Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 11:46
Static task
static1
Behavioral task
behavioral1
Sample
eb44856d6a77721e340e072f4ec0020b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eb44856d6a77721e340e072f4ec0020b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb44856d6a77721e340e072f4ec0020b_JaffaCakes118.html
-
Size
342KB
-
MD5
eb44856d6a77721e340e072f4ec0020b
-
SHA1
a3d50d3f851fc7332dfdb4ef699f54fd560749ac
-
SHA256
3a505607141c485776001f5cb46e13473ac16c5a4969487ac339764ce96fc4dd
-
SHA512
980bf7ea952e0b1b24ebaddd3154db2fd472a661be0f4e9da95aa2ab21c440645a4add5040dc9f94671e01c5b3ac3e8fad427592f9df06c4b08cb9501d189edb
-
SSDEEP
6144:SM1sMYod+X3oI+Y7sMYod+X3oI+Y+isMYod+X3oI+YQ:V5d+X3t5d+X34g5d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000864093d71632160f2996f5d470c2040b8aae3ad454bd5115c53fc50f32965c51000000000e800000000200002000000074aaea690bcc00b1e77c2038ee2ed3aaf01a84e329c83aba96d3c0c4aa05f1c22000000049b12f4c9a53b54691f4c93e009826e3924d37b763aa5cffb2efdbc97de0cb754000000064a482787a3004dd279a00dde7e61e406398b0b5c0cb0f1190d8cb491454d069d7b38fd4e35250a32b5f1450dad36f9d9094313b957ef6433167b169c0209d78 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0919a9a890adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432908242" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C618B141-767C-11EF-BDFE-E649859EC46C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2216 2932 iexplore.exe 30 PID 2932 wrote to memory of 2216 2932 iexplore.exe 30 PID 2932 wrote to memory of 2216 2932 iexplore.exe 30 PID 2932 wrote to memory of 2216 2932 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb44856d6a77721e340e072f4ec0020b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b186e38c6ad66403b89d79db8e92076a
SHA1d26b586a5b78353b5d078a79a2a257edd4314a24
SHA2561655ca61b3af2ada47fb73c4b504d51fb0dac00d2005d79fc6a4aa63a1203abd
SHA5127802e53e447752ffdcf7e520e32d7a89d47a13cb18ba383ce5bd9ce9d05afe2669af730c8a1428edc3ad99ee4cd51ad67ddb2ed0354bf7007ba1ebb58c4c491a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583ab020d51fd4eb9d74c9b29e9307499
SHA1f36e14352f0f31d72bfcff506ce5fb00c7a116f1
SHA256fc2921259a77a0b90577b0343883456bc787c41f8f5fee571d75e7417d5283ff
SHA5123284a5985a32341d6ade9807a65af5706409ea11adc53099bfe898e12cf8532d540673525fb309dbfe1657afbab446c82a8ab5c0defc14818619d299b41e1636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ec8ff1635f96606b31756cdeb864c05
SHA1f354b70c1c649df83396326355d5e1aaa461035e
SHA256fdb042702199238703bfc42b3c94c456302c6e92396a676413bd288c52954d26
SHA5120d5f886bbfc3a18b2db4b690e89755ff89ad9facbfe77ab337158b7f1277a2c74970bf32960e6ddc56a3bb3c70ec230982de6f7535d468443f8da38cd358d077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e53d39da2f3f8903e5ba6946250aecb5
SHA17714a050f05cd0508469dff9b74023788a1f6d45
SHA256c41580392cb6641312ca3ef49b4bab2eef488da07d5732e7723a9ef4fb82cee0
SHA512d0dc177f29d5523a33926f6e3295c59816a86017753746f1ce059bf2c6d007cd75635385f1ab833750246f688893e84fdfe0984673e934cede8328ea3dddaf20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa789ef2e04661cb8c1887bda372f62a
SHA172bd0aea1b6ff0d4d8e925f20a6ae3d7c790ba1e
SHA256bcdfd63a5c28ffe045ab8738666daf84a8734933395ba5adadf9bd580b4acbf3
SHA512e3f26d9f393a364571f0ced9308ec89913dfd396f36190fc858c8a89e86b0e59f8de926f2b42f7f34d1ebe50691aeab6c08d3766fb609c5ffd1ef6c1c4be0eba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2f371c7d2a4e14f015b4513de21cd9d
SHA1a641de8f1cf475ea035dafb3d51b48be5f3604ec
SHA25653328b01b0c98eb3c48503c2b9d750beff33b403598cf6479459c21a08c18ed8
SHA5122e4872c3b1ed72ca635011248315c0cc55ef649704042e0e8fb9b1771f9f167f50aa706699e3f1d2161bfd82a8810d1106db40fc66dd88e9e1fdc915464e4daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572f565e0a892587b91eaf5c11a44d930
SHA1172774a9892443ce6dd79369289c8154c2ca4376
SHA2566ad972e91e165287ae2c66538b5b042d19141e3e17ba2b5fc42ea94194eb5961
SHA51203e2d51c84f4741c012106b46005ea5b1c7efb0d4ee8d3c30f159002cb96e08e0e8363668152682ebfe4d5dd06660418fc0cc79b225518afdf649592c5366055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528ee1f37b3421ff12e2f58f57aa51d17
SHA128e215289c0e399044837a8e53cf1789c2d33041
SHA2564e815738107ed6984280526d95d83842d106a39f5ad5cf2e6082a8b809a87bb3
SHA5129444861668fcca7c19bdbe453e2a8b72b82bc91f82fd52873111aa1d657c4c8176a9d268727ef80ed2d5d78d1166f80801671ced6be994ca26cbc627c619138e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a41c8d2c307503ccc8972ed101d0d9e
SHA14f021f811b4c3c418ee8cca88e9c20e0d54d8614
SHA25652f4cfe70adc0cc610a7a878723d5106c04f736cadc1488ffd04dcc8fd56a59a
SHA512f82aee562283e143b2bdad131a5406970e8144bdf7ed078b3c6222f5ae0cb03c0ccaed38be716996c31a49c9ec122a50d819bcf10eab0e2ee030ef72315a125f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5123407b97525d594fdd68f23063dc1a2
SHA165f19a90964c27da260fa0b390ec65e1188b39a3
SHA25691b8867278a42aaf931b89d532d24868f5178e59d8366f4c8404cf5a662e1b1b
SHA512d0be9f46d4f7218ef454b9988595f2696b88230ff96683c8eca27ec4c2604942cc7b131bfff1a087241fea122f9930cb7355ceba60fa6ddbbd15ba4f48257a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5434dd763c3f6fca847956f2aff32a90c
SHA1dbb2061a465dbca1704a89e420ae3144ceeb2d23
SHA256f7900d36034d4a0c287092a40fd1b46f61e1e94ef65e23f3145a044a70d9ad5d
SHA51236db17c0588110c4877b30ef3e0fbe2cf30afd7aecc13892af3214242d7373469ff288810eaf052709ca5e37d76b06322de8b20c670f3c21c0ec4f778991520c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9557d1960720d562bfb5d15fa16312c
SHA1195e96812917386d23489fdb5b09049e09f57365
SHA25607e719be0ee6743513c30bcd0a21254f6809a477344cb037d37cec457f4aebc8
SHA5129f17d1b0abf14c2c44e81ecdfe0fb72765bf8b3e6f6d954fc200754520c30b0d60e4920387904debd99a71e76ae27f32e7f3b3e186d5f7bec54ef0d3c0ec253c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581ab81000b5515667acea950a7910f97
SHA11f7b3541c6aab1fbcfd333498d30d2b5846b89eb
SHA256aac2fe16cd28053838597ee94092f79f4f30288ca28dc3ea4ca6679ed22aa3d9
SHA512cde2bed366f1bc83872102cf2ee54662abca14bac33dec99988705c40c0e8c7cd5da259d06e96186c0b1ba4b3ad4e05654b28cbf2ab4ed5259eb4090d294d19f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c8e94aa57957f04e82128d4b11c83a0
SHA1045ce5f96ae835825285f11c589f14bd20a6f6c1
SHA256194a58a0be1706624c091e931e168399270250d08abf77ee513aee97fecbc728
SHA512ee6baf07f4c4e1f6ab811d048402d48cc5ed46a626e44891a9c93e2fe826406c9362a5cf34f6dcb31d52a4fa7bc2f51e2ea2e01d15fd4275211c175e3619a34c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577de890179abbdfdc5aeed4bb29c015a
SHA11605ed1ff65f53da028960d6fd519e37eddb0e3a
SHA2567595861b9d1ffc1f60590130bab830df249f22258dbe6d8d245cbf02a7799d7f
SHA512167c77da5424e5de51c74eb9c0c634a160e1aba1287bf1636fedf98b19cfa9b3798d5006fa47fab4af7db456df8d78ecd70a818bcaba81b583d2b6bd234f67d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f5c641c5aeca2fa952f5941aae84dae
SHA1836cd8310099da2facb49789c3fe03a324a6c9a1
SHA256a1d667332b9c94788a21196b2bb3a3e9c9c115cb604ebe5009f8ce18508c6419
SHA5129854b453201785f230c5e4490d7bc87b1a15dfd4e8686d8bd39791e9540fca5f09e3fc52fe107977b9109f183c0cd8ad6ba1df14b5e792aac3a4fe8fd297734f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acbe7ed3018851c4b3ff97e75fa87aec
SHA11a78c4c63c22dd43869088856fec263a182df2e9
SHA256087c610fca8977bc46f338a707f6e4432db2d8d7e2950c3430a521ebc729e2f9
SHA5125af8bbc9f689ba5efe33269f738e1313481a23ca9f68589b04c46ab29a2ebb6f94893946ca94306d94b000be1b9516ff7c6dfeb1f3d19fb17ba6023fb885926c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f380bb6d638463f5a303ed3fb9b5e3e
SHA1371e0e614dcacd5c47c9ce22adbd6b7ec9201ea0
SHA256eb0c768a17f564b9e2e1779e59177e87a92471393d28b813b086ab87549df5c7
SHA5125677a4f28f4dcc01579e32f4ee45d992133792ea79a86e91397b0792c7a93bf806177d742d00fcdbc02b24f4d754f312fbdefa38c22c982e511120982b7201c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562e0d5daca0e3bf0e6a2723e7b28e280
SHA1409f6c2b76a4b0eb5a54304efa292010846a56d9
SHA2564cb9095dac25b1c511689df8af70a69896fdaff91aebae3cd8bbb7bd361f3378
SHA512bc06502c46e1e6d6aac38215523e941aa087c47fa2a8d27c03a9a65bc1822ed76f3fcf528beaf0b0de52e7eae709ab712ada5cc1b733553348a4e9a19ea98c68
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b