Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
ea2aa38298b0e0d53c0c303ea0a79fcb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea2aa38298b0e0d53c0c303ea0a79fcb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea2aa38298b0e0d53c0c303ea0a79fcb_JaffaCakes118.html
-
Size
35KB
-
MD5
ea2aa38298b0e0d53c0c303ea0a79fcb
-
SHA1
3e784012ceb758736ebe747bdd9e6353c7c04ac6
-
SHA256
ae4834032e6739b6afe690f8499545da1a7da43ac6c231884a3038291c8f22dd
-
SHA512
4f9498d96e7712092724fa47e3b080c7cb7f9906902e9cfd3bfb6856271e99facf6c6376042502acf9dce65e9561c59eca72c853b2ef023d49661398c3ce94ea
-
SSDEEP
768:zwx/MDTHT788hAR8ZPXPE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6T0ZOw6u3lX6lLRP:Q/rbJxNVYu0SZ/E8DK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00bd2217220adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{40962821-7615-11EF-AF16-EA7747D117E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000cc52ef6048a87416a8c927b77067a404026a2707c8897f8ab5b5c63182122d7b000000000e80000000020000200000005cbf909e4b6a2116e3e198891081788310cfd0ff2a9d7e53ebc2dc378fed284d20000000b75e7023fb0af9b001a93feed2711d3725ea8b86db6d646ddfa7b8ddeb36dc02400000007ef1119b800ebf3d5e1ba5ca433ef23dea22f24da51efce91b9db9050d943759ed9af4a2b4693d1c2aa4fb21927787054b9f9200f482fd6ea4edb4bada26ebea iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432863781" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2708 iexplore.exe 2708 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2704 2708 iexplore.exe 30 PID 2708 wrote to memory of 2704 2708 iexplore.exe 30 PID 2708 wrote to memory of 2704 2708 iexplore.exe 30 PID 2708 wrote to memory of 2704 2708 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea2aa38298b0e0d53c0c303ea0a79fcb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f961ad3f387c258df4d500ae715cb9a
SHA1c5abe40c9bb3a5f8dccd9c7af93faddfdedadabd
SHA256044b7209ac445e636a17dc6f2577ae7442887004ff7112eb6930771c40fb8b5b
SHA51294e1f8d22f9a9401862ae95c03ffeac077e4829c4316c0c0125c324cf299446c42b847068a31fa9ecdb313e2698b87deb38aa83ed71c74d4c18838ace12a1fc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54627edb4659d9012c27568c557730b17
SHA156867b9ffe7d4f0ca03aab58a8fc5b590621bed0
SHA256d0b3bfc0d76a6e8fe7d04c5f0da44f8abd7a77eda3f7de4a2bc6400604b1c541
SHA512fc25dcaac93a9bed0fe40bb12546c5652f3d27b79a706ba1dfb2c0d54e2eb5aff0aca5ec6002533b79123873e96465d23e0e5f8c44cf3ad5fb3440af198bc1c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543a1b4a021790206b4ae8e0a07286cab
SHA160d4ea04577c5973bd272111993bc1d56d105873
SHA256fc49aa508fa050f92e8b61e8de411598284f728a6ca60d77f0719bd95faba1ec
SHA5124967552605f990c95249d587502d9a078c21d8f8a3411e8b23da7e1d2a465a22c76cba20949feafff611056f7f7e49837069b4aa29256dc5988904b744e659da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2cf45beb55948c1c5d2ccd879bd1ab2
SHA13aa933bfaf4813ab79717c6688cc7f41eb049fb3
SHA256ad3f04444dd5f96f9e77be3a4ca9fcb7ef5fb6a3a06c747cb0c6c6440603259b
SHA51210c9075b90924c2d1fb23b4b864f1a4ffced4c358d839c4c45048a6dc97c0e895fe8edbe71551bab2f439ade6135a115ffbe33907d6c2e167bede78b6e7fa0f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecf148ff819bdf029b4bac495f195b1e
SHA1d06ec89dadcbc8ac6ffc7bd49c2152d9d9d63fb0
SHA256bf128e9b66390c44d0a57fa1e95c751a2cf62e971a0635e0059c3122b06ce8cd
SHA5120df2e8116576850d467b14c373359fb95f926472811291a7c353fd81119e3248d08914be0a935ddf3eefd00231978a1e2d18796101e9ec14d89147c8f34af172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558b8189b0793fbdcd7acde501a377461
SHA1906b50ae42db9d96deb287d828e1e0599f7bed7f
SHA25678892d8bf6a22fb634e9ee4b2d65f5708ab7708449d10e601e31718186188eba
SHA512b1ace3646dc2ea62cf0f1ace6d003d596359ba33fe87b691cef9a2adea1e3b15b29160d7d9478cbecfb562582b63cd486a40ddbdcd3f43692199ffd7a93ef6e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506929098dbcedaa7f04dd19b6aa6d82e
SHA15af62fb0aa8e31e8012cffc63cb716384f85c668
SHA256fdaa7271d76fb234d2bbe1d17357421404058153c3be85aa07078ebe061ec22b
SHA512cc927b2cedbb0bdbcaca930c594eb76b4c7ef9da966a78298487e5b98662e16583367c3215c84f23c31f88b9e6376f5f6231acdc8d388d4c18b951393b2d2464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552979e3f40e22d3e0b418dd95ff4cf4e
SHA13215c2cea22ae0661c5fb965622733a6ba1bf6f6
SHA256d49db594c3bee195ab9fc28a5b6335865d6651011b737e3de311bd2080cdb45d
SHA512e8833ef9f4ed1a007c6989c9a243fe39c754c0505b6164df8bc8e2da968ee96319ca463c7a9db64c0526c51bde0553c79d943a8a5d5daff3781144be648ca8d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5490ef8b908cfa0b5024351baff2296db
SHA191c251e7c380f9c103b4455460c2f2b730822575
SHA2565b8a0d847f0f36c0d77d2fd5d48d9896ea9282415e2c9de6318674c4c62945f2
SHA51292f214002bdd124e5fbf8e9ada221808f7aa2738bff81cda41f73fd42806b3d7c5740e5f33874857b519e0f29fd1ab26ffc17c29f47e7fe9080daa23ff997442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cf05ceb6655cb01dfd0cd42acda8da5
SHA1fecc66e474755cb46de471e652ccfa13394f8794
SHA256e737c85eade687a0b017131ff11db60456b91fd69066b7c25ad19b2b16e9416f
SHA512e8baf71bc52d3908981db93a0e93187076597b72f4c08f5f62c85282b996aabc1a83f4ce5c9dbcd2aebfa06e76b5934ff36e7b67dd70fb04924a1611131beeb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576f64a486d6359ac810912296632ce9a
SHA128550b858aa6c9c74782587ef1552f6178ccec07
SHA256f68760aa1f2f2878e4274c5724bd9c53c78200b8674840f7111b2285321bb570
SHA5123ab2a7f08749f2ca0264e6718bc29046272a5fd72ab0de5ea7da91ff8484a2b5b6e0e139cbf29d707ddb18146d42ffa5d3aaefa4a3952b37ce8beaf5676f991a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f5c659ea52988cc766963dcab1fed6a
SHA138b2cb9bd76df46100a733468cc224566f4d3808
SHA25650a9d459db00367fe77ddc0033a334907f6114b829c8263bd7c505cece0e8912
SHA51234c4141f970d672ea9290c3fc1c86474658ce0951925f099ed7c9fd9c1c7065e72554c390aa0f94e2d9741f06789a63e2a73591333ae1217205134539a83383c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aef9f65c4f80007b62a6128314369bd3
SHA1f624b30552e7814dfd104ef6cd6412fbd16c52b3
SHA256b0c17cc3521f180a335260c0bbe89cf761231a7ec81f628fff9ceccae135781f
SHA512111a63f63e98424c74ea15d75bd6bad48a710c35e2b22ba087bfd6e31b9bcf15f31bcfe45e8361b477e4fe2512d79bc7c6e42a0bfeb2c2eaea6fbfb9f92231d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562f94cbf9b2ae1df5ee6ee5df19b600a
SHA10cee9f0fa581ead1ed9d0ed5cc1249a1c33b541c
SHA256bb1dbe1272d25ffaa2c5b71df7f9d753cc721b93f7381dd2f0664ac8172aa503
SHA51207c8ba299787ae9d3137a32ffe8bd7260696563ce8a39874686a0a9a687265805bff074a8a079829cd8434ac78b20752dd0e8aaa4dac64c39d494714fcdb2a63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac03b0209034f16dba93afbb2a3ae8d8
SHA1a1dadd0d5019f49df96f100d820acbef63a4fbe3
SHA256e00ad704a419c2067f8931cba320d89c44d28c36584a44118917ddc28f404931
SHA51297f36b2a8349d58fe93e7254b451b475ff9514657d7ca33552b221ac91dcc60b91d0dc2474cebec64d892be950cd7708e2df9760abe87b8d3999201a260b283b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b66972ba6d97e60f36707e3486acc6e
SHA18f600e169108edcd0850103b47f57ea2db29a482
SHA256c22d17522b38dab8702b8c8d41623463be70f759548a192fb18917b252797885
SHA5124251be3fc5783552bdcf8b423067e73a23c5e10b33e618299a6aafc3f1c929b8a0599f100352371947c4020f1bf6f0c6d79660f1fcf75bbb7a1076ed5447dbdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e23a28f106571dcba873eb5b782cb63b
SHA1971c7ab468d24d4ad8b943bb0d645187c6365c40
SHA2566dd9f8e607f0f01d0c194ac464f802d233beb9e7cc51bb20370d5fbe2c87032a
SHA5127721eb88efca8660ba0b4e445c44cb0788ffba704425c14e0096977d5b441fb5e1b06a8699346f859639884dddf779f8453ea8651df0fe0d708268dba3533390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccec23af4bbe4eb4e33432c3e6df6a68
SHA196785fa22cdc78c8a5e6fb26d2f53e70445ddfc1
SHA256ca7d4f3db4ae3c3ed2d8a4590aa9c5fb2037c041fe9c16615690c6e8c10fc2b3
SHA512373925a6fd1e17099d4e18ee1c6d8c7b3e064317fcd217fcf412427d93b2b0d74d5a6730906afdb4b1ec2e58c0d8c10686bc10629b6d041417bb4c71d40417e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25
Filesize482B
MD538db6ba422520cedf378d8e7a90f65c7
SHA1f610bd3a97eb010ae366ca89ff690d53e3f4e084
SHA2567679048f5ef96ee16b614a8871c752d3c8cbe59bba17a0fc6b91b1de34184574
SHA5126fdacaf8abb3b508e2d0fb79db3036c72a2e72f98a5deca52efd120b709872b5aea75ebdd931d3bdc43fae47c564fb31047caf299f5c6b23caa5f48df625efd3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b