Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 06:46
Static task
static1
Behavioral task
behavioral1
Sample
eac94c4b74c830a1a42922b4c4857958_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac94c4b74c830a1a42922b4c4857958_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac94c4b74c830a1a42922b4c4857958_JaffaCakes118.html
-
Size
1KB
-
MD5
eac94c4b74c830a1a42922b4c4857958
-
SHA1
c4b607e050ab2f325ba2455cb2f1c09e94e92a4b
-
SHA256
f8baa6b475027b64f2a68d37f1b47af58fbb97a1dc1c04fd881f070735596505
-
SHA512
df88c4c4e109d01949b3f61e0f768aa276b747faee62257998d02229a8dc3c994b6736e1d05223b874c09ee958f1b8f40c154b8c68cafcec7bc5f60624c96a35
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD399121-7652-11EF-94A4-62CAC36041A9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000bebceb8ed929777ecbe06b460ce6ef2703855db52b876acf32a53dcf40da06a8000000000e8000000002000020000000faefe5173c28f3445fcb0e3cb846075132cfeded119cc860276f4c689527d50320000000f29f01e8eac9bb7cf84dadc5cb794073625ec4fa1f01c410d18ab7c0f2fbd77b40000000c4b36cba673992685d9573fba7fea5dc6bd718aef49304ed7147464d62258ad5e13d94f1fb375f4b4167d8b9f3785fa1b250a13b1181f24f66a51024c4c19f5c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 708355b65f0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890241" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 3032 1984 iexplore.exe 30 PID 1984 wrote to memory of 3032 1984 iexplore.exe 30 PID 1984 wrote to memory of 3032 1984 iexplore.exe 30 PID 1984 wrote to memory of 3032 1984 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac94c4b74c830a1a42922b4c4857958_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588ce128f58847bc9bc29355ef4a5cb7d
SHA19cc21c9210d7a3741c13ae5e9fbbdd9e321c0b19
SHA256b79c5aaa4c5bdde0586d6e9d45e09c52752d83356bbd6328983184607400014a
SHA5126ac494b3c72020f5876d0b30e418a224bffaef100ef56d8966c730824817241cfd5a99246409aa71eefc2d7532a2f686c63722cce0940822646f4ffdfc6ae02f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b7e8cecbd998744c679a7d138cf2a9a
SHA1df46fb5039f0ad0d7c46f3c91009e5609298e212
SHA2560309790a76856b66b70e0fa39984e0f9538de702218adc1daaa7999eb710bb3f
SHA5123a78e80511caec61cffdbacff2304c4dde791068cb7bd813f3eeee395a569a4dd0d3f7f8635abde0924431c70a327de2555331540942f52e51784839a4302f2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9b1189f8d9ae8453bc8ad2cd5a37884
SHA19735e46d0fa65925e3722b68c8ff4250933bfcce
SHA256306eb0ed94773360a014869d62645d3152ad12efaef21642a888c3492e3d45a1
SHA512be5401b837a805f33c18dc6a2260620391c2b5cdc0601ae6c2dcaa9c41d569e19424a67c851ed7686e356dad190686af103ea02c937d0b8907c82c2a48b88aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c77cbf90293b2eac45b17978f48e02fb
SHA19d2d442ea69ec60ca084d587cc4579668857d164
SHA2563a6d113e0c177fde6cbb6e675efcd73e2a3b2022480684e26d5399de9a50a568
SHA51242251d3598f505205c503c2b11dd8f68c0643562180bdc976662436c6d7894f788ff024250a22dcec61c9ca2bc06aa7a3d0de14a608f3614e3e39234abbebf0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506b2fe839a21950845f2342dcf0d146f
SHA108a8463d08450cf17dd8908b60d7166de8b92073
SHA25647e049a93f4bc7e3b92958a3e0b64007f0697d6d9c45a5fad0cac73a26b0766f
SHA512d85b89131c2129b437c0bb750dffb393bf9da68072fc90cb6866b588d6be895fc460ca5ce7d28ce8128f9b8828d1687b808187703780f66e79ba75356797dff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc868504f827bcc93294af4c569b5392
SHA1fa20ec208f9bdda75cb0385075792c97ab8df94c
SHA256d927bc26349362c5b5ddf945f49319bb1b119116e2063cadc41e9bbf39bd8545
SHA512de65172f9c1e8d9feef3c987c632f4557eb57a685804d513069390efbe5c8f2d96f08b1b0c7d7e322a47fa3dcaee77a8e930c93245a8059162290646e502810a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530e7969a978972f411c7db32da0918d2
SHA19cca36c3f1855e7fe899f9d4d192347135646e43
SHA25639789fbea40269a2513ee979e39cd666b8066d5252d0aac3f9e745b934459242
SHA512632cc014b832ad1c9171eb70a7a89926bb2dd03a5fb334d6d33a85eb7455ae6bd8de206cb867805035bc0e4acc68994d8a98eced78ad53d1858c6bc759e7b016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505fa8eb5f2ebfe801309cb3b443c71fd
SHA153a8cbf0b00cc2d131a381ae969aac677b64e65d
SHA256bc639ebe8e289f443929d17bb90756be8e62808ec26f5719f71a1fbfcf6e6d9c
SHA5124cb39a789eeb297366ace85ddc2a31648ece1a2598cafaa4a5835c17568951708696b0eeec31efd9fb6222ac7f2af1a092b2db5431562ef6c8aa7c0b963a2965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584ccc6b8e9bfec579122a28e1337c778
SHA124fe300903d7dd5cdb895ebf5feb894d31ef779a
SHA25603d9dd19ad6074b27cdae792715d0486d2b7d280aa01c245259e0e79d21095b3
SHA512b704255248b495933dc55da536d0cabfda456fca41cc56044843882c42b6a8b11e02012442a5fe47fa1e124229bb324decccbd19727781bb97eb5dc0972bafb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53281c8528993437b001b760f54a14b41
SHA177aded10b05cd51a5133ba5afc7a1e3e3893135a
SHA2564c44fcfdeb8591a117932814c6a0009c91758ed1febeda6ec1692c779fb57d46
SHA5129dd54db3ee22e4c54bce7f9a9eeaeef0a4fe34563bb09ee18886ef04993e87dddde097de8375992d138cfec6fee286cf5f832bbb5ae2f116bbf0012c405af479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb47c564fb43b7c8b10547b3f4cc37f6
SHA1172f9ef711ffb5db3fe3ae8fd2f4e94137763172
SHA256058f5cea72e2a651181265d56458f8b8944d2777c678c9567f43a24777957274
SHA512116ace4dc311525cd8c8d2617ae0b93b0b51761323c2b31ec2afb88a32125f728042dafe1b20ab17faa6daa13b824815a03b869402bb5058023da1707601a3a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d044d17a33768fc60924f4bbdb2768cb
SHA1204eab2e4ea513fdb64709e6ba6609d1bd05f0f0
SHA25656ec75da0e354a9d960e8aad6bf91b63c5a91a57862de61403f2af07e731ce9a
SHA5124db622d0860a2fdb3ec3d3a7ae590df10bcc46f50437af26cc5f8b8b35041ca521978c195287dbdfc550592cbdace5e250cba378b0665ec74eed25ff16e4404f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2af487fae04731957edf17436c238b8
SHA16edb58804576ed418e40ca76e67046e4e0469b70
SHA2569327ffdf1d2b1902d9e28d80640162554969bfbb9c6dfcf93355e30cb588a36c
SHA512cff5d189b9bfe27df3c5396c686c8555c64da55c4a2ec51457a0f05f0c0baad56d6ee7058bcacf6f511d71b51bc8bdc957408a87cce24a0009e1514eab214039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa6ec76f8ade0ab1b65c0279f444b7b
SHA1e7e0c67aadc4bdf35f5805c2ac7787e7d648cc8a
SHA256fd3821f2a0f092e0710dbb9054df9330e9b14dbd5925cc2329c0a7dd6feb8d35
SHA5124ff587e84887dfa0ee9d6fdcdbd2d0a802bb44b9c1edbb5731ec32d1aca6a18c0c84c4ee50e53c2fa704d710e3050f4b16bff7572f6780e7c561a1da27eea542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaa5b28fadd3deaf7f6cf149679563a0
SHA19eb77456ac6ab42fa8c0ca730fa43455d6b8b09d
SHA256936f2697a2a6a4adf867417f97e5da05a91ec9fb2b230bbf5a57cb7ddaedd9ff
SHA512b4f45d94c5d3e6224abee5b2676ef5d0bf433e4dfc0b36d17f47753ec6e1596af265b1a20edf9f1696fc66421a7bb7cb5b0fb179b2e1a92dd113adbe2392bc70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a467738e616722b4723682c00680b681
SHA163fe8c9de519d38597d73fc006bac624148724af
SHA256407ddf8633470d58fcc2fe802ff864d551bb45571c778dc847bff7b454c5a1a7
SHA512494f8be4d30aa26974c3ddb06499ede0cdcb87aeeda72e65e789cfd09439ad6df0995760ac2db144ade95090f2ac4da141831ce12b1c87e26a932b6eab3f523f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b5584739bab3400bd25b796b6999441
SHA11ed7a16eb6535d7699a6c0d907353758ceb5fe95
SHA256015c9ab76b8a0a43655c53f2dd5ffe83eb6714e4e5fc148e799d04c5429da60e
SHA512f15dbb3375a1ebf58cf68c5117e8f864e981eb22a5212ae7bc820444a281a5340ba81de6a6c1b9cb41c4fd2c15c6d161f4fad8854825292343dd74ba8956df82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582da6407873c99db2261ac401378b6a1
SHA19abffccd5077960b5d893e270b782b435506e89b
SHA256f7f027cc57c2968085b51112e940a11957d4eab71308db55a0c1664daf7b3844
SHA51265a8ddb848363ea043d2c876d4a2f348a932fd4f9626b75e291cd3014f6dd5bf3a16f48aa5ad7188ff9ec189440b8b4d08999497e81e8918b48eabd9df4fb76f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cb208b0e702eb6e7199541793e6458b
SHA11f5dc5b6e345f0e2af982321c7aa965e954bba49
SHA25687863d749d84a17e53684314e605eec992bfa9cd9f86d00c3843ae6c3cb0ddfa
SHA5124d15fd8eef02fa5a402e0706a952be1f99010aef55ba6895d9992aa50b4a650b239c7d0efdb4f06f53849b63c754045bcf2e883e2187f2ec1b5e5708bc0eb022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5944dc6ae06f8e6cad683a1a97d5f7b09
SHA195e26bd2f48341e9718550f8090da566dcf8f89c
SHA256937fab77cb91101fa99c40ade544573c191d6ea9f4131e8d859507e57c48a488
SHA512dbf80e6261cae2607ad103215d01f772aa89d25f112f52c78df0a65847f158069e7aba8ef27049b9b4e3713a7ab9ac34466b548a0071dbca654377c2868277a2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b