Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
113s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 01:50
Static task
static1
Behavioral task
behavioral1
Sample
ea5e7c82a9b55e7120a98cfd05e424d2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea5e7c82a9b55e7120a98cfd05e424d2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea5e7c82a9b55e7120a98cfd05e424d2_JaffaCakes118.html
-
Size
254B
-
MD5
ea5e7c82a9b55e7120a98cfd05e424d2
-
SHA1
23decc6787456919d0e05f0dca47330979b83a54
-
SHA256
654e571480ea7e14221578b0abbf824e8f12abefdbfc5660e4e63bf8546bb62f
-
SHA512
8ba5d2e69961b109d5e5fe1754ccccc46c7ed1a6bd2883c49db3cc0f5347776039ab8c64637b95a839dcf74cadcf169b821fd9967af6cc35c222c331182d4230
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000044612ed85effa61229c3b706c68877c08efa0750e5ad07208481c768205013e1000000000e800000000200002000000092d7d8965ef1f5953cd6c6dd50e10ee557030c535b55ab895172dd1aa4751c3190000000d64fb87e92bab63342d818f5ad71924cd0ee8fb9e09960a6ed264cdc6e5a28ee880d1cd6e8b49e071f5b85d771d5ff504bb535f75aa32ed326303e7385a02ec773083aba73262290c21db249e447a861c70d5e5935c49e1e0c14b8734075efa05a58d7a59eacb70274dcd5eb58f3607d337ff28a946ff4f7aed0f2e8ea3d28502d0a8d423422d47605eec5fe6047f14a4000000040e8c04095ff45f6937483bbc74a6a8b985bd6ca73bec28c5c06acf5b1c0dc5009b64374ca9c4feaa98d57bc25d21a161808c8a377c49e7a3c98d536602df428 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30435655360adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432872478" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000760c5566295a69456665d76fecd21cfadbffb884a591d84c12cc769c97098536000000000e8000000002000020000000040c1949d6e888bda360f491661bf7341b344e125171ec4584769d67e567b39c20000000a874b5b39fafbc74bcab9746acbb09c08fc64392861b91e0bb7b9fbcb0e6c94d400000000da7ccf1b40e20004c24b354ce299dedcca7d26390e7b5398a0d93f3f85f394d3fb9033805cd6721b5e56d570421c962eb64708ab564306a31181cdbd7aa6e22 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8038DE51-7629-11EF-86DF-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 iexplore.exe 2356 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2540 2356 iexplore.exe 29 PID 2356 wrote to memory of 2540 2356 iexplore.exe 29 PID 2356 wrote to memory of 2540 2356 iexplore.exe 29 PID 2356 wrote to memory of 2540 2356 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea5e7c82a9b55e7120a98cfd05e424d2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5338e5518155088972cac9cfb6def0c76
SHA11c3902c6fb5992b5604635e07a7b56fe26831fd5
SHA25635a4db344beb8e075f6169026bcd14589dc57c5667bc501f81ef6e85bafa88a0
SHA51278abc7546fe00bd85fb8d4d1b0c55f3ed01dfdf354dee54f373252944a8b83a6a19343beaacff4ffc032e97885d858ac9b527324538747b0ab3ec85ead01e658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588db682d62f81e741e76051fa096654e
SHA17f86dcaacf1ae23977a968c18515ca6377c92c13
SHA256426378cfbf962c1de77430ed34734dc077235b3cc5f76eb07ce246a2e925ea41
SHA5120c196f2d6ec5b62809a7f72bee40a5af87112f7d254c471e60e4b517d3537420c9cefc12c357ff666ccf6fe259f47ea9a095305e217264cef057c728ba40f8d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d2672eab78dd6ca70954c5155c91a36
SHA1d162c30977980f1b5ba2d1e9bcf2ba7602aa6603
SHA2568403785e5dde490b2ecab02054349d7512d7c1c181862a426b9879d982933f47
SHA512d4af22cb371880bfbe5b75efecce17bbf3f442fbd28432b1caa71e1a4c6f39f7e9f719d906245b63c69734b62d18d6bb366015a175b8488565fe08ce303ed7fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56069b9169f22f954eded9b1696dba7a8
SHA1cb101c7bd2f5c7909294088b0dac8582889ca9ca
SHA2569337388848c30c859f7199eaf9965068477140c25e54b78ccc752e84292c213e
SHA5124cbecc751c52d29b5d29478d89e49b0c4d0534288b05f46b08bd16df9c544623110ebc97724dcc63bbc2da9e5271a1bccf8d98796452ddbdcb64b9cf473fa78f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596f1fd1d3568f1610a5c7b501be8a0a8
SHA1fc96247104250f9fcc08c654354e497ed1d516d2
SHA2567e4404fb0f8b0e144f29d70d35b8431148c157b855440649c43cfd775e0a1d7f
SHA5120928205f2b0bb04eacad4269969199c5f79bacec0159ed9be7a65711c644eeb7ab7d331ba735d7adff7128ce2bcba2e2ebd06059e997dd4c37a3eff7b2ed855e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51986d3c8f0b2b089f471e1c39b21b87c
SHA1df3a19931543c7e8956d81af45a646efad6cb006
SHA256af5eee711a5593f19db4b11adafa0964d5cd2af53d1555ac0819931b6e95dfd1
SHA51209d9f0fea9590777626d03e8402f37ce52de0cdb0897d7bec2491770702df0f883e732193e26983e5e93d43b9d0b51bec3b92b7a1605fb579d1b187f0d46b7fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56329e6ce31d9597e169fec6328ffe0e8
SHA1426f3aabf409b02024e3effcbc7244a64ad5357a
SHA256efe12306dfa10b91961b7168030ebb0c3245adcd69f21f98f79c911fd0631874
SHA512236c0ab9396f8ac19df3d4c6f43b7bcce1f696f65517e3a259f64b8da4aaac9e4e6c772a2a9ac6ef48b4d1ed7a1269ea5308b4492bc7ac878ab6ecc55fb4a00d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507b56da336d4662a7c4f9128be73091d
SHA14c5eec70b69ed90fb3c5d19053ce019bbed77318
SHA256f8cf9ac86416813d9c5e1f97465bd0d702f342578ad0c10cb4fdb777c944d9aa
SHA51281755cd3cfe46f8558f0ef2ce1dbd31dd77fc646e69e357661dc0f6a9a4ddd2264c9268426f852e3476b8a9b35c7e2fc06c583322f24340e077f2ead35965568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b8014139d6efb4248d5d26d3e5c7a40
SHA11549a5cca3dce27d3102bc82d73fbd6bfb9e63eb
SHA256bb91aee5dc9fb73b4e610734ffd5b465e1fb9db31e49e3c29b43befa26884866
SHA5122db4990b9ef5d37e883d67e5d17b9263ed76fbc636a7f01f0289ecd5b2cc3361daed3414812e99b89b8339c2bb552bd04163beaaf589e910d2d6be5ce666056d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59888640286af12b9a7e294e113457bf4
SHA104e229614192a8184d510eadad562de591ec709e
SHA256dcdb6c74ab6caa2856baa5aaba9d4ab66b8fe60757eb8766a14e745a06a972c7
SHA5122aa56366975d24995404ea8b5a313b8bd02cbaddc056bc9f562f2c10f12cd329155d1f885a9b2eccf57ea0a931d785d7d0eae5f418d5131dd799c3d9db223482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5006d6303ad9845e3dd45000e4d835ba4
SHA128fe425a115af313c3fe35d05c7ebf58f4715c0d
SHA256f797a11013b71e5fc62c54017f488e0eed05f7e273681d937e527d3981d3bf93
SHA5121ae3bc61d7067dbb4d18c75139dad5a74688c94ca4dac2f310aa15a1f9c90179fb58e69b92b4ee563e9db86dce44e339c8df023123ec689644cbdc1c7d9ae788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f755edffd67a621c6cd97c73eb60a165
SHA12afb53c5a603ae32e354063e4335b80b21735f75
SHA2564b7b228e721ff04007b0f631121a1dd70dbd5b2dd26de60c7f0b0c30a373defd
SHA512898ceda2b742e052c5cc7a2fb94c0050b2b78fbab45c42e3ef144da4c3703542a084b87e2db034c437abfe7c186204877d71eb1f210d80c715d6e3b0e58c0685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6821b09b944a37e38265deac2dc4ed3
SHA10708731f1d7c93e65ab54cf233d5a4359a2d5529
SHA2564ffb39b1104642e4e040ad5af32943405cf309ad07813ba69fde5135590db3fa
SHA512997a09840052b76e5c413502b5e7b353ab20c682f939cf210a0abef2a388444f2b4cc73757773e7ed80e6eb29480975c51c777abd3ece27867ec2aff3544a355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d5af7ed6d62acbccce34765f3480688
SHA1578935cbebde9f91ff6eb458651efacecba69ecc
SHA25651bdba5e8de78fffc5934973102f2a000762011337c8099f3b93bf39d01dbea3
SHA5125adbd88f0fd3a8d2cd30927f5259e806894718c046630c1131ff8f63479cd198ba3f72f36cd23c4e11457c1aa3edd38df06a10ec54b18e5eec90fc21b3747e95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547cbfd3de7fc60d87b50827b94e889c4
SHA1d573a1f55c14005eee54147307782455f33ade10
SHA256be07cc554c369a77fb208b14123a953065c0b539917eada1be869300ccc4932c
SHA512ddbd698f23f932d48055ac66ed56b9640f3ae3591787a73f0b46e220bf47e7f2d3e1740bff88be145c407628b47af7d90ad29d8acce79bc53e48e4846ecfff4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f49f5f27122e9e5d90a4b0c1d07c7ef
SHA17d642918a6f94944a18c23842084b9488bc3dcf7
SHA2568012b7177aa12c7679b1953559b5c94d940e2a3328c5163c62ae03f6b36c3498
SHA5120d18259721d57a80ea6bfe022d512da22d3dc2860be7256ae50a8d05790bfff6fbcd7ba8671441c4885ad46a4169f4a31f3f8b323dad6a71b0a016f87e4f4938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a658bb491b5a65a0c9b3dda0446c0250
SHA13f6614075bf2ad30beeab05f849bfef29a84f609
SHA256187d0fc72e5a2f97e9d81e19d5e6c47416398b79a7e8fd93b9342e556246445c
SHA512f36caa8d453cfe985ace67fb364a227b2282c655d409b52b11e47447611ce2d64eb369f5fdb0f9023e3eedcf71cab196fec22c67177e59e6b8ab4f5b77902014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531940c7f856762216cd7abcdf13a7916
SHA1c3eb536bc4579ff6cddd99638301a09d62c2414e
SHA2564359315c042dba72ad5a101eb2f555244dcf4a3ee3f33cc660db155c37566705
SHA5126d2a73031b284505c33d69a67511c5041afcb18aed7ba9931d734e5547cf6dd355070eaf9a23bdc676dceba3c44c8e7c57a213bac02f70e8472058889faa90cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa7fafe8f21c40bc72c3d2b67f24edb7
SHA174993a4c02c852825686d7eda68c5d28ebd0b39d
SHA256fa37af53a0b9708bb7e7ba624b21a8d4283500c2b51f31367070519a2e333197
SHA512cd4fb9989f3abb77a2321952925244d93e58a690aba8726fe70fc108d6453f3b22dd34effe9a33e95e669275eb8ae94ae413242ccaf5708ac71c5e18b210f46d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b