Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
fb21474bb7df56cc613c048df7f2b652_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb21474bb7df56cc613c048df7f2b652_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb21474bb7df56cc613c048df7f2b652_JaffaCakes118.html
-
Size
176KB
-
MD5
fb21474bb7df56cc613c048df7f2b652
-
SHA1
a3674feb05563caade43ac0bce586d72f0ce6c97
-
SHA256
d3de0e82bd66141163fc37fbafc538feab4b09ae3854e37f4363fae8d3db1b49
-
SHA512
8918e88bbbb9bee0180e8c57ec9c86fb5ac2bf463d82e299bf59c0ea17e247fb5ca1a7aac47a7772b80885426a4ef37890ebb5f19ddd1a7d079313e41b872dbc
-
SSDEEP
3072:SXyfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFiM:SisMYod+X3oI+Yn86/U9jFiM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90f46d643811db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8FDF98E1-7D2B-11EF-AE85-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433643020" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000086a0d62c71699cf72df35fc3b1e52465ef6234df55d69318e0d1255369408dc9000000000e80000000020000200000004eaea1502b93b5b9be28ea24d634a1e227844289f0b0af288979b6ba86fc989620000000d852f0d3ac68c8a241bd7994d28cb0e96fe9990f62ec26cb90d9af4fca69c257400000000d4e43552bdf0a1a559a5885c344638894a6a59927f274439938f346452c408e1afd2039ee9402c1c90a7fb143d58d183ccbb58718dd5cc5cac105ebf178cecb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2888 iexplore.exe 2888 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2744 2888 iexplore.exe 30 PID 2888 wrote to memory of 2744 2888 iexplore.exe 30 PID 2888 wrote to memory of 2744 2888 iexplore.exe 30 PID 2888 wrote to memory of 2744 2888 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb21474bb7df56cc613c048df7f2b652_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e12321fd777415070c775332a215b70c
SHA1ff17b282887eafe9d5f08f1b5ccbf36317343d83
SHA256247193eae83ab05d4553270f29e1192752ca47fe9bbdb8ae47cf353f6b933e53
SHA5123a60063551855d23e1cc0e3bf0313f9385a6bfbde574df2f14c418be91274fd9270f3d5ceb64d8affcf8c9613482b31f4d796a9a811b964462acd624402e350a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b87c832b4de7394ccdf970391c000e22
SHA16abdfa8eeb6def75056a8d446e915b05793ef2f4
SHA2569b4ca5090eb600951fe9c0192fec67a6c4f4500f968c162b0b1ef09dff244209
SHA5124812d282fc585e96ca4b6ca54c772d2cbaafb88bd27ebaa0f8bae069c0b4404b07da8be3f59d849787dd506ff2647bcc6ef47a34f4ab84332781a0eb78eea28a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ad9094aa75346a4932ae2564524e91e
SHA17d184368367612a13bd16c2dbbbb832632bee05d
SHA256e125430b2ce27dc864216e5f0f2636c9645258770401666492e72be9a9f8263d
SHA5123eed5b4922b523a64127e94310bbb4dce5285491668a93ca1fe5598ac47be95f399b3b62f9a4caf2e06c4561930ed9cb479dad5dd984db821736f473c7d6fd73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0bf101b0ca981a31d30c3b270140128
SHA1d06787d6d8f0bd24a4236b1c31a2c4fbcd5012ed
SHA25621cbeaca66b710a633474b7b7d23e19e86106a8180298854552c3f81b272bf51
SHA512dbb26b81bab6f6e99b409ce4e1821db3aae06634357b6e038939777c68940ae86c55790aaeee3cf3dddad8745bc91cea20a9748c969efed959735777182627d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59927f3d0704d164373eff9116ae7efb1
SHA16de2569ab9c2b82085a13d008b33ff2c51425551
SHA256757afae49f610f67ea9534452acb34c45a47fa9a94cc16b82d5841ee03b2d52e
SHA5122cd27832de988ac46fb240057bacc01aa0d6a390eace4c66412e42ac23377474810968d72fcb6a3905bea48149e82ab01b289b76ecd7e5cb1b7212abc19e3d52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54050d92dcfdf6c510afd9bba89404ca9
SHA12e28e4aea018540ab1762923c9636cefea6c8f78
SHA25646604e8f8659d9dbb11466c9e1da58f22db1c9e8ffc9bde869449814427d136a
SHA512678088d95b0086f28bb45d4390bee73d6d657c32168eae2110a852efe2526f017474414ca10c3243972827a48a177d2e71d50e2d69dbbfaff482b1382ec0c4e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e53dd53ec16380334ba3ceea8ae9106b
SHA198245ffddbb7b16b9b0efd3763f99ac8599a31b6
SHA2564862502fec0b4bbe376a1f607d8c6c559a45f6867cd5b31e67d6f978a163cba1
SHA512770875ed0fd57e51df24509d4358ffda19f3f31d5f83d16bdf640128eac2d604d638e41159926ca8f5aeec9fe71a6678b70f7df1e5ca5461aaba129591105381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9d8b14f07c4d6e0ea2fa26ba09f833c
SHA191262e4a005f8968b983b29e1e8a2c64b3f273b0
SHA256ffd3ec1084d31dfde79be19ddccf3c79cd2d60a9717fdd0d8fb669736269b02b
SHA5129f861bc0a1f1055b7013732ea29ebedf0f28610e38efe9b382af18353c4badf66dcd774cc73110fa6a8e8b4d0cbc30549d2cf9487c0280f29982a953500a19bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1c898cba4dfcd7f58779a4c05e83278
SHA14edaf2e962b8f4c3bd94bace07c21fd041b305ec
SHA256bac80ee481df04d6359f8ff363bc285577e05f7348adf45faa08d55b1e8201d0
SHA512bcd61cba27bf0998efca70512f9ab7702451413a25aad4c6a49c663ea1bedfbc9d0396734e352af21865e7382f6367c62365906ff5a1031fe553014d76965d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3687c9f281cbddc4bb296864a3500f1
SHA13bbb505d3f45228a93bc69885aba04fa5363a0f5
SHA256c7b3f7348412c4d95905ec77d8436a52f0e98c029f07991406bd1f8d459b9c04
SHA512843d2ed075a9c7448d97fdf9f6fe927308d7ce2dfa845f62f91d3352b344398b4d5f0880c40146ec45d7dd714199634a0fe06d2779422736a61951ac134e1668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5864493f94d525ed8f37b05491d66ef11
SHA16c35643db7df12f37804bbacbf9b8a8589d94e8f
SHA256a26979cdece46a0aa630760d3f46bd77f2ee9e6cc3c0faad009f1971a1c93e5f
SHA51279fb23bd352026f799595cba922211efb7b57f4f30a979ed274298b2b62bca04e8cce32bd408458514aaa4151eab51e728746c76c517f9c0964702009b445489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd262bb87bffcb626cd1ede7aeda59b0
SHA1cfa2fbd104f5d23cb52ab7f217f52e0f440edd12
SHA2565de68283771545974fb025bc7c569a304cba631e1962b5f049413b32bef0d018
SHA5126b448f4d5e6537cb42f70612084ffebdd33dbf9e70f3865c1b17f69ff3638ba603ab48baf5b630de0f9353ddeca9cbee3f4ee1865af36904c13e23414ec40639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514c96075488559d5e12923f261f77582
SHA1a58b8dab605f297003e93d8d24812f25d3f87f05
SHA256c040d6082f5388b7f56438c9f6c717919356b58d3fa22135588a3376a17544b8
SHA512a7bd7c12ab0fd8ecded71793a171449b480e75c0eec10a3b71cfa01cbfe59018b3069cee809c4775f9b36556d1d2c22259403b2bab4451e25dce4298e4800339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afd54adfa2c0a619efa4340dbfa213d4
SHA1a1eac1e88240e24b9abd4d82c9fcbfdd38d032bc
SHA256c03e94c2eff05f42743e823016a15367cf68b7544bb2f3071cd56065a8f8b3fd
SHA512226bb434d7434a41758b0a52b3f8f2e27541087927d195f87f7308758518cbf6bf46295a2f2b0cb675d2b7a35c862e176a7e4d5a378eac59518fb6eb57f3d3ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542d6167109f6ffb6effe5bd7d6797e83
SHA19c1e9d54301110e6a78df77f9db391b77f46e69f
SHA2564958d946188e7ec4969b285a5cb96068fbafb115b8cf2bdd7c152d36715b449d
SHA51240696b82f5de266c72fe3d52d91adbdea4ae52547880b6545a6cd70c7a9148b4c3f6075d534e643299067cbe43114edca682dc623a194628131a02ba4acaff4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f212850e633a36ef71da81c4ac876f41
SHA10d49b0e329ab9d412cbd5f6be4e21bd6c2433c22
SHA256a44d5b993375989efc940236cebeb855c976283a2ee86bb1b296077d565bd2ce
SHA51294e64e4de6a7ca6f2d24e9349ff235367c85ce01e60e7cd0e7ebc837c8b8f5c06b714c5e9601d43f3426f50ab240b97c1b43824757f720ab11454c76bc64b896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c58bbc17e5517a32f25e1aa3fb1290d
SHA106c1452424a0c49b61e1bea1b1b5bb08a338fa0f
SHA2569d0790d92655fade1f0ee853a5dafcee328dc4b38936933315f5c5f1f4c2d549
SHA5121014e3106d3b68bab75248e9a019f209bc4946982acd4fe34ec213239cf4db2dab594b414ac280eb688993d34dadad8cc5736289ccf3a31440656cb076bc4869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557259f9e96f5387d964f269c5ef1c6ca
SHA109ccbf4a5a19a279e2c58724e460fb65063b3393
SHA2565fb1ae88c319947a07409d1272bce6dba03bcb56ca285d8a5cde70e5f022ec42
SHA512cc42850e734652a620b5076fcb7b17f1c8e674b28c3b93c326a17885a51038e6cd094ebe7c16e49e118000856227d4df679dee66082cc5115b13ca4d2b65f9bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536f9a3da70c2edba239de16d6e79a1a4
SHA1c6dd106727038354f272f311c1140ecd29f5dc1d
SHA256ec1d8b4bcb12cae19a5baa8ef2fcc1f9519ed224627dd37d60af38c0b349e95a
SHA512c51d95e43b46e1700f934d46301f327ad9dd2ab7a55eb56523359d1e82e3ecdcf96b7d1e11392ebb709e57f3a16fb100f060287815a399e08d7d550039175f3c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b