Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 02:15
Static task
static1
Behavioral task
behavioral1
Sample
ea6725b6242551b42f263256f6a529e7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea6725b6242551b42f263256f6a529e7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea6725b6242551b42f263256f6a529e7_JaffaCakes118.html
-
Size
68KB
-
MD5
ea6725b6242551b42f263256f6a529e7
-
SHA1
5a0b74f0990d681fe729f39e80ef3ae85ae7c7d4
-
SHA256
8b1e692e2f75b6b352807e9057db3b2a9962010d30449994f44d99d313109c31
-
SHA512
6269a803a64dfcd892364777e88f26ee6168df683663b833bc8d71404e814be55765fbfe2b4e7fe40fe832cbab1b8b363908c3bf86f4a7a11850df3177d59205
-
SSDEEP
768:JiygcMsSZ8tN99OIs+qdS/pw7VsQCZkoTnMdtbBnfBgN8/oygcRWQFVGys//Ijk3:J6W3w7VsPec0tbrga6crNnz8PJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07f34d6390adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432873997" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000002ec070912af00c6e01db847f358fff15fc7943d90844e9fce0d06de71f4e3d6c000000000e800000000200002000000067b5f886f1524bdf6c92679a364c9a6a0db7b33b7854521c43ec5ef4d3d6c27820000000d7e50a496da5f2758ba39b9800b1a164e850fcb469993b2c8d694e3dd082634c4000000001c2550251074d257afade800890199fffd2ae348a6de34636f862320088151df7c11edcfb6461d7e9d2ce67a7fdb74eb9f3c7aaee9e1460740b5e0a2564bbd6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0197FAF1-762D-11EF-BB15-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000009775907ca73a07ad17dbc7969d314a04cfa4066a7202caa78852399db53c8e99000000000e80000000020000200000001f41c1ffdd828c8c09dd81d8bf09cde3f58b35a79aa295a39c32fb726981439a900000003a76328a8537bf1d082840acebe0674931848738b625410dcc250e53bf1a6dc2aa0ca8bbb95cd605adcbe697f4f7ee89f54ba4ca5cb96446ed93dfc7cc09b6c0527259703f7af685b6c0666ae422020afd831d6e4cbfde64299c57502cf7ccb911850d6c3b4d510d9e70553497239f4bd7bf8a1935279bacce461072275655908145dae2fec75864823139668c4b4f5240000000731455d23ddf82aa369d5cc8446c4bc23144d2b5123f700b2fd1d194a07ccfe5e5e19ed03903425742f98c4235799c2891a21fe6bac2042ad8096dc3dc83eb1c iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2744 iexplore.exe 2744 iexplore.exe 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2932 2744 iexplore.exe 30 PID 2744 wrote to memory of 2932 2744 iexplore.exe 30 PID 2744 wrote to memory of 2932 2744 iexplore.exe 30 PID 2744 wrote to memory of 2932 2744 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea6725b6242551b42f263256f6a529e7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b258107dbf2ca927476ee42858c08a34
SHA18719835f2a746fbfe6a4b34237379d949ebceb4d
SHA25612fa268f2cacb15b51bce925647d7fdba76273240f7243f8a8194f2a46ebe116
SHA512d862547fbbee7aae09f631d2cac407fcd5bba2d551e0132c9348fa06c432de52cf630cde217bda48bbf9d4d9454df225d005d281df16002dc619762bd3e905ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56483975ff28e7e68a617fedb3f1f1a89
SHA19d74015404a96789f7807e609d54dd5554d6f595
SHA2566fdf9cc750da896e3922bae5e911b3c62a739a9f899225360e0bec8c061b8c87
SHA51252b3d578025eb80b7c60a4ae70df6777ca547c1de799bce84a249d65b43ad20c304789e87315f2a3393efb13ea9303f60328acaf2490372a038d83b2d02d20e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcbdea6b91c5be9805769436cf9a6832
SHA1321539cb00277af93df6d39677be52f0078a90a5
SHA256fc28487a519b161114bbe19f4dfeb90fe322ca31eb90ae4fee0aae5ffbb0eda5
SHA51274978013ed22ddbc6abc48d7f8e5100aaebe08d6610ad449498d6d837444b1fa623876c733d3b9f0c8d9af8f3c546ec64f39fe0dc6569836a8ca12802489d787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a11923cc7c766ffc366a9313e7546338
SHA149f4066971c806e68047ab7b6d933909ded1f625
SHA256edcd18abf5caee2b177d30e48559c939d516e45b69b31809441668d0dac8677c
SHA512a726b28ec5d82ffd08a8568593fb6eb4e8cd2145d33902b6a56e22582f16eee16c5df57021a0d002c626792d049e072e8fa2c7d2860a99ed05fe0b675776772b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c590f1212587531c93e8eb79f194810e
SHA181945ea65fb06ffc3122bf6ea7c7b11e03ceb504
SHA256003b4154918e24461b5de7aa2b977c4037327b7a175e11152175cd9389081260
SHA512af82d78ff9c776cec31cfbab6eeca5d64ab7a5ca3f3d000f3d4112f1584195a6e0465a0bfd202e0579eed36eec07005b32b5257baa986e11d6842c850ec3fa71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e3dc21ba1943b1058b725fc0ca0245b
SHA109db1aa7e1b11b794d6fa88fd45ba701de72380d
SHA25628fe13d133cd75e4cdb5527fd4b7802412e0dae9e40296c95430a532fc399e61
SHA5125ff413b00a2a00d668df92d8a36a7de1819b50eba0f16dcc0e7536094bb1cc47a4926fa721348b21a0e4714a2b54986a5d058d631c5beeb81602d0f7f89f8191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9b89befd000328e706f0e4e26ff0b88
SHA1906fdbb6cd39887955c75eadd97f85584ca251e5
SHA256ca6c601fff36bcc29c117adfbb26bcc27ee87cd0db6d64dd60f617c4a3181941
SHA5120a5505de450ffe3576d3757817bea172bc421c3a94222b48d68d1c3cf4ad4efdb2db9309edd977752a5d1fcce8816dd8b2593b5d99f5e32d1aebbc9fbf369e97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f7db99223db4221b69372f0a3a25974
SHA1f87dfcf4878a27344e6ece442116048f0331b61b
SHA25607c7b481194906dd3a034aee0b3f271010e9af520e273c01ade832c386f2f0ff
SHA512f3e0350eed7d005a74addedd29dce3c7303dba26e309ba857694f516d3dc4c3c2f0530c3d1e779215954a4bc78b5dbc28f500ebcae9319f20d58c8ce0b78ba6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3c3febd1465f508d6030412f4cd76be
SHA1461e852ee20936591614b5ea5360fffb427e42fb
SHA256a92dd22f92d7238721a68dc729613810502faf8af4def22c865319347f1bcbeb
SHA51282f981ad84faa241c9db161a104b0f7f8d3631ff20e509c27002bf3f1946a8093137fd4f8eb52bdcba1ea9d4e826fbcc3c66e19f0926aabbc3cda52fcc55a8af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5532645af6c80c2600de5190d1d217e26
SHA12803f1a7d810735e4526f73b574492c43919d50b
SHA25652ab1dde77859e29c274eca0b5cb54eb8d1916d0aacd5f2fde3cb084286ecdd8
SHA512b0aee2325b9c8ee1cca5ed0d829fff092bd6c47e8ec18805db3c828e3e950ff3e9f507eb8f4a3195237a64c59a68dc335c27a82790c946209edeaf1fdd2e92ba
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b