Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
eb7b46501b748991c319a770e568c3b7_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eb7b46501b748991c319a770e568c3b7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb7b46501b748991c319a770e568c3b7_JaffaCakes118.html
-
Size
60KB
-
MD5
eb7b46501b748991c319a770e568c3b7
-
SHA1
7393ec53c4509fc8f3da9240c822dc3df35ba61a
-
SHA256
c7be39033db950e2b6202ebcc5c8d6dbd29d105d1e270ce5309750f1afc4defe
-
SHA512
b6f73b2b3da54ea6fe16dec9d1da57a2f614ad20bbeb102d7ef8f0266284976dfa08bed5b82c22ada4b2556c5c58f8d987c1c548b4c3bd171f9f1a22e5391898
-
SSDEEP
1536:7Lf3vIPHoS9Qo11pZZRRMRvG7DhxWsMe32fafnMxBy1DZq6JqKcnsyEu05En6:7no11pZZReRvG7DhxWsMe32fafnMxByh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432916296" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000023c414b8c4a6624807a7ea89b87354b834a7380929042de0e261a32979badbc5000000000e8000000002000020000000e80bbde4be04bff7d30fb2239ac956dfb6c1ed03011e7bdd0c7fa3840186d96320000000597e2651a570cb727963629b4a6d8fc9a5b86098a2b5f478e104c7ab48bd56a840000000753f5632efce58625c7f0933be82ffb14a315cad3be1c905ed18df4c8cfea904c85d9f7feb38674f9b8490c7148fd9f601c59d7b96f7999fd789c87a7638d870 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{86B0CF71-768F-11EF-9257-F6C828CC4EA3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0a6b6599c0adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3004 iexplore.exe 3004 iexplore.exe 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2384 3004 iexplore.exe 30 PID 3004 wrote to memory of 2384 3004 iexplore.exe 30 PID 3004 wrote to memory of 2384 3004 iexplore.exe 30 PID 3004 wrote to memory of 2384 3004 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb7b46501b748991c319a770e568c3b7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3004 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b240adfef4f161f498e157fad71c5028
SHA166f487e96e3ce50db569501e8657c04ad08150e0
SHA256774036000e85ed888ee2ced09f87cbb2139f680b32d4f0040dcd456dd67e638b
SHA512479815fa5447c8d21468ea641e2c08d349df2cf1fd15e50ba95d01ebcfe39fe18e56e3874be8c3acaddcae58cb3a3ca0e45a4cc5d2ed7b44bdecda200562d8ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2ed8c5add2440c31a88b7397bd62acb
SHA1f91f1b716eeea59aff5311a1ff4f5e144c0bdd0c
SHA256728c65fec3fc95452b2f4f3bafb2b44325f6c18d159a86d334427dc323912650
SHA512dbb549744d918e068d18a933fea5a379d8874bcb2a2d31de50afdb3d40df799edb9ae188767316e2bae63cf0fdf2c931b56ddf8bf5ec0cfd2b1bde8472443a63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd7a84e42b3f0243942ae14e7927ebc7
SHA12e5cf7e171db2cd1b6ce317d8963b92f7d696039
SHA256758cd8f753276b860c0ab9dc649c5eae4c228ae22c68a26f1c1e38f4a39d27af
SHA512832719d579665532bcb4d46e46dbae61e34ff292afb849c54a813e20f8055833f47d7a7aea44e2254b213d56930853971761e78342f283942b6e79e6873aaba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e175c66a8d850384bf035f809912108
SHA17afd6b5ad64e22ac592636a2bad3390abe855971
SHA25605028d9ad56502acaeec0c0e2d36a1c827b5e9d09336395f22625d3adb156588
SHA51248e7286fa5eb23031842b03d76527e38a9fc965ffb079e9087f2d10140be212ce3d4ca58ff1df2a8b027cceb6de789626216a8bdc02e277950ae94acc3194d7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553ba6b89b54bf318c5ab334e69c08115
SHA1681c04d83eada0bcc783a7a2c03d144812fe60fb
SHA2565cec20e644b8bce71afd8db6accdc52aa04995a2cdb2a29fd53ebd82f0e016a7
SHA5121bda351df60536ce8b5651d022e7b9fe1e3475e834833983724ad206c19b1e12b11c0923dcdbc096f78e680114d1d95b42fa1f13a83f25d3aec88def13e2e5fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ddc6bddc40baef12d589d2536a858f4
SHA10156d373cca8d6d2a9bb954b0a00e84ab257467a
SHA2568b371819ae4ba132ef039ac19075c78a17f49ee520a1657c8de49cd423ae86b9
SHA51213d5ea590d5e9ce83fa70626a7bfd1e3d9a80461c9127e930030394c4a8e41969e6d7ec18a4f349cdb5cec7ce283cf2c1936af110b4e32e36c2493d715f34ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e4c47e86738539541e0dac4bb59eaa3
SHA1a8a4ba772fb1ab5d3570829c0dd7b66284a9bf2a
SHA256dc74d47d5e1be5efb650aa473dcd6af0d0f69612cf5b93220e686e6e5b31cb43
SHA5125597000a78e8c304c233dd6ff9fca6cb35b04c46c21a0de4ba407512fd4f8a47e9d9dd5d31bac03e0c4196c08719c32d6098bcde8233f22fcfe4113a2b14e873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e5e1419762be660f1b1079c85d69003
SHA1ce44f83c5f58ad3e383f4fc865db8fc845ee3d3e
SHA25657ae6971b6a3fa2f3e273e1360306ce7b98e0902704495f1ce56a10d87d3c68f
SHA5125a3997a738749abc54fa931e1a428f32846cefaa6e8449f6f27ee3a96578ea4a0ec957a289b5438def692fc813d8e0e513a56d8426a5bce87c08a9b0061d510d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fb9b624fd970dde5037ac5ff0705f0d
SHA17179930b15fbbcd1bce9a513c5eec422cb04303b
SHA256a3462182ebcadda9699dc45704ce735ac27d4f8f8971d8d15a8b48ab9f7cf4f5
SHA512df9a1bd293fbd45a49053708750f1f79ba0da6e5471fadfb3a0a5b250364b31098ff31b0a7e5ce13e79c95d529344f39dcc5bde21748b8d74fd6a09b1740d7be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1a1bc326e1b6e68d974899dbe518bd5
SHA157a9df6aeaf4b11c27a6508f65b305d410da3b2d
SHA256ea59b1a7065c41c469d20f2edc242fdd3bd4025d6f83ab144e81d11df8109812
SHA512c38479bf6483721b2a12ecb7e5144ed71e784dd6c7f5a3ef15f73e4091f1183162652b3aee59e8d9158c9b5e42b898933a404646b03ba0e01da24698dd3a9bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d51bb0ca6d02cb48bb934578b7c801dc
SHA15afddb3655a6f18c32042600df56835b6d36f1b1
SHA256f741353832dcce847ee54d0ddbbfd1d90d0780bd810e005872776a0654ee4e99
SHA5121e515884f5ff693adbb9b415730dafe74417b98156430383da8da3942b985a1845b1a08e0371678cc99455de1de12e51f082aa5004a2ff04e9b7f16eb9ea406f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c36c3b52b67d753c4f96731b7438bf37
SHA1172dcff5573582ede1bade2256bde6fdc0984c82
SHA256384c289512ccef0b0f212b6568db8ef1af6d02f373eea1bb450ad89ae961748c
SHA512fa1ddcd02ffddc9872d603c1f589bf1bd64f579bd2ae3045b54951071ef31c92fdc45986732b9898d0f587858f7da3c293b0a91839ce6f3a69c1346f7dd0d8ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd331bf463b1bbf2480363fefd5bd91f
SHA1ef46ea038939e2e0e0bf67f77eb236380e647350
SHA256343b7c6957536ef1d7151ad7faec3125083ed44c1fb44c59e64b0bb992779e37
SHA512ae0d66d9b16aa5efc2e2416465aeab1b9a484fe61dd9133363e37a912cc93957ac4f64a3de13fabc1eefe4962025774b1c146d944c9be4c7bcf37acf71ecc231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb8c0171325c2c66603dddb31cdc8462
SHA119168c37fab6cf54187756b1ba7e9fd04defc463
SHA2567bb36c1f028aa08099ccc79268d23291b32a6777ae34768b2f40309a72576260
SHA5126827d24d06d13f2bef0a46540f6901415173c4d280ed32674e92a22b72a88cf8df72e6c8fecaea6fe67748ea5e9fafc1f6674baf57286be9bcef2c441617652e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a155f2d2b636ee835cd76f875c4ed66
SHA13ba5724cc89c4eb5016409936d558a5211387ba4
SHA256d954ab62dc0a6fdeef9c173632c676a2429ede5846746fd55920cbcdbbde03a7
SHA5122814b3c86825fc220d64a7bb80f688126777a59d6e53c6b8e970dc6278d484e0a8c0da0ead495e6bf65cec2f281cc523d32bc7d5a61fbe7ecc00f5fbda0ebff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579b7a5697eeb3f6569774d986ef9f012
SHA1363b19726e86631511d1ba30c675f83ceea52e5b
SHA25653cf2b5dae13ca7c152a475afa846619eaa24498008fe566be061ae855c2acb4
SHA5122d851cfbc21ab8ad0ac457025edd1fd39b141855e652be314e887e0df0efdf28fd4e2fc529f622044320135f9ec0320f023b3e9798891215a8a3f79c9a553d35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b67bea3e6c14c7118168c03ba6d68e9c
SHA1347e6d28ec1147f52559d0047451a08ef2c4abbe
SHA256a8e0940713c26cda0c8b1717c4a4f2657ddd869647b3b4345d786140d36626ee
SHA5129ab74fd9a9b04e5b7947abb70bae8466e3b96e875c089c54fd870dc77be235170faaa0b367ba4647ed8bb426a98f723abe3a9e6a50bf84ce7d3feeca3a088484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa10c6567ff289522bf5731fdd36bd7
SHA1e7e6566e708fc0ac85472d4cfa7d576e9d94658e
SHA2568f90b34d211af46aedd84bd17d43b8340b06d8679b42ddbdf6af0d782c8e5d2e
SHA512d4a7fc1198e1f818af2ed1ebff1e5084b6483d24ddac6062452442dfa6744853591f80aa0e3597ab21a54f5b3a150b06387ca5f3f0e602d15f00312b0332feee
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b