Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 12:17
Static task
static1
Behavioral task
behavioral1
Sample
eb5121e7dceb91ddfcb0dcba065331d1_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eb5121e7dceb91ddfcb0dcba065331d1_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
eb5121e7dceb91ddfcb0dcba065331d1_JaffaCakes118.html
-
Size
14KB
-
MD5
eb5121e7dceb91ddfcb0dcba065331d1
-
SHA1
e66e8d41f72317a08e4b111aec0d342751441963
-
SHA256
c04d5d6f70aa286760217f72274d09d8a596cd6ac4121c2e2a5845556cb29e27
-
SHA512
7914c9834849f8bc345deef676a1d35ca64ba1a5ff3b5c4d743e62b7321756ad2b7217d805ce174113affa42de1a11b0d88cdd7fda2e1a3dc8191abeaf4d5999
-
SSDEEP
384:DcaI/ZdO9iWe36SOOAHkWhaXlytyI8YIFPHR:C/ZdO96KSOOoaXEsI8YM5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0df130a8e0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000000ebd2870077a2c17c78ac5430d5cc7860e90746756c670ae7e72c7d91e15d192000000000e8000000002000020000000f6c6805d5c166fb8bff756f29f7385f671aa7ff6007b825b80fb764f8664db9b200000001ae8ede41188e65440f4230afce5ed1a2f6868f606b0be40c1ea913318d9afd14000000073c691cb09e5e8004b3f7bbe580924555cbb4f51b1a27aa59712458b747bd28dc6d1d13570ef11b9685ed403d4f3758c33c6e36573f572c29fe042c6434cd226 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{358C2B21-7681-11EF-A4C8-72E661693B4A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432910146" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1916 iexplore.exe 1916 iexplore.exe 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2416 1916 iexplore.exe 30 PID 1916 wrote to memory of 2416 1916 iexplore.exe 30 PID 1916 wrote to memory of 2416 1916 iexplore.exe 30 PID 1916 wrote to memory of 2416 1916 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb5121e7dceb91ddfcb0dcba065331d1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5072ebc68c4076d5d16da83068f02d8e7
SHA18a59bc362737045386ec086e3a92cece5873dd2a
SHA256153a5e5b8210bff4c8ea0d41257780d0dae7f917bb5a17fcb2d9bbd0a74555fc
SHA512606c54660e192b154835018cfa506e68386e79a0c766e1617932407de4a140cc756be25410c08c694f7fc681156853feef657858640ed0a7e0f643991650d741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b62613b7d8c7d23b652a4588807bd273
SHA1f6615a1401d4ca59b242ee430cfd2ed1a6fb997a
SHA256e627616bc6213acb034e455c1d5c58bfddeae51317989fe9bd1fd6e4be0a90ab
SHA5129880574ffe1cca300b979365bb241b800cfe59ee1e0ac9c920064b1f666efe2d6c4cc95d096647d5bd33798f06fc18ac32481076957a9d2214f26a6e9c13da94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b02722f50639c5500791cd360610e89
SHA15038d278beec3edd7ae7c581ef80108f1a3e652a
SHA2565750fbee480c8e225f9e47c868fba7866c900da62c7c113df0b570894d62491d
SHA512aa611f73ed5df380c26b52f710fd0231cddba831a2d2c3f695b513199ba95cb4a86fadaaca6d23bd6fec6d2f3e19ef227b675785f4d18d8a765e6ca1e5474944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3862ae7485670d6c3d2fd4010184a6f
SHA178fe115ccb51c7eef8745acb072f4d61b62faae5
SHA2567c408a96c5a07384a26898b5fe816b6bf96a397fe394850460ec986d81182bef
SHA51225e1f729228964c6b72fcc7891b0e44c3a7a276dfc533334a3500316c2eacbd015559227dc3dd465c70c6884a19c45d8d870e46bdd076aad0df9641d2ce2bb6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f32edb64c7dfa8a409ae777df9363380
SHA1cb54912965f5eb26aac03df8ec0dc37f687c8a9e
SHA256aec5ac1cb660c0f53e2dc91780446faeea86db830098f97f25892e01b532dbcc
SHA5125134107e86a900b1ba62c1cf657b05cdcdc23ffcc30b6e2601e266d7061a1900ecbbf5343a0e24252ae4c83ab7180e002a6acc24b3ea3335fde2316fd43026b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532b4c3e920fe837b699cf29e4aa55272
SHA18118a71b6da84316a3da59e71e02230d30bf7ff9
SHA256cdc56aed28684f6e15ebee2e605492077b3e827e6ed57d3dc1e4195b1b04c754
SHA512d137744343ba57a8b6359a358a7fe5262319f315bfaaad0703b1bdb69b73d2e2605b82a6ed5ed36934aaecc9b9b7b94bf0e6cfc299dfad68cacbc7a4c2970d2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ef4d251d948e3c88f134a8e49c819f7
SHA1663438e44c85aaea9c1da51effb9984a9c7b26ad
SHA256dcceed37b3c069060826c048db6378128d34cceb94886318200e6ad796bf0534
SHA512fa6cddc6e6fe1980d800a92c179717d7fd85e4b3e198f1654475a02fe246c195a7d7652b4aee69c668b7f29f52e0d4176f3e955ab543d3bee270d311fda26aae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5439e17003f8ab5790bc294db1291076a
SHA1ea803d9089177f1a9d18033cac44953ac539b0e3
SHA2565488b7634276b71e775e5fd87f3442912f10c3ed57bf2a6a3ae2dfe06c5cd346
SHA51251824346ba07df643d099ba780d5a02c8cf71134f13ee1fc9e5c6e039b3158c5f83b22c1d6777d2135139d9568c04708612d127413026573c7b7798fb6d85ed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5639a051b3fd5bd0ff343a91396471a24
SHA15c41f23e6aac17ab989ea173d7a9ca62f18840de
SHA256c86c7d8b50d9d9750465f7f1f5fd1e16e8718d3164acd45b20e91e91babaacb4
SHA512556d8e3af5c7a036c20cbe9b53044572674401ef5cd172e7616b4cfdfd811e909e3ca4d0c5311f27fcf6bfe2a531b96cd77cae947670cca3fa9f604db3a9f508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ce6ccb0af9e0c4320643e460ec58f5b
SHA1cdd9429a33d1a90a75e72cda1944cbe0b0d0b1e7
SHA256b6320799012f04eeb2661120aacc651b270724e19a86d123ca18adce0b09c2f4
SHA512663aba52c30817e0f39970ff92392e147696eeee79cf54c9fa0559b1279196efa5753baf85601fc39a4d82abe8bec73bed258203be3305b40dd9d07427d2b291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574e8aa75b37799c3871b0b4d5deece2a
SHA16692da493f51a9a7dc39a645d3bffc676ddce821
SHA256feab779fd489ced64f1457afa270bb7f622c9b8a7117607a08d4d6ffcf9db862
SHA512e70872d91aa4e7b0a44324565bf2e589275d501ed2285343226a58d12957dc080b336d3832c02faf4c646ce24d000eadb16caf1a6109b605c093e57bdb95aa50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8e80e1fd02163b2dfc75edfc2e3a5db
SHA16dfab047c330589ff15c49bb3942c17609b5a849
SHA256b66508eb8cca7d7dfec3e1d1e94b722f5429f85a1ced02e51cae1d92cf24bb66
SHA5126a7b3d939752da1066d9526947f2e2553c1b72aa659b5ca7ba47356bcf73952337a35ddad51a0ed7f9351f185c8f962facdce95492a311089a5a20a5359e3ecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524f0524d766e64d1779e26ec34d29d11
SHA1cc0c5c1931cb58ffc47bf1ecce97c56e9f1a3689
SHA256e61a6ef3e966a95d5a2ff717808a1b05adb6618d405eb605fec0a11edf1a6672
SHA51243c8df1f2a1fa19668623514617d5410c0a78bf14d4f4a3a6b594ec782d01826e2104f716aaedbe932d25552871188779936c701280b9f2eab5e6c62101d5150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d12c9cba2f9fc4cf377e63fca8f0d1b4
SHA1f9d72a9e4accbd8643aa6e99faec36b2f14a59eb
SHA25645951b2bf492b8e660c95fe0ab90e3404a860d22827c986120e70de6ad7e39b9
SHA5129ef125d3f4148f9b077cd2ef9efffa6e59161ee139c08c7289b179a5770ff6eba7aacf05da2265ceaf4bac78134d74ed5f4dbdc15b956a1b8ed51cd18839ee62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592eb82e7121df8621b09d7508f66294b
SHA13ea8ecbbe414898a42d794f4a1de543a94b8c5ea
SHA256442333f1ae8b7c1391d38d904bcdf7c36c753cca01c77d7b1744e099899f5d2b
SHA512297a7eca3a01b8b96a4bc9537219753d266530100688393c113b72373748641ae249165d0e15298aab263039d20f22d400f64b65e3daf74b5fec7212d5b87159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e45019662b635e55df6ca695d49ffc9
SHA176e0522aa9f2cc8d487d9ce5c3e139ae9765dfb3
SHA2564e4e1107ca2260ee3664707378186a40467ca55865498cebb058339195cd1250
SHA512b167b3fafbc2342461c732de13e975d88d050f4074af54044a551e36f6aad5016c9e43da1941881cdef67e07ad4171ee7930496dd39b0b3c6aa346a474b17188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f17c15a231c43bdf95cbecf10e443ec
SHA1d7ef37635e86e64a5a78f6099acd2fbc9da85512
SHA256861f0d277a5a85d6676a9ad8eb36193a7ca66cda432cf6cbc00a489226082c7c
SHA512e70632c96eeed1ad0f66c28d57bedd8aa22e353e367c260b7d065f38cd0e2bf9c12693409125f05551210b84ff09cbdf77807a3d4456146a9ced71d55cb46593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c5bac0da306a08a1f11e16e7a9c99dc
SHA101f994162c851a73422f7e7a023f29037ff78636
SHA256fcc5f09525ee569eaed3e3bba12be7ca067ed591ced4a6497655627eeb370586
SHA5122257d635e75b302aa89f543dfcb981c28d80deb39e264c62cfc38a47ca4f59f7f409cb5364cb264d250b39ac5c7992aad5c5cf6bb59c920ebf35acf4420436b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1fc00c73fe3156ba91c211967bae00a
SHA106a919e1fb26703b24d3846d4d7060da22b41c22
SHA25617247e115e21cc54e314c1124c2caa7811008f5093a526364f91ef121d359047
SHA5121fab4d0bcfd20d62442b26993942fbcd2adc6be38563d482019864253663a20b8ddfaecdb4872ef29ef393806d78d30c1bce8e395f186ff4dd9fe9b0652ee4e9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b