Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
ee89e0ad3875573e7674d6ff1b14935c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee89e0ad3875573e7674d6ff1b14935c_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ee89e0ad3875573e7674d6ff1b14935c_JaffaCakes118.html
-
Size
40KB
-
MD5
ee89e0ad3875573e7674d6ff1b14935c
-
SHA1
a6f6b3b85533c233d41d940080d99857c3a3fc97
-
SHA256
c89fb05cc1f9c615cc078e7ce6b4fc12db60e82c61e1d82faa397c12511bcd61
-
SHA512
f0685969dd92424a17e8fe59f8f590eb535761f65bc834f5261b3c5fbda6d4a598eee7164024215b90b9ba1bbbc5ed513ef4090fa4ee766eebbb04f830e3bc31
-
SSDEEP
192:SIY//XxfDL0EDsL1KQ7idGU84b1wJL8b2CflMYy+1tTXhrCA+FjT7/7CVefQLkty:SIYBfDKL1KQrK1wlpITRr+TvCI4w8rp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE813AE1-779E-11EF-9DE0-EE9D5ADBD8E3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000e47f5e9f8bbea210ffcec2fc012a2bf515f43889c023a4cdb602c2254db43315000000000e8000000002000020000000cc22ef3e70eda86dd7b459b4efd85a09d14ac5998ec4b3988779beb415e3e8a820000000d4651b8e09e4f40327c0a6e7221393c9706b1d8a4740efc24121fb5bc813eb404000000062747f05deefd81bda517f54704bdda146bfbcd8b5aee430663104ebe83c2797ac47b5d41812ee52d9b9370b2b72fe01a7e260d0916a7ade4beb403fc0694152 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433032837" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b00a45b7ab0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2292 3020 iexplore.exe 30 PID 3020 wrote to memory of 2292 3020 iexplore.exe 30 PID 3020 wrote to memory of 2292 3020 iexplore.exe 30 PID 3020 wrote to memory of 2292 3020 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ee89e0ad3875573e7674d6ff1b14935c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b63eb02b2b5ca1f21313125bf4d665a2
SHA1e099c7b254dbf3a093180a48480e22ec49b9812a
SHA256267828c072f3ec89830f80eb47828be6f4be594f0301eb0e1295c220e45755ac
SHA5121cbc73cfd365fc838f382386469de6f5e2cc2dfe9fff5b1896516ef1794ef189aa5d9fcb4ec35b10cd43dad614e9795db2dc41a6b3dabfabfac0a46be901eaf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584cad2db230e18ed6d7fd1b2ef2caea7
SHA12f0114ba824cc342ec2332dcfd5a265c073deea4
SHA256bc84d4279817703bb438ef74c61e7034fd6a2acbde80af60ca2479505f55a972
SHA51268d05c21b69392692a9f53a8110a804d778fb40e3ab896c3e8462d7768e611623bd88bef6af3b6f9133ac83d03a5efb423a403ee3c424d30a0a9291569f5945e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511606c6e7b13052fcc9fa3f57800a38f
SHA1c3f2a5781f87572351e25c28fad355fe253feef2
SHA25678010dfb3a6d22d5b00694565edaab830c39bbe5cd4a61c5303f86dd62d829f1
SHA512d4762de2c82344380577e2f958f1f084c93957686228a3e8b6930ca8cd358615d25b9273ceecc6c19bf3e98ccda6833aa04d893b1faf31568d03b9821966ece2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cc93db025d0d034dd9b4b21376616f5
SHA105546a2ed37567781a93f18dcc17e7a297c35d5e
SHA2563c148caea284563c58550aa32223b8c9cfb40140ec2672091bd5a5a409d39a1c
SHA512ad4ca583a4cd306f6c038cc21b46b16fb2a9bcb6c6e9cfba6db45c87719d0d1a1340946a7c084e5075c7d17ce50fb03fd0505c720fac3e3944a7b090ce27d210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e132dcec65b31684de5aeb42a80f235
SHA1b0b8403cd4261b064e21a2130aeeb5345c327514
SHA256bc3c93837879832bbbdccfaacc25a66a0625e0bbee76b73f1a8ac36db6109870
SHA51231d1e24f433c16d52521b75663988c5be593211dbe3734400547595be9ea7ca61abc567ff7e14a6a283fcf5b95adefd4415b8ee59f18d9bcba0be9dbda178880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d19e686164473ce01bda31744d63ba3
SHA1ecfdba2450f12f347fb9de9dcfd0652ac939a42b
SHA25622261bc990e69da200f58f416ca5897e57ea5df19a19afb68197b00ba249f126
SHA51291d961b395e1b7533b70d3f6b3137768bbdfc8a24b131c42f61b841b91d88acee65a69aacdf43cc90c398b3451886fe362fef32522dfeb734ae38648a3423735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5171a7bcd41bc3b950037c7075ba19bef
SHA1e1839fcead8c2feaef1857417e25422c3f1d9485
SHA256ed04fb4d1510211e6d60224b0841339456615180866eec7707b03b207a7627be
SHA51273813d61e6f66cd7d0f0c42e734810c57d0d27d02d415e2eb835b87c2251dd7eb5dcde6915fedd0cee4e53720e57051053eb213f8ab3b72f26c833b87e9ca60c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f5600845fb71c52e9545326a215180c
SHA1fd6d26203a1418883609c601395ffd9891fcc59f
SHA256b271332557e6c0bebb94ad5a586bb860c17fd8854a3743f06cac09968f0a1426
SHA51221c6fd8ce64778a4622555bd0d9457f8535d1f5bc5cb6a93714e7721c7d36aa1de002480a77a85c5b9ed885965c01d124b3c5e06262c7dcbec2609dbd72bf50d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee22181d0be7bb23b4835274cd3efbb0
SHA15442f6e9da34ad862b1c665ff23223041cb6de36
SHA2565dacb6917577435a81d2393f64c0fbf408b35897a18f7bdee5189f6218669f5f
SHA512cd7bbe8fcddad57a5af4a03750a2bc9caa2312a8ffb82587fe8d2ae15c5e05e40a82815b070d895f838f86d3ce376d2668669f17ccfbb2f30adf16cb2a0abb01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5320de838a4303b33d8a6d23e1e5605
SHA1a220a90c988c8652a5ab5e4d3f9d4c652f6f86b2
SHA2563bd910848970dab8d33a652eaead51d15b383eaaa4af1b84664aaa37bcd8c803
SHA5123e53e2c322578a7895805820c7313eac742ca12c451026e47520eadc53c006d458ce477d84f3f34c1e9f3368d38d7c229402f6b22bf0985b41f3045c1c008f12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5400fd1bbdb13bae0ed5a54580f37f9e8
SHA141d98fd8657cdbd86a77d417e7563d825ab75ceb
SHA25621d73c1a7d81681509e05cc1892081381c2b033b11303c8d27981ce320702e05
SHA512b7e44c622dfd1763eedf3664b9e90765e6d9c7a5fa190350d9d3c4647d89a2890373e696b3f0829b8b9a415a5141451b8f919d19906e6f820cea6b64f4a035f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cb6d9f04f0f0ebd93cf1a14a50afdcc
SHA1c1acf5a64fae1117c642519015163f8958ffc70c
SHA25678d92c03a4b4fe3e6fa274cd3345bf0e70d7470225da1b4b3bc2d2d7191c3923
SHA5122835dffd8ab92b0409961fcfb30ed38bf5d85928712397e24513644a3937f5b2d75b8fe7e8b2df014b5d35ce92c3384e08a0848b22f190d67ce8735fa2c96434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ae4e59927b9d11dad61958bf94ee575
SHA173e223f6bfd6ddb5be78fa3b6fb2e24405d76314
SHA256028022fca2594067c25cbd2a0ba0920370b961e64473361e708f567d1961cfe1
SHA512e4a451f40a229f6a51d279fc2974306e40a7633b0f986bd064ad20349011f10c1805626764d9e4882b347f792bc6a7fd978c22199fb2cabd227a91c829def52f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581f30cd7048089aed2c7a97431df09fb
SHA1032fe91d8924d8a8ce72f67e007c8122df423772
SHA256fbba4799fd000b5069cf77ad512f9c5e468e285dd80fed7ccd2917a619c95d36
SHA51228aad084872b39191ac837cf821b01aa1a71b3a5071089c2fc5095fa262f829c9b613e232320706a26cbb805e9d1252473b3c70cdefae4cfd1cd5f1037ecc6f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab4ff4280f54d8758a0b35f95b598223
SHA198e9b7a86038fbff7e846da428b71616451b25d0
SHA256cb545f9e325940d25467f15d7537f78cc13eb7be6cc74aa8244b0df97f08a814
SHA512f815ce09b9349fab849a0e7bf8df46f25bba99dc326977a6ee56b7b0ad1672b5204901c7c82dfd5af8d984533b6946afd105128b5b04847e6b2c7ede1f157f82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54262d969902127518669e6d051cf284a
SHA1afe679090ef7bc71d904ab0ba229ea62cf2e5337
SHA2560ab9b28136ccb49fd6a220e018892f7b9f16e96b0f7ae41d737b61dab8cfb0e1
SHA51246dc21a9690b3d2e9be6f79518c81a6f35e523eeffe556d8c42bbd03d4ea192b130ee267ed5a44c027f3430ab8e7552f482bc1c9adf9800f2fbf26b67567aeb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ac7902dd41f62b2bb5ad850b85490c0
SHA11f237443d29af690712a9a365f458d5def5a6f49
SHA256a34e40f13b3a2c5a62fa6874d55fecfe229be93204fa489dc7973e538be67d68
SHA512129623531e6ff7ae990c4c15cbe276b0acac45354b793504cde6d93396632e8bc7d4a2ba8a0b6df28a343c632eb8095261935ba1ae990606c226d9fd93f60268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d153918c3b6a50b584519fd61dd9fb3b
SHA10d50e84c6900ec3a2cad22c4d984d9ca04b11688
SHA256f3a7dd808e27658199cc6c18df58ec330e021730b46a0687010f3db5237d8f96
SHA5124982a22d493fcb6bb36e611ae050fbe107bf0db2df9ced0903d02dd3481c6773445097354df8f7b9f3342706e6d0de38ed5426d690d77aad05d897cddb04d063
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b