Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
ea26b321624a88da5be2e08535da14de_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ea26b321624a88da5be2e08535da14de_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea26b321624a88da5be2e08535da14de_JaffaCakes118.html
-
Size
53KB
-
MD5
ea26b321624a88da5be2e08535da14de
-
SHA1
ff50fe9cf409582f59eb0735dfe2922c8a05d2b5
-
SHA256
44e91428f35f3792c8d65480829861b48927f069fbe489b08e6a77ef558be47e
-
SHA512
af24943a3fb4e1226661d5d846c8be4ec0e9b2b2ad13b4c23d847a957cc4d3244cf3a007d69d8dfadd2ff097b0e141089d53327df794d0b0edf806dff8998390
-
SSDEEP
1536:9kgUiIakTqGivi+PyUWrunlYB63Nj+q5VyvR0w2AzTICbbfoO/t9M/dNwIUTDmDh:9kgUiIakTqGivi+PyUWrunlYB63Nj+qV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432863054" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000b1245cd07b74a92139f3e02a990362749b9c6087f67b124291e3473b083cff50000000000e8000000002000020000000ce07f68a11d786007ae5236c42203a630b0d2ca383960196cf1c6f3938237d3f200000007b3b064034c73020d407d0a67f19ed22636271405244d222ff534b0cd8e4ca8d40000000bc01bd6fcf3ba1b6571913e48c79c6ca16ecb566ffa166157253a41d46de77ecbdcfc5cc92c11ee5afaf293463afb625e59cbba4d54e029a0cd3d8dc7464a72b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301e3566200adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000e89c2e93f323b6f98d5cb1230b2880a151afd486f51977b6376d7188a4150a99000000000e800000000200002000000036148fc45258c0ac2bfcee3c316f18c0a2e19931324c805747ca3f23d07f9eeb9000000072dec283b2e0f900872b97dea3f453bc49e65adc881c31cb7501ff40d751d02c30711ca855a60fdd521a206c1eecc8cf064bc14ff3028f17293f97c976ecbb21abc260eecac3a405c58f1e6e0221acdba8a3b2214fcdcf89f42d87645aa784ec7d884ba985a142ccd30ab90ef9a8478d7364dc0905a6fb18455f8f45207ef15f15c574becc156bda9faf376e08fc8978400000002ecf5e371a1da775f633e5dab8929518bc898908bb71e02d197db335ef4c2aa8a31738ed526aa7b35470432c1b869a0bb8e83c813a115c4cc81b090e11a97d01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8FFF4471-7613-11EF-9B6B-D681211CE335} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2804 2324 iexplore.exe 29 PID 2324 wrote to memory of 2804 2324 iexplore.exe 29 PID 2324 wrote to memory of 2804 2324 iexplore.exe 29 PID 2324 wrote to memory of 2804 2324 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea26b321624a88da5be2e08535da14de_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5114052ac012725d2b0b89050c70be769
SHA17c11e7048d7c8975ebcd8d8c03a3205ee1fc8e86
SHA2566e67d64b42a23c61d840f521260816d849d4943639b721ac552831f3fb928512
SHA512ea90df4caf8fd038ab5b353b68128b3b07a14ffedbd7b3295268c32740d725a0ba5fe71bd08a98ca6b73ac14d7dd4c67e788f19a30795505c1b6bca84f60bb88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aed62cca08aa943e526fa109c3f3b13
SHA1023dd2ef439c41454138d8857f75cab331c84201
SHA2562723b96a07baa2f8a8aea8aca913cb287b911f1dfad1a1d7b9f0010554a8ab63
SHA51217f67e83e96c70dc66c2bc14a973f41abcc02e6e25d88453b7a0a348871d574af3fbcfc5a7770ab89dfdbaf7d824cf6d8df36dc84c363ee020af0b7a4f231dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc3d42a9b53c3c3ddd5b59dbd49de34a
SHA14646f6adae497a9e5ba9a3e6c51bc8ff4d129899
SHA256e400652f8f109c0f902ab17bb55d21f753215e66cbd45eef2b2da73f14055113
SHA512f061b78e3e970df4fee4b4d944fc07d7f9050638d41b1438ff3771ade8aae77b9476361f41711a1a7ad96719dd36cc540f81ee9a38fcb5157b3806fc8508b1d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1dd95f180b385353b77aa76d6a0bc18
SHA136662ff4b19444d9a03e3f8c1dc6f27391345bee
SHA256044b8fd215b3d7c7382403a2fc811c24eaef0cae93bd7ee3e0f05f73bbe449db
SHA5129744e14efbe5d63ffbc3513a88cf83fd0a1150855a5c7223d1791efd1088c50ea6818030551a231d54c46fc3dc0a4e7eb4d275c33b8547741ea9ede1ddbde323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54feef0e34dad5d5f10a9c18be948464d
SHA157fdb61ea933393cb77cee290a0bbea62c7c35ed
SHA2561420504eb79b8bf33bbebca6d282308d0b6a4e0e0640c10318a71584c2cab754
SHA512ee1d2ed4df5ae86b7592243da3b2d89893121a459963086db93b84d11211d8f38db15d1451a39ce9ecf796c765f33fea801b92547d5c11e11d5a31c67573db39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbb9681906ed8201209538648c7883b1
SHA17ec22ebcc88cfc02d36424f4943381b3104f85ee
SHA2564b88b425696315d9dc832221fe72f1111e1c95baa4e8ff02849f7c696b3720ce
SHA512e84c0eb7cc5e9fcd091812eb71c62a2ab5c452e51c1a6d05c13e1df8b22dbbfb1ed0633ac8496ca469202fb9be18377009aed4a8b6e2d0222ea79cf22a1ccb02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb98a88bf62827ee5c28300b0581c84d
SHA18934a07744071d761714cae41c06b292a831fec9
SHA2566fe24b3615ed153bde376e30e9779a02a7bfb747bf1377b0ef28843f7445e6c4
SHA512b16a6f301a76702e83d2a19c6058f4d703a0883acef2409fe1e01bb95177452174040fce13f211b1a03100d6bda872658f72fae782f677f8a40456faef1a50d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a5ec230bec8e79e119105c0be2700a9
SHA12e29c838bdc42f302d42fa88b834d7c3e415caec
SHA256e3429cf051b3dd2a46bdcb6c5427606e6b47c872f66cbcf3f939e0856e61512f
SHA5129ec95edb789527a6f6529992e30e2bb508e76132584ac6b48565c54572458b3bc579d0078d01b59b335d2ebd25381c540802669521c97f41bb5828a47fc17c7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c380f29522481a9340c3520b44134b75
SHA1e17e532ccdbb8bbc471cce70446e3e189248c4b3
SHA256e9c897324d5378c756df65d518edce8e74bd64c867d9c945895cbe050da2f09c
SHA51229640cad29f0a2bc2460c0936f78593fc34fbbf8783e81fbffcaa9c187b45a18294c3696104e254512f90686e233fdc46b2a0d29b305c976392f80db7d8d8b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d4582216920b1014e22e5570004f581
SHA1839dfc8a17b04473339a23baa374d553b8ab1ec9
SHA25674afde4a43ac5ec48de9bb761e22d30d20b2e0b7c29ecbada9f36b3fe6451510
SHA512cf5223e7d5bbf4c4849d59a8f04fe3cf8e2014fcbbb79ff911129be93a44c1b076cfd4ff1c67aee22027cbd98e39df1bc0516f508bd3c7a3f573ddf17af51911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea0c04be9fb9fac2592b7cebbb5ed324
SHA12636037af1b1240b1de8866bffcd4ca9b9bd833b
SHA256d02b9238d3eba754196afbcb6b9d6572b1291c426daa235c43f0096cad6d389d
SHA5128ce5ff88f981f9696c312615b5719407eaa1100dd23a48a1f8792fb0754e33923f54aea9ba1de91aea69ef3c4d34ebaa27285a6bd40580c7748d9891ca4c9dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd4867fdfdc51d1506a76c9431e18a20
SHA1fe9701d0fa1141a955b254db8b6db0ac3a70521a
SHA256cf22f73d6d8773cd33bb744e8d947dad1f82295f940906357deee6faa91ed801
SHA512c247a5c1085f26a6f98e1890f74f189ff214fd7952a5165da858631f4dd803a773a5318edb5201de7123a6187bfc3ea16e24a2f1002d926275a3e47fc29e843d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2b03e28e6fcd04b861c5690ca4802b7
SHA16a82c280fb7bfd3b2e66f57d83582759f82dab61
SHA25619e27670f81730ac26e7a16c2c128df124c0d04e3d99de86585992e647886df9
SHA5126b328e87388a81091802979e1cd5bffdf141400a2a631c347e0aabf7ec3f5085c6bdff88fd51e49cb0f2688d58ed8c17e534b1484e0bee13219fc758a57d0d06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebb9d456ce5fdf39e9116416e1e8c36e
SHA1508474b5e45cacb4e22d0608fa5a48f8577e4190
SHA256e692821218ca2494d3b705b018dd09fd97b615e3980140f0499fd3eb0f062219
SHA512c68e44dab4fb398df5ded8bde0c0e5a53e0e0f1d6547f6efe5cff79df6ebf8a8b55c645b689373bd3e261652e6ab5219d8b6d969a53909435a725c7fa04438a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5227a4a398be8d9a97f3a835c1f838ae0
SHA1dba5b2128ceec091ed890734edb680f5a65b0d2b
SHA256ccd856d7061661ba9205f22d39395d54bf91d69a1500305149e933621ca60e35
SHA512b0245fb243a8ecff8bd374eeb803e9df6a3f70b3ec1a81f0d307ba6eb8d459203815500879994fe64d41a817a8a29ada7f336b5a56183f3f9683c8726f065788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b593e3ee8d58ccf16cc5959a8a7ed41
SHA1ea034242cd7123eaa1f19613123d56ad81eb4030
SHA256ca03fea282c493865514b2854ce3d68c1c283d1d086ec93ca3f440f0f82c2563
SHA5123b96d7405edb03c766202c7aa3997d1cdfb24b9b956836c8b446ea56adb833f90856725fe29b1c75d3a69c082bb42ab5d3efd48b692b509b4fec1a79546c2bfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f91f10ebe4cf6a81741bbf0548cb1d7c
SHA14ec4ec74f437f82d2cbb52ee83b601a41e9c3458
SHA2567908d6e4f4dc5c8e945426e208b8285677fef439a9c7c061d87bfde92f532aca
SHA512fd28bf6723e6b48df314a63eeab14007ba5cd92950f158fd806d4b32ca2e771cdcbdf89516e96b26546f5c19ac6474040d4a8f8f956ee6a6e1a30f2d8590bc47
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b