Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 21:05
Static task
static1
Behavioral task
behavioral1
Sample
e9f8408df372060744f6ccdf1a50e985_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9f8408df372060744f6ccdf1a50e985_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e9f8408df372060744f6ccdf1a50e985_JaffaCakes118.html
-
Size
36KB
-
MD5
e9f8408df372060744f6ccdf1a50e985
-
SHA1
1b535665ed64a4689c536bd3f1e6a035010f677c
-
SHA256
4617847f6258ae68faf178cae3e84425db2098ffedd84c4d5dcd694d68dcb4ec
-
SHA512
2b5ec9a3901d92b8c90328243381f7ca9308018c4543d1c1893d5251afd753a93cc3f9f6f7c910b350461f92a11faae164de3c21bca2f7d94787b4f86d7e5d97
-
SSDEEP
768:F3ykjI3HC5C5C5CRd/rwb/jvt1VJ8CSLcy:F3ykjI3HUUUYd/rwb/jvt1VJ8CSLcy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ea8d940e0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000202bf15bad75e937bcd68ed09aaa08aa776be25813cbe73e334eb6c1ab45010c000000000e8000000002000020000000d2e9bd5ec5eb89871fe3554af90eace086fada553b847f0da5fed8e138f126b62000000087251cee65e4e13d4263b4eedba54973cad677e4ed88df4ff9c4dc563e4ce594400000007201ce68ac8cac84f44528a9a5a8057dd78a09f7734b55564ba2a26995ceba80cd6dbe4c9036169850da70f7b6ad8fbe5564ccbd7c3feaa76819e714a6b15649 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432855402" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BE282EA1-7601-11EF-AE16-46BBF83CD43C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2824 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2824 2236 iexplore.exe 30 PID 2236 wrote to memory of 2824 2236 iexplore.exe 30 PID 2236 wrote to memory of 2824 2236 iexplore.exe 30 PID 2236 wrote to memory of 2824 2236 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e9f8408df372060744f6ccdf1a50e985_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557dea8a94c7c0a727f03da89e0d66303
SHA112d741bee8bec71224cb33d8bb2cc42ef1085713
SHA256c73355467a4334950548618f76392a84be86a29b17ce60afe1abb94c08af40ef
SHA5127a97ab81306bbdea058c7f7e0ae34c6ddf5143ac06e5cd9273d290d6b308bb2f7f764a1ff8a418cdef627e8e6145d70e48d5d2f18920de2fd71e50a906ca9535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fd11fc3e8a96cb31fa9e9b938e50b87
SHA1f0aea0fb61a9bf7c817d0719e26e335938f8f9e7
SHA256424b71702042f1cfb3008fa673fe6fc98248dc92f6f5acbaf103baaaa9ad48b8
SHA512739525ba1e0bbf220b8ebb245ae249cc921ab880ab1b52a9ff3175c983ef013efc3b6f96bff2231e4e54ddd071c1359930cae0e0934b9c412846f54466604ac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f3422898d95b070c7e603eea4f851dc
SHA1a5007c9f63af82f97ea74c1d674e76e1f4830bf7
SHA2569ff961888a1e192d09dad6dfbbba6fc52a4e907672816b812a33b299f76a85a0
SHA5124f3c04d60806109e68b262aab859e7ef862ba6eb57cf8ff19436568b18a1ded1c4ee240ff4268092316ba3ddbbb88df23bd13bc552b5f0ee0d67eb02ed5c00a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acbae41f02efc7009cae5eda669076b9
SHA12929469479a36a395af1a39f6e0b56ba1fbedf1f
SHA256890f1d93e3bcee8b5f6931c673fa41f26c848fb87e05f1465ea46b7a020e3a90
SHA512b10668fd3281d101138d98e41dcf054fb61f1d66ae91ac6b987190bbc5361253f4bc409f01880fd9b76bd801543931b19cbc2f0a9ddbdd13f93e2785c1787938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c527a6efa4192f36a1f7b1ec18f88f6b
SHA13216acb9013a64bb9b3bab0bfc2cf0180dd73803
SHA2560b1b9f484de813be542e3745411c129b236e71bd2a845066690d07d52058c1db
SHA512a4ae475ba53656ab427eeb68ff31bedaebd2d4fbbd68090d743867b59049c6b5b45fed6249ce1eaa2d8e1b048fbca144bfa044bb02b8ea0032a6e9a2596e3091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c1c1365bbb66848471bf39bdcf673c3
SHA17baf5702fa70730ca93f0d868c0b983f605f1853
SHA25677486af05e61d1ed29b0c2a471120df8a6bc40989c3d457d41c63589ac031a56
SHA51208595b664d1eb637f24cd40b61d45ea125dfb68c9d8f139938122dd7291b28fd999c54969d1055231dd6dac8f713e0d4f67b492a74088582157f81cd0fd83a97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a544b4b3d3e3546e4fe5caf85e883864
SHA14f05194386822bc5a9098d25f7ccd2be84ea2577
SHA256e242c062c7fc0776a953f2b589aafafaf3de63f21a9b3e2371bb4fb5bda283f3
SHA5121544634f2a5fd0eabea484cde6016ccc5c7f1ee875eb7e8836dcfe3772a74cca38a8bfe6147c174cbaeee0b4a9d19085b61d028abc0f2d22f720c285b2e2ebd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d89edb6fc417ef68054297a057b5476a
SHA12f71aa45b36e86a396007a3e03cc9b8479002863
SHA256ae00ff2cf90ac6413c6f3e0c3845bc2e6eefe04c0057d7905ab82ad9f58ee5db
SHA5125f099dcf0a6b076acff4b945dbcb0aee01033c22d760748d2af91fe02cefc9c9b242047d71d83b84a5f01ceb23505f4ff27808310fd0b0752f64171b8bb2ac2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5990d9e909ea35875c27b3938867f7b50
SHA11bd752dda8d25359b01ffcf08cc10fb697a7b249
SHA25654a7e7bf454cc351ecc98fc556e4a795236d31d6755d7f4c77090dec1f48e984
SHA512f8de78c8b0b459f1b9f0cc6b3c374a7bf39dc2c15d7e43e3d007f7e8e35a05443b422d982c490355ae5527bb409c2d749fe1c76899060362e38ed952c75e8e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537a226f6a349d5671f75c6a3c9f6dfd1
SHA11cf64a2e276f0ba83869e2398c7c4b238975566d
SHA2563f626b56ee0e30e645436fe0a003e7434e1f39d539b9cec41c6a4bc6a70523f2
SHA512e6bc41c6b47edce0fb7c2b62f9314190267113246c02e07e0aa1bf3a6ecc516504f73ddfaa60f7579f611487bf2b2c48285d17f6a6ca51cfe024f9cfc6aabff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d272d60ee1a2b92bc94f8ab08969b833
SHA10edb90800298f90ce083354bf8525a174417f5c4
SHA256b69feb827431366817a33fd141e2779126e310eb33bf9f90e6286eca46f59a48
SHA512d33c5f0d5e081b0c056fc13af491abe2d026c42d2dba1224ef1111f1c3f6cd57b172829047eace2bccc45b2a6fa6d8ce145c727518af70f1907cfd7e95cd3564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56866426bae57886cf7b038c95a98c376
SHA1033027c04df65e3cc516196d1ebae14bc5bd8920
SHA256163388e185e9f1524f5ed35a92ca59a60c7ba5ced2ed8b893b9a1d4e4a021775
SHA5128a5a326e17f158d0e000367e2c8301847076417b5ec1d34b7ac9c559d44887c1b2a99e9e3478afe573ac8b2779dc7d1e22d5c460dc03cff9457141353f38fa3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d499f5f6891b6fe2181ca4dc0bf70ee5
SHA124207a865d9c7560c0a1d41d6f5d194e6fb70303
SHA2564703b99d814da8e920d64ab7e382f0e4785e8e561a390468a3388325a52a2e67
SHA51216f494bd60697c5aa5c5f22fa140c467b1fe75238b815a58709ff6965566bd94288ae4918c6f01f49eb9a728eb58b84eaabec71a03efbbcdd6b2d7af730bb9ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c1ec3e968f51ccf277a59232ef2057e
SHA116a31b24ef8a211a829115f7bdbbf3de676b5240
SHA2565a4be620a6bd2aeeb2ac3cfae1dd54234b1f24174db7d7a1e594bf49062e3e2b
SHA512d7f0b7cdba99848771c2a7ec6ac4bea374248bb1d140951bde8c5e0035caec71c7f2e5e4bdb4880fb9c74b026073d650c96653bdbe0df1eeb042455076b7bc79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52115e70b6fc6623a058d3546e5fa9bb5
SHA169c35e9368a641b26c37760125831386e16f3d86
SHA256927da01a1b322c7b18dadb79d8c73a1d38dff44eb882648daf12b6c87cd1016e
SHA512ff4bcd8a6eb9abc8501bac259bc1d9cc275e32ccb0833ce26cfdd227fb232e95ecf46ff566ecf65d4b359bd28889086913c2cf8595c242302e8f5a3872a465f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5253e777af31399f5d35b575772ff526f
SHA14d984ee32e679cfd40e0ff3e337c93bb72851e9c
SHA2569a579600d5ccd466e8b9c797083fcf5805ab69f15c0d369b116608a5ce44a5d0
SHA5120cd803dd7e441bed0e500b5327d8b7570c32647b86f2ca39fe1464053ad85c4eb1331598074ecbba9661effa2fd38b50a65b65adffa21f96f5cea6b30aaf4397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585bd7b0970bea768e2be371d54c4ad04
SHA177b57be22cba50998989b1772f265ad86c4007ba
SHA2563f3ca324cfe3f2cd59540f8a603cd404f4ded8c9a0efa8bc9bf009d7997c42cd
SHA51231e12c24190b2d8be01c597f5ef3af4496d444f7aada8ea672fb6522d13c924c0395459adb85a91dee4419e5cc72b7ab3769781e8057dc02629c3f200b9aa3d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ef45c1a909aa2dfaed302c8d1b36924
SHA1ca6e0a03be0d24a4921e2954b1033be5f5e1ff44
SHA256f88b92f1695f155de616a6978d05c250f9ca66132893649d70a58bff34e010d0
SHA512d441ada5902d6a77383c3c5bffe0b57325c18885783124c2efb03a65c5bb7bc547d0af9392d06c8e5b9a0f76383af62140bba2f9240bff0d61ec30c0f5d8c0ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deef9151d4bd5892a5273e6c0a4a19d6
SHA1ea98385d64b04c95a5babb1217455bd0037dd728
SHA25616da684bb73418c2b8b53ac8d2fee1d7b903fc512074e6ce206ed7a82d777670
SHA512f3618854a1a3860b1b0ff2529ef3c3cbaf4a63fa97fa4a3ccc7d502461b5b90d0dcb9fa014710e59ace870e12a1e25a41f0460926e78dfdb7bbd3785fbd34ef8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b