Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 06:22
Static task
static1
Behavioral task
behavioral1
Sample
e1e0bc80d1e96dcd3f9a4b675ade3294_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1e0bc80d1e96dcd3f9a4b675ade3294_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1e0bc80d1e96dcd3f9a4b675ade3294_JaffaCakes118.html
-
Size
349KB
-
MD5
e1e0bc80d1e96dcd3f9a4b675ade3294
-
SHA1
277aa7b04aa9811aae62fda84a47240ac1b21e6f
-
SHA256
479871d976c4eca145849b6f728bb1f34ca9b3ae317e5aa9d1683623dd6d8d83
-
SHA512
dd8436a8e4332528002f6c62c06a561399652358dd31b17c867c0be909f2fffde93a0491980e1b49cc292931438d43a6cda0687e2c6e6fa8e35f7cb9bb224509
-
SSDEEP
6144:SxsMYod+X3oI+YUsMYod+X3oI+YAsMYod+X3oI+YQ:u5d+X3E5d+X3Y5d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90dc76ec3707db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000d389f3fb3221f2d7189e3ff4e5c318abd7875364c2aa89f91bdfc5d894a328ba000000000e800000000200002000000046f91af5b99a2534ff877b9bd8e34b97f4dddee2503130065e23bce5d4a2084a2000000057eafbb1e1872914826ec79ae78085ce6dff6ece0cb518c02b2e78d8ca2b389a40000000929f425764847e1ac5e89fd6f638c37519f4f31038bbd57e3a0ed90c7648013cd984ad86d215f5dcfc70cdeecd9e6ac0c233fac33c0c714426f2c6463821ef92 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D77DF6C1-732A-11EF-808B-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432543199" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1364 iexplore.exe 1364 iexplore.exe 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1364 wrote to memory of 1528 1364 iexplore.exe 28 PID 1364 wrote to memory of 1528 1364 iexplore.exe 28 PID 1364 wrote to memory of 1528 1364 iexplore.exe 28 PID 1364 wrote to memory of 1528 1364 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1e0bc80d1e96dcd3f9a4b675ade3294_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596f6dd317b1be608b30476fb2048bf70
SHA16b02746b3f9e8baa912f033249db8cd76d07df14
SHA25634958938059fd3d6a1e6d2d71c91cf9b4cf57571f3d1eb7ab9ec558b9c26dc22
SHA5126a4de8efa07cdebe5b297e8067d55e9820026a9e7f4f15d508f33574f570ae7071488c01fc9405b92c10023ecd33c6077cebdac7ac877c8f6294f680b741141c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55215c7f1e3bca7c7a8a93e15bbcb4b5c
SHA142560d5be525b0400b6b70f3928a0913acef41a5
SHA2560db9fc9ae48208c4552bb813b23fed87e83ec639823d0a9569a9213bcc34665d
SHA512200c1fb1aa46692ac3ac9c1271f1abeb4c8bfcd351d61b4c7ef59282e70d97a9fd7f8d3a95c19fd508f070e57a4e2f5fd2cba21aa92d5d27e8bd7fd0ad609e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c90ae7458cb12b906ba3475695576e00
SHA11150bf4af7426a24a59649e494b12c49c75d059f
SHA256c5274e9b25feb5f75d906349e6c3b34d5a2305253491f3c30cad932ebdafeb92
SHA5120986c54712e57c9f60d51f0515074625d99f4488fcc25bf968a34261a6844d0cf87e6d13ca494ede7a2b6335bf0366b55477d5612a7a8d400ff58d78b9b5a0f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5621770292484d522fffa090a6e07a742
SHA11b1eceaef9231170fa7bc87f9685c10d057c634e
SHA2563392f7ea7c15fcf79b242ab7cae1d84db356d5153178d4c57e7bd6db341fc3d4
SHA5123d3733a104a0a8dff5be26030202b17d9723058feebe0d6d6165b963118e5102466a96d75e8811e23fbef27d671eee3f771b3a75568473569865d9048eadf60f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593848a68dd24e786bd7e479e3ee92029
SHA1fe867e795e71b58a1f3bcbb6d0889fab6d551b14
SHA25678f64d0bd5fab174af5529d885539237ba43c68cc9c78ac04f0bb77094a2affe
SHA512b9104c97b5a4b31b96000e5a9f12db30785d02c813fafb7eabcaddc69916ef898165e37ff522188b53d24cd8b0317cf304a29dd8f94ea845a58a291b109a419d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a47c20482bf783203e88d2079baee541
SHA1a6873c287f0eacee7ed0e0b812f5ee3137436962
SHA256b140dfc9a557667012e3902f76ca4c246e79fe63c7798b82954ed5f50b8c01d7
SHA5121c5eff1d7cc985b1b2c92ddb17d1f5fbaacd328788e29cbfb59a753ad49517bb3380acfe2209c92bd7bbbc0550589fe71e4dc7d4687f40cfb18a32e8267bd819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507cc324e8021dbc5dc8ada9b47a7fe5b
SHA172d1407cc588e07fb50a563a839f52c1898b2356
SHA25696ecb2d7dc9b1c4921f0087a2aa6f6211bbd42cd020db0d72ce2394ec5f90d09
SHA512664cbeaaa2e74ddfefe2f08fc73aefe8457dda5cd57647ad26b75ae90dd5963d6c41067055e4ddf480cde322985696ca1cef8b747d0bb7f43860b85af5ea4d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56166a515deb981776b503f41856859d9
SHA1ae2a407b4b93247b8c72b80c90073c0cc924edee
SHA2563b5a88b03eb68fff9606a7c9cf2942c14a0509ad3e52467468b2b17b612090cc
SHA512d8910993e579b21e0efda8c64f3ad123bfc19af93c1bee3bd5f9b2c5b6ec72d7be7fee7c72a3ee77455ed507ef4c52616f61cb219bb2abc6c5ca2a2a2b608851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5934ed432384f6886b16d99e0b5a63aec
SHA1625563e894d10586d8b87e2ddd7a34d5a6c9322e
SHA25688539042980ba55e0dac07ed8c13b38ee24408e66c54ce63ec0e5214927277bd
SHA512999ce2ef089d5519d63f70679e52e738083d7661d355cc1cb5c1944c7dac9ca867fa6e5e2a05eac49d73712cea0835611770c4c51e4c0ed681c0a16bec6e7843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e516f09f47d7bf92d164b2430e843661
SHA1a5043d45a1cd98dc0ce54639403a4c2c15eed055
SHA2566414f9e21d0721a608a09087e683c414d5e221ae55d5a2a8fbad50de58c4c88c
SHA512b7d2824bbfbb5adac353f94231e2b1ce16f7ce63a34aeb32ef4f1646800d963450707c9686a42a56c4b787d24b7c9b9a40123b3bdd9d4f71a62407f6d51ba1b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b412c42b02abda380c281f62ee3eac8
SHA10d34cf3eeff7bf0d5fc7726e94ebaef7e0aa86cf
SHA2564724376f4214174cb5960a051a02e74b61c3a3cae0fe6d86e8e77568e128af2e
SHA5125ba22d7014d447b31d09ef72e7b9608e8f7520d7760fbf9f0425e7999385d96eb395d85dec48cd9cb0052f912b4012254d83f077aee05e2dfea42d96a11c1008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b230ec8144648c815cb1fde02d936023
SHA12753abfc8234bc1dc27a7930242517cbcd01d16e
SHA256982d20c7bd5e0eda086b8a00d9d87f87582182714990fb44a8fd7cf6b5c1e312
SHA512aa9d4a3e3bf8d361a9ee41b9db79d1d46af5858f048ad7b7cd867ea272c35a07e30f329e0a0da01cd19fe547181c5ce6e66fe3b18e0c35f57187ae6c5af71ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de09df9edafb56b3e6b751d6e322a0df
SHA16c48669f5dfbe0aaf276aa3205134b215e4110ff
SHA256362b0dce029548a1744e97ae9a639ff4e7c58396a6d2c6caa42117cba26600f7
SHA5125afd66c46d22ab40b226127aeb4466f7ffce3f14e479eb8ebe4a9c3307e41ad9b5bce439a3a9d53fbbbc6d12a14cc3be677c87547e82eae444c11a18faaa6eb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536403bd60c82aa4124ca73b9e3ae1f22
SHA1310a3144b74618cc6ed944283e64b7c456efee9b
SHA256c42bb62a1f2439f16b3974a9cf283d72c6f27915313682151244239c498b3b4c
SHA5123b387b673ab843a25eb7959c3b97f3acc0c73cfd509ba2ad1b3496169bf8452a4af36ae75a84b733b29332e2420abb5bafe6a63284bf267b22afda0455034957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c157e742152f51f3e6657c8f841e7f2
SHA1c2efd2759adcc570c4160be86ba0461500bb00d4
SHA2562fdc606f9bfdef712c0ed14adf1f7903844571ce5ea83bc1d67820479a1f5362
SHA5120434d30d767ecae570f526e8ba27cf0bcbc97de31bf94756dd1be08570168ca3faf4c76d5f3370183d5f54744b8c2a8370c359ac166beda72782ff269d2e28b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3d93b10f44d6447f27e39d1f63848b4
SHA1bbccb5bc475df40cf96085e0548a428c359f95ed
SHA256a333e75f525f242a3e03945063e107049624b01930890f35af8066f72f3c9156
SHA512207519b4d5fcf760c67645c315e9400f5a51878c2eb5e8333620b34cd213c0eae8d7716c7e6794abe470bdf950d8763fcd5209e2dd248ee634736ba6aae36827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50853647940d0b8adc2b0ae151bd293cc
SHA177cc638080dd095faaf783a37a8822f742f5528c
SHA2561342b626c99d561b6597afc96cc2ab91234ea9d3bec17de9407ac0237e7133e3
SHA512c83d378514f56fdc90118f0f9456caf2e83010ff62e0c3ad8a6e7afb32aaef5db86bca648021022a047d2410f34db88f0b5cb466213586df999c9d80d9949a78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596359b5a658b7ca9a754504038bd907e
SHA13419362735ae8a0e185a9da068d36701b32d7733
SHA2564f2906bf71114beb8701c2bec7b7b2865bf1deef916b939d700f3f05eae4d493
SHA512e882492827f3515d13727921f5038b9c7126c0a1d45861666dcd3c24897a6c04c3286859c54da53f0fbe42996327ca40a09ff39c987211dc1ebcc63e459d72d7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b