Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
e20a4c0b11a4d1c85cd8acfa672e9510_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e20a4c0b11a4d1c85cd8acfa672e9510_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e20a4c0b11a4d1c85cd8acfa672e9510_JaffaCakes118.html
-
Size
3KB
-
MD5
e20a4c0b11a4d1c85cd8acfa672e9510
-
SHA1
02916564e45df61570426c87c94d7e6da28e9247
-
SHA256
eb3602ec1d6aa4df8f4364fbc470a8fa62111b84862ded8c92ed83ff256424d5
-
SHA512
d199eef635c67293370c11f132f8776e34ee36e465d2b0333962a395e24cfaba88d7cdcce28ae6fd15af88127925c7554fc06ad6555fa4dff93eeafea8dee8d5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000008084c67b6fd9e5e780381ff06c10cc1175989c5eab3f407d0782fd080b1731bc000000000e80000000020000200000001b669ead98aa6957c47b602de9434b00805f0e3ee93190ba4a084359b92f6789200000007011a58faec2f7eb4acad7be93656be499a1d9dd1bbe0670ab34694516703d6140000000f8b14bf71cd32dfb348288853569fa4e6f0a7d550fdf501025becd74876c2bd51fa8e254f526bde8b351d9054b4d419e207815dbec5ba3eb228c1472a91adff6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 109c09434607db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6DBD8DE1-7339-11EF-9F7F-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432549463" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3064 iexplore.exe 3064 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2832 3064 iexplore.exe 30 PID 3064 wrote to memory of 2832 3064 iexplore.exe 30 PID 3064 wrote to memory of 2832 3064 iexplore.exe 30 PID 3064 wrote to memory of 2832 3064 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e20a4c0b11a4d1c85cd8acfa672e9510_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0fa6c33e36ceba688a6c018867339b6
SHA120951f5aaf5ab953cb81714f0ea0ccd2578ce6ab
SHA256abfc0e7d2ec0e46fe8f325456f4c473204def51224084c7db2405e4293fdb2e1
SHA512a142d702bea3c37f25703a16819116979dde07c2105de8fb6a707a6c9b5aa3149e6abafa92003b017cedbd52650687e527daf378bc9722b75f96b3f0233ea06b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f7232df40e559aed84be18a21a4c11f
SHA11cce294c28b31ec5a263f71347a17e59a2eeb17d
SHA256adf1ea402287958923c6401431bb77777a5c65ee8324e9c429d5faa2f51cdde0
SHA512ca6b533fbe0ae759e395fbf7e3ff8c5a1735d4660cfb33aac6068ceed8bd96acb45fb0f014ba8c0672be578131fa84261ea83633f1baadc1f97e58e6cafe35c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aefef03d94ace965fc0c0de5201a715
SHA1bc5b5f6114354c0baba34193caba8ead889d7310
SHA2562263f87cffce28c7c75dac482cc4b56725c8533ab4b8a875009742b7e4c62323
SHA512a6432cad1e755a8698de72e66f41b46d1b8c5ea7ca62e828bd2b99524dea52e752439b4d97e978c98e6b433ae5daa77a292b6944c3d8edc193bb5fc097cb6d29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c54267af3f7f2ea4a88bb81816d596ed
SHA1a8ab25b22f6d41b0e5fdd672c52de647c27cf412
SHA256cdefd97c9438340166dc6343f74a5b81b268f5917b3d22feb59f8fa4235e5407
SHA512a1b4da9302af5f58d701f84e74fb471f2c4a29a7429dfd41e6954715074088e40debdf2ef8768045eb223e64c818191660fb84809d6a477284be4d4481a8b179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ce7626e3453c711a92e26b6d8f0417e
SHA16bfee6ce6294d2ec342336270fa3b6f30f68c368
SHA2568af8303c2e462c8c9946092c13ec819726d0ce1c7e46c3cccb72adc1b15c3a4d
SHA5124ea5b1125ee2fb68bf441b056c724c9a700d1f3bc3ce48e353186c818b2af447e3d61e7701f1d314b2e4faa6d0657441b4eb60e0099fbe4bbfce287dee50590f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581f4739fb0e8a1db7e7967a58b4d9d73
SHA1b59dc371201f638f1f4047b0ce9206e184856503
SHA256d8c0f4ec0e6d83ed24e1f4e77b780827929588997fe03f90a5796ec4c7e27124
SHA5122fc0bcc07f07ad5e02fd8c64885846bcbbfe10df7d9f48f305a68ec14f33bf7414194f99b0411becaa2590e8f08fba4de10a314a2c780d968b5ff5ddd22b41c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd6ce5b72ec38b19fa0a0f87def19f10
SHA1237e9cd4e7a342368d09d588acf545430e179c69
SHA256486fec8c0edc26e16b094837f842b34eaab0884bc0ee41873fb91aa7bff49a65
SHA512f5a40078f51e38172d0d4ee12641bc9fd5a96f5c474a39e292a224b75763e92d58f39f8a94a1b67d6bcc78e08f20798b2e43f6bd746affc6bf4667f47d653497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8e94b54a72f8265ddfbca28573ead0a
SHA1f747b22d0dbec5c340fee0830bfc50ac463d5fd1
SHA25620076900e670374b7bd5962c84804bbddcd2b49bb2857f34122fcc0efa90d03c
SHA512177ec7f01602b834cb136b6dab411775326995b781a7a1a1326cc31a3b06d3786c9e72346a357d87b4ccdfb39d9afeecfa2956afb7835a38cf0d90f39ce7f2e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aba6476fed5c69d1a24dfd2145b42a03
SHA14af017a7f83e81a703ac12a7037499063090cf62
SHA2566c05fff6eac5d52d474ffa8b71e56c3bacf38e71e47eb41f175c1b99f6c0a823
SHA51238897b1993ba8046b0801bd476e2151970685db0307b40b4d36a713427ee17fab87ca5ae2aeabc151a4bbe6c920f9954c098a1fa3323136306bb1a89e1c73d50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c58835d2d28cc99b2d52384daa483212
SHA1266d3ca91c211c3e22b328d69675b00177644716
SHA256460de762ce2fcbce1228657176026e7f30189a4a1207d9b4c7f10f45566e82ed
SHA512663aff8645204b8c3a6efe4a79ae0716535dda48ae141d96b97900f0f74599a7676885acdcdca9483413d8af23085a2e6f1feaa52274d0efb00b5287f3a3c630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5289722d23be6cff83fedb12a49b00c60
SHA1a2af1ce0dd0951297882f705410da49139b913ff
SHA2560f8e6107c37a12b373120cf203b500fa5d3a897340d3cd2a0dc610de65287e2b
SHA5126c302387731720df977a2ea2c30bb253afc33456410379713b49c9f9ff9f88da3e8e0c815c9596b174d4a781e52fee9aa8db533e3c33f11a70475b7daf3bbe26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf4611e9ae24e0d41ef76a169c021bb5
SHA1ea12e2f1e683d75f142e7775621a7224aa5936de
SHA25679935528dabd1e1cf4c5d70ccf85cc49f1828502a75308d4f25359a0eb0de8c6
SHA51252ec98dea9615cd5f38e96583d179ff7ba0d50a3c8b0bd38fb7a4ec8c05ace850830df9bde556c5e28bc376da20847f35cc8d87b8446e1b2b1e05780b1166dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57180e9e09dc2a826e52d067be8047249
SHA1923e2a14fca287bda405b7c2fdef84e328c5f4a5
SHA2566c4a9aa1a28cddf54f922cf4b146aaa87c8e6611f8f51c1e206a40d7818fa2b8
SHA5128240eefe25b69a19876d0cbded0dae364ef2c648e99f24ad37d2a5f49e18c0270856ae1eaeb5b7ba2383c27d3d1de34f2819708358ab15ffe459efc538090022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502bce948cf6200e1dab9b5a1161ad88e
SHA1b93cffb354e84fd4270cb24672f608a07f31e098
SHA256e6a75b4ea7db2f55c8636411f485c11f5aa159c50ea228a84538f9c479a4a4d6
SHA512bda4f8f34cafb3d7662c3fe8835463782bcb5eb4b2ab20b77c5eb7c7082ca457fcb3288939fc36a65e44fd4934145ab4df2c8a823887c6431b8e8ceefd9f1969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fdb513827759794dc101ae70ed1a7db
SHA17f03dfd3388a95efaddaee6b4458504da4ca1df3
SHA2560d84b94d17f2715bb448f9206e6cb564e9951afa0a69fac34edceb8574487d4f
SHA5120c7d5af76109ded6f77d59158cc162c2d32881562cb9c05a675323719e4ccc48e6ded2b0f0eeaea73ae3914069fc295992e0b7fcf7700f9cf01e40af1b34632c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5280e4bf529feac1130882f39cddf1c12
SHA1968e2a9dc8f995ebe21c8a13df64fa100b6b807d
SHA2566c30edae0d1903edb86a8ed46548c126656dc3221abe6f1099a8076375fdacb1
SHA51264ebfd516e99812c1b5d0c3f6178bef0b3b7afa6fae817f43dcb32fbbc0d32cd1752636a862e1f4041e7c7b90898d2bd24f067f1c6a12e609f469aaf58cbd5bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c527950a408d1933aaf37bc077e6458
SHA1e0cffffa9b3ad89e7310d6d51a2754c02e9567a3
SHA25659ff9f24e736940214b6a2f3356373705979dfd843315b759b198cf5115ccbf3
SHA512e58d8da9a0abe0c17d4eb359c8ba1bf2f5c4ec24efa202aaafaf0db614c8c9d2415612ab000565775b83ec031fa952a84e9e05f1ac447324631e606037307028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2dbd79e38a63e5d21f1e473e963f264
SHA1dd508912c9afff15487a0d2e3bbaa9b395673858
SHA256612f235b272b862ba9ab3658e7bc0f6ac0e55ecb5d9f2a8eb7f853b6d31523fc
SHA512603b9886486222edab853b9653bcbe4354c5e53f72ef02a93792a3e21b93ca7549e175e8b98d6d44b1ab39e9cb264c95e1459214c79f14669257da57020edc12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5407c53de212c33ffee959fa83a6e0e
SHA12957640de1975aff9cf6ab7d6b4748989eec82f3
SHA2568dc19d89338d9c756c12379df02ecd60a3fb704473bd5e9125c56b5ec7aebd87
SHA512e78f464c999c7294534f21b9bd38cd509caf13539b098df565013b782b1a11856fad433e4508cdbc5778258890d6d93961353574893d5a80544096fb075378d5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b