Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 06:53
Static task
static1
Behavioral task
behavioral1
Sample
eacc1fcf89484892305f8b39dc009280_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eacc1fcf89484892305f8b39dc009280_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eacc1fcf89484892305f8b39dc009280_JaffaCakes118.html
-
Size
9KB
-
MD5
eacc1fcf89484892305f8b39dc009280
-
SHA1
5abb144f611785e3a9916555a90f2892f71b5841
-
SHA256
5b8d9b94786cdbc102d91677f2cfd02ef0fab50a1b00c516e2d42e6765a281c2
-
SHA512
d3d783fe6cb458abdf7fe463e4875c8ef54d795b862a6a9912b75e8b9117a78d70e0ece510286175c08f379b240c53cda4dd4050cbb7679ef176fb5de9096f07
-
SSDEEP
96:uzVs+ux7wIRLLY1k9o84d12ef7CSTUKGT/kPsipUlVHcEZ7ru7f:csz7HRAYS/7dUPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890677" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000209440f3f84879d9a0483864e44f2fb8330b7bbc40d040d6b5de6c73f19f57fe000000000e8000000002000020000000f3b74420090e40410699315a0cf0d5c2eb485cbbbffaf445b09f44fe916dcf2e200000007057f7814d02eaad61dba9b2cd4f61a4c18d377587c39b9c98302559bce4776640000000c4d868a9a9abc6f99b42e79da5f3afc83e61a1f4aa530a3f7ce7178cb7a81725ac34d627c1848a3128210ea90b7f4e68fc2014ec9ec1c75fd05df6d073c0eba7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 003120b7600adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E0875F51-7653-11EF-A364-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2376 2072 iexplore.exe 30 PID 2072 wrote to memory of 2376 2072 iexplore.exe 30 PID 2072 wrote to memory of 2376 2072 iexplore.exe 30 PID 2072 wrote to memory of 2376 2072 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eacc1fcf89484892305f8b39dc009280_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b816d45e9449bc7edd3ad188725bd756
SHA12740bcbf470a19335474d215925601aee83e8167
SHA256555e84278a21a38d884301f25667f36c2a24db14bd95d1e0628c140df4842b50
SHA512d2a4050d40a9aecf8028d2e0249e575a2887f7848ba477ede969f8597bc2e95ed99ff219210a525b968638ddfc0aa828a55049c93dd34db56ce12e7febd0e384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516a62906d5e1334a68b895420cf19eb5
SHA131530dd0f104a2054ff746c1a932f1cf4c7be85e
SHA256e7df203a703a59e9ddf0c05e4ef3169f3c554ea38dcd080203ab45258c8bfe72
SHA512e97565d71517f42831f4c1843f0658ade7a1fac725dab23c21eea8dacc20715f1f21f774eadde4d5b6cd099a7822b64e0660156e8101decf40cdf206450b819f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ebd105780274d2b6b3e868d1fd0a324
SHA1cc920d47fdea4c0bb64a890a8a50358b1dc2f9d4
SHA2564389228f9717b8c60b9e4d3286caa8039bc78a231bc60b1dc72867dcd324b7ee
SHA512e9962862df69700b85fe9e5e73b3a4b908baaca3bc60989ca4ca76794a1d4b4ea9b6e95db3856e292b2217a894fffcce8c39ea05f6524a46df77893570db38f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fcc9f6ddea11742cac1f940033affc9
SHA1f817c8eb7f243481ba903ca018895eae0ac9377e
SHA2566569463d421ed156eb0ee4c7e3f6636db1e574238db3018b715d88ef9b597e41
SHA512c57fe1b29d5c54600b4fb087920547e4ac9171e19b343de3f94e6a29cabed8d4a7d5375548b34084e1944003e01e09e66e52c54772297bc0ba971f0f8507bfd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55adf5421a1e5228df9a0d1e89b4b051c
SHA1fd6b6d468551d5d9206bb48b029421955ee3e65e
SHA256b04e27b70b02ee0157f62643b6bc0c43cd034278ceb7c17c9f51dedc557354bf
SHA5121512fa96585ab479c04760fa6a664dcb572440830003fc00c2cfc672cd1edab282e736e91aa1827b9828304fde3b271de5c0601e1142fba4ac897bcbdab9ecb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531a3ab5dcd23fb3f066f2c724f7f6891
SHA1ed679d81030cd3e122e2f9e983862a744abeceb0
SHA256c7180c7ff6672116d4eca428af38757dadf59cdfdc4f1a1b19581c06fd6d4f80
SHA5127bff7068507c60ff90a97423795be7ee089566d7bb605f3608b1935ea0fb856cc147e335a2361929887c6a859cdfa2eb682d6453cb7aa0ae1f5cca384ad5e55f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b0a4285e5d362f844ec2c33ef5c4f04
SHA1e761512db04c843bda7ffb3ebed28623c70d885b
SHA2569d89431a259d44c56e6073c33cd50fbd4b6d4069a24240754800ba8cc270a10e
SHA512d2ff3a3bdc25db4cc11e381b46ff05bdc6afbe568f7bfc3efa79c35a33e9e6187e094dc616ba884fee7b0918e3bb081ad680c7e8001190353c9a2947153f2e2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5124630490619a88aaef95e5c8c18c7b6
SHA1d64f0a2d0138fd0ff7974d7552fedd059eb7faaa
SHA256b45cd429fa8e574b864f13d2dcc60a018e69a8f7b5a601b934561d9fc7708aec
SHA512a9af9bb04b7a0765418633dd0a8dca93ac4804105574fba8a161144252fbdaff0c2be8a56c0e48d64122e66198f1ea05692b7aeeb6b3aef82fbc068d71d043c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b5187d108e8c04bed387045969fa97e
SHA1e0df668d58ce789444c3a43e8cca2781ce007ce7
SHA25645ed1a4ee1f83c923d10af540e1198280b987dfac2975f721f4b71b67a4b1ac1
SHA512dbc9beac7915860f0a99ccb7fa5f09777db240625f99be00cea50703aba06e3a8e942eb59f40eb91fd1497af9d40716b2a6332cb3d0fe207f8fc1204a78f0af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d82b23acfbcbb543da73e67f459217eb
SHA10987ad7e364ab1ab5e88b18b843e2d3fe43892a5
SHA25684fc823d7c9f49d87e755a8052db1c7d81a40c1e270c3b8b6b392f67629730e9
SHA51235226664596d16bee564b60710f3a9a1a169f068ac1d6328cc558a433a8e3adecc29acf2555490a3ca2c2893b107f0ea34f2c74aab02becba8907e49ad086db1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0aa087b81cf4f8eb595a4da50188da4
SHA1937c4af853392a0b1c807f3b720161753661e9e1
SHA256a12533e329e550b7a1d8a73a6a6cfcfd5cf99c8e00c70df51cf39a9d5d5bfc9c
SHA512e14ded99c0da5cfef642438dd6af48e081d164b6250178564d82c7bc3e6e811e17aeb9f95ebe0513f44298229bbfaab955f89c79315d571d680041e7ebd18cf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f691d98bb8f7339e1b3e185afba98489
SHA164c386d47ee2630e74132c1838a8b755c9b6d56b
SHA2567ea3c1feddc9a47b654885f36ec72c27c7164f6a5a5218a29694776e99c12adc
SHA512a1655580fa37fa3d18b09d118c5271f73447493194330c19e064beebff17284be39422630788b9027fc8cee8cf56dde4b1c5e1edf92d6cbb9c86063a0f5d2070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f173b5df44bd45a31767d002041929dd
SHA1afec472fee24f5f4f3ee59d99b40c591fbc26898
SHA2569292f1088298e1e72de220e03404c389c9f81e9889639a1ecc8af7137e314ddc
SHA51231d8414541626cab68349aa1f69d604b508730c607a3cdfeb8aa00e2ffef0b1deb95c433926b5ee65f9778c8a79bc2052127299d522fb515b4276b8219cccc0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba0704a445329292b2c00e413f26e022
SHA1bd101238e3b4decbe5d6f6e7f1500997a6edfece
SHA256868dbed8e1239770e79815bf31654d11dc9e27e6806e38106ccde7a3ddb55095
SHA5123f42801633dd85e88f845ca0cf4764d80b2ff1d2657740616ebd62b38c2a1b318517cfa89902bc6f50d55d3d6d1e1a9ac3e9fbdfc58395d81d450d4adcc105ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c24af8de48f73dd27caa33fb13cd50be
SHA14341f011ea6af3abdaf6451a8a8ebac0e1c8f360
SHA2566fffef400beb482cc8fe093926169d4cee711413226d52ea753197d21a8b4b29
SHA5123ae8e75712ee1002c8a41f9b4d0c21eef3301a40aff212a798023275876787eda48198cb0176553d26b174deb7ce7ab82988e81b4f1685fb14749c44e04df4cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5902f4010ff0fb16705299cc2dd62401a
SHA1fce5746b430d413e8ee5957ea1e6707037c4a85c
SHA256fbcc04d50319fa22a56a6f7fea0fbb520c39d16c1a733047711a5c26501027ea
SHA512b3fa498597e3130f436feb1c7563606c80d8581f596156c44a29535c62c5773f7374740ea1b04d8a92e435b091608a6fd2453956323f00c5fa919e2a6f7cbb36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f404ffecaa3730617cef7fcee691b6fa
SHA15aaa5f34c0140215b70c99b6819fa2b995e91e0b
SHA256f1ed3008a1eb4a56f22ee03dd7bf6714b7cdb10b778b6e3c9915357a4c3b143a
SHA51242df9cecc3efd7a0f4dc164b75c2181b98a1c47b55fbacb3459313d6b86ddf0c461ee3ecddac2da6c4cad5e9d16bc6a50632b40ee454e72893e6e272989bda1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb205710eacf3c08374da5fa2e5ecb13
SHA1cb3cac69350d0ce36b7cb6c6282344ce494851e9
SHA256975d4ceabc2842bfce36ad10baf353b24c56f2468f6ed81d54afd66937ef07c5
SHA512bc9d50885ef0eb78e5652d3d58609171e9b954ab7c62460e1e377749b630e70cad4dde8b1a07b45e3d7a44a742ecf7dbf840286180bcbad5494feb10652fc459
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b