Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
ee879fe262a138e3f15c803b97e18e7c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee879fe262a138e3f15c803b97e18e7c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ee879fe262a138e3f15c803b97e18e7c_JaffaCakes118.html
-
Size
22KB
-
MD5
ee879fe262a138e3f15c803b97e18e7c
-
SHA1
d833f45959cc409c43422812c107c370e8ef9bb9
-
SHA256
f2bad013ff754c6e9599c4a55a5dd8f3f7682b821ebefcba97b41a02af47ac20
-
SHA512
881edf0f9ce8e87b83ef34633b3b36e24a30a4067530ddf3c1750e17f8ab7df823ea0577dcf506d2f2da2d8a824deee4813b77949ce15604404b0eed4ebbf377
-
SSDEEP
384:hlzTXf8XkbqBoNqZU4ZsnrgKQW1NqW1TZBJ7co9ZF0+ukTOr+n1FqlbD:hl/bsksKQW1MW1xaYOr+7qlbD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000e9b8c00a5beea64e357b350fa2524e63385f607d74c516cd2e9a2a5cb6e86bd9000000000e8000000002000020000000d9e26401f91bfa24e8352980255b0c8b1e1b7cb127542b7144f5c4484824bf0490000000cf770f8bcec5e71e5935600a2b4e7f28b709c3d2cbc8984d53f95b7e85a769829a9d05491bd48a7ac56cbd4b70d1bf2c67d1727bea11b26d25caa1934e2e1f640bf834468f0ec901875bac6b9004616f13a76f4be287d39deb0ab46538797b1ad1cfb0f4c4b1ea54cf6d67b4626278bb8d663ed853f3a20f712836a9b90f0ad2b0e691745fb82906f71df7a302eedf3c40000000a36a12255815948756cbefa5d2a212206948e64e45b6fa41136bc0cef52e96a1203647b1c9e6227a4b3ba2fff019c63f7d26b6f86c5a7ce1fdefcc98550bea45 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000001b849706cd2b81d73f62b93254b2d26c85800d267f765dd85b3088b27c1f7a6f000000000e80000000020000200000002ae45c0e4b35e1e0b00449ef16ae90bacbf5dadbd785992110e4ff7180223117200000003047bc30026e1982764d705e156d04002c588e38b9c92ed3b9f9e287aab1b07040000000cddacaad133bb9e5ddf14b1bbd367b3a53c7d32696d0ff3982476557d078014772c7e1d32feefa2e99aa23d25aeba185cc8524108eaa3b22679aae8ed3251715 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 806ccaceaa0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433032453" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA2E0711-779D-11EF-9D9B-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2528 3048 iexplore.exe 30 PID 3048 wrote to memory of 2528 3048 iexplore.exe 30 PID 3048 wrote to memory of 2528 3048 iexplore.exe 30 PID 3048 wrote to memory of 2528 3048 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ee879fe262a138e3f15c803b97e18e7c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518683c89e9b8622a7a323c8a14791904
SHA1b8288419f6d1bbfa52e475b7ee6a44a7fdd80f06
SHA256ebfbba0908c46ef1028c8e4c8d91130c580dade8c2cdce5064b2110e21eda0a1
SHA512d8eb2aafb499a247eeafc04bab3a4d94f6827da87234cce2fc6244eb6c26dce6ef8f86076cb1c4f820417c94221d60ead690417a9a5505be864da6071e404dcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515feb64d446bdbc68b850033a67053fb
SHA1471e8429c7e0e0c9017b11d5462b87d6b23d14d2
SHA2560d8964d4aad26a6601ff333a8cbb9560438a5f1f58167a886b478144379e3cfa
SHA5125cca314f700e7ee0e6d5f953fa765eb70ccd68f742c86559527949dd2dd24b7e13a3658cf79158aa59840be11f30c9412a5835167c0b01c86427607d89da0619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5120797ee2d647d98aec7c330a0d47071
SHA11b421778e6ddfa89d96816f5005d2ef080000f7e
SHA2562f96cb852f47896ebf3c168fda6ed61f731973382826c8017fccb303882c27cc
SHA51207e55cffffc12830bb6f79c00da6eb1b0a20423554b56e749d19061bebac2ebc74b84b541a96857bae1951d592e5c3d33e53f4b7dd13d4dc6ddb1b7c8b6811fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514601cb4e13c430aab71863c0584887b
SHA1a209eb95399f4543232cfe48ab196d4665d0f595
SHA25652c482dd8d4c60ea47c1a87f7bea4027a57707e75b20b6509344c14aadaedcd7
SHA5123848f959b4183959b3c1733ba210b8b1784892f63356a5ea9ede95b490e154c8137f44a4e2c410708522bc9fbbb22f53ef4e9eae2ee0bc079c588d1670aee543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afd3be8a8286b6f00c1d89d448fbfe1e
SHA13519a3f6fd91d54887917fba0716d247e35c446b
SHA256f7027896ce0ab472c8cdaf7dc73e05c3a839f95a0cca2f08c3c056e0b49ad140
SHA5126aa558ae96d0b7cfd65d66993d071b4968b5d5c188aca8fa2957a72c5bbfeec87667e3a287057d3d3976314020ef2f9fc80c2918d9db0022ce36bc75788ef30b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53860e375b32a161ea3148bfb962c308e
SHA151746ed9480e538af663010e9c205a152e9bef0d
SHA2562bae5755adddabd55ad7da0d1dd617b7dbe0a8fb87a35fdd496676b7de7b4b61
SHA512079af8d82d58f375c6e70a8d2bf9a140b8d576ee08a2238fa4bbbd7b588be1e3c81ffaf663996807a0ce8e05426319800908924d9ef2f5240fbabaf3e03e0f97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562b79981d19507a10545778c676bf47d
SHA16ee18c3bb68c6f915f468eb430abcfda1fb6a445
SHA25667c19f8d1684cb312d9e7528af77865f99d7aac6aa8123b6b47ab108a79cd991
SHA51253ca20295a87e03952edd7a81806e5dcbf3b513df8b3fa44ce5db4ef28f57875a4a97adf2138b6c697a6dbb0d3287523162dec38389dc2d87f69dd0bbe3babda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6e23244237c06e6b80138cbd8db25b9
SHA1913ee2fa1b695c3046d4456c9542811e521ff338
SHA256e04f325398b461f6cc0b4e5f3ea0ab23075ee338cff0c9aa2b42fa4f5e87cd2e
SHA5125468ca77316f6bf54d63750343b32eac523624e3f959781d3d38a230f2f5916190f3609fd1ab6cbd76421676a6f9f423d31951d573dc4bbb8391e85be7f8804b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508e9fe1e50c054633d4467363db7952b
SHA1a9c44d5e49686451d2388a80f3cbd21aab5e340e
SHA2569cc20ac07dfb57bedbe2a093037bb21619d4b5e07d0f5b5848d6c26e7b53d7b3
SHA51254cac721ac2380bb1378da6ea0925653b4f831ead188ae9f2c225723457047d94a4e223ae5bd0469815dc23ee81b97a65a57c594e5a74c7f8ce62e1b6a9a1546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540457b9c6d0e1fd2174e5a7c3f210d9e
SHA120818ddcbd7a0853b4efc2e1d91dfac098ad3986
SHA2562e85c3e3c436a07c1d16ac827e640931dec20caaa10293892dac3458e6db7785
SHA512a0bb375c489cb5533a02523185ae22dede558bc0395af16494dd07c82b13c342ba5b0acf79458d1081a4e4b1edef5558f582f859cc5f9549577fa3d19bb85213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52650e79174aa72a5010a56ae62dec63e
SHA1b1221f345f01b8e6a81d7575ce343f05ff5504cb
SHA2560113c3feddba45c5d0e15f5c60ddbe8501d7950eb8cb41916d7c78bd7d33960d
SHA51288f2df1f0821efdf00abe7f554010b047f91512582b2b03ecccd651ea07ba1a3f0adf9881edc5bd764cca2ad9563ac3aa15e864e1fd26d83d23654b44ef09446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db9847ef2361c3461371ada754577314
SHA18eb25bb64ee041ad0c131314a633442d66c5c6a0
SHA25689bca9411150abd69d56a475ab9d6b7db695f5ac16b3d4ca80132352ebfef861
SHA5120dd480f4ba73c7ee59fba44d11e4ce28c308275c7d11384c97414435f63f223d9b779e141b785389ab18d12af59cffcc1f6624001c0b855ec4fcddcc308098fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e70bf0a1d98dd9b3db5eac2910b29749
SHA15b2b3eaa018e13d4bbf384d2db15708f3b099fe7
SHA256d5d1fa5bc76a11fefd110230983d720c3f7c09ff7363a14d13d7000aaf253d1e
SHA512b5cb7c2ca6ae6d591e43602ef8c946d50bba702ac1085c8e1fb29e64084ccd083dfc2a0237a46a37a7b6f3c5940256bb13066ba9acf6047a273aa7de539942d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519e9b189a1ebd1becdc506b7a92afbac
SHA1393268a6106293f1d056f0b2012d70c409ebd672
SHA256c1aa1900d2455e6582f82876877b9daa15bd048526a759df4d235caf51040d9a
SHA5128e7deea90f092bac07816b6d84e4e63680fc0bcc944f31bd1757cf0f46a7992c8ace603f5d3f6831dcb06ca771886b2c7d0c4cf8af0d77762b5a557ce18b49b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e13f3921ca9034c1b68d49a3bf369d1
SHA1eef3d5bf7b9acf1d396bce138f914458e0662fdd
SHA2561844345c8ee6dd8395dd505e9dde5ca07f34022588bc9bae81d00d04dd44451a
SHA512752c4fdfe73c3038a78223b7e7e2213121a22d050f777f31ad34c40c99eb7a496e36a69f0d25b43445401b7124ce3a13b90926f1e38c561a1bf8e038cec12a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5436985790b41aa9ffe6d79fdd9676069
SHA19ac18a29882b01a8d6e7bd9f2e18c2b03d5a48e6
SHA25682b63c7003be66366818f6f0de519ddcdc54f4e9c922c0d5b1b18773c4f519a7
SHA5121831409b7a49c0a5e03cb4d8ec07ad462688ffb6c2f68a24a063b6281bd669d2a48131ba471c31583d951a77c0aa22615dc845c9ef63884f428f7f15c9bf6948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ad882d6e247133b13b80948874c3c07
SHA1221041fd2614a97196703d6b3e9edb11d21c9941
SHA25647f066d02f02c808cc319d7ae91aa348f38db7f4d44720a4a32acdae248eea35
SHA512150bd4b4c7734d14845bbbde758fab0a7f08e1062ce328b7c500bb76a8da669805de669229d36c030eb84573ca9818d0c1de2288584ae402ecf4a1f6195eb167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1cb1c9d41061169ad94997d556e2f5a
SHA1bf09b6d889f29c21cdb64b2d3c05bb87de15670c
SHA25668efd910ff3341667096f4c9378594c29114fd54077216c42e1a4ce75cde58fb
SHA5124f1abc47a800ec651cf409d6e5feb72b739c160bc7fde7e76cf8101eeaee1835e247801cf38be147aaba2b1276ee0ebc7cba44057ba59ae8cf1c5237e38c412f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b