Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 20:38
Static task
static1
Behavioral task
behavioral1
Sample
e9ee2102976c2aaec8455957156b6818_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9ee2102976c2aaec8455957156b6818_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e9ee2102976c2aaec8455957156b6818_JaffaCakes118.html
-
Size
325KB
-
MD5
e9ee2102976c2aaec8455957156b6818
-
SHA1
6ea611b8c643a5fcea5cb3c9a368cbc73c203b9a
-
SHA256
99d9a57a7845f15be311669d104b02e72f2738bce9cffa5c7b726f375719a29c
-
SHA512
fc0c6705845e10f4ca34504377f10568e696a193af88a053172ea0c705b6f12c8464c9262b8cb76ac82ca990606854cfcba65e58cdec99df7176e439006b9f0c
-
SSDEEP
3072:Y/8JPaXdkqxqd85j6JwawzMKI+2VnKpYtAgOlMccGxCARBGdCm+8dCrh2T8uWMR7:B49u2qZZL8Nck8Eh2o0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20aab0d40a0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FD8B5F81-75FD-11EF-BDBD-E62D5E492327} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000001d346fbb908c2d2983f3f085e1ace1ddd3f480a67e399902570c6c1e68fb91a2000000000e8000000002000020000000068342ac8fb2b3e3cd8539cfa0ede147f8e6a8289c5bf65cfb45341b6f70044020000000116a33a43519fb0c7aad395e58b2d6ecace66aa19899a6162a67b8f1753855ac400000007d783cc2a22b4b670e57550cd552f0405707cdf4974241edbee7ab9fcfb2a7c5d3299849b56037f8b32e0d67cc04e447519f2db32fa2e8bb174278dfd43c9594 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432853788" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2452 1728 iexplore.exe 30 PID 1728 wrote to memory of 2452 1728 iexplore.exe 30 PID 1728 wrote to memory of 2452 1728 iexplore.exe 30 PID 1728 wrote to memory of 2452 1728 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e9ee2102976c2aaec8455957156b6818_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af6114ef884773f34b8a50ec22a8b7eb
SHA14a481b3037736d8a5e1b999b095de592f2b66fd4
SHA256bfe6f1350c74eefabbf05ddb24e6afce2577865b6f7fabdec667506829f50ea2
SHA512d30b912ed3da3d7bc365a240508ee0e300ee982134603a9418a026e30eb5f79fcf144acab11063899cbfeefcfdffe0e8a7cbba80d16d1d496d32e8a984c29b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cda871f2e3f2a4fea3d808ca326876ad
SHA1626a9a183f293cdb9f3cb5b269bd3bb6dcf7d212
SHA25615dde6feb9bd0c1ea24c277d4453ab825a70c0cd8344d8fbc502c42b41519d79
SHA5122c6025cb3a7d466d97013560990f46d3f6c31b02c0f90eb328be3be13f94bd839e3ab2b17a2704fa134b61d88bd67cff7231da956da450feddb66b98adff0c2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537f5319ffaf0654effc8b7a84ff507bd
SHA1b9cec08095dbe9edfd9c2674732f2a595b9624ae
SHA2565fe906ae197faeaa9b13a31f24ec5b8845fd09124a644abf04ff9a1cd0c5a0d2
SHA5124e4dd9b5eded0b7f08509500b265290bc3c665e3ca2d83e2470ca7e0b7d9a7b6b8c0a9813cfbea7f00daab334bb160be7e21779bccfd5fdd46fbe02457243aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aada5aba8171cda7114e60ff6c5c1de5
SHA1e09aeba1f201717f9365af83da7ecd4c72f7a5cd
SHA256e68b69b646b2bfced9a2ab33c0b8dcaaeb74f96070f2268d8b83ef70a91b5edf
SHA5120ce9fea34272c3308be487b9c3376f1bdaa593bf79e8e0e9759ead6ae2c054e4b0c29cdc3c081ba131c98f88edcc608f1747bb309fb8930454692dc30e994f7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5014c2cdce10f1ee40f4c8b13bbb571db
SHA1c1f5b973b19feb5f9ef46bdaf9a99bef7eaabb05
SHA25674f8ceab08746d6e0f76a8c152c2d4c66b2d130d9b562bc0c42ba412ae3521f8
SHA512a84d6be1ad0f74135e81b826ca2dc1adf97fd698e66a07ceb7c552efe0a12b848e103c08edaa21774d0daa0e8796ed233a4865d97c90c7c14d630fa684aa25d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580febd9daeb0916fe81a7651881507aa
SHA1415b20376dc925fe60e238fb37d24b556daf3f26
SHA256c55a450a77c8b2bc915a87f773406338d394e5c9ce43c502fdb554362c4147bb
SHA512226681037c1e6b48fb61aba6d67f7b15ee9da854d580d0e54324b0514ddfd60ee2c5177029cbf0d3b638d25990cf87106125b83460f4d0f3d678f8d5213b0fa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bc995a3aca991d11ffa47f6cc41641d
SHA1a4d1badbf738ffe0db25a8d8978a4cc31de1b4cf
SHA25612d756ab45a119ada620d3fb7775c04937c29bb9a9e34ae8f556fbc40f031f6e
SHA512f37e27141b7de85006204faf5f84652533fc01dbc2cb8702a7fdfc7060e2cb000128dddba78b3eb2af2b09bed72e1864976db4e62a26bdb2e3c7a27119d986c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538fa3dab2b00ca411b350dd83b3877ae
SHA11f75ac44713f2bf11e33d8757e19b350c76711c3
SHA2560bda40a4c24b75f01d92c12d88ef8badde01ae4754cf8f40e2ca6667496c462a
SHA512e66e8efe17b0b0b8fbdca17afd7ae9dbbe1bc41abc1b135d62fba027179f1cabc5ac03bab05abc0af842cb5dce84e3e74268e65f9013b82b57c92ec30c8e5b0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5b9a261b0ffb827aa2b3f7e73667f69
SHA1f8e21052ee1c45db4a421e454c9037ca4ec1d907
SHA2568cfe155792a1919de90de4e516abd3bacdc1b0e5e6e1acc293abb21a465c5f6f
SHA512499d1a63a26726f664f51d575d2e8b50ddc8bee36f75ded51f6ccaf35b733e1a19ddc47e27e3257f133241a3072f0167821ae18c2b1c9e631e6b3bae269bb8e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffce30b6461d572fcf2b25a15577fcb8
SHA1c427e6229617eb53fa7edae1fc34f6e10fc3a03b
SHA25621400b832195e678e69f00f64be5ae3d4afd1a663a4d3da71152da84a671b731
SHA512211506fd8ee33882b592732ea91845b8ea38c5c51ffe1e084128dd3faed274e1c5abbf103105a63b3b0000bf0cbdec224d4c6c486dfb9a4c449cb85f41af4bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574db7ffacdfda9022df68d7089028513
SHA115209b63f40233e8e6c9a3aba042d5b63590a215
SHA2568c14fbdd0d49698b72eb2e0360c92f02d1f6badf1294198372d6ff54c84a3b58
SHA5122626d5f0c8535e93a97e6ae709de7ca86274f3b466165ee1eab2e7b848ce167306a08b01eccad803e3b300537791da28b61362681c47aca31d23527433dac147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b84b35e754ab21bcb762c323c1b14122
SHA107513437a3370982a431373d6668117fe3c224fb
SHA256ec819b4458703cc26c37febf1315ff710a4995d93770e0e3fb0410aeb7764f33
SHA512999bc70a9a654eee732077045236baa12160a76c93cbd10f6f3cf61bcfca962127707ce347208a85890d5eebfd6ea981e7d4c07c2c1c29f8644a453397a628e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5606fcbab2626addfe342b3ace8cc89b9
SHA153ba0fdc3c2f37c1b83a4c9ee7cf849571533a0c
SHA2565d1a8b0f3d3692686dfed03e90859794945a4069bb4e0673e8e77b82390ff5f3
SHA5126f6fa4310a80388287699af1960facfac0788aacaede73a213ac9be4b9ea1cad6d92a79c0c519a5617cd3677b5dd7c4bdcec3c0eb3b02df9330c1ea1973a43f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc8e5445c2e00603cb48891d11714cdb
SHA1e5b222ab94801c94b0e93bb12e581bb38e71833c
SHA256efb88b0452a99a6eaae344435f39738c30f134a9691bcaad4e882e2585df7999
SHA512b196faa5f720b14a2b39ff9e165f587b3191dfc5962db88ce9fd11a90aac646a530f7619af5fcc73d9e96f5d3617adcb30f19dab85a934e2c1aa37706b37aba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfe8e0109bff8dc1f092706645ce72b6
SHA180716710f714322bce1b7759deb2677d11249fda
SHA256f44fe2ec3fac30afe8f483702740b03447dbae95d24672744448f9aad27aacd3
SHA51226438a4e99150fb46ef0a6df54cccdc1e0b600ebc7dc8b8ebc1d79781bbf58a4a5a5077046d82f5ab7df747d813f8707657b6e236288d7ead385573c42f7b7cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552a8dc9abd7f04f523b8e71711aa2da7
SHA101eb421e2357583dc144c6a7c3f2aee68e62b6bc
SHA256b73c9cf756ad071b83db4e30572b4c941f0bd2d273fbfc0ec9198c30f2dc9cf8
SHA512cb47f2370446dae896dd14787f92110d4d362a8c0227ee1b1202261f5b9b4594b43380488e04ebba5668349082206a5c5bd264d7d52c5d446e616ad8d9f877ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b981ed7a62b94612e34f21611b12c514
SHA10f730f983d1545f3c929d27bec0f7e621cbabc13
SHA256582729c4da048fd07dba92f0689afd3ab335bcb134d71313825dc7f4335b4405
SHA512b99f64ce46bba237aa0a0c13d7a32c0b667a6b8396b05da4cfe710d2ccc83765bcc8fd380b5130817bb508241e3db160f91e21e4d294d38601cceb4e7543c3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579ce4b9651d500cd0fa5f1169fed6547
SHA19e62978f4ae220d06a59360ded882ea051b16a2d
SHA256e168a2b9670e2a910cc1c72d8b28b76f621e93aeb1f0de26e46b856df758970e
SHA5123395aa8cc0c38b15a372af83d6a0cc17878d0a67640cf38a7759457ba6909d5364c7e1831dc843bc84fc8e6f117589426b2278a830c674104147bc130e8f7a06
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b