Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 06:19
Static task
static1
Behavioral task
behavioral1
Sample
eabf77571ada8d5db9ebe464fdc3592f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabf77571ada8d5db9ebe464fdc3592f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabf77571ada8d5db9ebe464fdc3592f_JaffaCakes118.html
-
Size
130KB
-
MD5
eabf77571ada8d5db9ebe464fdc3592f
-
SHA1
c7c79f6b44b84bc64299a93f4d4b0f26545255b0
-
SHA256
a20fd5b27b1aa6a6d352550edc3593f2bdd0c924af27e2b64a7002924ce5b8cb
-
SHA512
838e3f30ea06298f9526fbd21e10cb45890d4bce65bedbb1dd9aca5d59f37149d4bdd39aa41f8926328066a745df1faca8c4f402a2ce0cfe4d0fc7cb757ca83d
-
SSDEEP
1536:Sd70fqyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dK:SdYyyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2EE43381-764F-11EF-A5CD-E699F793024F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888661" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000063d32852cb4cf53dcd73fcb3cb1dcd085fd16fbe16b72d03556de8c0d172c2d4000000000e80000000020000200000008537b2905b87b5a834b4e3d691f01399696cf79a4f0e233a4c14452a0ec6ffbc20000000fdf0a58f463c4d5774ddb5aa6e720a0043a29b9ee551437bde7f72ee32a3a10940000000102e4922fe61c8bd09b5a809178eab62e15c626acaf402334c42d86ff8cd2d2406076041ceb64553607b69aa74abbb5657650bc636e1c6fdd42efba31b241a8d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c089035c0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2684 2132 iexplore.exe 28 PID 2132 wrote to memory of 2684 2132 iexplore.exe 28 PID 2132 wrote to memory of 2684 2132 iexplore.exe 28 PID 2132 wrote to memory of 2684 2132 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eabf77571ada8d5db9ebe464fdc3592f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555e23c1dfcf4a32f978b34dc53a6019d
SHA1d2e0a19943c7f2b17539f536ff35c30893a61595
SHA25693528e5c0cfc79daa1f6018b6dc7aa0ab448fb596dff55284c64f0c0bb44e149
SHA512a517cc22480c83edf08c7512e3f5211ff0d93613e15b173f5139443b94fba60b4e4e401be76660290be46f0fb0cec561945b92eb3fbd7468c14f63b8350d66b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59322ff50abb7706a99bbf42554d6487b
SHA1526acb5e2140f937eb3e4b98d5683fddd80f9b31
SHA25613d29e226a34fa800d12078663ebd01026d124c41f0b9766b3ee2f1865965689
SHA512bfa4295817224ecadcee7532e77c70555a1584f535826121b49edba2c8cec2119b5d060a79352b94c4e46cd6339aa06f1af962f1f871da9df04e0b05aab08fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598fa2ee620f3918ab6a6194a91521762
SHA17249f081ddef5516620f12b0d88192b6f6f83e68
SHA2560248dc8ab3f0c5ce83825f6d952ead3f0d2f1b40f13ac817fbe535ecc3979375
SHA51221e317d04a28d5abfe0479e937c65f25a32aad8860c1545bc7c4e9c4da6c143c889893dbe317987b5101c3bee82063429c6c417c1e677f5bf8e09d9ccdd148bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5210b747c5282d62381972d18e9143340
SHA18333436735bd450ac68f9401ebb97a4bfa9f55b4
SHA256f133610ccb18d4e806962c674999a6683a5b57b69c2a370726d1ee803760e484
SHA512332014cc97a51b31c3684e117eb0f67aa091259fa80b6aefd0cdb4db2b3e06b80a29d346fc3370ba9d9cd1dcbd24120dc8a9359c505f41b4a113fc18bf1ee69f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acdd94586a988894e024a31648340dce
SHA12d23307a3c7b493a1b22303506754b69dc620649
SHA2562ab5623610856d163b80f9bbdc406b0c229e80f9a71cc216ac2d1e4afdf60bb9
SHA512775f97bcca833580072f5c68a376aea5dba8e857a0be8f29f530462d5b8b6a1a66e9ea2b5c83774a05feb52a7d691cc92feda810e5c56c3eb1e924f405122163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585c2552ded67cc168f217a9a22eeca14
SHA1a51f845fcf207717bcb742d5264ad8759f2e74ca
SHA25681bd91a5b0a1c543eba42274e8d5f154727fdc775a4b9c530a41cb0b48aa0ce2
SHA51225f38c96bcbd92d1c39a62550ca45af76fce6f77d889d0706ccff8e1c5d95df72f0fe12e0352b7ae2894f43bfa59805dc180baa9bf6e492fce2c043565916927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b347c828822ac8ddb5f283fb9dde728a
SHA125b70747a1fa812df21807b06a1ca73a9c6beb33
SHA2568280b8c9706ef69aefe900546cec5deff6fa3fd32649909ddbc7d4b0c176fdeb
SHA512e3af3aee58cfb35856f202e811e1cd176b51b2755c3249828830098e055a6f1f9e6d39e89ec2dfbbcdbbbb02ba42301d1e5cac64bdc30fc245552d815b58f9e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe38dec0da2c79e051adc80288bf7ff3
SHA1bc346887f8180774223bb0570b47eeb1ef80c7a4
SHA25671a2af106319fcfa37c6661d67544b6a1fc4470527381414aba8b0c8eeca4535
SHA5124e282cc225a59f7d9fa5a43107bcfa062b964afabb11e05ca61de4b90447e4ad8b55c108104ea735e1cc94f6e694643974c450083f9e7ad1a635c41b116a3991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e0b40a8eeb0a83415327cd9c234fbaf
SHA11c3c37de72712c3e23f9730c90ecdecd54132903
SHA25601554c07528b5e7fbb95aca35ec805df40e6946d6ab00f1909cd9062fe2fd696
SHA51221df5f91844d983ca659c900339608b978048ccede12a0b50086d39399bbfba34612be41f26e5939131658e3efc0dda968bae5eb6eaada9d0f47fa1f410dbaef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abf8c7492906018befec7633385efa22
SHA16d264cf2cfaaebd23a8fe964586ac1d4f32d1214
SHA256fbf328d34cd3ab52bb24a9e7f8c3e87d05b2a261691a928a6791417dcac7d68a
SHA512656b3704756134fabd27060a283ea39df93e8580dcfa086e327f0ddd23a2addb809b3fbacc83fa6f7658651003ce1def04841c49216d12232ba1fd808bc53d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cac3b13b14974985c71ed8c272baa982
SHA1ef3a482cce96ae648f6c0e94cc78a33d062d6fdc
SHA256c7124022205a1962740a1a6f949bc747ffba9e8a61b20311066222b1bbd0e82b
SHA512d9c7f4c52875b71867b665771269fdbf0df70cdaa91693aca88cb9b7bb4cbf320a5e8a52e741a60121d9c360d4817254052b9c1efa06d142305b59aed25fc9f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8531cf2dfd2531849dc0c5f0d7e1b99
SHA164bde29a124e221d669e49bfc789eda5200e3644
SHA256343116dc4a45d7e8a30a55c91a622c87ec6862004f20756e6f4369d0c133625f
SHA512192b47797d8b4a052c8ae663725b1ecc82c9824f19cb6b4d242e75e35e88661335d85a54ac4336d011fe1521ca82c923f6beb77ccae1f5f9a0b6182fdf9bec66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfae76605b37906eb635328e82f564c5
SHA1400a0a5798090b10d48b65c01bf1976848dd19ee
SHA256e50c3ee1ee6c46c3641b2a6455e35ea003fd614b47752e2f3949a5fa3323ceb2
SHA512c1b67bcc5b229ad263e6cf0ebfbbdd2e0500e79a4cc7c9a26cabb7a5a093794a2a353248cec724875e6cd3716d0bc7ab8ffee1e62f398befea8746089e9e5516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f979953f2f23fb7744a7fcb51f91de3a
SHA181a56c413d0937222dc814775cd9236c7df10e9b
SHA2566326f2ab312966530792fd8030d3eae9c938cab77adc1fc7d7c2b5e090d5254a
SHA5126d077b5920b2c70888438019a604fe74567504adde1b7afe78d5afade952e699f8416d305180d775e64799607c7af5df30e12b9b385d27f0193c704ff8d78a47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5010a3693b3523e13baf5633e599dfbb4
SHA17ca4177ff4643f295551b05f50e05fb6aa5cabaf
SHA256bc2730e48de6d775fdd475e483535760884b520f7ed2b04132aa2e14d562fd3f
SHA512ce044804984268d8d23bf343a29cb2cd6260b96df5002e64f02471e42866956ae6b69ccdb4babe352d04f1075365ba984c7043e289ee6ea2670d877164109f88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d13887ee42536eccc1b2498c04392a21
SHA14ab045c65d12b167cd9914453ed21589192b28be
SHA256efe2df70864c01578171ec3dbc124eb1880f29d3117ab1640412b9fee37a257d
SHA512bf3dac6a055fb01caa4e70ac2bed3a0a03c200afbf5c085302ad895e64218a8e64b75a45c68f39ad93fc62b3b85ab2c7c22101263777b4c76b737d6e2586277f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b06bb518e87850cd2120d8548dc5242
SHA1ecfd461f9d2551e00c63966babe9aa218c54a1c4
SHA2568c591d655c9888d89e6b44c61abcdc10fade04e4c2c8b54f6b2c4368cc07d44e
SHA512bdcf33856e0861c24b960411383d27fa668f264ce78e4310180865d4eba7c67ed31cbb1158c20c1e1952d62e7937f04f35ad45bc458902435e061104bcf88b47
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b