Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 16:13
Static task
static1
Behavioral task
behavioral1
Sample
ebb51be7f8846c9ca07a622bab6236e1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebb51be7f8846c9ca07a622bab6236e1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ebb51be7f8846c9ca07a622bab6236e1_JaffaCakes118.html
-
Size
4KB
-
MD5
ebb51be7f8846c9ca07a622bab6236e1
-
SHA1
6f439ca074894c1716fd1c1aadf79edeef828660
-
SHA256
974ba953e19a73e40f9e2e2e521f728363286c42dd09f49a7eea70716e66621c
-
SHA512
65b030f5754156db7eb1d4c382ad15b6a05798dcff31c18e1f70107ac07eb1b1b5ecad67298ee9299c1d07ccfdaeef8451dac51ec36d2241eb8ba973cf5b853e
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oKeRx1d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000ae527e5e0fa43d85adaa526b49b214e8db9572fa79f6be370c16f5d2dc38a2bf000000000e80000000020000200000001d85e4a88961116a8fdfb5f01c6d085be8afff6fdf142cf70b778c6e23ae14e6200000008285089bbe3bf2b70877fa4368d548bce22fcb9fc2712058f5f7c362eb6d142b40000000bca283b6ebc2ef8aa4c70bc5df941bd6b33a5bb4535789651f4cbed68e26445e001f77ee2ecc11ad2f77fa8750cdba35dad68f7dfbf408cacce446881eb76235 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60cc9af2ae0adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432924281" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1E0F08C1-76A2-11EF-9B14-7ED3796B1EC0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2484 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2484 iexplore.exe 2484 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2348 2484 iexplore.exe 31 PID 2484 wrote to memory of 2348 2484 iexplore.exe 31 PID 2484 wrote to memory of 2348 2484 iexplore.exe 31 PID 2484 wrote to memory of 2348 2484 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ebb51be7f8846c9ca07a622bab6236e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a61cf1319740cc65974be878f96bbfa
SHA166e5254f10aae1e1174e12d9a7c471f88f9dbd0e
SHA2564f88f0876f5c3721b3f26eb5e465a078fa45c56292f289a0d7d5044de9f19eb1
SHA51261611907ce4aa62c71284c65cb3b8152f2564af5d27762852ab11f7e42968a983358f1251b227a73414f6b4c204b038129f89ac7a34185ed8cb88e8aa2c193a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac4d2a737d4d4444c0e5a49ff660012c
SHA1f070698e674e163a8a035e958e21a15ae738bfce
SHA256317163e0c48aa4c351dc929aaf4aa7bdc2eeeed2bf6b495dbffc913a019c07af
SHA512bbaabb943260254e0a51652a518d3b62471a22507b1eed5c849b198cb66bfbdcb101a948402791ce300f1212e2042b941f5cc341c94eca4d8ee04591fe91b57e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504935a93280c4b0381269e4e7a76d4b1
SHA12cfef5613b5532a261fccb6fb3d94f733c638837
SHA256e8016226a9bf4358eb804cd0d919308e9187d52730ae2491a09ea9953de77949
SHA51204f3ce9e669503e3148007e7c439e7ab8459c00001bafa450ea82fdb2d6c4ecf3cb818c99ceb32355d7b7fe0f3660fb4f70a12a0172660bac6106fbdca558f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5271f277fa99b82b0d499b230cccbac01
SHA1d30646d2a1de060081f520fdb50952b7956422b9
SHA256ec6bb6717709eef1b5fcc62c24571eafd75e81f5b920296b1c3f3b67e2d7a23e
SHA512138017b4485c15aebd035be9cf5262048f335feaf6c0c044e43ceec1ba1999067e75b90579d9e045936cab16a66cfb6a87aa6fe1d8ade5e1de2130b5ed0efa31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d94e2fea32db900cce7a6b3f57c0dbf
SHA14a3dbc952d4ce47c8b0dab1720f519403e82b403
SHA256b30e4e1571d1dc59d6de802b9df793fedf8a03c3e275ea11c98268755929596e
SHA512c1da998615a1c5a39d1c711f60b7983acdbd9d62ebd0cc8805eef69823ea83a2dbb2b56bba7acc92c7bc81e1b7885c7ec0a04348b984064625b81f279770357a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515625775523a96e7e67b8918358d89f5
SHA113caeb779a6750789ad4da7d0b6833ff921e9f79
SHA256350222cee22a0a71e5b60632fb9663a590cd3f0ce1160402ae48bf3e7357f904
SHA512ee72d14491c39354b4d6861311ea9a5df5cb3ca24fa6de41d5691c7169d960def5c5e2287ffe85f80c0dd8b293115614319cdc52ecdbfa163004b3238f4b6592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52284ab4cc010913bc2e4837c876923cf
SHA14acbe0c530be3963e915dc7a4451bfa6ed1a26a4
SHA25664af8b9edca17b2ce33f480453d27138a85269bc8ef46b5d6ba6a682603063bb
SHA51229c52fe10d6605f1118b19393fda4d87bf121fd9a56692d1a87d59266c761a7b13db2831cbfc2ca90cebfb29cb2734d787fe1bca3bdd3dcd0681993d65f7f681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1724a2c5f07c562e1632f6d4e709f5b
SHA13e476e7543a34bd9a5fd1f988c563457d59516ad
SHA2563a0aefa5f562b75910c800288298649ee8786d7da7527abffce69ad5e082a4ff
SHA51299b6b03895d8f5ee2842c286e49b7c5d8549b77d8d10fe2675ccc04785c8861f230cc4097488559db4b4b41bee489723bd4c1d86610507f58f1880c15f34f222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cdd8f7a276df54112f8b0b4714963f5
SHA1bfad98ae229b5cb9461517855cfa33c9edad0ba0
SHA2560448e7d7780482a9358eec593d9e6b194a6fa4d2a72d04a954ee5dbc83e0d11d
SHA512451f5fe3c5f29aa39db416c65a78eb6e325eeed713d14c5fe802affade16bb36a69806b26474d5390bcdec7aa307b9b2f331f6c63de38bebbdd11417d4d4583c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e51edbd6986772c2378e8bcc87d2982
SHA1c86b8374a34c550b0b615424765f84cac70c6775
SHA25690e693fa2925177cc77789c0635e9e8d34a43cd9fe9b24c040b4db2bb424846f
SHA5122e1a356ffb83fdecf9561ff94acb16cae205a6ccc160d560f65242ac9aae49d5fa912af671b29f91742ef1d80c3abd107a580a1f3ced7435e8d4c99ec86385b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560204bcd79702f94651f0bc89f9d5a4c
SHA17fb35b451f668f27dc730dec6c66b3b77cee6894
SHA2568dce8e21cb3b3c21899fb9f399fea0639441142510613dbdf3bf92b20e3a470c
SHA51299365d723fae92dfaa206d079f7aef3c930cbe8f30db82a9f5841ac1612e87052e3b82f9ecef342db7bb4c7140b07d24097195f11f937bc0ca091ac57f60193a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d1dbe193abe99011d616260b7b54216
SHA1034e6b704adeda59a570371919f5104740efa734
SHA256fffce84783f0125a99f8848fe78ee0e264fbdd0ebcaa91b08e9cc9cbe29239da
SHA512973afd947bd60bb39163228ff8b1b6fdb019af94c0aae624b2506d666e4abf245a541d6adf5cbc0c8d0ce4b71c16a7c906af3f522735517351b7e782e9a62b35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c554537adfd280749a9a3e51b6ca2a7
SHA1794c311f2447c344f8fe7e118f76d257f208dc92
SHA2563bf35f46712f5dc2c0c1a76cf0068fde134cd96399b9fa692188549076c29747
SHA5129435b471d7207772e53b61e80d98cb49a52314ccb0b2ad126a98250588e5e53b8e578f57959e1dadc34f839323ca3737b9ba809e83e198914c9576369772b4d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2fce220bd25dc8cfb109da41a98b255
SHA1a18fa7e699565521a1e6ffcb792393498c44f184
SHA2565bd91d6a692770f46972ae67a40bd237602e7455ae58c2424bb34bb7bd8f8fd1
SHA512f55e76bd3f41520b05d5beaa77062f2761ebbc26185c6638f5cf6aa1343b7b2d7a52117ed02961405e531e9b9f5bc9d9b850f0f6c8f3fdc67b7d08a307cec568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54419a6f8f0b31f0b9b24dd464dd636b1
SHA1e53419bb969bfd1a37835bafea76a933cbc0aaa2
SHA256a6daee33e0f3b6944fabcbbe78b23487fb1223dfbf11aee88cf35de4a7f71e1d
SHA51254ee413d5daeb12889903667040b9f28ea5f9f0dea895b40d599ebbfc4d4955983e97f5c86fefb36379dc41bbb8661a3a0e9a648b75d2c0ecd3604372acb11cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b0011d3755e9162b59be506d215733b
SHA136048d49fd9281b57eb43fdc78b1925f839fe9b4
SHA256cf90088d18a45a7e20190b4e93a16cd284cdb5c71f4167fa771a8886d445f76e
SHA51217510685d687316179682d8004a1017ad0170a10fa33a60d0dd8f0b5a0f2dd9522507acb4c91ce6a4a0461cd82d432b3c9f199c87c7395013b81a5006da16c92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53466f1c5b81ff997ee49c1a6644c8b47
SHA10fc216fa2b54c96d76c36fdce3d91065dd4f9469
SHA256bb26f33512bf552101a3a0921526555d6094db5311cca39b87b0554e5c7a4411
SHA5122a0e69a8b938ed66d602655ab1fd4e693040002f7e4d90f5986f6da7185408266a59ccb8d20f59bb48054b5912f959428d447ae6025a8438917a6525b6d177d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7dc99ef65ee9b36dcee9cf7f5630adc
SHA15c4237ace0256254cf9ff0d2421508c4f839bbb8
SHA256afff600789c0f77273c5d70985fab45c436f98bc9129fc8b7f50277dfae6336f
SHA51214840087fa7fa924ba13a80342c5350a5e96dc79d6e4c0df3a691cceb75119ebab2e57aa685e26c16c7f870bca855241723694e2c690207b981025c58d4d55b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59017f699e05e7ecc15d2c65af58f6c2a
SHA1ddbfe6df3da685357b0ede27f1b23f5c4cd604a7
SHA256a8c5612d47d102e1ba75a8730fe5bb995bbb2e371bdcdeb57e1dc002670fcb20
SHA512082b2c2f7837a5c448978c6be5f05563d968ce046beee237d1377a12b33de6a2d92600ae2aa8223fb91d24047ffa73d2763254181468599e1cb85b98749490a1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b