Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 18:08
Static task
static1
Behavioral task
behavioral1
Sample
ebe8cff88411e456e37f82b12e1c6329_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebe8cff88411e456e37f82b12e1c6329_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ebe8cff88411e456e37f82b12e1c6329_JaffaCakes118.html
-
Size
9KB
-
MD5
ebe8cff88411e456e37f82b12e1c6329
-
SHA1
954ab59cc9e9d82135c46da6f4c05cc0bd4cc264
-
SHA256
1496f4699b2dd3b4a56dcc3e7d14e9271abce6944e2bb6fac3825e4e8723390a
-
SHA512
1a1433b498309388ca7d22b1b6c704fea7bb4a6c05e4c9d446f948c612f458fa52e87f13e78d9f5962cb6f60ae406358526cd68d97802b51db12d57e31a00692
-
SSDEEP
96:uzVs+ux7RTLLY1k9o84d12ef7CSTUfGT/kPs4pUlVHcEZ7ru7f:csz7RTAYS/qJUPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000007725953fdd5bf6c76e68d9c41590bd9ffb6b9ee4030160167f5f096ad9964eee000000000e8000000002000020000000973496a6b7f877ee73f5ffda623c4ee02fac43a7145b61155e2b923c614d1a27200000001a1e3f90e6948a80f1eb507a53519fd1c1adb2c7f1e574eb2ba21a60b8c4f498400000003e5dc10a6244841a2f0d18bd82d47073ce1e7409bd5fa1b437bd7da7be26ec74161401db4c24dcc87e25c71ed7fa3307b07d40788a89c4a32b672c3d61ef1fe2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5090fbf5be0adb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432931158" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{205FA4D1-76B2-11EF-B0DA-FA59FB4FA467} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2440 iexplore.exe 2440 iexplore.exe 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 1188 2440 iexplore.exe 29 PID 2440 wrote to memory of 1188 2440 iexplore.exe 29 PID 2440 wrote to memory of 1188 2440 iexplore.exe 29 PID 2440 wrote to memory of 1188 2440 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ebe8cff88411e456e37f82b12e1c6329_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ba16ee84909c567cdd776a9fb982491
SHA155c00b234c30051883c7c9cf0fac8d9691cc91a3
SHA256bb04192bc7f2c3f157c080376604d4c00eff707305fbad619b892e7f49babe05
SHA51287b52fde66d0e9ddf5bd2e5486c1df7c5e9110a96d03cb1416765140abbed924c794ebac067fcadf863fb86764d15d4c2ce485594502abaa53397d24409c73ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f2db71c3bc232f2f76f6484a8690bc6
SHA179cf4e12e717eba9d69330ac90d1faf011edd8ac
SHA256ba8089db7658f779c7db64d942b925937843f8ae1a00080cbb316426c682d1c9
SHA51284c5bfd56dd5bb5e5ceec42fba8a35b044e51351428ce9c67d6b4d5aa8764f3848dce6e2b28b0073deaabed0f5128bf43cd73df84d94e7ab12fc6f2b0987f66b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e67efd2f3cca01591aaa3901ceecbb0
SHA11504bfe704c35a4a37ed220db0ffdfaed60b09bb
SHA2568067808c2ed4e57ec92aacc2fe3fcccd1925e83cecc1686a84b21ee555e0b18a
SHA51232d56c24e1d415d76bb4204a21b12af48777f9d4ff3bfce7d9a3b58dd84580dbe47894866bcd5c0bba75ed45d5d80ae7f05eec180ff82201def5f85d016d0bc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566491689f5a44c8dc018d3da9fdec141
SHA1431b54cec9c6e47fad2913b9299d9a03dc036d80
SHA256648f606a710187a2bfafefa3dbe28c0155e869b48285492b05a13e59b6aaaed8
SHA5127d7e4084841e4f973ac7d2be24d83eba67dca143199f528179c927592632e3abbf6052e546f7ab8b26f560bcf6e1aa2c40b090b8bd71b4dcb61e9ffb7e9f26f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd0cbef71b5dac6ffd1cede454f45ab4
SHA13e9a857972114502293efac46179902c4ef542b9
SHA256ba8102cba20959b202560a2008c2e38b2c06bc2b7a45aa129603388944e16ef5
SHA51212d47a171094338288c9412e997a5021792af34d07dfc0f8e89d5ac071532004e9db1a6a78a608ec671e69afe15f6c6baa600dde5597052c6c7fbd575b096fa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57deab6c74d52072206565a84ea29a026
SHA1d4132f5194ecb816490dba7a721aecb829e38cac
SHA256cbe9904203b46e33efcbbbb77962acfc244524732abc67491e7c9ef009d59152
SHA512b979722cacdf8e57f3c7e49a0ad55640e79bbb11cc9be352c45479fbac2c1b8b4591099d14fa5ce2d39dcbb8c5054b0a813103294c0465a70d5567cf85f37c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516c2c0197a532ed7dc4e9e3e37d7aa17
SHA13037df9ae0fa6940576e4c8a94b938375202918d
SHA256435e7d15ebe12f4280e2c3e19beea606a290b7fa54af11d993fdf21d5bd93cd0
SHA5120c44d0198d9a5ea77e9600708ba07cae58cd4627479837093e3b8840e588148a58a15297b5f0905b312ac1336846c6f5711a7c04c558f641827df93825a151a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593c0301f2a1dff9926416774c49f66b7
SHA101ff6e44f12328edbecf3b4dd1b2c583ef5b8712
SHA256ac91daf5c4a2ba29c44ae3d599d457e6788454a2a6e33653cf73a89119b9e878
SHA5127f4e90f5be44938798d58c83a3dbbc205c1ef99f220913e69e60c01fa8afc76248a89d07122d6b44fec7962d34406461028ba4f1fbe746a85149517156f8b3cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5155614bc43354e90636293bb980735cd
SHA1f488fbcfd6c02e6051a8b038b92e5e0fff9488d5
SHA256c40c9db4e44c719262b36d1a0da6866b2ee3caf4ebb1294e11e1f0281c39977f
SHA512757357e7192ef9c042d6c73ce1236d37bf4fc43318cda7ce480fde60c1dfc6576fcd3c453cddb42e0aca97b7b7562d6ae8be5a25c8ece5d9dd5a2f804d3c2635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aed8265d352b57a7b6b74a243daabe1
SHA1851dc6a4052d65d6c62ad7c0376eb8f5ffbb92c2
SHA25604b163172a1c6f6b7530fe5bc6297b874d2c1f9241fb6c2c17f52323902676cd
SHA51222c110ab150ef6434c6b33e09cfd1fe6e5ff366243675ab0d9d8dfe3e401b13d450ed840fdb431048619b069bf0a1b48da098476e76339cbf315545fcfd5215a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3f392334803509157054c83fcae9020
SHA1b2728482655c46f4d2ba5660a53b1776d39507d8
SHA2564247831656464d7c1f9ea985b7cf1a763e78fd2eb028851a14a4c11eb7143e43
SHA512aac235c9f9853a0d02e8220a5c8e42bd7787891888cb8c968f6279a13b880f474c95d53d7b8f6c23f7a66a48e1588b1adc76365c857731e072f02519948fa0eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa167a8f65a00f60a771c663f385d6c9
SHA1c8794bf618d781cda54ff8adb0a924286e90a75b
SHA256330593af0435e218ff39d7f0c853e6159bc60324918385e8da527b3c8718025f
SHA5125ca83ed4ac7395c02d16c4520003581e9f62ddf552f813f4d3496c9634e40b33ab25fbbd0616739b98a1bd5c299b724e927fd69e49cb467ef7a7fb72c1a6c850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e556e55798a749d8d1a55d65ec41375
SHA1794c59455089723df51a26cae169cd52d8695859
SHA25602cfdb83e8c319ffda2faf0b28da67723bee492058a0f0e7651023f2bc42eba6
SHA5122975e69dabd4f6b4abbf1997e7615e5e7881c5d43bf3d5e6e243e41579e7d36374edc3bbfc03a655dc23d2171e11bda518329ff84d742fb18cdde4c9c2c859d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54938923dd583b694ac09a334d1976c51
SHA11218d79941c3df60988f1988e25d1e1df70fe110
SHA2562f4be7948a8d78891b64709165978aad1cc47ed578acac470cb3952249c830aa
SHA512356fdb1028e6152ddefeee3ac01b545bea36bf0d989da7e3c6fbcd8c4b321d0842b56f4a3ec540db626ad8b72737f9dab4b76758cc3d871ef08151b3ff44682f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566f173b2f4688541b174a2a204afe626
SHA1ac1cbfe1fbb0e9852ff8be4a7c3e887f054de817
SHA256f331390ee72b561ea9fd0a13ea9fa902b2a23fe6c176511e3688c15a7b0c8ed1
SHA5120bf6eece1871a000fedc05eeb7344a1377ba8c441251891b150f2f897c3822c816611aa7c5c419395e1e0d60c746600f526e8011509b37de83b3e157778967db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c62f657d3aa7503ba609e76f46ce3d28
SHA19ab441ca63e2f32eb699d032547c2d8f02999071
SHA2569637af6cc7394ac84ddd192410693cb2834e11d8fc6538a724833b8f779a84f6
SHA512d38d4776c917ec4d21528e26db57975c4d6b91020aafff70fd0c93a091d5cf56277d42f87a5f65414dfd776dbd3a643ed13955739fa20d17facd82b6775fcb2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b96e03407bffba2a17f9c753bc48db4
SHA18740a3be4ed57820e501ca3dbc3bb54df2b3b4c2
SHA256b589df3680a0fd707e8576d7838b494044517e6b14ceafc1beaa5912856b7e7a
SHA5120dd760113eeebb30130a8f9fd7d68303ccdfd2001a180c5bcc19ac95188a8c4c39329ae472965a9dac9f3e72d1980f6a0af7939014a26b74b41d64145ba69c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8f3bf6a52b9219f5cd102c716120f31
SHA1674f8b46a56e6f015fadbaa79496b25653bcfbd4
SHA2563ac28035a77e0c0074060aff5e0aeaf809e7f98537109003bec149db91f0615c
SHA512f081b14250e2f09e57d888c18718808473c3488aac0f7eb9ccb74ef5105f47fd14200917f2e99eb05753d053fe0520c838206d1441978d748c7ff6d83c3539ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea02b99dca5632f3288f1c3f2fa9da91
SHA1a7503f0218b4529e89d751f8a1d0c247a0974a1f
SHA256352b7ce8717ba3b5b43a880b1032896fbbd7a366329442439779f62e48bd1bf8
SHA51278a8b0199e4f705b135c7f955f77886337744c2716b461778362f0611f5de913a31093a3418de3d4a7e1cedce400db68bf1297c96545938b7768788529e7897c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b