Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
ef9854814eb4a16f6a90811a93c635bc_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ef9854814eb4a16f6a90811a93c635bc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef9854814eb4a16f6a90811a93c635bc_JaffaCakes118.html
-
Size
43KB
-
MD5
ef9854814eb4a16f6a90811a93c635bc
-
SHA1
a87ba207d95697447d6da12408848349acfe2f65
-
SHA256
87d364a188d3844cd7f88b8418397ac2325ff5bafe9391398255f722f73a36a2
-
SHA512
4179b5c23c23ca714f830578a1ede0de3ab06da598ca8e29950c309fa7dc1eef97243faa36685b69a0f2a3d9bb0e2fe44f16092bd75e0602913c535a42f46466
-
SSDEEP
768:2/ZjNv/GeUFJdWGCDE/pTgWJYOYEdJrJuMsThw3S3maOs2BiT7V+uUH6cLhgoNi9:2/ZjN2eUFJdWJDE/pTgWJoEdJrJuMsTl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 907df2ce100cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000f88a481c05b4090314df0c519bd99f09ebce1ab819146e06342ad7a8d787cbeb000000000e80000000020000200000005f3be135c974fa4ad41638611965fc604e6921c67a3119a43f12821d7679d97220000000493f4c1cafff0d0de5e288417b17c4d493aa016d2fe66031f313450119d5ff2e4000000095ba0a10616d982a264c08d6b46c17879b98b6e72da32f4ba39e13f9198f0812ce1577be82e6b8a59181e185ea802775b74f80617efc26cacf70cff0474318e4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433076284" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{06E7B711-7804-11EF-B557-C20DC8CB8E9E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2788 2196 iexplore.exe 30 PID 2196 wrote to memory of 2788 2196 iexplore.exe 30 PID 2196 wrote to memory of 2788 2196 iexplore.exe 30 PID 2196 wrote to memory of 2788 2196 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef9854814eb4a16f6a90811a93c635bc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e50f25058d8b92798530b206aef91aa0
SHA1a244990b0becbf3bbaac6f8529a57d7bc91d5048
SHA256d285678d9015dd05284cdd180da289374d82d1f883adbb681131f2f722c27b3b
SHA5121a96432b7106b8ece7c2e589e1d3a95086216a436c70df7969448d0513dbd9046357710f6358ce7bb92cb699295fbbf7f5dd7ce8404b11d1bfbc2ac474274b93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad06d942d30783eb6fbe623e8a3f791e
SHA1b0ac0ca7d305d9a3a0098c6744fd597fab5da22d
SHA256d54a422ea0f54a2f593f726fe53dcb7a18a1c18cb6a7df04dc086b9efd01a242
SHA5128a84f9cbe56988dfc5997cbc6bd05838fb3035bb45d9545d4f58925ffa6f866ad62feda30a8deca2052e8126d133cf455f1ce76641615b1ad6f8b7ed64352aab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b0b286a14a13e3b5706c83908ba8b91
SHA124a7017e76820f748581597c54fda3ec3f7e0b67
SHA256c5d77bfd2a7f4b3b6d6edce49fa102b58482e2284d394271b7661e3685a513d5
SHA512aa99bcc1a28952c1ebfac46b9322f6a251e29eb4970b91af48c74a023c66e626af0e2e5f8e8d9c6a10eca72fc11e20d8c16fb228f65fcb2b1a4ce6be27e6726b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59487739bd7f7b175a674de33840fcb52
SHA1e2787b616788f0fb4a1f8c023cc0be52858be849
SHA256a75110b17473915739522a23bb2dc85c2205b57bcba8d2d7fdc8af3579335c75
SHA51209876b9bde8b5e0e99d19f8a89f2e2babfec76d4d88f8ae035ed7c97e73d7421635f08f7af438da1b96b9af08ca1bf3dde91c7463d4682eaf6250055053c4ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbe4faa47f70b6242f740642c54344ae
SHA1e7a9da4a6957f7ee2e77fe6c0ffc7824abfa3bb6
SHA256aaf5fda7180d5ab8043f40127c02ea37f0328829c2b4e8daa1d791925a6a0202
SHA51248f89b72c2a70e2589d079c92ed80999fa47ceace2b3bdf2dc93329d3863f5b97f840081c683636c0fa495067a031b6afc289e6a8fd59848467bcbb484337846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503cc0b64db67c75ed9653b4545fb9f01
SHA1a5c2901bbc61691d47a238b132c9b45901645f72
SHA256b5c81caae34a432a8ce337487c4582e8d4ddd808b12e02fcdfab87a6e52b72f8
SHA51249f58f24455fd8bd3403cfca0f0419dff4005a62bc847902e0974d6380f0b0f23276a779fd57418b3498e0c5f6a878dd9669b254906efb7ead5e4c5d7994fc72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58da80e75c76bf09a28f8f9174843cd72
SHA18db402d8286eef5d1eb9b406b4f202909a777e60
SHA25638cf8caa9731af218a8b8d28f2ec3b45a11c0c726f4b92a251d6a958ea92f683
SHA512503297a5ebee3df61cdd34156929567ad47aa49853cbf87895fabc79072054f12b39e31c3068af99ed405d522727020d964fb5d29ed99b9ef657244f0b21e337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d0ec9a31b37b2475c28525df217fd50
SHA1f508191557886a31deff2f94f67bcb8d550f0a97
SHA256e09a8b6e62ec338864ca54e74bc30a554613742e21ccdabb300a1675710700a7
SHA5121fb511b6a319e4ddc1924a56e933c57ce2b78078bb131021c9adf12062f6eb41662cf45b2090cb8d90ee2bd6217c5146144ac7aa5e34b3ea60e83ff71a778984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e56d816f0092345f40532d2528cc43bc
SHA154f0a190f746d016bf9d0ec3b59fac5680b536b6
SHA256877edf22e2b6d4591ca67d77074caabfecabfe61e6c3f9c7cd643b7b34ec6bf3
SHA5126b4660044851687f3a59a8a299a5b372fe56411575ce293352288faca7da402530694695c05e9e628e598c43a7fe99462025d1509a63c29aaf5304234ba1dc77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567fc143b6caf9093951a1276e5bc3b23
SHA18525e2dba441509662593c2400463b0643233b29
SHA256e7e82ee0157e721d7460ded2c9667ff85ac0176f98aeaffa435fbbb084733782
SHA512044d5e7b4869a2b7607ad61e6790ace8a949c468281e9d8ee79b02680c75583f8f7e24fb5f40c46bbd6349f2642fd4300fe56c6fd825f473ff591eeb536b597c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501b0b44a75632ba020e1bb1e3e9d87c4
SHA1796329ad0a3c8d1d7708e00cc0dd1e69b1110fad
SHA256f4a9507c454857256be9dd1b04ba1eea4e74b438cc6a24a243cfd5ce09a9b219
SHA5120b4bafde3db2ef5354ecee99fcd8112d4d68ad35c125ac64879509a6de6988f90e82e73ebdb375e7635dcd86f77ceb4b21c7c245c3fb474d8d4ffefbc808e54e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd2e849db55abe0f31984ad79d2c1550
SHA167d5d264d392a3202b1ed50741062328a2dfcbc1
SHA2564e4f3c2e0dc46059e67240ba13e40f44bff8e9af36a4fa4c91b52b350a2d4b40
SHA512a4a5725600d5d67fa45a5f3a8a6f58c5bf5818065156a74f827e68ecf5eaab9c2b20efc07a2895d690b0844324469670a6a28923f2d33fd1ef1ab5ccd17cf9cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f98525831ae98f6fe5cef76ba7105349
SHA165edd951cb505a9c4bf57232cb69b7df134f2f73
SHA2563a4a8032132fdab0e973d28750dd8b4a368343dceda30c4a2e2a0dcb3aa7795f
SHA51207d91147daa9496561ba52b4ed6f77928f7406d0f9b08db8b7fdb4b45c009ad962347de382973a9e2f03ba0aaf7e052a5f85f5760a3c1054970b9ae4f859f4d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7bab4a45c822b3538b7972a0581feb4
SHA1b57e88ea651b263a72a9647c29a24c2018bf2648
SHA2561d21414cf8fb2fd31f0e90cac891f2c6e5ac32cf6cf1a0bc1636f6347eab4f7c
SHA512823c73086763871f6a112953c6320894a0052669f149a25a8d780e810df3628254d2b50d4edc4f716e6cfc95ffa19294e5fe64a76bba3281a165f861ae066348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550b6e04e33af88d7a5116e9adcd12ba1
SHA1ef616148dd635242d11be76ab15d3a15a2069ece
SHA2567a313d71034d04132a8c2e85cc384be413dfb5a3551eba158760d872c4298afc
SHA51279c9e52ec7509ba5d3d43db23154dc3fe3e4805dec72763bed24cba67e320ee135c05c43caf59e4058f0380059faeaded0b64a176591bf0fdeea53fa9202accb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0bd71b6f0a2fc82cace373030eee3b0
SHA1a8c3e4f6847c7563e5f439ee535f94ab35d24bf8
SHA256b626937d04d6a40a4e7b6931c6fbf56501cf77d8e83aed8f8d423330dd728e85
SHA512a8a70b240c567f6e3da4ada23bd5c5ec8f44e02eaf228245df9c42d3b0c22de2dc7e864e1d819d829f7cef1d1ba6b6f96d3bac92cab731f2c507ceffb054a863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510c6c6a55dd9a4379bd645eb119ea7fc
SHA13d54b4512e14e23eb759c8c00bb28df006c622f8
SHA2568b3151ee6e9f060c1aca9f370ae22b6d2260a30cd10e49ded5891a6f1b663545
SHA512f4c75b66d4e0a83664dea5a89d4f4e322e6beb1ae2793e5a836a6fa48668158a0145648b4911a1af447f97a79b6452bf40c0f8fbbfbbdf7c8d9ae6c4523e43dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bdc9b3dcb88aae8f3841bb30790dd1c
SHA1ba01f32125886d87b43e47e24743e1c6c33b731d
SHA256c24be8ad4d2e3918518cf43d9273fe4600d4202c52f02467b9ea976ebe96c3e1
SHA5120254988ba320a51a823717bc2995aadfe4fccb2850d74b62c72c1d0fb189c555ead8179c7e31989e27e978665510417503705e7929b2f94c5ce3360a14993791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffc63f5084f0620c98adc9df5d7a4164
SHA18f6ee8c0d9ee6afc95874352313fd3daa3ccdc52
SHA256874738b9f9e390db63d8276335ecffc2b2db40e0ea5d57ab6588e1f5402be86c
SHA512b5d4f3d3a3b841d99e47d6860d1d1cdff023a08919fe1b74c3bb04450ce7aa14b67c5e755d5c0407d588937cbe2bf964648f2eb01d45a0a1e47969c58f80b386
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b