Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 10:59
Static task
static1
Behavioral task
behavioral1
Sample
eb317e85b29b7501230b2c0958ab077d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb317e85b29b7501230b2c0958ab077d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb317e85b29b7501230b2c0958ab077d_JaffaCakes118.html
-
Size
180KB
-
MD5
eb317e85b29b7501230b2c0958ab077d
-
SHA1
7e154f1955c5b1965a75932fa85ef00378048991
-
SHA256
ec2b0b71b4dd1aa66c9b48cd554dde1dce4ce13be2e9f836db79a5009c485d67
-
SHA512
ed94329d5bffc5afcfa8c2e235ceb4629ec9a55ddb9b536881c478c6846dbfb6faee770995c5db216c9a091a815d67488223b4a2025aa3d56d4012266225e399
-
SSDEEP
3072:K9ZLBl0iBgABgjB4SFBgWw2x9Bg9BgLBgEBgCSBzj9G:kBl0tw2x//
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000006143ff3f794abc325e1a0e871f9cdbc4d9f867b4077aa109d3e545862b42ca9e000000000e8000000002000020000000283c0c78b73871da047a95700f1217a0432d351ec03d80e8e21178cf11496d6e200000000bf065ae383f1fe25daca2ce4afb81d31d9b6d97d563165327947c1da51704824000000045371a1d72bdd7a0ad3b8b150032a1ae2e4ebadbcc2396d3eb768830d9b465808e9b52c2831aa8e708477ece70a9a8adfa765de45c060720aaf1cabf4ef96794 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3BC72C71-7676-11EF-8E45-E699F793024F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432905432" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c48611830adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2700 iexplore.exe 2700 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2696 2700 iexplore.exe 31 PID 2700 wrote to memory of 2696 2700 iexplore.exe 31 PID 2700 wrote to memory of 2696 2700 iexplore.exe 31 PID 2700 wrote to memory of 2696 2700 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb317e85b29b7501230b2c0958ab077d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD59729e68f6d27a54db8f01e1be65f6a55
SHA1a0c65b93af6df7fed89eee5c26b79fcefcc9a85d
SHA25680b30e8cc15593c099bb7e1a2094d4789ff1096d2e61f68e38834678a312e1ad
SHA512a70bcb9e5eee5dbb8c1018d67ca44dbbc0b277bea981b75d375d5b4e6cbb3be0d87a7b418e01401e426cae7e6b3e16c474d05878b8692681ae3c8e7550b40786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5523dd0ac50b578aaa8a9341cd8e055da
SHA1ade93a350fa370870183ee4a7f47c7dbf0dd766b
SHA256d7538afc537a9c8dcbbd36dd6238ff1acae050982242ed1545811d0958ebd898
SHA512a3437f836c08ce68d5d67fa65a16064409352825d8e52221e683a7453db28c775b037c657e9d9780264425d43ca04797b4d8b8ee1ae1018fc9981ed3606c0526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e92e36c7d6f54b20f1563c198875fc2
SHA1afbb505880940375cc0267450e448eafd5aaf0d8
SHA256cafa908d7e6c0505f9c731d8734af50594ecea5fcde8fe82e63554ac7889ae6b
SHA51214b6ed5c3e5dce3de0b440be19d9a738c11275e8d8d5d2b5c804ba21bdfaf92af161ad23bd3ea28dc455f60b7805cb25d4478fd8a9b953374d2d4f8aa80db4e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5d6c727924e57b872417bda0698f3cc
SHA171214479bc0982b926ac2f302902b8bfcc0ad025
SHA256ed3a044bc91350702306759c40062367a778ac4c904d1384a01934781cc391d8
SHA512691d86bff188091178aabf1451880553bb86447196a21e114c25254f14e38c6cd2e6e6ed58023d339a7aec6cb8023671a2d7f6ff81e105b8db3800bc2da063c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583ae35f302f2f5ddeacf58c727578c70
SHA14ca4f62afc249b305a9f4fe21168a7e71385e14c
SHA256a619a1f825050dcba26a1854af819eea8ce5074334cc830985fb4c822a2d8e3b
SHA512f37fa2c8679aa39406917ea82ae40e5ec00a83b6906f11e3526a5a8b6c26e4384969069c530e8c49f9ac8587e2ae72a446646fda402162c3d764164c6ff65c4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1db8098c36ae1f527f097d9631eec4e
SHA1585386867d0ab6092eeedb842333f3dfb4e90cf5
SHA25607bc05476806281658f3355d93db10a795b1f628b77e4a22ca72e336a5047e8e
SHA5124d0ec1a321c83470c0810a1cbcf9622bdd40be251a2ca7362ddc7fdbb2572e67aed3d302b12ae95f67d74c5caf40336b2e01766be90fdd96b8904520379fb2b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dcdd8d64bf3e2d67997a341babf1f53
SHA1941442542237f9c91aa03881c753fe8c77b6d174
SHA256f915da143e88a6810666333911bb26d6b3c503fb42a9b1ae3c31ad483d0de492
SHA512ee0ccade3e6d087dc724413535e02d401199a95929764cce19e137fb1cd0d0f013def5c0ea06c2777566b9dacdf84416e6657b80e8fa00531926d140a24dc331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522a27a357bd995c14b376a6bb2d4dc1c
SHA1a1d73e887c25eb4285973ff4c467bc34b0273cfa
SHA2566e9d8844973c4f376becf822add9129fa6295b34eb36080fc6e52bb87aedc7f4
SHA512d91f2997e05d7f68675f06cbaa79e72484a4816be031f8ab6c6854398cf3a54e8691735fa8f21cf13d52456fb019941c90abb0681ed7ba7ac8e93dc63599a398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5cafd306c78cc625ba7c0274fd26005
SHA14bf4b5efdd2ead02d4ffaa8535a37a1591daed1a
SHA256c6c90c6dc5ddabb9a18ea38bdd1bf350e84ee70f46d986b9a60c3ff89a70b83a
SHA512f84f18fc81e31881600363fd9f61badab265720c7cec95ff325c8fa2c5723ba388520222147c5756490e54bab00e613de31f3dcbaf718a4a2b479c03323faf48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ac7496d99fc2ca4964f1e01e88dfbe3
SHA1dbcda23584b2c4d43ca8890a6be5d70571e0d3ad
SHA25605e62fd339fda72c31729ce7ee40f5c7b307399bf0d980c576f6a8258bef5a77
SHA512ea2f0065661a0e1524274ead2d8240d6d11f31e2002604b7b73c72a9e2797c221bd8a7d82d74b462d502c20d13026a6f671ccb8459a0c01b671e967709751447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f627b3ee366036e69b4000f53663f948
SHA17486e269d43428003e5e839b9f509cd3ef50b8ac
SHA256ec4957a1ad68dd5e6e04552e6b281ad1abf75b6c200526a19304e3ce7bb1db98
SHA51247ff86e8a2fc73a9786f7845f00c47f76b051aa1c23666123c4136d1bcaa09ba2f37564671c4a267d00d1ec4fbdf829bb29b1358579ec455933a2ca786b8ad9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584a65056d6224238e7bbf0c46bbd08d8
SHA1a5ed59954646f60f3e8af01c28627ef3af670ea9
SHA256d43afb119de1ab3471ce2c34ffe50f33856695a5d60d95fe0cd30511be0aa119
SHA51296db1b27b514e8187bab2f9c9aca2388dee3e3dd37bde597ccfda8cfcd288646c9ff391ba50aee540e2caa63c72725253d8f2bb0e370e356fc9ef2af54da2550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b53e46d6022229ac6d3d10115557309
SHA1b9bb07b56c3312ae6bece882d0b408fef31129a9
SHA2567d794c04411fe103f5501a1c2b239e48b80a5bd0ad02d803b9cbadc31e29d648
SHA51284da534325d3d7b4a405e1b3ca4c702aada0d4f2fc742fcd2e601fc42d3d21f3dcc21b2a1f64fe7bfaf2b4f3b004fdb580832e310104195d6e92b8166682f9c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59418b1cca49465780cbacd9167ab42ef
SHA18def32f6864eccd86bd1794f512a59819c447db2
SHA256b1f0abe61f92f001bc24607ee5b17817c761dcc841f950fae0c108d8e2a2ab55
SHA512c615579d5163bd5ed2228d1cbcce83af7135f02c0a38364dddb0fd8ff8910a000820223d0cfb783dcf70a4bf92ff82a4f53883d0f5fbc87cac6be6fb6c2d149c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5508a6aeea2f9702db0cfbcf4639e6b5c
SHA17df6cb84444810406f39cdb2616469e0baf4d93c
SHA256e61db14d25d92d7768388798ef970c274464bb5dc5d46c7eac3ca98d3c1949c4
SHA51214bc55390b910765b6c74c6804b54573906bd22a19491d36d4376f2fdb8fe9ae665c1228c00329258c24c738f801d971562bc64a266fa0304b41612fe74fb226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD5d176a6a6ed100a122032c7418f4f8e79
SHA1e76c8755e0ef86841d1afcf3b19e65387074412c
SHA256e1ef26ea1a5abc01aa88a17edbd4343539b3da6d37dcb74908368aa34892eba1
SHA5124022894f2912c851dfa4eeacf564e2e17000bee5d95df8f8c2c433b776fdd8ad56df1bf0f0ddfe4161dac975c546317017e550d380a276c2f380d5348cd95c57
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\yahoo-dom-event[1].js
Filesize30KB
MD58df028d2d3bb6f05621ab23d215ce7ae
SHA13fbe84dae8d7e5d0d776d2ca166eb06c4b21ef99
SHA25651322e416967b25b9e30eff75661f6d108445c040f91a2b590f59f44e3991509
SHA512150dfe2872bbe9620f08be7fae51d468a39a7b673e01444eacc9f106b5011231f475efeb07c371632380e1ce48c3fa4e529aac925f4daaf91aa43cb4f312df42
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PLSLTMYI\calendar-min[1].js
Filesize69KB
MD553be4d85829221f66232d883e3a327c7
SHA188f8b450538e5aee6d142192cfd8ba9496ecee26
SHA256e3468b5f1f6d645c2b1a58636286f72d503b00789205b9d9895b161372a90bb9
SHA51200e5ee012e696829100d11a475dbf31dc19e4ef5220212c34aa0898bf9a1398eef32c361662d3a9df4bf5c992f7990e7e3738f50bd7c730d7a4aeb1cc4c709ee
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b