Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
e1d12cfcaf796d8b16ea0199f3a4fa97_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1d12cfcaf796d8b16ea0199f3a4fa97_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1d12cfcaf796d8b16ea0199f3a4fa97_JaffaCakes118.html
-
Size
24KB
-
MD5
e1d12cfcaf796d8b16ea0199f3a4fa97
-
SHA1
8f5ca9c407b1661720196549dea441099a33c979
-
SHA256
9a855783b97889c8790c1e90b99769f864b306175ca15b2e8044c323518a0ba1
-
SHA512
a334fed8fe9399cdfba3fa68c3ee344d52dc866203a5220f786d2b350fbf077fa44f3a8cde4e882d7574abdd1c9d66326ae2a6138431b28285fc69dd195611d4
-
SSDEEP
384:SSqQOnm2LaUofoCrhfffcDzv6pvz6NYclY9VfSjVwffSbz4N/gLSA0fTA/9E2Qcz:SYpBKLyv6nixFyivWsi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432541023" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000009d0d4b50a8f8b5699a9c331a1400ef054c4778097b45dc0e3b2e96c30a04466e000000000e8000000002000020000000ff188eb05dadd2bce84f1827b1692782b594b4c17c4c660acde8d7a2b217176120000000165b923c344a79d7ca589815be25d5beadd6a4eba935bfc6a78281f4be4bfe0940000000f94e5274b6c983dafae764b1b1cf3db3613c3b26dbafc3a253a44916efff07a7e9bab639b06055c8dc9e89a725bf05eed85020bfda2d80da4bbffb1bf19f2844 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C67CCA91-7325-11EF-A7C1-EA7747D117E6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8066389d3207db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 1864 2364 iexplore.exe 30 PID 2364 wrote to memory of 1864 2364 iexplore.exe 30 PID 2364 wrote to memory of 1864 2364 iexplore.exe 30 PID 2364 wrote to memory of 1864 2364 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1d12cfcaf796d8b16ea0199f3a4fa97_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56515abcf47b794a230cee30fe3d87cc0
SHA15d3024d4b1f01f489b0927c8152ed244ca723987
SHA256785d60b8afdb86059fab0cd5e6e437ee3050ea964841c77078dc1997104fd826
SHA5128b33b5e0bddd0b0851a86ee56ce66dbdc52e2b15e0b8f410f2d0b34c2e6fd43f623a6add162d58fb65e956f2c9d6ffbb035c646f825058979fed0bcdac4d02f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555dd0245e4aa358ab49635bcf940c45c
SHA1c54a447da72aa92b0dd4e878f98e8f41efa73349
SHA25698098aa939bd68000d56f6f78ec2cf54d423dbb9540210e251127eb7bfdbc176
SHA5121a4b89aeca084ace74d27453658844f02f1d56a892bb17cf69766c4927d4446a1605b7150f39a8ecf81ec989ea3130827a086976ee06f9f78a9342e873752205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6fe899565b42bf07693ceee7f18ed34
SHA18cdd3c7e04ebfba6316dddb75e6f01b7dcf0e8f8
SHA2565cac88e243e8af67c244657a465f5cd6aeaa40d9b275f3d8b8130abce63ecf16
SHA51210405460e28f343cff7deee7500814821d9807459dc56329e9a581f8db95695f05ced49a47f473a42291e89841287540b2d222fab17755dcd17e913adf8c3375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb6a87f62d7dd14e9c657cb1a1a39985
SHA16bba1cd0357ab597a958328bd4ece6d79e96d44a
SHA2569408c5e0ab81d2fd45358cb54aa8f7a4445d31f916eadab510eabfddccca3c48
SHA512d8bce5c08c1a857e286ba99f7de23ae8ece3ca4142e66bb98ba6267e4077e179590d0d2fa3407f0cd67b5afedeaef1f2af0cc5dced64f827fd479177786fe528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5716c30b7e9d0c445abf479bd9b399ba7
SHA1f180c94bed986038fffe5a7861388df66d796c8f
SHA25672623a745cf7b6ea8325c25aef054407bc4e4e25e789787212ae17fbe2c82775
SHA512f4db7c95aba02a30161ec72234f718ba6f8c01160ec33886a0ac0fc0fb5242a60868341b1c8d975542299e2ff1838a3a5451a238cbabbb867e2d98ac36edb079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cffd17d85996bd3cd370c134cb964691
SHA12d9644464ce72dd9b89b0b58343c99c86d716457
SHA256a8e782bbecad0f0eae50a17352bc65300765f8c5c81c2fafa6b79c1b3106b868
SHA512aaafca4ed50b6abe71e77e8abb27a20057a22ee4b02c3902a45853dac73a99f6622407de975edf99d0c353ba5315af70bbe078335f51f3eb552ece267a104dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5705097e6d74b403cd2a500430fb42826
SHA112e52d6de14648cd56a117960f891c4789e1ae30
SHA256b82a273590e6a25b7d4af814b528de030e436c02aab0702ef753650a1c0d0451
SHA512a6860a415313f57ed97f3bb003573505e5881c7531cc624cf830ce7b356cbd3d2d2c1a0baceec4db259fe9215d850bf20118ce6582d41263357c37a9362cf4f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a17c50f0fff8101b1476a76a54225b32
SHA15055bb4656470ad8cebf605f10b7b578cc4b85d6
SHA2566e3bdef36f882c572bdff19090e30a102f11bb36655de42eed1c30a430fbba95
SHA512293f2c2f99174a098034a1b77e57c14b01b20307ae3f3c59d239276976e45b0974fa57460d261f0897613920d1cb3c488a8ddf484a321893961e58bb52ddb69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5769ad2af103d968be08d16b97f6dcecc
SHA103824f2a4027aa63de18e6f8db3e805b373bf886
SHA256847f2d896cf71a1981363dc184a71963c8ec1ad24b1a13992a72ed05e1cac7a2
SHA512967920ba8c39b7987d2cd28553edcfc716afb0ca9c5bd6c8f2bc09e3baaec3d103d9d9848477c6631069f089f79648b4f9e7c6dc6ee752fe17974af244e06b30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52de55b0f0ef70bec1db21fed232482ba
SHA1d1689ff13f809bf96354b8ce5836d9b6f8579907
SHA256b5b35b0205c14661e5ab319ba7a8b5b677ff16c8c18bb37ee1da7cbcd641ce5a
SHA5125006fe9d124db41e7e82cc581a61397eb97bcc2113587016cef844655594d0f509eaa308e8ccfe7a0d274c4e929cfa134485914c7673d3f6daa403e37832b995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5463855b130fe2ea24eb060636e09d4f6
SHA107e8bc6b5a5a7c44fa82d9faae8207ce33db901d
SHA256bc102c9e7cb69178610cde5c3e5a47dd2de670da68dd678597dec79481e00313
SHA5124d70cfa93bf15a43b95928b20f383908d1e97944a7b1de25b70cec5a27314c387c778a9575dfc3cd1c708fe064f9eeab26fd219d8c93ea8bac3891687a3dbbf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56594197d3c72f3bde100ea6619bb24f8
SHA12c1fb2287a9ee5a7aa95b499d1c5ef18b24ab906
SHA256fdb6f464320991032b6c55434e3e2d81cb3b767a876e96616940bec90f647721
SHA5120bbcc8ac3ef0769a858ba531e43ac702c8dc6e9871a45c93d7d278a3595b9e417ec96cb64426b3a1ab050e826fb32f26c2937584f42d2e62ece940dff599b9a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580fb07e1ae6c2e3ad30ff2e37d583c41
SHA1ce8d822e4e6ea8e591697c44e9f77d4fbc192044
SHA2565a30b25d985ebb532ffd09bb193be855964ecc4847046128d69e8f6041ef231d
SHA51278aa686e14b43b1b6f3a41584d0f47e19d2c4951774ca065b21d102981f8efd5cb8aa181a6d9626222b27830fda9cf72d4c8a144299af93e1986720c40579d83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540eb4735fdef29f99f89010ecf8137a5
SHA1dae82ceabec52faaf1e4f79925e109820b4ebfc9
SHA256c07e03ca4f8605c94feb0bc9503ac67b12b3b959a2b01f27cbc5e4164d1a575f
SHA512039be76152bd0424f041c3e016374bc842fde0d3b6b9e8bfa6730c31db0edb13dfeffcee314092395d4a481514aea8cac063b7f502ef45508b9a53c43d186dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ed470cebeb179b95825853199a386c4
SHA13b95168f06fa35607fa8c7fb691afa59fc7d8568
SHA2567201593ce24f99674705b930e9b5b01ffb9cb2b20dc7ad147dc83aed9e913424
SHA512c94e4a62aebfbfd8855c2e0e820611401a52eda15217cdbc1141a587993ac535c30edeffd4c7107e25cbac0d20495d1c5befb00fbbdbac2052454a192934718e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52879bebe7125ffcdc30f07be559ab8b9
SHA162954347795f8942cf5ac0330688c294238dbcd9
SHA2561d2ec69123b528d02d0cd1047cb130d0351a5af6b43b6a5685b47651995902b8
SHA512fa95451baefea23ed5060e96b088584c84e87670db4c26c5bbc2b2f22703aaac4125c62a1b827cdac8cf80663707e0028648a259c812fe85e65965e92e0ed4c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcb6b25bcdf362ca6c676d06c87f8beb
SHA1edf9af79947125203c6cbfbda38fe241912e8963
SHA256ca1666f5eb0ec76e37bd57840caba9a87ad036d4fc81fe1ce7bac1b0de60f9e8
SHA5121bb5c2149760375c56b76313f5cc53f8656bfad8bdd704a3cc94d00c830d863581a6e9e6abf1460fc526ac07af5a749fd62ca615735e6a27c439798f9677bffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cee13409c05d6a203070f2682eb52a63
SHA1a62be91bd978ebc509f5e51a8532e974f29aec76
SHA25634496a1058c6f6005c96529034a27e0460ba44baaff7cb7fae649b84c6f72cdb
SHA512f72b63bdb8e6dd0d139897d32b005fd21efc754e3e1715bda7b022e6971d2e40c5b8882824b9e29b77910381b8b19120cdf43424afb64e5fb3b59262c19c2b7f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b