Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 06:46
Static task
static1
Behavioral task
behavioral1
Sample
eac9976d30dbbd9c879a93ceea71d9f5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eac9976d30dbbd9c879a93ceea71d9f5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac9976d30dbbd9c879a93ceea71d9f5_JaffaCakes118.html
-
Size
13KB
-
MD5
eac9976d30dbbd9c879a93ceea71d9f5
-
SHA1
4b81e42172174ffa59372be4c78a53bc5017afd8
-
SHA256
d7d1c1c303f9fc1daf1cc69aa190903074b644aeda52c69b29e25a5a3009250d
-
SHA512
860ae23a7953c2d286f05885f017439e3660289c6bac8fbe62fee5b128e6145e52eb1c40fed2ad909ab92d1a297a368094bd226d1fe65a3a4f56e6dd07e1cdfc
-
SSDEEP
384:CnrzbEIPyx4y/C6EJjkJc9PTQmFGKKzc4kSfa:CnrPEIPcK6w7QcGK74kSfa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000864250e25f158d0b267d9720e6eacce1c7426cdeffe03e4476c1ecb967bdc3e0000000000e80000000020000200000003cc4a326ae9b8ede83520233f93846ac6e6a1358b0833021dc4f1a473e45eb0c2000000036ef6579bc734df46230b2342b39629aad8edab065e51625af305b51479a6b0f40000000912e4b1cd6fc5e2b0649f9987ddff6beb6a714d0fb73060f1d5dea336a01cea9062bfddee0e6d4772b22de0087ca4501020f739ee0acf86df0801d43e54b47b3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a28de45f0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890282" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F52C26D1-7652-11EF-9CB4-D238DC34531D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2360 iexplore.exe 2360 iexplore.exe 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1928 2360 iexplore.exe 31 PID 2360 wrote to memory of 1928 2360 iexplore.exe 31 PID 2360 wrote to memory of 1928 2360 iexplore.exe 31 PID 2360 wrote to memory of 1928 2360 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac9976d30dbbd9c879a93ceea71d9f5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566972cd41aeeac59a935f7208edcda3b
SHA1d78e93cb64fcf250f1cdba064550817764df8776
SHA256658a04188b0f51472e99af9bf3ac3a43008ffb69ef62a65177428b2815d88c9f
SHA512e577c9f01d689ca20b1a4470e7c63090e29070a6bebde306129bb11f31e45d1e89ef134a6e719841c2a52950753715ed25fefc545289d4276c7397d58a241e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598acd07f2eebefe92740e81c597d7a61
SHA1bbf0eddd1ace0ec43a5f7e1164c2109dbb4d48a3
SHA256b786cd976dc3387817dce90805bb06accc7ee8df492ed8248b5f62973b31f9ca
SHA512b53e8370365c9f23dc8daf9b4dffdb5b4467c6230dc585083d728ead2fdfa64f06bb6dbe3c616d1aa264fa91c4fbfd6dd5c10a64c1885965743835038d7a0680
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556d7d24363f0089cb187725e44914415
SHA1a814b3dc2cab50805898aee6bdb8fd02391a11d2
SHA256ad1390ac6c133852b6f21d95504ebc450d68de9aa5debb5d6679edfdbf1c3d7d
SHA51297892bffc54c162ffa134ba4a70274d4531ef03fed9db816fb8264c0951a8d2afd65b6766b1c3a6e0edfea12f1fa6071a25f2799d05eca97034c787e5277e006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eef758d9294d41e8ff667802aa1bd7f
SHA188661cf6d86b33337d402486b939ff69fdfd643d
SHA25697e8b83661c694de728fd0fe3e33121594bd5e599513eeb23ba8a94f31581bfe
SHA512e279d660af6d14b58a1efb68c31b4c80507851ecef34b9d27f0c63917ba87427d4333ade143a0ca46cfc97f0a3592b01feab822a7ad085dfcbc15c58db8563c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58367fd9b067724cefde50f07ad7e4ce0
SHA13a0fec5f95220965c9d8c2c5de86903a4d259fd5
SHA2564e3170037655c02c5a8b50613efb9923aca98b7c7e1109b6865425805230c501
SHA51217b3a0a4d2bb0184b3b0811bc3b2a03fcf508e4f2dafe18524e13477e4effb85ddd4eb7b221757349d864e7047674eb58c7ae04164138556e7f6707c494e7698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eafce019ed9dd11ffc3272e6ff6fb52a
SHA1c66be692794b045ab05788a367a0afc00e703452
SHA2561e7f05e79a8ce884407ac139c752952e692ac9ca81275f62a5390cd9c0fe6352
SHA512d2adc1d59fd9d6f9f28f7f541574e1f5c0a761189153f22c91a2558d039cc6d2557a15fc47f81c85b9bae1d6fbaffe71eb99646c4f453e6b64839742ef95af93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b91f4ecf3d73b64d8c5ea160857b428
SHA139d4c6f8439eb5b36e2ecc3dec5e0d778f362dc2
SHA2569c1e61bcf77bbbd1fb830243d3043eff4776221d0ba0d54a6404762edaf159cb
SHA512be25e11a8aeb4e2d0aba9bc5508406f887a79927087b6351a786f541b2d330a8e10986cebfba1270a858dc08b7c3d8ac1fa2fd51f75654db4510df9832627066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa790e106ae54662f8c6e2c07719cc95
SHA175b43e109086315e8f53a96fba80c305325a5fae
SHA25604b6a5b9545c6c705a5f74c5a422f64eb9f17c1be5e7e903be742a25cbcb099b
SHA512c5b9392e81cae3867ebdc28e442aa127ad8d2d788b2bb6ed92850b8a07eb527cdd18ec6ecd1fd973523672d8b229c1d7afdeb094d5128d08a0c76fcc9e2a6dbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57de99d40c0e87dee0203a190b3268a22
SHA19d1310a76c2269ea7454253cdacba20d8920388e
SHA256ddd3a42ed935e9261259fee61189f4cc310f4c09b609551ca0e2b36f0669f444
SHA5125215d23ecd3a61f7660d238eb8429e3551b15ad5a6c92c3aa03747b53e5b75b89f4071340f074933060a98e7e7b47f477f705e83ae3f5f8ae799dd069f89c494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2cada699088875036563d490538e0ff
SHA11a10da108c114e83315ab14b499378a811c9f693
SHA25658b1643ddcfa7685405d61d52306436896f13b08a408c175bba5fd92e1b93c9d
SHA51230825a8af75ad71212ec3a1983837a4d2ecdbd2e8569c5e593f9abdc52c6435ae9457948f5ceb7d20d5bc25b5c35a647e644513cd71c7919971055f6999d2868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dbcca0a3af01d3c87462939454fc2a0
SHA13cc347f386337cf00366a7b52d0dfedbc381a35a
SHA25618480152c4e5b10ec8b086713af7c5b40eb609fa1be01c7f2246d0ff93411dcc
SHA5124b2215fae6b37cbcc525b14cc3498a25f32e7c28cb4a75d8e2c816bc8cfae6a5e0ecf27ce80c1b079f9885bdb6ce03363a2f86218fb0c27d19c58b303c55c68e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ddf900c63b5ff13c4b490ae39b47578
SHA1c47b5982bea79b3c39b3a984b60991dc4af3fcb7
SHA25623eacb88cbc1a0a13c81909b65ce53e1d1fb6b8bae4d409ebd21010ad28fe807
SHA51233e194863fc77f657776c1ba4762a862128ff06ac4b5a73b796fab60587d4d505899f9600528aa762ca9586d1fed7cb28e5d26a4ec31d2e9eba6e1b1bd54778b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac0fbc8c8f6fb49c62961cf83c350288
SHA143bfec0bbc95299acc9ba2e0536d5902fa254f92
SHA256cfe089cfa7956af0d044ddddd3b66e5414c783248b89321ad08a0b34bada4cc4
SHA512a1daf2ddde93b4ad05a739196936e8006e7e652a61deda77406e613709715614bec33aed44eceb45a7a01f98fb070cee1e732cab7ae230723dd7c4787b3d4de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570df9f4afef9357fd5a1bda6b766e299
SHA13dbf15be60f72fc05abdaf42539e15dd7d39f40b
SHA25694a7ddfaf065c30c67f2a1ed294a309f8857abb86536c38cdcaa5aa22b8a9524
SHA512e100314e6bb79f18bc9e6754a0c03984c12fd835a6e6c17f118868f1141ad9b8662706d6701e52edf2c2171b286063215c130e45e25c19e6c1b2971c739c94d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bb47ca654659c689332a4d46a499158
SHA1b9c57eb572394370a2aa89a3f20f58640be561f7
SHA256359089fc578b6b00b265ee20a19fac78eb40d77771cb4d81ecd00311f6bc51ce
SHA512dfa830c0ac2bd4388c30e1b8152a55f9479b4eaf7c451dfa76bc2540a2aa655ef0bf0febfe302c603a3a47490a751213f5cfcc31ebd8807e06e20a014e505a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5583b9b85ff61051f19224296de8c74d9
SHA19c651b59658e3bdeb3b8b9f788874b4e5e701ccc
SHA25661b8d80891ee7660ba46d8f54e5b165962c4b521ee3268bee7149ed25d140d18
SHA512df2044a9c68a6a0ee52abd11a63bb994062087882aece63b70e56e605574e3b5caab875c3cebcc5726fcce202fbd068c0e07f883aba2c6f2c8529f9cbe821f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a87334359e291af1987d5d5c5a64d2e1
SHA18f0443cb48564b0f403efa95f82074c4e5bfa77a
SHA2566ff81df6d328a5790364afcd852e63b1d75935795956ed4a8b1b0b86c4c0347e
SHA512dd1815011a4b2f66ae8bfca07c07063956a8c8e70585ec383df4b401aa13cbb898abd479e881d2208bd55a779413028c7d8ed8b4bed99e261abded6119340e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c841e24f674b3268f8ec708a8eada049
SHA10c824df32f63af2e380e6f837f2ac80b3f7b6d12
SHA2561361eac3bfa983a05e3f5b70a7ca95c48daa3735e2fb15207c0aa5e5f1bba6f9
SHA512a61a7c9f71ecf168aeb68f9f1edc445df2431dea85976b5139c39471b1b9d9a55267c93487cef27b40981bdaf1a4db2c019dbdcae6d505436224a308a9359542
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b