Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 12:27
Static task
static1
Behavioral task
behavioral1
Sample
e27a887f5b3dcd92ae76daa7b75728a9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e27a887f5b3dcd92ae76daa7b75728a9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e27a887f5b3dcd92ae76daa7b75728a9_JaffaCakes118.html
-
Size
69KB
-
MD5
e27a887f5b3dcd92ae76daa7b75728a9
-
SHA1
9d2d1e054ad98db8d9d717e16522fef0fe4feb1a
-
SHA256
664dd2ba60dc6147980fadb8ca771225fa20ef5acbbfb740c027b6699c8c1282
-
SHA512
ba443e91b6acd8e092c20365966e8c76e33102e07aeba4c4724977ea2f67cb46082ea411c2e1b090b04a6ecd5d9dac19009576188715a431323307bed98d1de5
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sLy6NkeqDeWdAeOZoTyS1wCZkoTyMdtbBnfBgN8/lboz:J34TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D7474661-735D-11EF-A97E-EE9D5ADBD8E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000009eb1bd5307bdf4531851b6c20ebb63f078912bbe1e3ac68667549a9ca4167605000000000e8000000002000020000000aab295bded9d6a2e1480d15b3510fe13471f224e9686531c25c7938c71cdb90820000000946c90af10e7a2bd8cc807baf525db96a8e1ed5a9925b6cf48f2f3f91be049d140000000aad46028152dc8dc22a65e04485e15510a9048c453f65e997b538a473644bd0c267238fe968fb7ca5fd20e46d8d4fe2f4b002a98c87983b2d709565fb0f4f80a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432565113" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40697abf6a07db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1324 iexplore.exe 1324 iexplore.exe 2044 IEXPLORE.EXE 2044 IEXPLORE.EXE 2044 IEXPLORE.EXE 2044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1324 wrote to memory of 2044 1324 iexplore.exe 30 PID 1324 wrote to memory of 2044 1324 iexplore.exe 30 PID 1324 wrote to memory of 2044 1324 iexplore.exe 30 PID 1324 wrote to memory of 2044 1324 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e27a887f5b3dcd92ae76daa7b75728a9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1324 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c208acbf5fd94b05897b09851f0beea7
SHA1e42fe6687ce363a63456046bf4f1e8924149f2ab
SHA256d9abc42fde582ef6abe3c2bd80facfa3945114d79383d3f70c36df9311596920
SHA5127e3cee063d5385f6c3cd702a78584cebc51c06f89bed109d485f3e189b315ea058b85b139e8715b8bf209c73dcb46655756af295b5264fc496e259cf7d3c0f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d95631ddfb09e8eb42ad35b039656b69
SHA171033d150961f40db7b222d9923f95f543bd99f3
SHA256aba91bbbebdd7cbc51a5eb5a55d20dbc9a0b4a77e68d7551469f3e899ac0cae0
SHA512ab2bd0af3fe2eca16e91336bbda8279a7e6c97e14d272a961154751ba1ead2eb3f46a63db78cf261c20f427ba40483442be652b1f4c44d68d597e3ee40054865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dca5507cea9ad3b44ab19d748f22fb71
SHA1602924a35ac0b40bb8a8625c4d27be3b5a1f73cc
SHA256b694384021a1374bf9262bf3220175ee4d6ac7e1f69e206823b8b84bc41ecb9f
SHA512e0a8d558d354c8b201f28b102f29cedcbc13b161a14913548e92b326a05657f9f22399154312a9836a9af85e43cbfc7e5a609cf78ccba9eba7db287d52b60664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd51cbe066d999cbbb753c2e81f134b9
SHA168463e5c7a52df9af2956625553b2ccbaf2d0685
SHA2562fcbc0cc0fa80a57fec3f37a56290582597f901e3192989546d74b552102491d
SHA512c8747e2b8ce8b2c1168119453e22cfacee91fbca8d4d1f89c6804aa95d36613f4deff8be7b9bf3c2fee7f2ade7390812f10c5947218f85b53b55bb796e994619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c47a0b05a61c9a30f168a8ae16713d7
SHA1929576dcadc1079b86fe4d578f61649af0358775
SHA256b3139fd6c8d089483ee6f84445b78550bdb5fbe5298ebbb4efbf646556309602
SHA51292475db126e4ef2dd70d4464b6e86672ae82dd43ac9d555f2eada873e552063b4080a8cd1c5712aeda578ce5f15bce9855d2796780c1e7f43f6b9f078c608995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a08240ebc41aa5c33cca8eb04539d6a
SHA181830a415fc94c6ed64bdef3d7c33542751d9228
SHA2569baf9bd54ac58e8d7db4c2b73f48acf47bfff2f28a8ae76685faf026ce1010dd
SHA51297559355e313fafe6661b64773a37f1ee43a8cade0d7da99d1216c892f21d46ccee2c8fd87917d9ccb1c805f0c3dc5fed84e938a9d4c05a99a70a3e97f900775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5477c6ac49c221e85b1953e4f49b670f5
SHA1c66eb634e7a2b256c38e4f31e5f22383360ae37b
SHA2564eea39886c22e36b1a785890b8609f13a31728f083df2afcf9b382b3149923a2
SHA512927d3f41c99dec6d439d4ed58bc6997c0db3d6a4a92682b178c01beea6015f3b172a5109b7c84d9d9ca5ba0bf802464147f44b5342af57715d0db4d7ddd4951c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552623995913e652c7090567a3fde6fa4
SHA13c750a7e35eda4a72d2c2efeea08e72d87847b61
SHA256128f5573445f1524e1787341c01509d046d357846785cea701f2b86d4a2085f0
SHA5127ff32513d234efdfaed7e8d2156fa826d671ee6a6bb7fb09b74acd0cb8a53e96c55ca8fead57efde48cea1ea71ca74053df2367170e6a4f6c49cf4c892707c44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50793a130a92a57cebf16f09f26034f08
SHA1bddab6ef5020a5cbd80a6225da2ca031b8e5aed6
SHA25696b60fde826ae785c8f6d8838afb4053ee4dde8cded5d96fa50838a0d4ece57c
SHA51277638d4ed9d6a342d52c003e93186d516064c3d6cd14daa99eb79caa6a9622f36d3ad299075f0773697fdfe76a2fb41fa806459e3ea4416c420d20b64ed9ee65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516591e51749a8929d6f4d005cffce059
SHA18e5f584b9da7520de72a5e0c0b37ee1ccd3ef089
SHA256c86ed68a5cad95ead5c7f35ebd6160134c76326d9a9de654b5703f1eb422a4e8
SHA512050c6cc7e26058d762ae02c618c73e0c92a76d590be3a75e22a0d2d9e970dbbdf4fe2c857811ed64a68dfb06c09b866d81755ac398bd722a4781eccaea31e448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cebb988a3313e45a130ae08be3e27daa
SHA1b2b5de1be8f9f02250509e5133cf63372bafca1e
SHA2560d9311c5ef21c736d9b68bd0ae914a447b1058da3092463b54ef9c246229f5b7
SHA5129f44af06e32ce980b1d1675dcbdf5f025e7f01d5fa7441fd9621506566bb6b15375bf7888cb64f2923246fb902fa83174ee1487f0d3ad851089752650684adab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1cfaba29d34477f5115fb4eb4e30ff1
SHA1cc6712d811921103d1a401866017e1d0c808bc5c
SHA2563aa8091082df6005a5049bef73ccd2b12616a6bd452a8eaaf2fc1a75e21ecb26
SHA512f65de5c9947642165c575323f1fe96e23bbde0eebe21272ed87b9d0aaa1115a838b99f6900c59b71b7c9ae506f4a145795b075cc50e780d027b053b6abfc7ed4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b