Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 06:47
Static task
static1
Behavioral task
behavioral1
Sample
eac9c9fd12044eb3e50f1b5b0001dd38_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eac9c9fd12044eb3e50f1b5b0001dd38_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac9c9fd12044eb3e50f1b5b0001dd38_JaffaCakes118.html
-
Size
10KB
-
MD5
eac9c9fd12044eb3e50f1b5b0001dd38
-
SHA1
b3b76601bbc3655ee1cb98348c107a82b227b803
-
SHA256
591165f0076af2d6b3b024c183c79a511043e313bbfcb4909428463e1b099b6a
-
SHA512
b3f5dd8d2a11606279e51ccf6ac18b37305e2f90f1653ddc82c0b6ced6ca80df1e59c73bc91ec99e62d900cb56569fd13354467ae3dfe5680ad808b71fb65136
-
SSDEEP
192:zO1spkLt63jmK1viDmKWx9tGz7uClmJQzT6138sXA5JdPe94pDF1V6:C1sp0MC7DBzT+38sbU8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000005ea6e90d31a065b4330196de91992113449a049cbb873c08d32b3d5ff3d62388000000000e80000000020000200000001341027cb1d79343f7cd10f82a264211c02bd8d499c20e9f72dfbd3402d8ee2020000000801d117de3530a32783cb345ce65345fabb017aa722ccb6b7b2b9153b1e84aa1400000005146a0bddb8850740c9d6382f69e80590c1d96acc14f2ac77852b16bd91868545a643c457fc5c67f080ae49dbc7d09ba8d08b5870bd95700693d45765322cffb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890324" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0EB75611-7653-11EF-8A1D-72B582744574} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0afb0d15f0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2016 iexplore.exe 2016 iexplore.exe 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2120 2016 iexplore.exe 30 PID 2016 wrote to memory of 2120 2016 iexplore.exe 30 PID 2016 wrote to memory of 2120 2016 iexplore.exe 30 PID 2016 wrote to memory of 2120 2016 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac9c9fd12044eb3e50f1b5b0001dd38_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a249b7c15d0b556a725570e19fda7ff6
SHA102c7225b771180601e9207d6a555c843ca07fdac
SHA256803b8282140846eb70696e5982f22e8e7081b296687dd35472dbb20162efda8b
SHA51236946670a20812f033892557b909f36133c0580448f61d12733cf19387a400de5cb510dfd4875b29f6f800d0ca94af065fd59e46c8c4a8835007fbb2b262a034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f710d3bcb734d3e89089b979fd11cf8
SHA1ac4d76818936b19631aed065316ed5a3d7a0da57
SHA256b0fd8653f44fa78abf76477db0db70196d9fc74adde51b733fe0482e25c7dcfc
SHA51264341d20bcff147153bc5d78a30bb902bee6d94bb4e580805632a1e365bbd094d5a2d2069fbf92dcd6d956c5cc64bceccfc421220bc9d747ce4e73b6e101101c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531e31a38d8df7336819aadd7197e9ea8
SHA163a94ae33312f1e52caff2c1633d9776a4968a55
SHA256b22716f8781091f9d34f92fb681c72f1131fa5b7e80c45cc6826c740ae405cd6
SHA51245a82f939b99e54721428de3eba0efee8a983493bbcce416af59bcf685d86d06dfb69636ba2572f5115d345a55ac244c19bad310cbd377ae9742b857248debdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595af5a31da1a69a9ebb6f92e68f44c24
SHA170e9e29ee2f7912f613bcdc0369bd7f483659a14
SHA2562c64544393102d443a79074001fcf588cfbbf9dff2185abdb49366c37c527dd7
SHA512d4e47e656c7e48225117175af3e73b56a5ecb9e8631ed5ff854d5bf4ca7da87f8f27ebe4f50ac0fa6dff391ee6f7c05faf03dfeba9ab8409eac9d6889cb4901f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f47d376f324c3df968f2310f1ccfa9d
SHA13c4448de6e0ac309982c1c24df42d75c6ae4a045
SHA256c0ec0ed28fd9f027717604b47d09d0b8d1c2d7b66eb1d5a506f21f9eff4df004
SHA512563e8bf8d0017722f2e806d79bb46878669d94f847a6bff7af96152c645367b4a49a2fed8ad1d2418e74568ebf78fad0a46afc5bd097772afb7b8bd9f0f8c438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d6fcc003d757d61e8a6924481da0e5d
SHA19b6400376406a06e9678234a462c702f72cc835b
SHA2565338708ed43f5e800f3b53162e14995c7fa983a94a3c9939e5422b14314eab50
SHA5128cb04a5d3cfca1437888fa269b130e58105a29c1a31cb450ff2e1fd52d238d18043422772ee01cfd8f522e597d7c678e5f462e8712ee94b4fb19fe9da63cb9b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5122385c1e2c6937334ae84ddf4fbd09e
SHA1b6eb26562c2237d37bf10567e1332bcc16307487
SHA2567caedffaa41f2c17308174a584dab558ae1b86ba4683f8232d868ae384c543aa
SHA512cf48b62f83c1f0aba1a79248330e0f57b01e7c265e68a8d83f33c258ad7446f07dd6627b23fa67fe7f74abd4529ce489d199f5e48eb092c0b30cbde5b7d5c887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54de8e8d86998fe8e70934cd9528455e7
SHA16990f75b622cb3b99d570c2a4c6e2c3c393eb2d5
SHA2565bc0d98401b06125f69706d48c9fb081872b0d11d3b5a6f7d440733911cba244
SHA512145232941db4b7a97ff60eebb562ccdcdc0df422029574562f54bb708b765912b12b4433ffafa057b791c9284a467a7301a676b6944235c7790446c9ded6828b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c993527995adfbea0e0a2d585408076
SHA1a783332c7fe9855778a42386bfe2fa25f5cc0a76
SHA2562f699eb699a2846a58ed8c562f2a3538144690740e2a8ec0f7283465ea786855
SHA512b2fbfa9b186ed8e6dd5875d98021060c83f33c0abaa2ce5d2c23667ced53eb5997c0d517fb8fb1436918b6973679e8a3ba8ecb65d0f44bf11c576341d6d3ca73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2fa7bb1c7c4e55f8fa4c6438e435d56
SHA1351e4ae3e1bd9dcc41494ce3fd1b96d76492a22a
SHA256ad3a6b00a7cc1621e9ed7325c16c27640cc3f8bb1c6bc501e9f32be903951a39
SHA5123599825d0d0143632dd592f14c6bcf00fabf6bbc2b1dd48fd50503fc258155536f3646fec3ae930cae60e07d449494591515d24f43c57e187b18eca6366f3574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5522fbf0d5812c99b03ce23ad0c8bb11a
SHA1d499d9ae9023b403bdb4ed25f6767c0e51a4cb9e
SHA2560fc4e7e2754b865b9e5591f1a7824bb1bc3d41838e2a10588dcf7d781ee40363
SHA51205fe4cc913838538f7011059abc8488918215d3b67b6a077f9a33b1f9ac4c6ae1a8d32229041b8d42dab8e9891df42baed2ab03f414b3140d48a51a60c18ee66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551996f454bd311a3443163e252f6369b
SHA109c1150e92d0512ad4fbf09e230eb9334a9c068b
SHA2567a89bf953d57aeaa1c761a9b0b5c0b879a3a3914344edba55efff0fdce203795
SHA512cf0043f0c6f74cafcd2c6a80fc5e17ebc218934b20bca10cc3218427cbc114c7d56457c250497626bddba53836bdbad91770f6fe92fc1f33ff62d66dbeea75bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509b35c4dcf9ba28bc3e3810f056ebf1d
SHA10382c18b69dc9530373fe3680c76c0fa86c82fd9
SHA2561c18c3e8449c6f1e50c31a6b071ac0319da9b8879e0ae58fda8f36ed16cbfde3
SHA5128af45ecdc1239b4a264a522c7490df280a2970c8f50be5725d97f4621126a264b7ed1bbbbaf1fbe741752889cb340fddf64d7e9ba41c82025431f74725b7104d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b7afd5bd1268596b09fcc9ec1d2fe19
SHA136d03c9da95fb2130d2efa67165a9dcda452b0e8
SHA256f235ac1407b59a607a8d949dbd2b3f6c60e63ae94ef2c8b9c2c67aba45e20749
SHA5121b8e3a1c0242d26a4e207e1eba94f43d35013dbe35965299ac547ad535c8218cf4524a70154b67be81533b022eda399ffe9636ab43497a702ce6e6bcab5393dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8a1bb8214b741a0b959fd27017cfe97
SHA10cab41d21e929519d5a2da30214e7c2d373656e1
SHA2568d1cbc1884539ca7311a1bdb84abb02abdbd5eda312b0405c95c9c35d1312d0d
SHA51290f512fdf005beac97bb1d4e718e5da618b410b71826a05266e710187473b7e40cc7d472cc3b2f61e92dacf34df06647a2feb401d23e48f980d79c5fb1ae0c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9df704ceb04990c2586f62655a4ccf5
SHA1560fa200759261e1ef4c6581d255132409957d43
SHA25679ccc6ed5199b2f5c387f7410b73915b7a1b3b0c26eaa456c9f5cfd94701a496
SHA5124971acc0ae75dff3488f27eda010516aa46d7fb7c7c85cddce1d6064ad792c13db7d8279893881ff261eee0dc15f2e02afe7b7786668a0ef7f6d3d21f906230e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c53d8ab4f63320458e2585febec8332
SHA18e5822ab3f9e0d964e3df1b534d406cfd90863a3
SHA2563ac7396451f6e2871fbdf7eacc5f3ff1dc2388e0709cadfbf5f57b4c1e7dadc2
SHA512fb48649cf959868c48f6274776e5731818f8987ef847b8283af2eaf23652251c69aaa5a11a2a30f7aa985dafe3999e737819363172fe7dd1498c9a5dbf80ac17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0624b6265969564b834f45219ce3d0f
SHA1ac56197d8a3f89cfd0a0317572a2393f89f2d81f
SHA256490a5698e3044b77a74ae2869b3f3e906bcf1f27149138f595354d932ed76000
SHA5120effde0173ebac4e368e228c6fc6b27406d2e7d3d85df7a6c500af250d5b3ca4d0d24679899bfdf20f62d7e2dcd9206a0916e9b56e24bbc852f28a44158b8eb4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms
Filesize3KB
MD5597eff0d8e7583b2d7802801b8462184
SHA12f27a609104d26664c7e5cb6abb69c82e2389b10
SHA256fb73612b1366721899b995121e9e51ed273713e0913ffff1d65f05fb6b19eea8
SHA51208fee4cbb31fbccc1379199c193880d60a248222ddba10a6b081719f0e6aa4ed1f7db7b2a0cd6874a245c33d1ffd6c6b4337e01622b0c18bb97627497f9c3861