Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
eb802748d71ca98a440a4edd924774b6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eb802748d71ca98a440a4edd924774b6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb802748d71ca98a440a4edd924774b6_JaffaCakes118.html
-
Size
29KB
-
MD5
eb802748d71ca98a440a4edd924774b6
-
SHA1
2e4076a42a746e957a45cdaa94d1bc1ef972c802
-
SHA256
318853803348a03c3878052b506f97ef51e5a1b807fc6d7d18a825ac977e340e
-
SHA512
3bb70eda32ec8ce101af1b0809cbdafc0f6dbc4b03d6289725b072ec06d6fcf14b6e66c0711c0909ae72e35ee084b1a1becaa5978745712a2dd6f91c20cb167d
-
SSDEEP
384:ZpU1F/JhdjJIaBAouB8GF1cqThCMkssuUtfr8u9MukCXr+poq6ajNN3VrGAwQ:ZpUNhxVLUIHXtV6utw6iRGm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2A560271-7691-11EF-B557-C20DC8CB8E9E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000003c5dd4d3beae5fcbd0e590d659583259266f793544f57fa390d9efbb482920a2000000000e80000000020000200000000e20d51d0e8cb203bc56c2cbe13abd0ad98ad4618809d7a4be630215659bc8a520000000dd1d7646dff7eb0ee7eac34a429b03977ef708dd4dff05416a8f32097016d119400000007066139cefd24424aa8daad8aa4e8cb9cebb98976b11f31bb22de592f144c87762377fdfb850a67702bcdac1436294a3adb3e32fc0874b04c6c307bbbffcd67d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432917000" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0eae4fe9d0adb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2624 iexplore.exe 2624 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2788 2624 iexplore.exe 30 PID 2624 wrote to memory of 2788 2624 iexplore.exe 30 PID 2624 wrote to memory of 2788 2624 iexplore.exe 30 PID 2624 wrote to memory of 2788 2624 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb802748d71ca98a440a4edd924774b6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c3e1e24abf5e4d0438519c52043d224
SHA12018a019faa520e9b9958fbd68d3326dbaf6c647
SHA2566f441f66b803887a3991e0a437013a04937d745dd47c5259f8d89f6911b5f7f7
SHA5124e628418e78b2a5c5db34f425118d671d400da30d1db77cfa73ccab500bdabc53e4aa96dd6960305b222e9a58da8962cd7c525e5bbb86af45010f2095d590829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c58db5668b9ff9d5cf1334d699b4e93a
SHA186ad9d275dd79702c2f5490ce3cd9e5498d6d8c6
SHA256856bf537740148b85cd3020a5146e0b98d5867854611ec6f0d026d991a252ae0
SHA51276078926497e8c12026672838d278ae248c27f53f7ed1d8eb2a0c594d1631f067642287e2de37ae42683546a3d03c1df70c91c38b56c0220310db859a27e518c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1fd9805d93574c47ea3357e62fb3f36
SHA14b3f24b6c06213cdd4a8b6ae8c2e548301e4eef9
SHA25632419123e2b26cae02273f840b7b4d2af2d4f36f52f9b18493942a91c32ca239
SHA5122687dd6fb7e0501c3a3ddf1a8a18affc528ca2f4907da2f9b808800a4ac2c51f21d0e40275cf6c68eeab54bef01b463839766c4364b245f35dbef9d941e3c817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5945177865f455c42d11788eec88fc266
SHA14f4d9d78cc6948e069cc39d749635b684d130210
SHA256fd98a2f6aca934ac16afd6af7d1aee051476f34638862857b5bc16a4af08109a
SHA512b381e158ca885f2b25bca48946a1a51505679f623a12202eb0a4b4f86a6a8e465c5bed8567728ac909e67c95ee2a2fb991c06441fa0ef98b99eb7d28b6739e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587aa3d48658a596065c983ecf1d75de6
SHA17367a9bd3318c5e1f3c09f0507f54a89c890154a
SHA256d962e8f811560b2a58741dd9170bdda785d0955caf5558407352e9414f985a3b
SHA5128f4ad4df2d08f35dc674bd970a17215a12e825183d85d3db2162583442fb29507738196416330571d11c36d20e32c725744a968b03bc1aa51f85c599574a97ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c02066da5e072950dee8acea6c26c752
SHA16079fb80d521ede27c9c2991919e35840e32581b
SHA256c622f594709705663d5f30ac91588bc47e38a951b7a10652deed47369c3c6cfe
SHA51267229e56101eabf025c355da1b82738942602e930d4b2e2ffa4368cb877a8282a8a0fe1e9c9462d3fd63a2261524a78ea4efc6c6ca58a582a4740f0fbf369fd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b777bf8189b364e29e90ff805b28f983
SHA1ad509d87e575155242a2fc0354bbc50eaa666723
SHA256baa01534ec756d2a9314ff0e9190c42fda6eec8eb27319086d4433fe16bd2921
SHA51289ec0c78399b13b7d64bf22f5e9e49a23de0a730ac4d9f2e6eb72b6b117b913d15993aba9d2a75ce041711c0436108c1d62afc7d25c84d641fb2a434c2a77ec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e82970b847ace1df35ba02d3873f53de
SHA1678781321a9511aa878965b90b4c6391770c84df
SHA25653ad365e1291354b8935e3cbaee52bfd080b0c3e3459583301bc14e63c6167f3
SHA512e448d9a5d12f64adfa0d6d952d121dcec4de3c1b287644e5be22102ad49fa5b395c18266e53fe5a89dc9df4e9a81079ad4020371b74f4826d928d62290fff0eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542aedc1306a96edc1e6a42d42f01bb44
SHA1383eb3d8c58e5264277bc7d7962795a1638caf01
SHA25666ec7e0762b1296ef36d77426257ede00419caa9f68e8ad933e0cca10f12136f
SHA51281ee0bedae842aa911e82c4de00e5228a9cf1540d186b22c41c9b181dd10e89db4ebc7b178d49c13bb3a9ce63002fa01987b022fc081088041e7f87383a93693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee48127b48c3d067e27af7a0c7f1f264
SHA128dc9cfbdbd87981a8aee9b6060c63ba61f936c2
SHA25631dff9ab6fa0402c593979f44b14a50d081ec8a53cba345707ea2080f09692c2
SHA5125e3ee8e0ffcc50d8a28a08de7a95dfbcd9199db6489c47b61cd30aa42c4b9833d0f3a1d952a034eeadccbf39ddeccd43569839fc8090078eafa46c03344b2f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad0097f76a0f3de0395141bc39aa3af9
SHA1e66529c1f9622a00ce1cd09daa868f63b7e4154d
SHA256f5d31043918342af6b3e325950c4efc37d168876762da318302ded5cb2cc8d4a
SHA512353b3301cbed88b84df9dda0e2d756ab71be32b55810692d1964dec529ad2148223b1300d05fdf8df6d4a78a2cc3eadc3745ed42928386c55498986eb0d7f01f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541daaeeb6fe210cac9500f14f2673eab
SHA107aa90f0163e1102a1bca520ae9a0039bae1b8a1
SHA256967998a77b5df20c50c51378e199544e962bbfc35e0820d2b074700b5cbec262
SHA512eae28a7d184c4a62a1848a00a3851845f414f5c2a0ddca9024ae429816dbb19bcfe115023f702c62d06d705880d86c510e6494554b1c1c1147a36ca895588de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548d85a04b46701974f522408d5ef970d
SHA17405897e7054834e3932cc3c7daa91d6a22f848a
SHA2565bc9fde613f583c729ad75e21da71539e5b5ab7e79e82e45f67aded7749df6fb
SHA512d4b3c8d9590b008603449509eb75afa489557a6299c854b8913247086c3dbcc7cbb788f72a595528b10641cfbcdc0e2d6c3695019316f5b6683b0e47212abac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a68a149bb32e03949f501edbf51b0bc0
SHA1ea99de7702b42fee504f756dcdc0cef9d4f63b43
SHA25617112c9988cbbc41d0c162c06868a767440c580ffd74e931869d457e613edabd
SHA51267c5b77a17dd55d995e7ee9562cc25fcafb464a9abf4618c8ac8f19d5c2bd9bc8d7ee4f4fa252de194cd16b93c7ecf3c34c9f97a37602021c37197a76c38ee54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bad3674072ce752564d1dcd824a417de
SHA1958fe7c843fce2e52c46879ce2a5961c1cc6920f
SHA25681aa0651e877e7b5e52d77c1eff4cc915aa0154f3bfdc1197d8b04a28decfce6
SHA51261fd813cc0b61752d9f27f86114a93ae7c7bdf9a2210e7910fa2714aff099e2a48ef797fd3751076daac2b8b4f44d58052ef3af52b3c766c2bd5e180f891e8c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b2a1414408c645c3947f3a8186c9622
SHA1461c0f517b54108bf5ab04faf429f6427d2b37e6
SHA256e18270d49f9ec51a551b8cb6e99e50c6b4645c442c6b8f5fc49b2b304d8ac58d
SHA512d15708e144476bce2d33e6a40b1cf8908a454867b224c7b8fa4769a089b4314bb26de0696aab9a60318e78c26436b41d4ad7f8d760ac24dfc314b123c5f5755c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0c9a4a2ee94af9bca947e596a3ea909
SHA116761d38a22a6c535a30e36ab7d0b0c72d77b988
SHA2561eeae6d6b969cdf94a09ea61ad341571f6a696afa72b9df874c0b92ab7899789
SHA5125216add6aa5f68075d39f6a23d83d65a736506c8cd21d7ed8c08019a6dc41bdaf43e08d4b64ee63f125dfba74266456440dbcd689e47d86f31ba47c3e37bea33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587c0ba1bb670c55f6627cd6f5f2a60f3
SHA1ca94bff564f6814ffa1acbf3390e32c7d6c6d4b1
SHA256ebe864c690b64049a8f2b67838b4394b231c59f0b83bfd9aaca9516d7858b06e
SHA5120b37618fb495e0266a12d0b2b1303df3fdda9be5a743df0d4e238d2b37e5e45fbf0202ea7569d34c295f649dbeb7654681007c77c43e503b1b09c24ae605b502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d4560ad01e05c0d1c9b3593205c3fb0
SHA1014ba4ed99c219096df64e7760113231a80826be
SHA256f4071b56f1109640158593284e39424cc1b1a1b9c4d8a6350cf79f45f59f9ee4
SHA512fb60eb6f178a6a98817c4d0bd9384e0efe13b2c53f165643b32c6a50b69b769045e977d69b8098332b74ed428a0b4463998dbd7f443d422fbdc4b0a82702351b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b