Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 02:02
Static task
static1
Behavioral task
behavioral1
Sample
eedd2b5827765d662d293f2f4fb76125_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eedd2b5827765d662d293f2f4fb76125_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eedd2b5827765d662d293f2f4fb76125_JaffaCakes118.html
-
Size
349KB
-
MD5
eedd2b5827765d662d293f2f4fb76125
-
SHA1
8c66031f31414166ec210803d298cb26b88da255
-
SHA256
e823d4e867ac6ad816994a0421f2dd3cf7da7ba70a513f71e25f0d5c73956aac
-
SHA512
0d344ccda3a5f0ee5cb22ffc255edb7efd750e655aa45772a6240fd4a03d73ae6120e01e93b2b86010a3ae9323a9860d37f0ccabea038013c4a4c8d3aafcc602
-
SSDEEP
6144:SVBsMYod+X3oI+YzkdsMYod+X3oI+YAsMYod+X3oI+YQ:k5d+X31u5d+X3Y5d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000f10e782ee38b93f43b3e9867b507da52f56ea629ce6c99938d947284368ff00c000000000e8000000002000020000000306b42d8e03f13600af24f378a3dedeafb00c2c6df271312bfcb7c0b13e385512000000022a21aa21d18a076a59eeae8cd183dad6f4e7f3af1b6c2ec3d756ca12cec037540000000fe76942e20b8a5374dbdbcf67202abe215702c118f12aae25efae159479131390aa5621d6fc79161341f204cbd909b3eefa3caa40fe956b5e887252be7c9c0c2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433045991" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7EDCAB51-77BD-11EF-B2BA-D686196AC2C0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0013dd93ca0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1192 iexplore.exe 1192 iexplore.exe 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1192 wrote to memory of 2408 1192 iexplore.exe 30 PID 1192 wrote to memory of 2408 1192 iexplore.exe 30 PID 1192 wrote to memory of 2408 1192 iexplore.exe 30 PID 1192 wrote to memory of 2408 1192 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eedd2b5827765d662d293f2f4fb76125_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1192 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce79716a7eb413fcea7fbf80b4b81602
SHA1eb8d559687e8ebb36f21f2412eb4562d7c98d2a2
SHA256e2dc665220769766060ce6f9aabf55c84e1940298ffbc52c5a67f94f20a746e7
SHA5122272e7252b92afc9e25a1fb74cf24ff9b282025b5aa34c19975d1243da4e2a618af6b074299d4da699b4ef978ae43134f2d03806f7dc843cbf9e907dbf109361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545a0c908658d41162ab26b5ee4c57f79
SHA128d2f277fbbe5a34139bd28a62780d511e626b17
SHA25629f1d1d12911e4603931e10f3b0efc77cb16229bde47ce18f0ce061b7764e1d5
SHA512d956f3fc7722fdba5514a4641ffa28b3edf6a56b2881a3bc8f5d0a4ce200e07afad6f473c9d346eb12e92b1a7df12bd29ac612d95caf5c6de288e64e1f8f0778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d28532c3270959cb84f7eb7c247cea3
SHA1d09dd476343bc2ae1ccc69c93472d19c99c1b12a
SHA256ff25f7d95931e654bbf208cb8f86e89640723e2d25570aabe6539b2cd03b5759
SHA5120dd6beb7ae2264dd3fa4e769fa7c55d678010eda3a1fd1c82c4cfb05b1a08e7a127965b3395eb9ba12101e02fc305e8febd90e4d7f9437621ca0c1e20f716053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9b9f33969c86f441a3b93c68be14dfc
SHA16c9c3c869db3a37a02bd1226099c35c4fe7ab36d
SHA2564ec586b3e493c095afc962921071ee8dd9b848e1d851394827acd01e8d30d997
SHA51243c5b5dfc2d4ee784580924a768a06bfe3335dbe7a2450d262fb9b3f7babc7ed9ce6ff8629cb32980aefb25297bc6d34dea626dd60e1e299a738d9304fa6cb5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5098294f534df57e7f3e1603d00dc15a4
SHA10db8795d78853a8519817563188345ca91b54ca2
SHA256d8ad5c1428d567d0837d25aa3b1cf182178682194cddcacaa59c5b80eba919b9
SHA512c111d57a66d5423726699cf51ef66f4f2ebaf4f8a2348c9ce7c62554d04db29045676f5683d7784d4fb8fe0a306740bd89c4032be61fc9a15fca7098a21001ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f763cdc1dbc09dc54f8301350f3c522
SHA17333cef07a95478c9c40621952dbebc3c0938a45
SHA25620e64cdc5a0b851fdab5b0429e34e5004aba0818bf1a9d0d488ae2d94600fccb
SHA512129ceeb178eae4e499d3c343e8f65c0dc8ea02b6d7bf1aa65e966f07bb4ae6afab5cfb905789c4ac9146fb48895a5370432c7d2146938b05249fbb86f37eaa88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed4acdcc7f1a502f43543ebb0b5fc60d
SHA1fd238a369493344f24c2adf7b68242040e550bb3
SHA2560bd940d5c5f3f3cc7426b6d9a7b51be7a5a9880b14dd4a1c6c5b45fc48cd1b7f
SHA512ea601e37fc9bb1d8740d4d8f0390fd2a8d6ef9ae8d480fe74babeae0a146a8e5901d1c4cea96670ae3bc9bb483ab5e5ce580f9a415929d6f022cca45b5cd0b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fb3c3b768e0bc85436813ffb5960163
SHA191cef5677026d0baf21be91529a7c855752c7bec
SHA256176e5b38e6f83813d3634ded6d34d205eee89108d73d809d5b899d79f1b6ed9d
SHA512b2555b806f86dd2da5c172a300ca5a7a896e6c7a982b35a2af8804ebcde96e36d813c85a3285a4e8017f98956de6d12f979321c5c9fcce4ee5ab444e30f6983d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1f06ea98fbcc1f897f29db9c3787ada
SHA1d70811d8611a03385a400d65ddfb0b7710409656
SHA256f70c8988347d305b64d19766118c53d6155e494e3b11a29a4ec59232c6aa999b
SHA51288466557ae7e390beb69f00ca30e9304417aa61264a02a8781c1c5da25673b7117e276f94be35138021e6de53dd92b5c6a379ae8ac32d60b191b8e8719a219f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5c5f24df5015e3e194760ae32db3748
SHA14d8228c5bac0914e232e5d4bcd4949a7dfc957a8
SHA2564fbd4efa2ca50f6ea1eaca646be5c00a75f61a4cb133edec16918808275e3ada
SHA512efd5e4cde069fa9dc9cbbd6462bed37a7620dbdb0436d2415c568ab3fc53342c3439da0da781d66f6395e0ec9a4b8db6d6b1a7210e25636d017376576fb27445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d89d83b25eadddf56deecf192279d02f
SHA1cbd5573b39e6d754234f46c864d88a8d12a98b3a
SHA2562574339df4dea995bc82f945a7881aae3d377fe52178820077d577a70a074e43
SHA5122e2c7c70cd37fef0427f0cb52bde38e372662f07da39c46b4119b2e9d773a5b2da809ae466487a330f3f855724624862ef3cbf2d50dc9c8f5e2aa25db001a686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53616eea84abb23913d4926b9ecaadaaf
SHA1466d30a0389e0f797515b5d5678cf313d5f927ca
SHA2565adbc0d664a69ad50b887f634963e4eded2f59bba9cf4f660f58a49d06b7d73c
SHA5125f7f1eb0d452e1049bfc7e0bb48538536c5ea92d3f2797e0092631283fb59d01da2ffe813b360ade536114fe5c1841054565c7cc1dccad42892e7959c19ae2a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598fc5873402975cd71f2c5d68fc9d714
SHA14e852bf9159b04058906ec2c2dd4ec9288485f4f
SHA25659729b729cf4907fe4712d6b1bfacc32bf8e46708213dc358e88347d0e6aa7cc
SHA512e75c3b0771de96e292cd4e4c87eb587a529072622e0bef4877ff27b6b01efc5e95c8628447df8d729cfc13867c31f92528695e7a6230907f70485eb7272a1d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ac6379605f3cf4f1e6e7dee9f99e54e
SHA1943ef0189e857d7a95aa77465dfd67beb15a37b6
SHA2568d2c0ff2a7a4671395b41332e20b70cbb11fce166f410bbc98c91285eca75448
SHA512fad19467a15b6889108e616f81a602635eff00a4cd89c5c1cb663bb887dacba358e04bd4cea6033597789b734e504c912915213a83b22164ae5503f0a731f257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578ab1d4847e7225e86346ceae36755f8
SHA12fb7e559468ee6de9ea426cd8f1a89ba98c855a0
SHA25688488f39f180f59b359817dd544755aba1952c9a8c6ecd91a8e9b31992da1fba
SHA512a1424a873728173580f2dccadaeb8e6aeddf21b66377bc8060a28f869bdd32808d9297f21aa910002cdbc07ed27f6b496cfbceca0f1b2c5b7c2c03995003cbb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5988d673922fd788cb544dd33aa3ce31d
SHA16a8c2ed275f16681ad36a876dee7f858f938c3cf
SHA256ff115848bdaa1ada9712d7683821f507dd8b12da3397c8411089dc0d40f5d59f
SHA512b934c357a44019fae538631de2115fe002075d7851d3bc08a4c455ff83e8736055c19eda49350a42a42480c23c9ee8292823a5ef47b0dc573bbf5b90bcb27a49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f11dfb28beb9089aca3050b21d92db9
SHA1c8fad98325dff36f3e84013970e51d067d91598d
SHA256b1d32ad305d064584b74cde35be11fb521d752ebf89c211bbac74ce0305ed315
SHA512d839db8028750f46c90711429bbe66eb12a1c0634a827a9f5e86fcfaccd379152a41489a0dd014643d8fcfe7eee03f8de02296ae030c55ce14e96c2b9c53e8df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d580f867b919ce746935e04cd49758a7
SHA125f5f4f542998d3720dd49b517da6aa734161782
SHA256460ca453785e97eade8e7a35f05dd064e71fcbf9e0ff816d656fcf945c43e619
SHA512b1a794857030118b38e06d699d627e3198fcaba04d3f8427f527f97b7c51453dcafd3e5a984e20bdac4889e9a6ef3536cffda957501e06da797dcbd10efa9246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c4ec1fbd94cc98635befcbf3c906dd0
SHA11204c0d82ead564c72ac1903eb9e1ebfad765875
SHA25615baebd31c507979cbf90d55310e081ebe2da8bb31f76ac5a7bb7614c3a15bb8
SHA512be5d1b4499dda8e80fdef71051a1d504ed6e8941382f069df24c85d68c8f83bb1b0adf2c5903bdd836d8c383b9c7053ea7acbbc0e0757f32d03d149e2f28d3ce
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b