765a737f2e1f9781ba9dfa44ec27a6d29e3473544123b8ab2898f0
SHA5124f1e62ca9306bdb9e08118bae64bb2ffab98634a2e9598b45768723c1b513ac6fcf46d5c66af9bd85c591241f9c8d725438106b58c2d637cf6adddab637ac101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e425fad6c9fa56219cf7d7a8b2ac551
SHA1c709b48924c6b104b44d88802c0a2a34e817074b
SHA2560897e1efd874bd299774f280afdfd9a941a7db5ac75d5e1feb00203c1dfe888d
SHA512e7c527011c8383a936bb007076871ebaf841fdf14a891f615a0773267c183bbd1a047feb417be2d52a30b510badc6fe33bba94dcfcd54308783841018a9700b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea8e12399e39413bc2bd3dd84db3bf09
SHA16b242a62bb4f0ed0495181961ac147e82921bbe1
SHA256b0f5ec13f72e6bef1d102d4c34e33e5ddd4525ee8f31018895ea277fb975b02d
SHA512ef32e9f03718dfe9fabcf80eb6bd2617489d331c6969d9ff287664d5f995242f387d9ad679649cd599a624874332e04f5442dfda7febae89f3162e1ed5107d51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dca197af4fab48b7a1e2f39c529e16b8
SHA18a7cc06593474f4d326c5d6632685f91fd1dac37
SHA25696d38769abf83e66fb9c146d7182db97785dbcc28e6169e1bfadc3856f6328b6
SHA512d55bd57ff8be4dd1feba01ca999f3210d5d2366b25b667da6eba9d085608ac06bd484194397f921c1e195f117698f76c7ea2c061d632bd7f4d2cac41d9daddc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9da4bab65092517edf752ad2a38d50b
SHA1a0d04479f3b7fc9398a3f136e52b25cef961d522
SHA2566b5d0fe1e124ffddf8064c1311f05d0ce0009b8f22a1c4c5c69c8f5f225d5def
SHA512ddf9db825944fbd74d881995bbdaaa2ab6deaa0c941a809bb3a7506d4d7b272905378d47f26cb4f83de53c2d923c5b7fbd9f27eff38cda6f6e834ba026230732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d2d3cf838d4dbb114ee0abe5b1fad05
SHA1a424d95b19f5b68ad32951b1e7ea6386483183cc
SHA256cdb85795d9a5969d1ff46e1d02f376170c0b396bd9fa09a79286b153bdb569a7
SHA51217f9a5a230dee77441d5f5206738079fe333620e2c524d6920ea55c6bdbe3f3c8d1f480c5d4ee7c8a0223b39f8801ab85ce1b687d8a5198cdb45f50d3e5ebd25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eb97548e9c2a011e48a4d10e3a43099
SHA1e53466625e0f857d583f1ff67dff48f18bc39f62
SHA256d6c0868b3c23dbda90063b1065a665d135906d1dc418a3fd0ead0fa54047e52e
SHA512e47542ef5533720732776f7b429b3bf849f9defc4b987f3fe472237b9ffedcdf4808324da50d486b4d2dc1dc96310d5d53c68468a18c76f3effe4f13947b9ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537659aad7a7aa0bb0efa06e1c00514cc
SHA1706790277d7c4c2b5a2a3efefe2874ffd5175665
SHA256927e7f20b35044f790cd0503cd5f7ad6ca91f77a5e390a18c6e1034b6ec784cc
SHA512776e71f105fc2ff8c01411c95f0fd14e05ac53dcca12299fb5b58431350b630ae5839f6ed81a8cf5906655157ec567ad0af83f71add78e51757d3c943f678c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8d0043daf7a28ad592399db10c0579d
SHA10b598f40e0d7eae6431e92cdf3a6c359779eee70
SHA25602857990da1974d6a55b931e52a484d4c6889688072ab59298256387347e3799
SHA512ec49929fad7ce866db6e6c1776441a5637a48ca41c65229f2948ad252ac2a23a6bb3aa3da9e30511f0c3bd5c499c959a40c175bd4f64c7f9896ae4cafa91fcd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508a2df9cb18f7c0e9d3468d2784715a1
SHA1dd5ccac2ef9464c67fed9331edd5f0fc257bbd1f
SHA256f5504057fe82009ea767933b8ba460e04affb0e2cf40703495dc75bbd5fddb0d
SHA5124473e26501340cb8a3043e7191f9634c99121a2a8a3dcc8de1053cdca9d78b72f81e8d362423e00f89b3b21e5699a6b317273bd0bdfea507a134d30bbe54cfb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52039cb483c5fb686b0d6da15218725ce
SHA1be80939f9256ab2885f4c81fc6090ab1068ef744
SHA256543df6d631e7e341536310c2a9f5478703423304d4a2a0a099e6520703b40d1e
SHA512e2c5c80733d400de29d18a235d4896c8bb57871b515f5de5c3f663c6002915646b980f412b8481d7346ce5c6c52f9c247ffbedb2255feb337586a701d2e5af34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd4f2610e68cd760fb3e5af47dcf4911
SHA1e7760bc3116aa140de1592d20277a7388dcfa867
SHA256f5da03988c85a9fb0457d4dd86fd94289a52688f0b2897a27bfb08ced5ec1e06
SHA5126e5dfae40bbc4a09b628e2b0f449f377d98597856172da41fbbd7135a218f59ff57d638bb11a7ca7b4d2f575bb0ae9ced3c597759753aef6efd01d586f346429
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b