Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 18:01
Static task
static1
Behavioral task
behavioral1
Sample
ebe5ac56b17d0dbeede020a38517376d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebe5ac56b17d0dbeede020a38517376d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ebe5ac56b17d0dbeede020a38517376d_JaffaCakes118.html
-
Size
10KB
-
MD5
ebe5ac56b17d0dbeede020a38517376d
-
SHA1
f9944c26d0f9c095c9a42c23858e8f4c37088a28
-
SHA256
dc3c6fa800299497158003bd2b784970f98328e7f09845334b99168ce61ecf23
-
SHA512
0448994fcad7f951c85660b46122d4e324a76029513ab0acfec61f1dfe2b5767413b1c0eb912a2c89718f5865956d5a984fb1d84fb9ad11e98ce85ebfda43da1
-
SSDEEP
192:syx8ENgBQtRTRLcbyzmMFKYnpR002mP4vteDjHaHu4CAGYsJw6uCsByHZE0:szGTQ0s47AvGa9CAGYs0yHZd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c0f9fabd0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{244D7E11-76B1-11EF-AA6F-523A95B0E536} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000007f92cdfbab4a176c44697437031ab2f2538f646166a7c22a92472144c23ec5b0000000000e8000000002000020000000d782910312fc7f2f0899ae1a69216fb9f32082367759b1560090a61dd16b92f090000000a110d77dd2088c65c12bc131a34bc2a8bce9a1a2aab6c1747f9caa7df0b850b66fb284fffb4b623cb0f406a58334cf57c82ce41f64de3b49ab7f174cba2bf9685ffffec0f361c84473098b4cc3dffd2b44d153c4b94449376be423925e671008cddb51ce4943d92eb2c102f2757f56cd9deb123f0bdb875174704765a4a083442d04d71fd9710eeac7ab7119ba35d4f740000000537ad7490ba4fcba082ae484a317ea02aa591f3d38b28db87c0994d2642830be1108e9182f36e0a244033b5e866a1799750c278c166afac22ea5fd10b5578f15 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432930736" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000b6d45b03c3022f651a689b2e903ee76f667559088a7c9bc067ac857a326cd6b1000000000e80000000020000200000005bb8797f6c1bfb34de811fcc561486ee037673900925eecc1f7eb09eded9438820000000ebe819c7a912d20a4fb3a565858784f997ccff08e11ea8f5535c43863ff9ebb340000000efffd50b21e9df3bc8119154d481613c4a4c38de3b0a55d1bb93edb28a861dd4bca0f12747ea02e4407abdc11c8409da6708dd8aad886a0540255612398d5c9f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 940 iexplore.exe 940 iexplore.exe 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 940 wrote to memory of 2856 940 iexplore.exe 31 PID 940 wrote to memory of 2856 940 iexplore.exe 31 PID 940 wrote to memory of 2856 940 iexplore.exe 31 PID 940 wrote to memory of 2856 940 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ebe5ac56b17d0dbeede020a38517376d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:940 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58006b25ac01be3d7574619036a9eea99
SHA1cc204c752f2785bfd3d2dad7c6088e4d94203d16
SHA2565f7e623f2397645730992287d191eaec1d9b4c7c3b12e405920a14400c0271e2
SHA5122209197b960b0a508bacc0201a583a8679a2d2674e5723cc3415e65d3ee036890a94e75ad6b6857bd4fffe5cdd6a8eb5aa8f2777f8287ddf39682a4d9fc10e3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a7d19c8b1df91e1e4d48fa0cce3b8ab
SHA1577f8ad13af41b4e76d8d7d29cac421372973a98
SHA256c236051d7ffafec95101524fa7c49d89cb74031e165d63e540fd68a1efa9c2b5
SHA51216d489cbf1fb052ac618ddcc4cca27d27e5fb0bfec30420daa403597a6ce263e1dfc081c9fa47743c5cdc5149975038b9701f99932c294b42a15081e8bd482e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566773171f63d624168ab708b5a41d453
SHA1511234ad2136bb5a5cd9f75b5ef98c9b0a38fecf
SHA256812aa265a66854a1b2e3da6e3d210626fdd69be3a92ccb3699ba8fe02bb28b04
SHA5125414c400326b2b85fd8fb003d4e7566d8ae08cb27d10da8631973943eafb6ac9a4d9c19ee5d3025e554be871b4924bfcf632511f4fb7554a6ea70497dd17313e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589724cbe06e48a766599190ea8c28afe
SHA1e314a86ff3d5f4468ca4d41bad224ce8acee161c
SHA2564018563c0083b7b448962c0d3758cb258f79e9f02c32d6f8f06477511cb083ee
SHA512ce5186f067b0926a59741042ac07e7ce377b92cf86afcd01925d3ae4f334cca5a78aa16411261900da5623d8ff8e8d51dec7598f5352c54022ca9ad3b910c5a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf13b29e131a45aaac6e1b9b2fc6b2d3
SHA1a8a3043d6567af911b2dbca9f023c3ea59fcb881
SHA256a71be039894b9762dbcb29ee7266114ef101cc5db7269ffae78388d7d0cfea5e
SHA5128b260f75e0a72b67ed3d8ac375ea3119b2c2f1ff464ef17668fd41f01b2910c61bf36c8b250aea7c325cae60906c7bc481c07a7d6a8dcb6dae9a399fc3a7d365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ce8e09a9e5a5e3c9d72d716a6e63515
SHA16b2024d944bf1ef5b659ae73168cf5d792b18a6b
SHA2561025385d30a55c07ce78e3f8a633ea2eeab7adeb241144196a3db4176f51c6f2
SHA5128fbd1c80f3cff68c5caa94995873553b7f80e6593b14319de321fdb8330892cc7da013784e61ec37e857355ca94faf3b13c21de235614ed0cd68269f02e389fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f91c2c2cd089b0017c72a6cdfcd470a9
SHA1d7916a958021d85b7936c05e6b3e1dc90605f03f
SHA2562c627754f784b77e0d28359ee7a4474f287795df9ed70917df9545378f4d21ac
SHA5129f6ac6077fd1406baf097d9a4b521d523399d6999f2a8c240012a3d154383b7f2eb181f2b8b5d841b6c94235c1e0be22fea95faad12915a42ba161784959ebe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4aee52f9482dc2ffca314a3c3faeb1c
SHA117963c3291a1c1e30261ba110f540818f54e1114
SHA2564d316e1263d7e2cce102d0063abc5ce140dcccc305d86542ea16242589a15952
SHA5122536cdb55fcbe360faed9313e681a42e08e2b894bbeca1ec55d37979092e7d47608321c4e090eec100dc1e061cc621349642825463ce3b2995aa4ee626c33057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568e5e4b05a00ed100f4ed202bbdc61ba
SHA123ebd551874e33c6f97a514933ede9c7076b227d
SHA25653645f5ce6337c63a79c679fd3cbe7910ec45f0fec500ba07b16e324b57c812a
SHA512abb5e596eef512432df6bf7b3e30f823f29b09abec337f8e84c6c89fe70cbf5273c7d59e762042da9c949e8e722a0c844e1e7b9da600e53b3d2391f47f5f3a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5400e1c9a49babdabd435db93296e43d9
SHA183ae91093af5322f95b20f3899aacc2b621929e1
SHA256795de75c462313f2cfe83089b963f50262d31198674acbae5ea8dfd1372a720d
SHA5123be62b72034b1e143c8b8e32d7d0c0b31fc54355f0c028cf8a3ab1c7d61dd25d5395c33f048cd24e444f9168d5ae3406372468f9abeb53f4c98d95113a70e370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5883b7d516b7da345310d8774e4fc90c3
SHA10641debe8efbf0385b0e49a2f2cfe51d0dabaa5d
SHA256c6d5c76b987cff8fa2ddfec1c72216f2a94fc5bf96df61a2ffc6c83a1e5576ff
SHA5128d83c87190f7a361bc54bdbc4c8916e9f08652af0bdb1b92a2281b821389eb3abf8661d2ad1b8205df3387a44f91a2cb1d490edfd9ab8f0d3fb6c2700bc2ca4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585b2d4a559b113169a8f0b8fb7aae80f
SHA19c62a795b8f43ca4636c0b7e48134cf8d7829c12
SHA2564376b0a00ac5897d14be33bca3daeb781a4054678cc843d4bdd932614f1ffc72
SHA512e82f9131b772f293d316c93dbe3d15f2cb847030393fd6ac59a62792813fe397fe6906c8318677406fe54ad0214b2dfeacd72fbcd8dd923987bbd03485d92cc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f94458a1ab5f47f14ac153558e94f0d5
SHA13a14ca62d5f1ecc03f2811cfee3e8ef3520e7f9b
SHA256989f264eea623f93cc2c94647774debdb1bc82f45376d5f62044758b68aa4b22
SHA5128d5189fe7a80dc9863002872994dff98a88e1396e3ba30c6d951eacd2097d5bf2d0f9ffcf6f5b2b026d7953c2b07ef08af9ed62d0f65ebb6d08ae37da5157fa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6b41ef41ee0d8e523bc1fa484fd2383
SHA1b0a44eca81cebb2ee4a0b9cbd083f15eb0217363
SHA256efd5863cafae20f9a689c4e3b48c69cc0c82cba542f59095dc9091ec25fdddfb
SHA5123b38c11281f6d9706b1c14628199ca7bd066f242b04b4d59c9272e15119e6f535bfaa82944b4538d8755076874788cd829931840bbbbe2fb2ac7fea9a2d43d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5c77e95d56a0c4cb214f4112f108474
SHA10a70c4ead149ec05bd0b142df5087fa552c468e9
SHA256a4a636b7e4a6af0d6a97c15d744766075ae3cfa067c5634d563ce4d9e6b2fc6c
SHA512479990bde750482f010736f1047feeaa90e4e23aadefc0c7f0124079a8ec5008552a632915088b24be3c97cd803352e3ad89f672701cfe5c87f16c12d84947fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5879c48f8b27396b5a5b76c96369e422b
SHA1ad70beb050f66b0b7f1f10ee93cbb7d2f2833092
SHA256c25fd6258c5e190daddb731be421af8f8e09f836fb13d234cac65f1cbfbd8f15
SHA512987f230484397e31504e80ccf5810897dba87842d42a43ccd9a779256f0158de396cc4b3a440e79d7cf2c86dfc89394910a0cfb1f58e8955af8248f45101ec15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f966f60ace2e69b3c24f6bf8fdd2350c
SHA11934e7304f2e42904c5ea20eed80cb53918c1507
SHA256ced47d673c8ca245643b52584440dfef2c586ccd5786c34bd064d8df40fd7ca9
SHA512e39dcfd43d204e14a794b5df65635a428a632fe1055e78576dea2452c94cee32f95188f5139aff33f22c9b4631eb0a0a3e7c4cc16963017c0c5a003af8d60e0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1a485cd409e4d03f96071743f21f9f0
SHA10d4dfa4f7612b4c7f01e4b734258925d6a6af19d
SHA2562fb74b7069305a68e74f672f3d421c2cd345833927d835d549f390c1dca6f84d
SHA5124d1357add046b64db98c051a1b5bc20f6e2000260a05b2f2239de2f3a4c52b89e3d87dacf0d4a30bed75a57dbb0faea57f7257a92c35700a4ec56135bab3ea01
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b