Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 05:14
Static task
static1
Behavioral task
behavioral1
Sample
ef2175edbf248652f1f0a3c801a6a1aa_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ef2175edbf248652f1f0a3c801a6a1aa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef2175edbf248652f1f0a3c801a6a1aa_JaffaCakes118.html
-
Size
23KB
-
MD5
ef2175edbf248652f1f0a3c801a6a1aa
-
SHA1
d564ad42ba02ad4f83ac9eaf69e34af90f2a4f50
-
SHA256
9702220e319c327bbe041041f45e652903d347df7431cb62775005e21b604d6d
-
SHA512
2e8888dbf5bff4300bf9eecd5059466e4f15ef81760bb19b45a32ca5f4f1c6bb76153fa087e68c4c3fdcb2a9b5b178e1202e9f0c21ffb21e1ce148809d60cae4
-
SSDEEP
192:uwDLb5nN+nQjxn5Q/4nQie7Nn2VOnQOkEntkWnQTbnRnQtBXjvMBbqnYnQ7tnQYo:bQ/oVIQt4w
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433057557" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6CC4E8E1-77D8-11EF-9DBD-525C7857EE89} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60285941e50bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000007b9702887f883e43bbc7b60801b3cbcbecc73f9bbfc77396d9d81258d8dab53f000000000e800000000200002000000089ae52d6e46d603c50b0792481525669a996fcc32b92a9865d4e131f7d5936652000000057f652eaaa8f2c8327ce468070d470554a375e6e01a83f8cd51c3b8b8071c104400000000a10f1850ca9010fe4342566c79e005e354f594e26e9a2dcfa80f9e052f77cccf03d277f6596a3851403f85b154ffe415fa51dff759b78f9db3eaaa2c02e7c34 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2884 1760 iexplore.exe 30 PID 1760 wrote to memory of 2884 1760 iexplore.exe 30 PID 1760 wrote to memory of 2884 1760 iexplore.exe 30 PID 1760 wrote to memory of 2884 1760 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef2175edbf248652f1f0a3c801a6a1aa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e08c41ea6137d0a3e46a9390b726db9
SHA16741fa6a2fa2637a0fe898f256e4b0176d681d2a
SHA256bf51442f52c1b5f13eb957b1f0a14928b8d027675c710a706c50b375bd0072a8
SHA512e10d62c57c590e2bb54f72b07edc963bb9777f674fb5546ce0a3763121cf9439c7cecb8f47b1337b2daf023791e6cce3ad3884a1b7782bf635fb3f98eb6b291c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bd8b1e1b6204057932092f53355fc48
SHA1d2fc571701d0021f97ae8854fa7c0cd72e4071a6
SHA2562f198d7cbde05f9f4e08f806e6683a691321b6edd209434bbd18dd6555212de8
SHA51263ff29cc849f105738ad16042e813efd2bd30c7d8df54c7e235f79ee74f3f8e405a3deaa6ff673dee7c714a8f6f6009c8f2dcb91e75dbcf785f56c62c212c61c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b5f38a64e373e52383eb054bd96f5a4
SHA1b17c283b0617fa64f6ea48b5137d97bcfe9f4a8a
SHA2563e88a5e5b1006ee765d564f204ebeacca4ea0be8afd608f9600e7400cfcf3743
SHA5123b43aee56d5face21cc11576518aad7c5a5488c1320bee9511630657318024debe1c35f0f417040667cc6fc91c9044a0d3f79b4dec4052bb9af23dacfc313296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b08896cef5a70ab14b193c0c35dfb0e
SHA1bfe590a43e8ccd5310d2fa46942a4be9f6616667
SHA25676e2883f99dab84bd1604ff786c35a127c424a194b662f7b5054a85cc255db00
SHA512eb3ab5c7c4b34d99f23b10ee07f43bf37cd21100d6e287542a6fb85d604b92d0c37ecd27a3f3906c7295a89057f434a7f6b62752edd5506c3d1dc2b9836c6b8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc874bf1e84cafbaab7cd68b50d5d1b6
SHA1b722f65e244d50506c1a32dc8e1138102800cdbb
SHA256bcbf08ca7f18b6802d6c73f7a225bb403435711c6db95485204850e93c8931c8
SHA512bd9465575acf0fe3e6e777969483f5a5f0b96450ee622f8658cd73214214528c41c1e6f42267135eeb22680623e05f158f41d1e99115608bc3cd1146e1bba8f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543079f332305182107b965d11eab690a
SHA18add2bdf6073ce71afb6f57e2688bba840aa3cf3
SHA2566d72b96198d6bc60f8905c5dde518225b03ac7c5926c5058701e24dd1b2887ca
SHA512790daa0f64df4cd4dec83c5cb84ae1bcad7710c74b38cf354fdbcae8c33d870ad771aaefbc58fdd3fbaa98d643a2248444aac7d4feb9642a79a45994ceb8f9ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2238ef7d6e65788034a45e2c1cde0b3
SHA1d6d241798e9f61f06e8fbd575303b7b2da5c16ea
SHA25670161858f72a639b5d8baf1e076081dab12c3ba62ac47695af74d6006267e537
SHA5124021c8d106de3f7147417156aa541171f4a563120af535fd532af8e46b47a0bd1fce2ae904e149ea465a909322225c8d22bdbe1abe7ffa653a81114cc27bc32e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f5dfa45f7ee30ffcf8dc681269b2bd8
SHA1c0189a599883756375593d6c306ec2df062eb894
SHA256f3478eb8fde37afcea7da01ec629ef75d4a73486c5db5c2bd6c70047350a1b61
SHA51284bedccbb544fa2222499b38600de689cfa27378c4cb038a4dd3eb31cf3a939711541589d2fb24c770b044b1b3947b59ed633c16793d9598c843b4165c1d68d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57436e00c8403fd3b2deda9c85325f81c
SHA145522400a3552d445ff225dde33c908c11bc2083
SHA256e9274e6fb31daa476628504ab542d3af87ab5f452a341b8c009b96cea933eea1
SHA512c500e81a5682cb5b4991d1827081891e544180df4bb0952df72e41226a08a99f710f905b7f2389256af2975a485bd341ac2000565eb8a5e20a0af47c20cd2f58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529d589168d60097ec91224d021c55f5f
SHA1bde30c1dab12130099a653c48a23ed4c694d5716
SHA256f4b3e838e1975db7935eaff4d4ccf755365eed9976b34c73a0d65c0aee52983e
SHA5122d3248b7dc993df5b8d1f7fa55bbc53bc40aa2f72cf280a076761bd9741a80676e7d0f766c5c52faecd927eff2d10f422776a048ed05578a46bcdf87d2104556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e642b8d2de0b205896cd391ae4503294
SHA1c85dae0e1088ecf766ff66051b98142b3c21c3a1
SHA2562a0333f4f467785a78e683ffa4b76f3a5a5a2cec224edff73d6271c3983a50ae
SHA5129d34ce16cfcc96129110ce02e10538722602ed7323381bde0cea18581b643a3c7dd3aebd934a5b1b44129cd5050bbc53b2c9fb55bed9ab1391585d5d4bdce8fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d85cd3bc2c14454368a005b49db6b76
SHA11072f8111ffd9e9faa1e35ce9f5adf7da180a047
SHA256da3a5ac791a0daef9a1dd0cf887c7c6e4e09cd11ae4bdfae8b39053e75f0ddd0
SHA512843cf8de19c12b32618e5e54af336901329396b99aeea031ca4e4deec54ca85e23cfea4fd7b6f7a6ee086397d57897872bf426f383d637e4a26ddda1ae28241b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575bdb779a59c41245d67bb010b9e7be7
SHA1a888ab06476c19b7cf26b1c7e8fcacabc5c468ca
SHA25674fdbbf68960ec7c51b682a19caf7ac0b2a34c9ca36e57c14e76ab541ee635af
SHA512ba6bf249778b1b7533c2143e71a45dd1de9e556076f023d46ababd81811615b1f58055132b48ac73b9966f78924c55313314269b98e75f6e22bd2821f6849ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556c9dee8f70c9f8c50709bfe58071cdf
SHA16fd4250aaf575d73c63f6382a563d2b4ffe3b18c
SHA256894197186248e5b32470033c9ff44ee7ba9bf2aa33e0fd8cca1a8d260627ba49
SHA5124262ece71451667bff70ab99c226f7662fa99db35078a7372c2b45f657c41ee0ce7385256bb3dacff7c7ec058f088b518481c0fea30b754f14e2e70e60a2044d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8dd4e148546bb30f4c639b0390eeac9
SHA148dee65b1862c88af5e90ed5c97ffa99fdc97165
SHA256ab20d7705df17bd27578890d826e43bc286495395998f143cdad71191cf6cb04
SHA51292df7d98c04e6bfd455c372708ac45aa63f67970521bce47010f6e9cd36a4a73f3c9ca27138904dcfb2545a50c38043be93051543258df30bed10743917e7155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3ef750a16a5cf9fec583218200106aa
SHA11a4576e8d36c87bab47581451b76f4853a898266
SHA2567025cec4adf26ca76b17ea56fce7ee4eecf21bc154efdca1523dae324df26005
SHA5127c23a20914e526fcb2c789ce75dc99de1d94c45c715686ed725d07f6b8e2be2fdc5ddb8b966cd5d7b21864e2ea3795347ae5658eae72b61b4a1e3bffabad97ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5634152dbc8df74b555fcadbbf656bf30
SHA13d7c6dd0013094b58ace7c5f279f19d36b935032
SHA25645fc013f8b220c6ea6b16ef51f8ff4ad7375a6e8e230a5008dca718b498bd443
SHA512a64a5a7111c83390dc2c2ab144714b22f644674459ac713d7d2c3b64e5590590b01a77c1de0e8113cf55d686e3ad58e1d467a5a2398c5ea56d0cf3b1e02f4fe0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b