Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
ee8ec34d9d8412aa69e90a86561cb75e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee8ec34d9d8412aa69e90a86561cb75e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ee8ec34d9d8412aa69e90a86561cb75e_JaffaCakes118.html
-
Size
2KB
-
MD5
ee8ec34d9d8412aa69e90a86561cb75e
-
SHA1
f8012d25b0df83fbcd9bc5c438ef69c05bec711f
-
SHA256
76cd57f291e0492ccbc32f9185945f55cf826e71549c89f4e5d833a4a3930fb0
-
SHA512
81c13bc59f4ddcdcaad147208f54834a4c4f8808a5950fe450a8e7c617929588e8f07dfdb6823b18c24b7d2e0a97cba402b73200b69ab926728919c3dec682c2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60db5c95ad0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A7A84C01-77A0-11EF-ACDF-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000f19262456cde14535c1654dc15ba1cc673198b13c371fbcfad89caff445e5ee9000000000e800000000200002000000005b666e55248cd5e0a2cc0d101795533e7720cefbbfad6495239c56c5c6f73062000000046635be785cdc2bed753d949ade4de1fba8bbe30aa87f08933c203b36a34f7b140000000c2145d0b07f33ddd43c3322577b887fd310b66fcd406eb35a8003aeea199ce5f8ae8238f899a1b025735d5ade7cb7ddb7b43257600c73381975bb7a9cf8b1069 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000d7744f09346e1b319ced92bb3d5fc552a616e54e6a3759b69ecd0442152d1a76000000000e800000000200002000000000eeda412ad4c6ea53274bcf4c9a4743797470c3faafb55d33d99dc38daeb54090000000db221909ca4dbd305faf98df6b75ed594b5a7570b5da2f00bd22b35bb3d21eb7d71776e2eeee6da4edf315999bb2ae5c8a31e4db9ddaf4d2689a04160da122a59f18050e19d632ede94537bc8210a1dded8b8f83160750a2346c545d0402153b674efab464185f6ee454d856d9de2c72c5251149f1d74e625f1be66cb63a4f90b24e82ec5f4cde509a1f3f920b27bc554000000012fc47eb36f2593801efa3c4ef645ea78a7aa4b645ef0960f39c4e6e06f061f99720aee0f715e0992f6b120431c0eb998fc4642311ab8a8016c810744b4a99a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433033603" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2440 iexplore.exe 2440 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2752 2440 iexplore.exe 30 PID 2440 wrote to memory of 2752 2440 iexplore.exe 30 PID 2440 wrote to memory of 2752 2440 iexplore.exe 30 PID 2440 wrote to memory of 2752 2440 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ee8ec34d9d8412aa69e90a86561cb75e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588d0f2b1a71752e6708d62043ec7a6b0
SHA126e72e83718532485129dd60a2609f7da97f02b2
SHA256a0254b9be77eeb69e1eb37b96a2885ed44c32117de229a3d6468bebc5800232f
SHA512d272d08ac68e388f935917bd07e1a8c5ef53012e0f580646e4f2b79ad1c12f4e60904b403f76f3ef4450e1c1f2a8c5556cf894dfe6d99ef849b30384ae0b2052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ff3c66633081d66a6a3fefade28f579
SHA1dad70e4ac787626c6c026c78d3ab638d1451f389
SHA2565ec304eeb9b0c8aee703914f4a0ef034af10423768175662f0d8fa95c46540e5
SHA512631680866190f2953b4f4760d08fcf2b3079bbdac55ddf0c3e7521b6c3ba898a372c59ae45c7d4e443903b0072bcdc8dd2be1cb30119ea438591c858b7a7ca51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5171896a6c3ea0b5abe42e4a7b58003f1
SHA10bfb8ef98ce969c5351d995fa360168af320be7e
SHA2567d0af7520a7bfa60b023693a9f180284c1fbe5569509606cc2d25bd692ccf9c5
SHA5126e5b768a9199423d51735ab58f19f66ee1de81c39214ca382fc9079c71d1190c0e23344e905a7af849991f4cb4ad542c4b82e924064d4b516c3ae8dec73097ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffc4669d7142b4f9d0e0201dd72d40c1
SHA155701b25855426c7e700d2c58cba786b91b154c2
SHA256f4f5c82fd8c318c0bd572538a330c58f52981b6d36ca9d0b678f42ba64f3cf0e
SHA51223d051139bbee2215d4ea7efd11dd9d6127be9a104bd59b086cff7b8b7bd411057b6581c5ae36d37cd10346bc5a55e773eb82666f76261ee7c04229b3c824c20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593dd11f7e8e8a19d020afd3eaf992f68
SHA1cc472eaaadfcb7a858b569d7dc2c943204053766
SHA2563525ff342289554fb3703388050b246d63d4b3ff5bad347ad505b4a80ac58908
SHA5129e9841e368bdc256f82d13e63e466edf3a463b1ef97afe3aa0526b5ac9a06001f452ced42f21e57550f0522d2e79d4778d20b2241469ab5ef9d6e2b1dfd2f466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5706e6973e35d2dd96d0a6ca918fa7754
SHA1944dfa502a9ef622cf8c40e5ec40a4c40e521571
SHA256139d3a86a55d7ee0e38ee5ef0e69ccb3bfff901ae6145b015b5dc816f4b76f78
SHA51253deec91f14414c798036807fb11f244dbaf17c1446efe214560cace15d461ff64770d45bd0857093f439394afb910a235571700d6582421c89af8cc4f226375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb1b615bab7cfe6fad1617e50ddd3cf2
SHA1887e79b5c8b41c31591062c21028a2993f326638
SHA256abd750043f12ab431d95ab0ae8da0e86acc117f194e7fb3f1bd865d18317a6ac
SHA5125fa6387807719a15583a7bdb75bcd75cde98b388967b268b6ded2ad292959068ec90a34f4ab2fbe785c8e424eb4cfc29afb57aee0ea911297cdd1e5743ab3e48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51488cca77f8bccb5f5be0b4480fcdfaa
SHA16c0f704e29d86de0fb2d3dc091926e0a6f7776a8
SHA256126fbf1267180faa57290b3dff4f73be3149f41a6c4bbcbcef2afa326ff92358
SHA5127c2e67782cf36c8dc583f2e9d2235a307d9fc6e23589ab46c84c97841712ac3e5ff3c08dbe1237be5af36766e478d97a877ef6a66cb38d4fc614dc8bc3a8ac50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b83902aa6d69954b4200d7c3fe18e7f
SHA15ba45f62bb61d8f4e3e4aabe58e70541529117e7
SHA25659a9f62a0a863a21aac7ee95f8a4853fcb276ed99b8a25026428374b6107582d
SHA512fd2aa8f32545b0cb873b5c482625082ec84a7b3c799bd0b43609695214432405ec7c41ed7e36017bcee3c30733acaaba90ab62e54e5639173ac1f148f75978d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57554ff313d4bf1d6966293ffb814c395
SHA11b07f32456918691524a86faef4a43c6cce2bc92
SHA256acb862e1a63a65d819ee331a9f817280d63623c5fc52e2d70ead1a5b4098bb70
SHA5122280bbc258027937873437fdb9c7532a896b6d4da65ff2221c03afbcac39cbb5ca173d13cf9d6dd3bfe2da12e1afb1d306e73bddf72413af9e85681b6b984375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5784e42ec4394d81c18770b9c5af1e2fc
SHA1a86007977756d4264951b3be731b47971e824d45
SHA25675f3c8e68d804d7687f9bc63b05777520cc02e563694b31487e57de195784065
SHA512732f26c166a1301b31b6bb8946abce70c0503c670efe1d4f748474e1d347e9d0ca0c0030dfffc508acd70d0ba18753b6aabd1ee5cb603fd02e6bfb817b563fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55024e467f78ce8c691fc18f3ea4cb271
SHA1ec2a3d0c630a307251d972476b5480fd86e74c1d
SHA2567cbd8bb960162f0aa37fd881136bbf24f8807a763942f630750c724df7e909de
SHA5124c61860bda9636ff1196f8b2eb1ef67c486b76615b95bf4d1c5efdacac7bb64459e6840009502ee306a29371e2d04bf4fbbed5d2b53c278d37f5b54dd8fdc62d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5467866012ec12dbbd80ca1b9bc3bf6e4
SHA172375bbfd5d2c9bf6ec5b09071170889cb6a19d8
SHA256c24ff36e3ea07139ebbc4a74c19fbadb4ec0f896a93095276a8c4480cb41c2d6
SHA512eed20318d776fabce08f68f08cadf0a474524b4ad2d9d6797e8327138e992d092254e685c1b2cfa6aa41c9d6a9e41f37bc53666ad062efa2ded1cdcf89c30ef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5265d3ba90fefcfada174ab0591a0912d
SHA19a5f1289cb0c368d78dadc27dc0431ddab68fe7a
SHA256eb2552d816dcb749528498484c28d841eb5774b906019043b9db45738061a951
SHA5129c64c50f8e6c3ee358e262b0dc589c4fce89b0b6fdd9e6ea18e04a7dfc5c5b341b0734773353884bdb0e665bc6e445fb6cc98e82729d3de049fdffd7383e90a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cd56e38b71d28e1a7a664c0d5bc8996
SHA108705c43c56e2645efc7887c724cb582d44ac3e2
SHA2561543d759e6c18754d4cc3247d20a8bbe904acdc5cea8b7a9d1ec431345adabd6
SHA512d36f84f04b37e89becd008e347a0e07a18002af95c29d74912a8228a0b4982247754cf4f44b6631e1e5d8411778e7fe9c1ac759052dc0226134e425ff2dc0abc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f06a9d2eb4f42b1fb665197b1abb328
SHA1d2b652c59bf0553a5a53d67d91cec377998facf4
SHA2564f82c8a1d787703ab4a7188ca99cf15cda3f9922633ad7c1750d33492c9fe1d5
SHA51233c25e04e2f8003e400d8110559aa532046058eaf6c7650a1d4ad71268fdb43e38dd90e6d36a3a5f50966cd433718d3452f43924e2c1f37f51bbdec858e3ff1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bdc8746bfa0015e69e72db672021a1e
SHA1178b5d29e7f621538fa2cc4ed3eeafb0bcf9a0d5
SHA2566bef8bf6357a553a3577a4884741757b7f1f7f53915fe3f082a4258f4ff6cad9
SHA5122edf4ba6abc76e89a978ca24573521e5c617236b32e48d326e7b72771a531b34c3688d6f4d57c314721c83dc3db066afaa2da660d65971a5482dbe98005ccc87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c1fa6abcf046a684b12c3407ac9fbb5
SHA136ba75f6420f00bf656f7adc2818ae6454b0b09a
SHA256b81ca39ba13bbafd87995ce4fdca059a5b506c46e4b88ca7e83934b31978355f
SHA512a0db1712f705627eb1acc562e909f36bf34d551f0baba90071214193061c58ffd07009046aecb99aa3d01a3d1a584aec6996c4d463b42a830b8f6fa867150e61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c42958cff85d6788a5fb98589c06dbef
SHA12ddcba00a0e363749b818f9a8652bd618854dc28
SHA25609185c42b4d7d92a0cd75ba8c4a7bbbec0b8902b32e445fa047a7d741788f64a
SHA51266316ae9703adfc51730b357c03a8415d6d6059b5fee7a2a49c2ff38e05e0416f2a128128a17aa322519ef39f71299a8e5c75df5ffeb0e64b903faa82fe81769
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b