Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 21:11
Static task
static1
Behavioral task
behavioral1
Sample
e9fa67e077f45a5b82af231b51d8f653_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9fa67e077f45a5b82af231b51d8f653_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e9fa67e077f45a5b82af231b51d8f653_JaffaCakes118.html
-
Size
4KB
-
MD5
e9fa67e077f45a5b82af231b51d8f653
-
SHA1
789a9cab3afd30c109820e056278ef0512522981
-
SHA256
383b96f77448f58f44a0406cec25cf71912e5b506ac744905238b308522f712b
-
SHA512
eea04ef891283c9a14133d53a46af9ccc984d54a0fcb58af6ff6a04cb3c6f79005f5a50e069afbfa8f5b3112cc5436e07f3c566a729f4a8b059b05e033a92a5c
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o+YeXJd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432855736" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000eff5e79d7021625d920d988edda99b74340423b51c679b98a0feaadb4a6f94e6000000000e80000000020000200000009fdb6d11f6f2e70c165897d32b867e23f5a869812ff010135b0b4a18d864b5092000000086a4937a151a491edaee60883c3de6e6dbc9ffcde2e870021b84667c5bf4cc7f400000000ef7abfdadfb4b9203396902b375a040c2190b99aca71316f93cd9df0319789d663551997d1b46d4bae494df1b4edfe467ec82fdf7879d2a12eb31669e23d0c4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{86A63391-7602-11EF-B20A-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4007215b0f0adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 3012 1724 iexplore.exe 30 PID 1724 wrote to memory of 3012 1724 iexplore.exe 30 PID 1724 wrote to memory of 3012 1724 iexplore.exe 30 PID 1724 wrote to memory of 3012 1724 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e9fa67e077f45a5b82af231b51d8f653_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0149772d677bf5894dc82d195766101
SHA1bd9b4b141f838f2b7bd0b58583528e338b380e1d
SHA2565789cd078493efa1782afac0720008768aac0d11debbdd849a4104d690c3cb0b
SHA5121579ce9604d31fff622258c142468e5342ec76c389b3d01779ada84d7c7a6732832284360e30689f0ef6b01f41e54ee34e1278da690748c8593722726b42eaa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57675399a4b82c5eb3e3035a00947e466
SHA1f1ad7a2b9d5a2c1f2b52d3632ac80c36b1d1dbfe
SHA256bc46a928ae9c27ef1414cc8deede8196dbea1dc4d4cc5dba297439f885c5d2eb
SHA512b32e2cc4e1f0e12afc79232b5cf31c98e34fcb06be2fa01a43862757d486184f335e306bbb696d5ac54a9236191cecf439048c573cbfaad97d2a3dc5ea5b821f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fde000060d3e1388e8749f1138b6170
SHA1e61bb64c57a5cfc8a84317db3a93fcb6ee8aea8a
SHA256c230f035848b19c6ec0614ca2bc5de078105620559467fba4f7141b9124caf81
SHA5127c167e1c8c75467b33f237a44133711096eec2965864398538abc4bf3e237aa1aac9798bcca203713361136ee2ece21448ded6ec211894d8bfe90ed81d63fc69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5202f4397fd3e030be24def1fd1d89786
SHA15ed6a2b91cd026e229b4650ae99b2109359796f1
SHA256e26c937d0aa4de9571653ada16c714ac9333183f2e349fdeee86a75c484a67d0
SHA5129ddf81a15317e97cd51b0b731450974abc53f19b1d55891e70cc8af80467e8ec977695b4e0acdf57ba3f9f5bb93853aae9b9232ed93aa978552ec9671bd7b217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5900f1c3528a3a5f960a0fc7f0045f1c4
SHA1a01ef65ade82c526f62ec8557610aeaa0f7a04a1
SHA256eb6075097f8050d9cdfb23dcf72227fecb92b5f6efcc5740c0f810d8c85982df
SHA512cd88e3620d1683f83b24e3a5e659c3a562fe1c699f23fd5a2717437cd07158b855a5fabdb63c16fc67b82468ba209910292236c2e8c902ba7aff73a7fa841791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f4693b4610ac664f37674b0e88ee6e
SHA11cd0df968ba662051ae68008985cda72f13c34fb
SHA256a45fa1e99a4b88245a33e22cd538964c20aa6262c836f1c9876cb0ee36706deb
SHA51284d5f830a811d8571074020879b3fb1f95e2d57569690d00971c5ac7b3015542b122c267736bb8ffe349f9aa7a7df58655191220f5d43c873c71b26e1819e333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bd6857cf14902d40187521fd7cd9748
SHA1f6ff2ded8daafb2544b5166c424abd36541431ed
SHA256686b27f242fa3f0fa4a0743d41f66e96046f338f68b1429d6e73c94c5278a354
SHA51269fa8d9bdc3ab947a42add55d19de8dbe35e77c5d35274be971e5b6950bb2395f243fbb8a9c5cd6801a451a31d30a9d8be989de4fae02eeb37fef9e8688cefce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529bc37aa36aafe3b2a6cbe59bfa6205e
SHA16852a4bc840e5a6bd439a54819973890118b7832
SHA2565dbd4ad0b93dff57018eaa4abec998468485b17d5b725b2f6cd17e5ca117cad2
SHA51208c3d22e7d0a86bcad24715a43f34edf85eaa9b3dfe34ebf2e9210220e62782769b2f2d4f19858463313dce8fd3315a86a0f020f3fd90580dac645c329e86048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54caa68cd0565a23970bec57c184d0302
SHA16525c744d3b686393ee3094a59b9874f182e4523
SHA256d113948e9bb7410eea9b7ac24dff11e93ada38bc4d94aaf82e2ac0623f773b83
SHA5120a705af87efe33117539e9e476aea036526111c830d74327bc6e7721f192f88ed4d1b567d63282626453ffacb6f1112e80d1e0180f52eeb34929caba82839c72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd9f59dedad7dd71f03570c4e275bf39
SHA1ec181f44740693b38883b640da7b8ed6f8cccda2
SHA2563485d708492864e0905c1e68673fe3a4c7fa05eccf27522cf0a834bcff12b6a2
SHA512e41b6f23d57d60014ebf194404a1925d488578e85c456741e51ccdc9431cea579a15addee9ff4e1a4c7105bf2fee2cad218ecd2d1e15b11a6172011a9e21a8f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e612f0c630f69815b2923363dd75718
SHA1977bb1165606c5ba7a2c668ec3e952d102a2b2dd
SHA2567ed70144eefd870e826ce30cafda146059be54d76dc074d77a8fe4d98d26063d
SHA5123bd206a03844549c574f4c039f70adcf632cdab606babafbcae2f87db183e3e677cbb421ebc24a22d368ad3b24beb5f96cb3b1501af3d0dab86f0c80c23e52c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b3d9bd3738e1652d11509dd12cd9f3b
SHA1f15404a24ff813123ffbaee19a4b6ab4deebc749
SHA2561ba369a22ec61d2e675036e49f6513b4f980d8d8b06107f305f3f40971ce0116
SHA512d617fa7ee518f18de91d43c1a68161e83d15993a2e751c382f074f864324d010af94299067fa5538013941dfc40f3f68790e031bd2c7f373e0963503c3cf63c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dddd650e3ec48c6c7980932e27fd62b
SHA10f6adbce73eda4d271afc45c25ab5b8176dbd1fd
SHA256dcf5769e8bdf96783c9838ce5b6ae7ee7c3645e9329a5c12b7e657d9c9a7a5f9
SHA51285ab9c635988c0889922e4efded923ae03bce47f5e8d546922394d31ea551bf5358b1a8cf2c0a382f8ab20813b9b95b18ba4e33b19dc777621314450490ff865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7c8634f67b0c0175bc48b2db7065060
SHA11f2f1a035cc2d9bdf0b7b0b29e4de7e758ab03a0
SHA256d4c1fa94179656fb334cd8b32cbe834837bd3fd9494feda17cb3b9548136757b
SHA5123f89f866f568ed5690cd2ca979d643b2c141e8c0a983c6ff6d4b04540beeaad9645cb302761f063fa9a9f02c794076cb76fb365fbfab1689ad9f02ba5d62be1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8dfdd16bdbb462720dd149308aaa3c4
SHA17c1b80f057f52c6a4205ca533d26239da89bdd4f
SHA25612c526cd06b6a0edb93065dbee7dd96d08eaffb50d23d5ba1a8326a81a408b17
SHA512dc0415b9f378223ce6af5a6be5692902b50a8e4e0a55fc19bd26c991241e1df5d804b7d539016aef4c201bd9eab36cefc5d2033c0a8286136a229767f032cf41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cdd0dc5b6b615dae786dbd721face84
SHA1b91d17cba912f8424d7375202bb885e1b0e91562
SHA256eac44cff66eb856cdabd3aa6f0f7fe7e907c0325ea6216e22ddbecfc3af208b1
SHA5128434017c74dec73ee5d1a2d4bf971506c54990ddba62edd6b34166b0d6d757364aa05aefe6aedc99604ed5dcd8bb9d27056a32e03f24efe1c356c8ddbaa10acb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f9f2d0c4046854d0991b56a9399adaa
SHA1e3e34ef231bd8037656bc85f2f4b801c8e55bb09
SHA25644552ef0f060031e7c941a07c9f2b85fbe508e3cf422214f6a5a56dd8b9bec22
SHA512deba2a6429e8eaa67e57952f4ea9871acb47a4079750e90517402ae6d92780b4baabb5c5b156cdd94444ab71d80f35c5af8a7ed82f3aed7696666a56454c868c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d5d0d364ff6c9b0611e8e940ac60785
SHA11f412122fc1e603e0846343ab54719e0e6200403
SHA256edabb98c261c5604731b9ed6e577834069bddfcc588e1792fcf7b6041234e662
SHA512f83b2e90dba9bd33fb6bc8b3e292bea4ce3bb60bf221480400c6a96c5e948992cf506f3a6a6a333435b0d990ab83baec09b6690c1c7773050f334de25f084135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5622cb4e9f5dd677745a05f52a4084181
SHA1e20885bbae18f5c2ec544e244c0f3669c31ee35a
SHA256dc00891332ad0cb9a3cc3fc0513a03414753e14ed37330734516f81f7e12f2c8
SHA51265d5c711793d5c58672e7883cacf70f54bb169237e11e2a75dbc628398a9edd7938510cd4bed48fe06abda022f0adfedb8f043e5dd3027fa5927f5039e631c3c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b