Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 00:57
Static task
static1
Behavioral task
behavioral1
Sample
ea4b571652d585e31173e9679188faa8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea4b571652d585e31173e9679188faa8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea4b571652d585e31173e9679188faa8_JaffaCakes118.html
-
Size
90KB
-
MD5
ea4b571652d585e31173e9679188faa8
-
SHA1
2b6b8f644df57dd0584648af0960b500fac146eb
-
SHA256
1ae1432f28ac72ff0c0101f05e62721bdd0067314b678cc48508c578ed7a54c4
-
SHA512
8855e35278403a3b9f504094f58e193268de0c297e4af4d2779b3b1f78ddee51b34f3fe77bc41f91892c7f554c87eedf4e00d57f4ea3dbc66f6ab7ca13cfdcb8
-
SSDEEP
768:2TsVRMaPBTc1b4xcUqx6DEdY/YrMBHdziWq11KiHrZtFoHGYuyJcWcua5+FLTHfr:mKpcAc/y3inRyBSHuxRGmXXpMd1Bk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{19A82BC1-7622-11EF-9C5B-523A95B0E536} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0a54df22e0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432869297" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000a0888633a842ec73dc293adda853c42e9994a41b8ab9fa0caa2cafb7fc51ab76000000000e8000000002000020000000be7f50638d2184c4d689e7047db3ff4eb794f9e7bdceee035245a2cba3c9e61420000000a00b4b4efe7b5e88a8d9d254a3ddb5ee681b78ff3cc13c73333b684fc1dcf7f740000000dda2b5a278ebd10f95170b9e3564852ed7bf99ccd5050c2aafa0109d19af971dbb04a12fabcf06e7d27f34a481249f85f3ef733622df8c3a84b238f484b25839 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1316 iexplore.exe 1316 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2788 1316 iexplore.exe 30 PID 1316 wrote to memory of 2788 1316 iexplore.exe 30 PID 1316 wrote to memory of 2788 1316 iexplore.exe 30 PID 1316 wrote to memory of 2788 1316 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea4b571652d585e31173e9679188faa8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fb611e4f655f365507b245543993faf
SHA1a27aac3d760689310bbf44dfafc8284be31edb7d
SHA256153cacd9c879163070bbe758f98e0b5b93c50903c52746ec26fd4910cbf7c870
SHA5128fdaaad7344bcd69e1eb47774b99c200fe1fb618772f19dc1532706c2646cd94a3f4e1c2a028317f0195496f31264b2a4068332d51cbb0594b82f8b9b0d0cf50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566f6a78599d5ed38bf500c08e1b6f0fb
SHA1db2fb62e722783ba506507cb30200bebbd7e73f2
SHA2564dd97d7b5e9f16f48b13f041bc07e25058f57f68c06e817af15cb31807a001f1
SHA512cc3706362ae868b28d5a60c27aac3507487660c80791f4569fd7ed2e6ff520d017f7ea6cdbeca320ac1936cf425f3f58b6f2e408442ee6fea9e6f6e076207ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515cb45864768f4bcdfa9fb650e645428
SHA127deae129e982e10cfbe4bc608c5ea19f780c38b
SHA25646644723c9199612360ff3631febe981309303face8791808b874028bb43b705
SHA51202a39d3e2bbe1667c9228fe4e8875da659b4eb5b508883d236c45b67386e99bb7496f489126322326a4821aac220ab6ef2939f8d3b73a538117ec942efec77e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52104156c9b12004d6fbcc5a7191bab5e
SHA16662c686081c3b1761e9ca6f1c1fb28239cf19d1
SHA256d0b77ee0eb3e90a3b55b3aa3c5816e7027022ed373e893f3ef0043111f59787c
SHA512c0542cce5f82f6606c209d0c8b5f53a33606664ee8dede0a34837ef9963d778188d8ef5ff1eab2b8ff64dceafc29cecdf29ae316403ee2a53a8f47abc8b71887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfc10f28fbb3fda2678a0e22d0c5f57f
SHA11e4d20f076fe4670d226c4a2ea64592384b98abf
SHA256162a9a733380a851954f4f1a40738db32c3dcbb852c8eb5a04666373e39b90bf
SHA512cc86214cd2ca8db2521775171e4015e90b392614fee9b950cf53cd8b56ff03516f51468cd85ec21e7122ce932ea4943c9df62be99f05cb5551ab7daf2ab50c4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51413cab3c018850abe759a6361024343
SHA13385aa5d8dc9d906a7733b6b8c608fd259990f41
SHA2561d6c42bee7193b754a7c2a4d31041bef84d236425ec5f97cf9e7ea63bde333fb
SHA512aa62a278ce86416a54369fe745ba5ebaf41957df24014ad8876786fe64fdef55e22b3df77294f0a337808635119084276a504e95e35131fa15eb290d0a46edf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f40d625948964a0c19804360a3e39b1
SHA1670f425792bd21d41ff66833e6ffd4b3f33eaaa7
SHA2568faae0c212a135675f1c3bbbe5a9a034c9c28ae1f4003d9d85331c00b9ff417b
SHA512fe2c81775cd29a6f56a447b24c63e5250cbdd43cd4caeeb6bb5107237d7d3f010e46ac5eb236c22be3710af8380871111b899f4419db3c603d13231d89170f7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565778f6d988fd540f0accc1039d8a575
SHA1bfa83669b3a0150629566707f47e7ed5998c7b80
SHA2560f2ac7a819942be8b3b8e87108c35b98fde5146ed10e8ba1cd90fede97ac1949
SHA5128f01324da8aff7f43511703e1c24225b1420b3eb1115786369f122a2202e7b23f0167414d27d98de342dd1e0e552918db689eaa243cad2c245140874d3bc9043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528552d4ca4090e034b21c38785b9b049
SHA159804c7124168c132df5da92fe6bb601849cd7f5
SHA2564950fbc10e3cefb2e859cebe8c7f341acf2bbf283f054188e2ecc04e28aa51ed
SHA512ed14f496ff2ffc1848b7112c6c61f233d58d860b6647360e423759de5fcf513e53524bde85d0f8733a446eb70b9654f6499e1e057acc4a9dfb24ec962807f602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d38557d40f8be693f224ed9f57c75ed8
SHA1bcd876ea3f82cc3903721726509db9f0339e3025
SHA2567fd13a7a34d33ce08e6b26ff5e13454a394bef62664ba15af4292c4489f0ca6e
SHA512b616f01ad325f2717776f7be56cd59999c965a4f3b1b274016602c4258aec07d918270346ece34acfbe103d711fee06c7bad35b7ab42dda8936d47cae1c8c34a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fbdf4cb5044452f950c4973722ba5d9
SHA199e4e048ad3740f362e951c004f4d83e503a3117
SHA2561405e221e3cc81b73fa25afcdd2310e22219111164e4b1964da291eb5a15c927
SHA5125fb2a1673cbd153efaa2fafb129ed8e938c3051abfc1a6a9cfce2831d6a1d1fda556b43e2c4c20f1b626269aa620658f43a0ff4e0cc0df76daad10f9cb029f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b25feb381d253c813c1df4af72e55dc8
SHA1e036aa7575b29f8496e88928ac706b409c7a098d
SHA2565a02cfeae7279b33ed1f44f2740ec52bfdf379a8cbf2c3e92ddbbddf8dbd8282
SHA512fdd24b3b5b869c5e8a61eeb3d31946efdd2381219de90995e83fa414e9c3547fec57395888b82e930fb2b7aba93158038b5dee5bb8f966b2ca9fb56012dc833b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5686b327bda17f38b04f6050f761c3fc5
SHA1c5e36dbc4a8e7281e76f96dea8107a6879c250d2
SHA25600bb2d1d8841c3e521a00dc0ae2d70eb768d1dd04e845f86130c2bc87a314055
SHA512b68ebb47f1d9c41f8e60ad140a0a3674fa219e6dfe74bb1d2f9eadbc89b23e76b5eb43f57ad39ec42b664730e5720be6541fd6537cf0184a2857f25c385001f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f39aa40d3ca91ff9059e5678548fe68
SHA19a95852512b57e754ee909b5f5eea8baefa6af8a
SHA256e960cb48df9f88991ecd82bfb0204b74e539cc4a8fae675ef06e889d46b9dca9
SHA51220a0ace4b9fbee757110acc18b267a4d47a79cf719aa56a065432afb7fc01af166e0e9fa11a78c271806c00c404fc2c915e3f369039dc53e183d2fd82301fccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4c06fa62a2c43c474cfadcab79692ac
SHA1faa0549192a7f8f7b08c0d5de675ede034329327
SHA256d96f9691f72b9d35df02fbb314ca4347c1d5311b40f58f18bbe6d4d57f22a9d6
SHA5122571127eae670708773b9ddb89b52e46fe4b62dce5326da827b4d50b9a8ecf2c70e2a090376cf0655d1e287c66d10ab8bf33c72671a5994daedbcd479a36786f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c749773e6f7378555374c9321e78f337
SHA15ef90783e5de5e5b115384045be2cb02d480990b
SHA256ef80a501ff189f5bd0ab13029692839a5760ac2f2d6100affbafdcb6245fa70c
SHA51249917f015b109eef4dcb0323f9bc70b74b4f855cb5e4105ad702ea69664d6c8ac5c3102031e8cac3cf1027c8b53d6c188feea7a0f705959285a4783202b4c40a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d25e766a4f31559e90593420f2a4c25
SHA1ae0dbf7cec50d8d4b95ac7973d020c099fafa930
SHA25655543e0fd4ae1076cf05b18222aa36acf0a6dfd0c09f82ecf71f18b46223c4d3
SHA512ca6f82814f2c392fd6db1c488a47e7c5b5443c77fc90df48e6fcff7bad1fdf2a0e9521bddb1310a69a1331e1f8f3ea635850f2d39e4afc76ad32e26efe60bcca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de85999c9a5e922c3d35313011049d88
SHA12572d385780223c4c8389017061752d856ecd947
SHA25601fe6be79ef3974ff9a434d35087d2f5d212970da2d0d1af0fe909a3a65b8a35
SHA51260b97c61da1f63578df1a60bc62e238809fbfe5450f04a5d4b6c895a734232cfa5469505d691241df3f5e4e22c13a92183eda9a1070ba64611e6ac5f81048488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58847c974a4ac9353a8fa7c161c054e87
SHA1e67a5e5aea16a56910e345d7cdca99639b63c653
SHA256f5b495fe65ab921d579958f04383a2faf6fcab4e45e261ddd9bb727a8f4a8a7e
SHA51226f6700cb010a1e9241f72bba44fb3c8273a1a3f304a07cd8fbdef6af5d86ef202a9d928f9bef3756b33aacff95782b2b94c27b16d969a06ea2d3e9cb3bb853e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b