Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 08:33
Static task
static1
Behavioral task
behavioral1
Sample
eaf3e983843166fc6f2bb80b0d794469_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaf3e983843166fc6f2bb80b0d794469_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaf3e983843166fc6f2bb80b0d794469_JaffaCakes118.html
-
Size
45KB
-
MD5
eaf3e983843166fc6f2bb80b0d794469
-
SHA1
d78845ad11a83c7263b7276a3121e3ae8d3423d9
-
SHA256
c3d8c220f1adc7cc33f3f9c8a0b674670782dfcf7829917908b2780fc51636a5
-
SHA512
2fb9782eeae5763854b2c8c03911dca764ec05dbb20f5bfa12b6fd6bad041594dc82763743b184bce152686beaf37455d743f6a8ed7dbf730c5bff548318c523
-
SSDEEP
768:KyAOGuX15hn/U3YYfa4+C8C8C8CUCACUC/CDCoc6XERZS+pEUxXzdlsA3HuLTYPQ:KyAOGUN/U3YYfv+dddNbF60k6XEDS+p0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000027d72f25f34f09808f6f5defdd285561d14ebf1109f1de48033bdcef6d84a62c000000000e8000000002000020000000df3c6fdbe743842e9f9b2d96e2cd0b13b720685fd9ddf2442b888d2ad4f1b5a420000000e5ed0975fb0cbc7767db751be98c92728d66da290834295db8a379ee4dc9917c40000000d97c42d084ba94b7eb13524d5c4e61cdd618c805c550c18d5c8b2ef2d5c1994921a52d754a918959d79e322b4f42b26f2e0efab9e8225d8ea88c4f57eb57e2f1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0456a056f0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED8DD7C1-7661-11EF-9B59-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432896713" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1140 iexplore.exe 1140 iexplore.exe 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1140 wrote to memory of 1324 1140 iexplore.exe 29 PID 1140 wrote to memory of 1324 1140 iexplore.exe 29 PID 1140 wrote to memory of 1324 1140 iexplore.exe 29 PID 1140 wrote to memory of 1324 1140 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaf3e983843166fc6f2bb80b0d794469_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db8f2cb99a9fb1224cc7098be5012fdb
SHA18cfb44d5635c4900ad0893cd2570d4f497b64f32
SHA256a69f3c7745bc50dab7fd76ccb5d129becc3f293d15533936c9f35cbb592d26b4
SHA51275d71f2409b275c2be6499a4f54a590c5d10cdebaea701588b6592744e99630961a3b04b46091f96ead1f7751b87c6f805603b0e784e387f050a2bbeccaa00ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54975151cf61a99b210936022943dcd75
SHA14463b2f9b872393a1715e9e139b8d65bc15bee07
SHA256106d651682670eb2e28565857eda3d9be3477687ff99dc0e936f374566746750
SHA5120f38591ceba1be8f9c3f2a77ce71bccf44d0998aee14af31c16dbca022911b511f3655680d6cf0b50c13253a157f5f7f6a94d3015b6bc73e267beba6018c492d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b725bb26658da68998cf79c7260890dd
SHA116d8e6b82b876fea7ab40bff64929ef4c6d9cad6
SHA256a0e2216eecb8c679149e57f3cffc6d3c203ce5d9e2889099e356e44ea4f8db02
SHA512f22e6e43a0073f9b645272db90021eab2042631f2b69f7e281ddb8d9e7e9e7f8757c9737653033efbe741c2ffcb50f63a0eb126ac2af1d4c2978e4ea886a19f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d7579186aa3791d2c594d6793959585
SHA174ca57213825d6142c93456ef25ddf9ed3d8a471
SHA256d3144dd75679cff26cd306622fb4d813d302bdf8cd078d721568252692ab1bab
SHA5128cc8c2d0a1da5e031f19f91c538075c7d89ee979dbac6729aec243bed9e9c4524bb5465dad7bc470c25b7462a48fb35b391badeebbf6987cf29e6f75e509da97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6f5bee7438972c58824732d0718ea80
SHA140b8850091ef22bf3a4566861ba37738df99869f
SHA2565b65d6d33d46cc91be0874f453daf8b20d5fdd74c3684654321df4542bc10791
SHA5122fa174749832e7233dda21110c10ff69ed4390f0219de63e354abeba4d7a5a4c9e45faa2e59a032e7f15259c6f7dbe2151455156cfbec4f48abd51382e34707a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5946dcf52d08fb28ba6d14289e000c084
SHA1c2327f2b57683fea846421bfad0b2d09c612e254
SHA25649ee4ad03992c921fa71d22bd7bb1356b333ee8713df352c00f33b2f14fbc6f2
SHA512e21344116f57214346b26c3f00d10162a2285722692aa1c8ff8e6f5faaccf9eb77b3509532e0d4b7788c996bafd6be1efe9ba5ead956169b6abc725a11c723a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571a8489e2b4f57127dd20d00cb88ae48
SHA173728f68f754f339a01b05c72a1e3f1a176727af
SHA256d58568a00c3bdbbdda8630c48daaa28292aa8818663ec7449081d2308df0f53d
SHA512368840a961af17b208f72a58fc6386d794c8b844948b2af7948cc66ceca3417a4a9436d6185f95eaca662011b9197d348728272e96b9d177b340d98c3a715a5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eddc18192095316cb3a25ab57a4f5f3
SHA10fc11fab21e737d8210c86bcdf2140baee04f437
SHA256ef1cde633d6290f41d0a0e4c7af09ff452cdafa694b3017c0faaf221d2052ca4
SHA51243c32053a2e7385bdb7abe49a44875a4cfa9da5a1c368281ffa76b2fe8a373dc707588f4c391a9ae0c7653feebe4db06ae91e0b9ac7b0f5caf0d20849bbe1f29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554529610919006144aef9e1000ba697a
SHA10c3991849b5d37003d4e6e7dc5b15c7b43bb601d
SHA25611c76d45dcef1f7ecf1d3be3c0d7131cd8f6803ef8436c78f254c5470475eb20
SHA512fc008918c58a9991ac7f7298650d36bcd1c7c5d8392fb19d9c502859757ed596bf835a22f4f1ff7ca0954f0ad091ebdc0e4a16d137d3a48600e9c0745a057b65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52442dea6c1917c58d3dcb06bacf4b769
SHA1c4314522820a5361b5df1d9ef64cdae7c96dda06
SHA256d36b22421ee6389665bedd400133b1451eb27066f8ba21bf285aeb8d5c6d682d
SHA512fec1ea905ceb0c2ed38794f760d0fe990e38b62733da98c6aaf60cae21accad14fc2d1bf9c719873a44808ab84163289a9eb6e0e7bbc60a32aef3c09c7b3fe72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b375a5dae743bbfdf411a62903fa65d
SHA1455b013aa7c593bf4783d5dcb5ab8c46c37731e9
SHA2569f90ae919908ac4e65343095def87a8113bd2bf3e54623b5c11a6d69936850ba
SHA5121447dca6bc42051171cd69b9e7286c948c2de89be77489a9eb791def7ed7606024b9ca0d466eaa6bfea7ac529946fa2a95652c56515a800901eaf84ad2cc18df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b4462ae236aa93f48350a99ccd04271
SHA13b787d90db8b94af8de91bd7cc2134d9fff999a9
SHA25675c412144c7ba03174a7c7d9da6e2d63766df181ac32cba478bafea3364c982f
SHA512c291fee24a527f6bb65efb13cbd3d41ba63abae28a4b33c317d2479d1927256d050d94b94af47d95f275bc123c099d42baf3a1605692425e9ea26a31e4ada955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557e38955cf513ee33c8c326c441e917a
SHA1b3c78c27290fa1a2fc3763febb2b08a11464229e
SHA256410480af38312cde2b5108b02ec386522ac42a8b9f760e917da01a3f7f690525
SHA512c453d94eb76b3fc2112c1f8b0d440af9f05f20879ad2dfdbd2399563ce989c84bf0af55d4ea4a8a6d2aea4329f96217bc94595d2c0fc2f95d3bad14610c862e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58883324ceadc26cf2ba702747c02bfb6
SHA1492bbe7f2da17e2898fad55cd5947400d3dbaf1f
SHA25609b45cd5a2e63b158d93bc6edbef8aeb8e042f3ebc4854132bdf77ae53da55d4
SHA51215f4b0327dd6f7ad0e6991d152c4835c7d6c93ebc3b1addc7b84abc61e4b7cdfd92a46fc81f4c3effbf98249216a80488deb7fdda20e131d0f58e9841e0154e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb5178b2327941b1aa731e95e14953f9
SHA169cab213507acdcf961e04a10aec58622e7452af
SHA256dac79def7284ee2924b8ad5ed94f69a49ff426c3c1e6c4864c3e9ef39ffa26a2
SHA512acf7b0f32e35e13c28f64f18e40d3bf4ccd54a5dded0a5695135eb4b75a10b62ea373c1e820aebe27acf3bd79a5b5adf70ff6fb7704c9087c34d0d62265b4870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d38b6591e0d23e52c72ab8dc720a1b2
SHA1e17b43a7bd4dfd797c061ea513962ca82e222e7a
SHA256a0ec429b3d30927e04f6dc05a7a6f153431958fbd6069d34a006e231cd1a0de1
SHA512bbfb27460770def44cba5d0386e0667ce45eaa1c72743187421293e67925955127f1e8dfe876e1826a207d600c72508b18000532f63fbddfa7b4b2ffce48396c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c11b18303215ba04fafa2dc729aa8cce
SHA16d8d31de54fb5f1a7931f8b57cb6f0db889be290
SHA2569a7cfc2276f70bf30f341eedd3c58ed84f91717dec02d05f7491ad530e4616c9
SHA5125e817162b21847ce892743ed2f18c66bd267c6f1d54dae61e2c15639387858b8ef5ece2bc38ad61f609b47bcbcc825ff706eb1def5f6ad18565f15324f70b0ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5236ccbcc01ffbfa67869a01d80192be2
SHA14feea45cfd5f3cd733590ea1e1ca87d9a0e6eb50
SHA256d2a72d4b88497ac1b00d0dfa4547a366f89ea20609cb9a0cbdf23a01aaeb1153
SHA5122f0e35c66094e18647ce5b8ece858f825a9d3c48f96e4e34371e1ef4f789d7c977c3895433ad93c9e9e907ce301ca898f6551ddbf3d13cd788ac3d7228acbde1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5062cceb6103c60287b85a5e9b0d0563a
SHA1f94d99c177f0d152c04b0fc10d7c7c7d4565f7f5
SHA2563cb569d7e17dcfa7a4e00e4f08b014a57ca78d97bc9c78a073dc7a091c9510cd
SHA5128f8f104beda1e69c796bbf57878915a578e460f9cbc51fb50e16f8785a07b86949617ab69bbabb46b3ef16b71240c7613371d28c966c5b6dbb3f23352299e313
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b