Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 22:07
Static task
static1
Behavioral task
behavioral1
Sample
ee84726f51fd7ad48bd696bc050a6f97_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee84726f51fd7ad48bd696bc050a6f97_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ee84726f51fd7ad48bd696bc050a6f97_JaffaCakes118.html
-
Size
4KB
-
MD5
ee84726f51fd7ad48bd696bc050a6f97
-
SHA1
06a242974dd71ab0ce9f2e5bbb1ca46f6f2bc4b1
-
SHA256
8956d2ad7cca62cc0b50e0937e3e0379bbddb6dfafd07b4a802554b34d1359f8
-
SHA512
b1d9c4afa2e1df100f8c90af4e59fef5a8e857ee4dd64313f5fca802a147c627dc3fc2a2cf06ff8786b42cf56a9041f8a820ab16678b344198db23181c0bf4c4
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8op+sYYPO:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C1DBC601-779C-11EF-86F5-E699F793024F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 304f5896a90bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000d8be6ae124eabe025f95f38e55422a4a19fda5ee191d80c1c97d52bdbb266da8000000000e80000000020000200000007545be27c9dc835621739063f05fb660d3fd814173121ad99c2c083e1bf83bfc20000000093a76dcbd85e23952682b64b4158893f69265f15a3c54822002e86222038d2a40000000e1efbc337e8b48ef687f8bb03ed7f75373fbb41a94beb6da7224338ce560387b864afaddce4fb78bd8413ae50e739b489d1c5e4e0701ea5fc3a34b1e7cc79422 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433031929" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1544 1712 iexplore.exe 29 PID 1712 wrote to memory of 1544 1712 iexplore.exe 29 PID 1712 wrote to memory of 1544 1712 iexplore.exe 29 PID 1712 wrote to memory of 1544 1712 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ee84726f51fd7ad48bd696bc050a6f97_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566fd4dccafbe0c0e0f4edf52357a1cd7
SHA1dde22b59d0fde93b117217eebc810baa56163f41
SHA256ddb821e4be45dda336cfdd509ccdf89258a6e0ee60f263f53d16d534c114be63
SHA5122a23c97d612bd3c33b1570c2776fe31aea292d8b7f688472fbbc7a2661c19c0ae6d209cfceca6861f7d84ddd73f91ade32fcfe2a4e27cfe78ee1849ac612631c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ee4e54e90c921d6b3d0429018305f37
SHA1f8825d4af94a7caf7bb257fa02b2f43caeeb2ce4
SHA256f6369ed07ef3edd8450988cf7b3224abdd24241a5a5b3058cc5d68d172ba8fb0
SHA512b6033c068c530ec9ab2afa14a1d27b78adb0a45bbab5b67c69044b8eaac8155b19be9a1042922fb4b780d06a6001930eff49f9b1238808d28da3f003991f2d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a8d86300128baa4b884207a6b14a3a1
SHA11d73c8c8a9e46e5448b2209424444f104fea7219
SHA256736fab18549deec82fabfd309db4e8a6a6c57514d918f82935b334049b8a1adc
SHA5127a36876da69ca6acb11a3de9f2d6e3d852eba337ee43196404f628d97dd476e1fc121701fe8f1b508804c32aa3b8c03ba8542f4c029b002b2a0b87aba9c1719f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527f6d060f73b20ebcd750d2fb44aa4ec
SHA1b147e66f997214056827957f9b5d04c4938ba3e0
SHA256705c781d6c3d3bd52d0c09e4f69f55de39539bd6bee3c43ac1107ff4af28dd0b
SHA512a0dd5673c26d9e11cbf5bf763e80007bf2aa5dae9ca7564d030f2b8e5cb1ef1b0d01b8bac1831b4e1f6b49c0dfab29d5abf1c3423cc531b78aa57e460c96d8e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e71aee458546046883fd8c4125838a0d
SHA18a4ca2b7d010ecd6823882254d6e197ed3fe9e7a
SHA2567a55e9b1bb0df409667205aaffd509a54bdd1d11cec615fc8fe2b6dd7d4c67ea
SHA51237bde6a7e86dd1cb98b93010d93db2698ba4402ff1829a418b9c560a7490945088fa61baa7941d154880f641f9067b93a35bc984f3b69b7e55201dc4650dfd41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524536e4185fc4048f3b4df35d0516e0a
SHA118a258688986df8f9c41acd4de67d18192fcd879
SHA25676bae7d8c111df7bd784fc094353aee2c1145bcf2fd1a9b9056c906382e1368a
SHA5122f9acc4ce10e4ac2616fdb990c68472233b3e49491057d180a696c7c2962f458eb91426204898dd417edf52d5a1e7a0c7c920f4522ac8d9ff67a8f7d3f86585f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea846517b43fd127138be569a50b3b24
SHA11ed7835ab1d5ee53a416879209c91ddc9423234f
SHA2562121551dc676ce9c7b65e790a53c23dad156938909fe11514832939d7ee213fa
SHA5123dbeed299f95a3c7a2e34352dcb317927cd5d3392f4b6a955364f234719a4cd2fd76644c27f8659a14847d70d9d6f1d35ce5f6b3aaa0624398cb854ebfc01a9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5021a90df4f620db97236b00b58f0d9b8
SHA1da20ec7bf279e3546e88a96a0fbc62ba5e31696a
SHA2562cd5a6316dfec8b948fb5d188897ae5cccbbe4abef76ed45dcdb467d35030773
SHA5123166588dc8d9e9e7de848fa99f31f5d31d725fa0788bf422d13413bed3c0edeb28e4683371945768f959eddf6f1a94bd88bf037b684968f552f4c899e30b4f05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56021151eecc17c51e661f526c8caaa77
SHA1794f17b066fa3607d3086be4d0728326b534c1d4
SHA25631fb4a341b65249428249e8d5383412e16c702d4a3da7d0585bdb430c8500aeb
SHA512eb2f5e1d1390aa1c4e1c57180efa818086cf3d548cf1aa841588ed47252c1f144e67841c6c3cad8efe97dbc0026c88fdc22c7ce2bd0d5a11cf653dc966056b38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526d6a12c24d4638594bb67b1a25be490
SHA1a22d82f15d86ebc4925a5ae6252087499a81cff7
SHA25632d237369f41f49419c07728c923932ec48a65c9eaad79a3bcc724a65a4d4aa4
SHA512d5072f489287f72413445c6610792fb0f04df739c09de1329fa7ee31825f50640a5050ce3668fb9f3ee4cdfd9cb55e61ab6e96588d441ec971c3e40367172d60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa1d0b8c781067045ebb94c939f42edc
SHA1b1304136e7690486cac3753c212b4225f802b369
SHA256fe2c04ba9297ba9d354a97168a68cc5c7fe961d325018637b0b48ea8fa8dbc14
SHA5128259c2cd58f37ac2e4bffd37e6b83d802b51a4aba164f59722e1c39fe021a5953793aa0f7ef3bf3d70cde6ac0bc1c95603e715e1e81520f3f768ffd1d2fa676e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e69f330e47554e3623f3ca781b4255e9
SHA1681d90f5febbfa8dcda1006efc8dd9c835f634e3
SHA2562fb6d27e5c62d89e5c53e8cc1c7856004e3c8c7ffe639cf749d98ab43df688ca
SHA5125870c44ef419251b343c24afef2a2ca69d656311d7c89eeadf7694fd5629051a581312ec414f87154ac336a7cf09f87e14959d2dc0fa2ecbb6aeace7ac909494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fd23a0a055200451237503e0092363b
SHA16bea233d7ceaa05a0b10c2c8a0b9641afa56db20
SHA2561eb8b7292366f60b75f1ffb36a929e38d9e988c475bd7abff5cc24d844691c8c
SHA512085b791353872904754ec1bd22e82e8af4624e121a9cd66f1235191c5fa95b855b6ce402f2b347e7c8bc47d106768735c876ac72cf8365daa8b961964a5bc62d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d140d5d8a4c9273a284e29b1af3f7b77
SHA14cc40f9a1d900aa32068f1411418d00cd734de89
SHA256fda4184d0c63ed2e8266bf4e039fc4922f18159b0bb4c70b30838f5fd1cd02f9
SHA5120f07024b843078a9c9a7f85c98720bb6600f53fa1d8983512efd2044af162c65c6c1b3f7e85cbce57cc8c57a8d9b81e161eab0e515fed4408cd33e1eab49f9fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580991c74e270c887a7e8da05abe6b8b7
SHA1aa3832e851c70445d51c6098a08dbcb31d4bc1b5
SHA256b1ee20c4e87ec0de657c2a13b780b29681b0b2f7e4df79a2f9785fa08106ef35
SHA51229778848a4cfeb97ee1401bff6c937f575f47c5cf072340ee0304d57a7ec63910c1da79c78dba9946447bf584a079aa5127c1b2a30ab1e04ebcf9b6def229b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5976b76aba8fa41ed9045b756346d79d0
SHA162361b7ce6f73a1cc4aa57053e3518d12c755dd8
SHA2568f460bc40590f94ab0d25915c38382f4121649e1585a23978e857eb89108945a
SHA5125ab0a4cfcd2fad052ef053e51e2adb71012343e67dde115277aebadfa2ca9aca05fb45bed72517ddf1e149e0a026ef2809221661e40bdff1fe8fbbdb9e21a611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b320106ee131ff33b6d6f4762b6a87d0
SHA1766e95fb66776c3542a0d05d55e13d5916110176
SHA2569eb0c9f7c0aa6911ea5238d0b0760fcb0bf0d09d3701368c24c8fc51838a5ffe
SHA5122d517c585edba316d5ac709a90d26af721a31d9cbd6ed3eb776c959a3d04f77e4d5d9c9d73c74cbe9efed4c39a36b31cb3729c932519cf00b034e20abd6a39d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59df5f6d5c8229e6b4e20de5303320052
SHA17e2bdb1a5e4ff397150c6df0bd7cdddf35351f52
SHA25642bf7e8f1e70696b176aa225786c89dbab4efce8d271d07347eb5cb1f509a2db
SHA512892ed1a9922ff691819442e72d9fa5b2c7c555edcb2c837201faf5a1a92b8fa35807e3898745b578783b6168bf257748e98dc3e5937a35c55b0706a1d986d48c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56aa4b72e6ce1c6e27e541cf44dd567fd
SHA15c95a78c9a1acc9d376ec1df42b50273a159a61d
SHA2564b1e6c9f23cb868338652596eb8cf49aa680e756b529eba6c640505e0aec2065
SHA512f7b80753e727233592e57a03f783a1a1defd7898954472c9f7902352247ee53560e7fbf5ad68591134e20e9909cafbbb39f139cf1a69269794ad305681332776
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b