Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 05:53
Static task
static1
Behavioral task
behavioral1
Sample
eab4b9a7b22c1d87ae3ffa5af2266450_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab4b9a7b22c1d87ae3ffa5af2266450_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab4b9a7b22c1d87ae3ffa5af2266450_JaffaCakes118.html
-
Size
27KB
-
MD5
eab4b9a7b22c1d87ae3ffa5af2266450
-
SHA1
c7f684d9c9825277ab6257c59a6073f5b70fd657
-
SHA256
08eedab44b76c2877adbe02e2f40a389cb1ec0abcd75d870e6ae00dc18be9758
-
SHA512
c781905bf0eb01967548d8e0d749523520eb16f222652239d5ee7d88c5f6411985024a62f29de187026d6eee147305de6d73525621a01ef2a9117f67432d024c
-
SSDEEP
384:aMCm3tIB0m20xQoejmuNcgFrjSjP06bS3YNkaS7fn095YG6E1:aMCKaN29cgF/8MD1u
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76636951-764B-11EF-9E7F-EE9D5ADBD8E3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05c197f580adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887063" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000db564f923b1be41735adfc77f56f41b7f06540f3442d70547592c0b552b6ac8f000000000e8000000002000020000000272371e57479472cd84d8f4d13a458fea9a4c5cf048b097e48cd6a384b85d1de20000000de8e1583792c5c3c908342e1c70138a523a9237a19185a7f78939b8ec7ba5438400000001dcd809ea190d6e488dbe5086dbc7a0946b15932a413235733a8b9654a9648aea1c804446025f4f62408b1eb1e109dff7554412548fc0f281f19b5ff8e221db8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1852 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1852 iexplore.exe 1852 iexplore.exe 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1852 wrote to memory of 2364 1852 iexplore.exe 31 PID 1852 wrote to memory of 2364 1852 iexplore.exe 31 PID 1852 wrote to memory of 2364 1852 iexplore.exe 31 PID 1852 wrote to memory of 2364 1852 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab4b9a7b22c1d87ae3ffa5af2266450_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1852 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531abef4ca9ac4c63d1a6933bf17aebba
SHA1fd773f5877a2ef8bf11249893cdb7c4e449cbbf7
SHA256d5e1d134e471b1342bd4754bec5134802a443cde6e91b8bb2a37e67d0f4c3370
SHA51260a8f1cc665455ba7696aa17a13e5b0f30761755494d6b4afef48fae3a3dbb76448e0cb6f7e922624e987b9e2c12513435e793409d489f87bc58d6ce1527ff9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f13d469cd1a61f7535fc1b8b0db9c721
SHA198756c06d24be487b9b4e0b0e39060d4bb1df2f8
SHA2561c4e76bebb41b8df64ddaa158d79df7899b795db27eea0276e3ac8417933a297
SHA5121361168ee29a7c44a12b005e7fa10600f33c51666cf05edd4c2e144b6752d5a61d71fb4693dfb429c4a45cd3f926f789d2f9f99dc7cc899aba128cf2f1b872aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cd8fc942a415d0261091928cbdba9d9
SHA1aa4b46d67338cf3d07efb866d4c7f8db0b4512af
SHA256ff2102cd7b21d80a677444e7f2b0482ae3aad098cb7014c2aec1977104a48496
SHA512cc3a6f18ce0e1b21b5ac9bd93864676f959c2930491238b5100a82ee40c587ae0e6819b506180f45ae3fa4f17af484555b0a318dc1933a988a9e9f4f910e50a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c16d4a3ad42c2cfe4c8fee2533962c0
SHA1da554d403a0c8d7071b14b7b45a4646b7effbf68
SHA256e96de581b46ac9c4ec3d86379ad8799fb0c4daded6d17b5e8acd78923aa99b62
SHA5129a3597f6c78ba9195ab207525cada514813ddfa3dc2eba76bf98297a1645c7bda89c3fbf1468f1ec032c9f590510f334c1859623c1edf4fded3d63a6b304a206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7cc2e93af0db2a9f95c09dcfb156f5a
SHA1637f3d4acf97a3214dbd378094abb50fb510b08e
SHA256be03287baa45fa0897a24c3c20634e501baff23b5c7dc83f185b74b0b5beb79f
SHA512860a07eebcd4834e8c6976b5fb5ce1f97613f80567932313ac06722f5454fbc6a91eca5d8820fd1111a8ec0772782343fb8eab15777e78a63b84e7f11f984389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514f3705c1f1f62dcfe3b9e95c155db01
SHA1629969c5831f262e734bf7a21594179022b81f69
SHA256189debb3b855e94e973da3937c36f82f911cd6568ff6c201d755689fb6ba2fec
SHA5122d19bbd21a3dc3b5f9b251d2f2b82ab17eba491e9c1b3a3f3372ea34ec2b82b4dccf68d6e279311cffca3d9359f2553e9186341a10b4e705b1ee39ceb3a4e742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5651e5cc250e35eeca38d432fd27ba49f
SHA1e6c1b4d89df52b9dd13c3765e929545200bb75ab
SHA25631193012a635b678e448031427fc2102d49a873c22d9c517b22f611ed9438583
SHA512f14081d18fb03375673ea757b48d98c78f0d89085e7f63183718e4f955bea345f12d529e7470904ee325e056b698cf0935e0e0e5a6cc13d86ae678d6620831ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dddbe0a0b1c46d18c266e1eab117d6d6
SHA1448b1c550f07cf26a44114efa81f3d647147fcdf
SHA256a28becdd039f99080a0aa0deffd5246184cd40a6bc47a7cb26f5eaa9f058a645
SHA512821c0357d6cb5914645dd4a1880813776d59d091dca7d3badb622f959b8d566ed1c97ce2c36525e7f922174f8304534d96bdc19170fda1e84abe6250c92576c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a66812b5d662982bd4955ee924966f7f
SHA1e7f9d55f129fc3a73d767ec6451d6391f54932a0
SHA2560f54de2a6978f85ec31ee832a9b03091f1e3d71eda551c7c69ddd91f07651f8c
SHA512d573e92047d6da47f49f5f8c5a3715e1c7f343d73626b2d8ac68ef72faee09ea2abefe02bc021d20558491085bdc4da466a4173c8ec693033f487658e067aadd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbafe6033442f77e380922ff5c276f29
SHA1a884c8307d993bca8e7c6a8b7ed5dfc2fb12153e
SHA256127e9839e9b74a28ca1d7cc99a1b90ac4612c69121e4e7a9aa43ce8a1e2e7558
SHA512ece4a22f143bd876611cfe947d37dada033ecc4e0c46d126a179d4b9d3b6d84f3dfc9bd72ea875a07a3fbf739323cd59412fb2f71434f9403c60e3d1d0e64465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533bcb34002ae7909e991705cbf97bad0
SHA1adba239c9844354f1252009f5ed483d4c49bced2
SHA2560976389a3562e33436c0c712390adcfa2c8090f5482566c2f153da982396c3ac
SHA512b46c46cb8c7965d2baa1c55cff3fdaec50c2a593eb8c59c8552418180d1679b074a3d867d93c46c14212616b02a940f2820402ea043e9085d4e1c292232b22b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59285f65ee588e0c50c44d3f763d51e71
SHA12ea28b370b8e09037835249c0aa2282d2b561a76
SHA2561ca64c5eb9329435f273fb6e7b80aaeaa3f8b8e9166114eacf8746c041e2e382
SHA512daa343cfd5938b548f76c4836e9fb97a5018777ed2a6973806e6d198952776770f6b0a2801264c8b3abd67af55d944f48de5c46a7b62ed317c5c2d98cfe2454b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4b1bc2ee3fdbbbaeedd64cef41ee740
SHA15d053338de315a34071acfce34aba1b103129cc8
SHA25604dcc61e35a974158d701f865098b2b578806b88717759df7be9c6b80f6ec470
SHA512556907ac1468668eb23eedb8facbdcc5bc9536dc50f51c3de8e2fc56e569ebda47376358fba0f18de4fd0be47a78e5efbf26e1cfc13f94780db78e5361e06c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dad20d0f130173c242a189561c9e58e7
SHA13465cf29afee62b41309e016b18c37688fb6b5cd
SHA25640f2bde39599c50847c6416d4210c4dbf74e2c521cdcf8304c5b522af1ec26fa
SHA512dfaaa0ac732024d5f876576b8b4e590fc162d8644353775f23a1452850d17b84b40fdca620c0da86140409c6daebcd25dc5fe82d0e1e26c30f71e56c6fa9f46b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f4508a4edb4bb46dafb2e3b9e212af3
SHA1572d9fd8dd84c425e9e06faace2ed655deb05c5f
SHA256718ea166c378f8924bbb39002357a63a31f2726fe39ec7d8272968a79f550d5f
SHA512cf4a2c7894054809c40cd279653dcdebaf8f31acaf03a4e0971980a9412634e3f00c820f47014c6e07e2f545b216e2d5508693105f45745546b0ebabb58433f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e51831e05874df24500c979ff3cc5933
SHA13877c9d5c84cc09e057edcb0b71df7bcd6d7602b
SHA2566abac7533690673caa414d1e3495d69f633ff5bc30e75e67cbde39cb9db0df5b
SHA5128e520c050b4cf1ada224dd32bc56846f312bc66cd1f9f3bbecf2427f68d5a7de6212bfec3665853b215e283051094ab10ed4e69efa8e3eef89c4888499c81faa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52acfd393a758cf020d460cf3ff013395
SHA109988551df09495b85ca192ae982e180e1064b7f
SHA256aa6d9a54ab57904976116fab32d16bceae9fcf1b947fc8d7dad9984b360dcbef
SHA512d5bc463be47c0403f0fe9f089f0ec04d57f589f002046e7c5b9dfad8149bed75e9b55da5e521858ae3f8044559c0b882b7a1955b381a1eae7f8ff84b0a770877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580599760a0fb575670fafba36c53218c
SHA1d8dfd8b118b5e3bfc0483e96277d12b9a06b3e86
SHA256f94a5e3133a20795301e695e4a53e62fcc76a4cb252e2bb9a45522c90efc7651
SHA5125d6752723f2317bddde6a27758d44177b11b635ec8877eb2b823c03c92558d785bb1e0421333ae326c2ba77267b1ce462917601d367f786340227cd7d23101fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0cc12d9f5ef4eb516eb5f4856de6b73
SHA11c9f834ad20d1c303accd552dd193588b00dbe97
SHA256c203aec41ccdf1dfe252f4d9e251c7676446a69cd798beff04f30f0aa345a3c5
SHA512c6a8569705538e1bab7c0a7b4f670b1397a0fa693d9a925e28bf6b2db6ba5026277ca0947e1683b9b113b2b4ff013f67f074c984d41c434036d1c0148d8620ca
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b