Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 08:14
Static task
static1
Behavioral task
behavioral1
Sample
ef63e51453a82b7dbc5570afba969c56_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef63e51453a82b7dbc5570afba969c56_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef63e51453a82b7dbc5570afba969c56_JaffaCakes118.html
-
Size
70KB
-
MD5
ef63e51453a82b7dbc5570afba969c56
-
SHA1
5abd83d3fab48094251ae29e867fd0b90a3d5248
-
SHA256
5eeabbdb0ef1145206cc067c7fa9b4dffca31efd0d8b0cca2731a798056c4fba
-
SHA512
9b92a012fc2423c04c5d05f845e061d001515c0b6744bd7365debebd3c0437d16b780dcfce3ee4037aae86ac5e919c87a792e551e7577c14f42710e36edb2e9c
-
SSDEEP
1536:JaYb6hsrX+sRdTTNen0tbrga90hc+NnhVJ:JJb6hsrXzRdTTNUq0hc+ZF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8F161EF1-77F1-11EF-A8AB-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000001717a3e432b84d6f7e4482a12dc1ee84c5ccd7d739c5da6236a446e413146dcb000000000e80000000020000200000006f68c3ada96a711607e0c70063ab9149f936f22276a1a2a7f1b6fc7fc72c598920000000099c418d20fa1bfb6761537f7a0c1ea58b329255dd695e260b15b6907c3a9896400000003d6b73b1f0447dc5919c5aafd92dd4a9f10b95eca327c55992d334ebb4e7f26b82e56dffe356bc8a1d931a9a5540fd13809dbdee019cb6233e5cf1515c336ebb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50563f65fe0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433068351" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2092 2860 iexplore.exe 30 PID 2860 wrote to memory of 2092 2860 iexplore.exe 30 PID 2860 wrote to memory of 2092 2860 iexplore.exe 30 PID 2860 wrote to memory of 2092 2860 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef63e51453a82b7dbc5570afba969c56_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faa439740e65d88963368632c892fb6d
SHA1637ca55c4f0966e0958f65bc2c5f4c7e4f9b6d52
SHA256cb2fe18c625b39fcfbdc969cf89b218647080b73857a8f00ed0cf1445b9e2e97
SHA51281ad96df4cdb7309ad391a2f13acddec71ba65eebc41f4f842f9b14779f56c2b700621b9458ca249879403ee3ad711362b2997a7d791f1b59f1c414f544c6bd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e109ce853df337575d006e0b9215becc
SHA13654f99b54605a879895d6f9b5895a6da3c35119
SHA256c5d73811e40c7a9c4eabea18e045312d3296a545e992f663cec8c82dcdc9ef21
SHA512bbd27a7ecdd99aeea86dfcbeaf7f75270d4445febd8009f15e4f9c5dd298f053f0500e3cd85ed212b90324f976d5b669fcf3a46eb1ee32eef9b2e2aaccecab71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533e2920298752ac25ba3378b8619f822
SHA179ad218e754441cbf00abcc9953388a4741b0839
SHA256bbdebe8306d9a3dd258b44592e226756bf4848c0c6fbcc900c564723cf796a65
SHA512cf8362d05b3f929c8199c0f838835f168d3ea86cccb4bad59f51dab0244dab32621c7d1cddde83db8440766401cd546f344ad9df9a9af7af45b9df7fb70e09a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5ae4d46ee6f4457b415d339c7b3501e
SHA14fa08b622db9fe2b0fbfdb9209f047fe00c05928
SHA256ac193daab90364370d5342688c46f6344fec80e5488c8977e41191683d5ab828
SHA5121db9fbf468fb712fcd93c57232fd73b55d40df7c4b451318f78f7e5a465233e419908a42aaa8b386d65b76e48864e33952e696c2db7c0ff61d48c0094fa4323c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c849877dbf23d51388a7c0ae559b566
SHA17bc3698b71cbe1ed696f1076c34ed0b23f4f5ddc
SHA256c013e3a0ece1a207c135921fdb277aa568e86e9e23ff11a3167b9ed707d9cd17
SHA51264a7e6ef6e41acd6a07a438d874f8743463153fa41ffce3b4503b67506550c17297a258e1206fd73aa05b082da46cb5e856820741df7e9cf5aa83922ede648ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4d10aecd75c3f54d7d18faf04c7ec9d
SHA1f3b5aeb1313bedc7a86a8d48f4567361a4b1b561
SHA2565dbd053d33628d2d4c8f9491009912759ac7154697b8f1d296fe7f46e6aeb0d9
SHA51251f738c65151d072c65639ec92c7df0034b2b01a2d85ebbfc4aa3e21b934334af01d4be5d9d52b810ced46999db35769a984145b2d30f21ed8fe5fc7e5cfeccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553249c2cdfba31aff2425c6e07e1c119
SHA18e8febbbfb9e49aca6da04d6be241c7f1426afe2
SHA256faf061f15f6108c20c15b7b5b6c4b0ea318ef0dd92a4748e83b4b088094961ef
SHA512c1bae2f384944115e6ba40f8314b66d74c7d02afd567fd627fdfa9729108fde3748d147c503f3cd59443c447e9acd158ce79adb219b654e16571cddc2bfb2820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50675ddcb39b0b0bf181b4e4bb85eb34b
SHA13c8c084c921d445fec08db477f7cf46e3007ef75
SHA256ae341009a523ddc3aae4e87b776e6740c889e06ffcc2cd33b18ec829d2e33be3
SHA512faa9c7672f024247d6475b73499a1ec2ec4600665f72191f0b34a9183f83d333e9439bbfce3241ccf3871f873153dc0cdfa815a333cb79a3f7caf973e8d2ab78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518f18f4ac08031a0b55fe9f27ec42c38
SHA12ccbacd49cbe195d28816d5d821d26d279944278
SHA25682a679bf3cc1bef7365f1f09753f977a5e87f325a38296511b6c38f8b1cd5655
SHA512916bcfeda89e9eeb9108195fb83433e134e91493023d219c5d581fc6918309ba0e9a3ee26db2787dff8f3e129ac29dfb44bb8064aaf7c58991471830667bc6d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b12d4b62f60206db5b99e2b034212457
SHA1270b4c1c60ab4ae1f495b702259047943fcc5e02
SHA256e0d21dffa3f632ed4630e527e97b62f0f6892351dd49557c5b8e0438aa4067bb
SHA51218c2c4e2b0ff4fbfec39d267a5daf3dc4b2136779af81180e1e383d6b6d8c1bc34933ca22d7534c1b2977e1e1f23ded9700c64388e7fc14084fc9405d7a0fa00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505062f0eea1910dd66bb52e07750b48b
SHA10b20892cad4ad02245b0e0f6f9779c1852cddc66
SHA2562a9dcb8a5036778c7e0cffe620f85c5e02eed532ab6bdb07309296da25fd5862
SHA512c7cf09622a195213f9c5552ddfe51b1c0f9b19369539aceb3712581419d2472416effbd35d0462519a991d63a1a7b47f77d3eb5775eaeb439b988f2a2874ea6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b39b62eebba9f2f43b3c8bc924389e2b
SHA1d0a09a2f9f8f0956f074d75f1d08addb505c6e89
SHA256c0293761c79ab0818cbcdaa5c6864089b98fd77a77b518b17dd696c69447376a
SHA512c91283b62c90d1765dbd9bdca05a5627585e73195c7e0969e8a2550aa790bd844218819281d3420a28965324c682ee5503f060e9c1a9a858e1ffd2d481b9d3df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3eed15cf01be050872ba75d65af5146
SHA14656244b72f24fa6f8265cf07d2107e51645cddb
SHA25603b3d461e5e63346d9b56743bed5a49b9ac62d64b01adac27c8e69833888bcea
SHA512f55004b3cc4c6d0dbeb535bbc99c0b4828f2b7adc588c0abbe5a95b706109b17a56d7a651f4b774d43d4b6001660f5b113912b43ab2ef39d1bb9355072c98a16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b1f7e78bcecb6cba33d99af4f7dfea1
SHA19d4e0a3df2da0e176b320a3f3079288b16f6f7bd
SHA256924f0583f1c3cd32d09828d84f574f209ab94955095ab16c271cfd08f43a2fb8
SHA512e3e018c76f115405f936533ba9233f1a4db0f0457edb1698f5e88ba93af6dae258999097f32251c6caebf0e1821fd5beadd291956016b03cf7a8776809dae73e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528326004373668838767fc4c29176832
SHA1c798340097f72270de88fe26e8b84086cd480e6e
SHA256119f20ac8e2e160782ca1a728bd34dd6754d3b008fc77b575e1645e91d703f68
SHA5129ce164992200b86b313e8b6e8252543c7b512c43c3949ccb1b571950f3465112a60cdcff81bcb9fd49600ded52b1ac355dca297d9e59aac63bf894df399695c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db46859f791fbd06501f65e035f73f6b
SHA1a045471600570cbdb0208ddab0f31a12ac976fbb
SHA256d18cb2690c644601025d28090dc13ce50b8e5104f4229cf9f1bbf2db2777d51b
SHA512f18821afc1dd603fd8a4bdd8a8c602243680a37286fe4b8b54eae690e9af070207fabc38b477c6e0613b55a94346adefa71033353fae821cae2b453e13ed9bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5604de144856005db5b54279b75460a42
SHA1055c876a4efab1fe1cd0933c22e797fae89517a5
SHA256deec95b5e616fa60643a0b4b467e5829678ebaa3a9f82e9b18c0806dececee3a
SHA512308d1ecd4201bb4c08f31b0259f3d9d031340e32961b6a4841638469e2e283a9ca20c454cb2a45a696be9978d704d5390cd3dcf23da67598e7369f65a2d001b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a55d43a046dfd41a80238580e9c59534
SHA1deb1a2d2ce2db848fff3540c631f4cadb2c61a84
SHA256874fe165727d4b46087266ebb293334e36c26648e21db04f4ea95e341c28b11b
SHA5122fc70b55d7937a9b69a90b2f459c38069afeba47e147747986d27d05275b37b6c9181bdc85da0c5c072b2cfbf69ef5c0fbdd45306f4240f584bbddc105890966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53876a339842e3680d00f0c66577cfc82
SHA16421d2aca576bc30ac4c28c326ad4f48887166f0
SHA25631b924f5545327d437b4a37b8f02252e2f8153ade983700010c0e4b8e718d1a6
SHA512ab9da08e5c8581ae47df2bfc6e2f132139c5578cb6d1308b80344d2fda7b57af4bb2d1920d19333b69939cd659d8fcc5363f7a22e15fb25ada8772c1e8b8e77f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b