Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 17:03
Static task
static1
Behavioral task
behavioral1
Sample
ebcc109b908cf1d822ddfed94190296a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebcc109b908cf1d822ddfed94190296a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ebcc109b908cf1d822ddfed94190296a_JaffaCakes118.html
-
Size
64KB
-
MD5
ebcc109b908cf1d822ddfed94190296a
-
SHA1
8c0c21cfd9932cf2965242e3ba99f38821d324e9
-
SHA256
050941a9f6ee0bb20ab2fe956197632916ea40257ac063d2ef0dbe36380f911d
-
SHA512
1bd395ca467055a4501bb220b852cdf5deeee61019e62fcb5b6c78526b63b6aff015e0067b5c8413abf2695bd7b512bead000070fb2a5bcdc3062d885f6ec1d2
-
SSDEEP
384:pQ/qpPPkh4JlLDSpbiF1JvmP2DHIskDln+5udtaN7subADyfntwewX4cjfeyjOL:37LubiFPvmAeQD7ayfme5cBjM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0DAA4D31-76A9-11EF-A6F8-EAF933E40231} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000281c3409cb79ba6596ef182de00e51ebf417dec430d3602de798c284ca43b3b1000000000e8000000002000020000000885d78c9a8d4c8b220bbd36019231ef3d7b4712d01c82460e98eac180c2de40b200000000895526e4aa8a68eea53cde23e66bb45c128fd358984adf2552470dae27a7fac4000000031fe2e66ccd94746ff881a33bd0321b202c7509ff17cf15012a79a6175b948ad897712c8ff99f071849c7374c28dd0b5909970a3c30b1ae124e630796273f905 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30aa6ae6b50adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432927260" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2100 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2100 iexplore.exe 2100 iexplore.exe 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2628 2100 iexplore.exe 31 PID 2100 wrote to memory of 2628 2100 iexplore.exe 31 PID 2100 wrote to memory of 2628 2100 iexplore.exe 31 PID 2100 wrote to memory of 2628 2100 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ebcc109b908cf1d822ddfed94190296a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1a591b1fe6e6b29017d18c9a3635aae
SHA1629b4158afea777afaee0a821031ea50ff51943e
SHA256270e8a4389a6a4b36ea0d797f8489e646d3241080497aad2541b96e5a7b8dfc4
SHA51230935527babed7c6ab84867a05a88ae4ddf34be92bd79f0fb34d0f1c57a666a04055110e5217711f966dff05bbcf40afb2c573456d6df2eb65757ee4b4c7a0e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4eeb45bea986ede4a0fb853019acfb1
SHA10693b17f50ea89a53ee64d4e9387b083e098ff80
SHA2565505a8a0d91e82630be89664a258fec3759bcbd11359bc3bf5d1f29519fbc245
SHA5120204f9d93ec270d89d48ee71c2ecc6a140e3b52fe2c707e70c208c1a701e8ec7fb7753cdb87f152128e8b8db1b390e1b64417db380d34f08bdfc4a293b620c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c92b7fdf1b8531e2940483da7d65ccb
SHA1d0888e27f11c49c445d42e618130cb8f4a9e71d0
SHA256dd0b59839dde1e9304795fd9c200a40a0b65dfd65ae4a84fbed8c305273e72c1
SHA51256733fad6afe974adee90e83bf87e44dc894a4692e8530d1cc4277192330695d3c11e54a50a484668afb90966b1f7972a864dde248f63bf180331cf3a41ece43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586e59e2f5827a4dc8605a1b1239c5b4f
SHA19aa1be523a8ddb36d3e1da54ba9b65e28fc4314b
SHA256fb9760cc3c9df82aad00258b52dd0ae412668ee13b98f38a96a36c45949a0d84
SHA5122721ce4c7748a6ba2bfe285231db5377f152f1d12186a4ea99742bba5eb630ec816989940ce71e5672993f715925f793a0a1320ec6e6dbcdc22bb31aeb0c68dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf58248594c2852efdd18a789b08d559
SHA158b24a308e078b19e402b0418bbad7c80b7a859e
SHA256bad87fcd0082a8b50274f034ef483ccd21c4ae67739d78b32fd9a5b23222cc73
SHA512832bdb2b4a6f5b8119d9be2dcdd3d9149c71914b19b6fe8f70776078ac4af7598969eee8aaa72afb519775d345681b846ef3d6facf8b878af457d03de3a8603d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51034c5a0fefb5202a447c9ae36d48ff9
SHA14ad2d4c0ba997541db6b08beb5d1e39076363123
SHA256257d67dccd9a6649c4ec69808a1473f82a3bb16d866facc6f50e5f704230a36a
SHA5126f87d9e6bb989ea5a6fa603ea1431fa17e427cc1e3d0b1be2f5982ea6adac64fdd7d32081bf7d052b81288359d5beededf0e4dcaa922951478782c8edcd41559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57519cf678ab5ad86379a3863df1c9647
SHA121d937a3d981640188769f973f37f826ac05faa3
SHA2566f5897a19a89e7257581898eabb980663af7fe3eee2a10ade7aba8b78c357464
SHA512d7a1916b08d71a8db1c70a59468d26e9ad7663f9dacd0d8351685ab00ce58216b81e2884c61ee577a9dcf9785d18d92677bd9ec6e46d049e509840817b30f79d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc549818fe8404778fa3fce1cf45d28f
SHA1c1cf5ce775d23af7d1e65692ff6dae81bf82dfdb
SHA256266f8aa5f44a4586dee80b84459eee391ab25ddc70606b86920f3d67fed849a9
SHA512f270cede64fdb30f793a81710fca8ef85e112f2f362af5cf30f63bc1e359be59c5aa57b9ff270dc1bc35e2e0402d38c2abf3373b49532e4128ef1b9495532273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50342b6855d6b3229a302ec8b711c985b
SHA1ab38551118d92f57f75631aefe9d37b4d71563fb
SHA256516f0899bbea1acd44bd82bdd67bd08a7bec3d321fe4756468bb4b4f19b12a88
SHA512574fd1ef9dd0ebb163f9f3d8e798f1c1297c4aa64e2e6eb13af90257cccc0221369c094a218e8f304f2d1bc46b120145a25025864209f31247cbab3030fd724e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f5c29b61a34fab7f746a40280e59b5c
SHA178c976c75afebfd0c7b555951ddd910658aba56a
SHA2563df9c94eb4093547363f7068877133f322cbed28c4328c97df0cf9a6da03177f
SHA512cc4a8ea7d358161fcfd8fcceee357fe47ad24d78f67754496d67bd13f45b8cb13c859e8468374dbd9d53d69031c71adcb0f5207b3a7349653feba56395605956
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b