Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 11:50
Static task
static1
Behavioral task
behavioral1
Sample
efbad06b0ea383aeb617b9c884dddb56_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
efbad06b0ea383aeb617b9c884dddb56_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
efbad06b0ea383aeb617b9c884dddb56_JaffaCakes118.html
-
Size
460KB
-
MD5
efbad06b0ea383aeb617b9c884dddb56
-
SHA1
044b23cb1176be4fc713b93a3eff97b8fb9e150c
-
SHA256
79ea49dc7e52c6faafe7a3bb224e9c0ef8c600fb891162ecea64d19a50b45d75
-
SHA512
49c3962484d40a33bbf719311bb9385f11ddc29520e6af054cb568cbb197da6505c90f68ce059cfeedc58276e2989ff44b0600c2fed6f870994c62ae76e96433
-
SSDEEP
6144:SOsMYod+X3oI+YbsMYod+X3oI+YisMYod+X3oI+YLsMYod+X3oI+YQ:d5d+X3h5d+X3y5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433081295" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B1AE9551-780F-11EF-881A-CE9644F3BBBD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30d1288a1c0cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000008e2e5ca638b9db8d41acddabd03c49fdd83fa9cb77a2ae3066ee1acc7e52e09000000000e80000000020000200000004d64ee12efafdc03d817b2399c1343f8997526ccddec357c7e1dff4f7298e1e7200000003849e5814c144ec426b3f5932fd8f96c59b2479fd36051a7b535f04b4f0a293b40000000187d0deb7b404b9e81d7e048a36f178e8abec6886603deb46efd48c6b39bf02aa12f048b62895848d6ec9aaff76743fb712a59c5313b05e0bf274f2a40dfca6c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2848 iexplore.exe 2848 iexplore.exe 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2872 2848 iexplore.exe 30 PID 2848 wrote to memory of 2872 2848 iexplore.exe 30 PID 2848 wrote to memory of 2872 2848 iexplore.exe 30 PID 2848 wrote to memory of 2872 2848 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\efbad06b0ea383aeb617b9c884dddb56_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6760f4ae25f6546d0494b94021342c7
SHA177193d3f5683e2b00926738e203b1f211017075e
SHA256800c92aadd710d3da60730e19884a23029bb6d534a006d6f4ce71c926a39502b
SHA5120180ae78c39301bb253060f4b07f127c9fe42cdaab328f0b04230c7c9668cdec0cff1f92c4012087a148a0a0cf2a7c7d2dcbec480ff8e3f772e32895a69f22b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56657863f3cee5d95990be869bc4035b2
SHA1f1162f5f8f70ab35120e7679b8a3a64a850dc729
SHA256c42b929fce52bb55aa94cdfa1f167ed6495fb6f8ecfdf55f1f3e713a12d3deb6
SHA512daf460961239b383d82cfd10f06def0db576a44af576330de2849b1945e00f88f593d5869859ee8df728c89c55db6a570f48f0d70a712307c413cab768b8ac65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d6fc1b9e94d4fdbd552c6bd3c635d31
SHA150fb55a76213ec7c1269ecf9a36b4d32ecd6bfb4
SHA256867c0b0c47c1f64a2805335adce4d541da72e465a6d834d9a1cd5900456ee04c
SHA51275cb121fe6acf72d02d01fe9a080602b76fb77334cdad7071ded8b7d699450f3999953909309a304a5eb2789265ed321ebed1f66c71a14291cf384cc0507c67d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bbe040b7353d2187997c0c3b781284d
SHA10230c40e2724181aa0bb864525b3d55a31736041
SHA256aa884acb4a7a0344abb3aa74471fe4ae67176b865d226750967870d8759ba95e
SHA512d828b100691e136650bf9185cd7f66f65c9ae06c4c3559dbc9a1d3dce197a0f6e815f9404671b4a684a899faa216318e9a9d348da3386670a7afb3e46c4ceaab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa684b2c10dbb6326cb34f61e33d9226
SHA134f287c6b71691dff580d2c6fde43ae1c0483e62
SHA2563853fc1ebcb9d0cbc5e4ecdb8effc9c2e7f82dcd8a5bebb1a37f7ce794b99d21
SHA512afb0a7f25c3ace483f9954ed66daf16703d0cb40a840a3a6b0738eb83615edb1bb82620f8009a5c5a754ef5dd2d69ccfa1338f061f7abbaf014799d94e0d1fed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525b36edd50b07818a464fed76915c301
SHA147b45add2ebd712ca0d72c7259320ebf0eee568e
SHA256bb19e41729dec4b81b46e92dd67abc183eba48b08385feb10700fac2b07a8bc4
SHA512695cd5016adcd983949ac1b37d307fa5f22c15292d10e80c15fdea954edf16a393fd996a123f2a6dd629ed995c001f094a8d86c75faeb0128b80f0f09b2fd54b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5684c6d5e2c2c70848055cc46f0588b71
SHA1ce291afb1b6c92aa417d5a7d9d3f8ea9db708cfc
SHA2568d9e0cd9d62259e743a6bfe2d04f6a4e7bda59cb954be5edae40bf274679d879
SHA512345bd261ac0678ceeb52e17cac93b0b953b6f76fe2d1ca30b54734dc750b42615ea723620dd8253d37287e73b220160a993be20dfae6d10bd329dea7ece6b09f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5463db37bce71c65c473ab6de2d1ff7ad
SHA1f55ea7239635b21a87a35521562d44f3d65803f6
SHA25696a15069913dbbd7df64c5003eb4234cd818296bdb38db05c65b970fc49063ad
SHA5129cdf35f4733dcf2a262f1831d39be4d596e2e88ef452c2006f38a89b1733e71e3168e370471c9b9205e411f1d3c01665e164fdc6b0de53f8267f7c53e63a1f7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa3ed321b6e794e834cc1269a24bc1f3
SHA10cdfbb8c2ba233327f5fc5379a39d36e2eaa6e36
SHA256561cfaeab25cbb842ad05474ab8c0e15dd82f30874f540f1559edb9682fb3d78
SHA5123eea978285015361ff23fc467955041dcc4a49795025bebb4028446b84f5f0b6a34668e0ba8b975fcd6ec91dae6a0d3a3219432df8df395384d31defed81ddc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5897936c5240755d4201e1cf9df719f80
SHA14f62c17ffaa68a92d04e15603833c093fce3bfed
SHA256db61d20092f5076e9b3797108d2e9ebe5a678298f59a0fd2656f9e430a1571d2
SHA5126070c894efb4f022969666ae77e986d196c1668098d9930f14ff66fd27f7b2a0c1c98f436c21c414cffaa485b8f00a885d3d3eed6d2ecd6b362de3432f44cf11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba63b9911089e5e93ff3202b33d8522d
SHA1a48bef7bc8f9e9f26722d7c1f52f2e7ac7277722
SHA256fdf4dbb9c3309d326f37e111a42b33d258e895a8217c9fa1d9b532f8c6b4e40e
SHA5121f9fe70d39dda1d53ac1b676d50bec709dab970fd36339b62aaf87a0eaf52a2b741d004a77365aa110e99b043c682d108d9a082941cf98770902eaeb1f11c6e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d722c85cc3885055f5fd29f4522eec86
SHA15aedbf9238be19a7a021b51ad7e0d4f1ecbb3976
SHA256c6bd31a24d5b009b5c3ce16254ce432694b67b0f40184bede6b579b52eba7521
SHA51282412b289a2b3c88150d22b998b322d0926605cef6be4cd3cd1973c91c535a1bd261a27bdf7708a7ab2382362293325b246207ab79488686700893b8e039f8f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534b48675f791a864bf0fe6721386efa2
SHA1a802ab59a392a7d62231af237fde26eefa9e484a
SHA256bb2eecc7346693f83857f0f6a4bbe4f241138ef405b92b8c04d08bc448c9f19a
SHA512d7c92f2a568ca5ed659ca43c1817f491429e0dae6458824703faf36d270aa949288467d75fd1794c153709d289678eed61cd1ca39e9e8e3b4aa581759004bd95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad306cd8a27e0c4557fdad76c67510b4
SHA1575a0fd9815f0dfa53dca63dcd04c1f77573a79c
SHA256e356afd30455c3b72f688517ce9a9bfa089c45cd5f884d81fef2fd33b1d76de4
SHA512316cc4bbcb259bf27bb8f0134c86634031c977c2057ea366ab639edb2a1c2a2203d89e9269c4b1e0d8dad993926627b5d4150a2a4526397833e507ae00000197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5656f9e82485cae463ead017692e2a4da
SHA1be43911a7058dda1e1d1090af9699dfb13f1aba7
SHA256481a50d763fab02268f9fe79c057f7840004ad6249bcd00a568e44ca40df2bfe
SHA5123b086a4dc8d25c3a9a311a4f28c6f260e5a47f21b739db8039aac21ec4c1b5785fd397e2285c47ca04db7fdaf53c6bfaa4c3797dfa6795816f57bdf950807086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de07e32ee6b939833884ca2673229193
SHA18bdb2e74aab6abfcb0c6593a1e14ffc833de9e07
SHA256348dfb0e7f7ccdbda3fd49f457397a033e30e13d0059f7c90dd084596a93d986
SHA51200e774e04f7e98c3ef109767fd604b94b7150f12c34f6b0472c61f220ce39217be2048e5935f52ae01770ee84b71e14ec6adf21f1095e974208c2154b6211a8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d47121f07b073daa3f1eee2ac02e5919
SHA1b312d216334efdd93da79a366b248a2376179dc1
SHA2562339462a4334c1385634dc85da2f8d50b30ec2fd0b549e871f7db26357b6035d
SHA512fa8658adfccde1595d0255aa9ecfdef4e591cf05ea1378f03a1fd5c301167a41fd3076d6c00ffc7f22826a6339603e4c6c62770f54313f7abb217f6748277157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574f593726891fb13685c81f86b397106
SHA1c031858aa652e62eed88d99ac5fb278fd64d24de
SHA2560c1a0571570c0f2b591e9fb73f762311415cdba603e82da9e026b2b94f4e174e
SHA51244da00df02afd4f4e7df6619564032685955fc3427e08d4ecc7540e5b20bdf98bcd4e3505a80d354c8256972ba4af6a66ac71662c4333674ec475bc711159731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566b88a2efa98ba3166ceaac0fbf8e7fd
SHA199233bac1d5df3fa1cdfdfc126c6bde6877b3037
SHA256bb6a772ec05a3199b14840c13d8e9fa65b566d0dd79566cf9835303c000cbd44
SHA512ea03c0b943f00cd55c7d6f0d38e3ff8e710b75583ce230528b4e2e3ce8c6b2c87d86ff200131edc7d3c2b5f989faf7bb00d6ed5c16aad836a12e1c8adc8b194d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b