Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 08:19
Static task
static1
Behavioral task
behavioral1
Sample
fa0d9a414797f6fd43db1342b9e4c0da_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa0d9a414797f6fd43db1342b9e4c0da_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa0d9a414797f6fd43db1342b9e4c0da_JaffaCakes118.html
-
Size
231KB
-
MD5
fa0d9a414797f6fd43db1342b9e4c0da
-
SHA1
c343b5ef46da874ddcb37357b537dd9021848607
-
SHA256
f8b9b3cca2dfcb2c7c95b537e1b240d3f489be4043b327d1caf04fed0fe3d321
-
SHA512
ab00e1eed8e667cad47411edddfa9ded5d2bc7a19fca00738ae523c0fdf771c9d80fed2f74be040e1efdce0c83ef1b1274e7feee779c7e8f52fd0369cb25f703
-
SSDEEP
3072:S6fMvWPMO7PMRNpyfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:S6uQT7kRNMsMYod+X3oI+YS1tA8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{49E37781-7CA9-11EF-BC08-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000f9c8fe150eaebb9481e265495ad5b3a31dfc05a8e2aee70c3e84a4b42dd08298000000000e800000000200002000000011614d4b7b4664f365b37bff0b994d7f6f8a275e485d02ff89a7e3d36181d828200000003be79197d2a82ee9ad80ae2bab367322e20e20b091d54dc426f8c17a6b54e80140000000226ef1a98d2fdccaf040be9c467197fd02f8ed62d79f98b8ee3c559091340d8b43fbcc4a602ade2e57e3fdc2e5e45f43c3f94ee769d1962c1231e6b4bae5ddf7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70ab681eb610db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433587067" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2524 2296 iexplore.exe 30 PID 2296 wrote to memory of 2524 2296 iexplore.exe 30 PID 2296 wrote to memory of 2524 2296 iexplore.exe 30 PID 2296 wrote to memory of 2524 2296 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa0d9a414797f6fd43db1342b9e4c0da_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523c5e0953e7ae62b28f23755afeda704
SHA18b654d63eb27c906432cac7fc15146738dee021f
SHA256f4839335bfe982f70ee5a02a840cf2281f40e240ab9cdffb0b501c627a7b4124
SHA512705badcff58b780a138f2df03283c51eb5510b4b357554542c7338906d407a02eb73046a8f05f8c486531627249d810112b524362c6766610e4651160d78ef41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ef59386cb9e5713c14af15081375fe9
SHA1bf3ca7f2b1cf44073fb899836105d344fcf2f89f
SHA256f295257d14f3fcaf0482eb9c309cb14e829def747b46779b66c682bd887a23c6
SHA512fcac65f4de07c925bece2a93fea58cbae1507ede8a63218d53ea68f7ac4c8deb7e5ba2bdf957ccca7157b897cd11d857f7ec69396b844612d8f1f7a6ae1a2a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555b99420715f7191dc47422ed62f670d
SHA14b23cc272ea7f6ea7386a43cc0e9ba5fc8c5e12c
SHA25639be95e7036ead9eb6598c5daccd593b6ce5cb0c5a4d6b3d5ff331e93418123d
SHA512876523c7251e0baeea98261996abad3dfd56c9fdb59c561bc7451ac0a6a60317cb1cf894d561ff5bc9971e93c01ccc92eb9df2972f8bbdf4287a525d46cf9954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531ec4ba459e9b7bdb4787d279753a60b
SHA1d34ec03bb6c8ed3688b3a0215d3a6b0ae20592e2
SHA25684a69fe12c4b9c314dd574ca502ad8d7099814950ba86b03e9d570492f396fef
SHA5125a90f3cb73082c084cebfa876337439cd76de03ab5291c2f6797b57e7007400b68ac658de62a31aaf45cf8e712bd7d61502d7acf305e7a20dbade9ef53c3b23a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3d6886606e8113207f72a38ea24d210
SHA145f4f47d8e9d252310ac8528dfc282f7e8cb0325
SHA256d98376df4218ab14da1d048e802df0748b111725498dbba583bec619e160191b
SHA512a4a71f7a7044f1a56706c6f8ac3d348063798e9dcb29a39c935d9d224af7bcf751361da535bd1c2f5b320d529598fe9607f8beb74dda4f56336effbaf281c830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5898daa8420ae0b8cc6f0f46b8c59de06
SHA117995ab9dd25710950d53ad65141453d32bc79b8
SHA256b9ca6d7f54370c02a7b30f021b688b8adf49a505e52df5d75c0ba441b84b9fec
SHA5120805c8f241fd0da33ebeca92910d216ab0edbc5ab8f5585acc7119a88adfac45aae222af14279ae92b3aa159cb46037af1fe36ca096cbea2ad57fb6971bb9c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fabcffc46da7ab0fb5da0d7440f2a1d1
SHA1655d0a49361af7337a2e93ad1339310a82db3714
SHA2562430256febe67fef5e90ba4c8fe18d593fc5bac2832cf415403077cdd9b38113
SHA5129eb670114068a660c90d086e918ec1d3fe2d391a0d351871c03e94320066911de7af465e4229531f6d8c7efb6174243a8603f7eff05859e64ca47b40e59a96cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f26251e419a611b941b3c2f51433c5c
SHA1a0019047cdb725a92bf76dedf64528b144501c2d
SHA2568d1f269e967c9fc82dc191b7a6cab4e3b3c86e4b57dbe6aa9001eb4ca9095319
SHA51210c7e94711ec492b95c08d75d23802963edb0e6b9d2b47842816eaf7e3a119309d54c7b38489ae463f695c074969a7a8605f7546af19e869631df103b744566f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc3a614fc1de20ce8bd8eb0213dcf7db
SHA1cc6c65b40bd1f956a4852c0de010f83f57f81bf1
SHA256c6598229f8e02f1713f3d48b47505b34fcf2b370d46686451eb00cdab0ba7a70
SHA51249d54af88d8d308c813d6c78f652b1a691e95ef1a6b3f9d53d1b10822ee87b5d2ec7add2962d50bc6c39016dc44f9edd67b34971d314fa872399ad31a0116a3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f94986f4989be5e11b834b87219b1cc
SHA11aa7725e775110cdcf89f524428ea2160491eecf
SHA256c84f5190c113cc8e7fd8eb9908c23e990fe53d5888a4c60b5b692d346b2f37a8
SHA51235f15fd075da1f3653d5d6a1ba4bf32b3e920d12c6fbc9c93a0c98276355e115aab4e3d27c7411f037b73ad7c0b3ac6d2269e71c5282cfe6ac6cceac46fb782f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3d1854913c9dea1bd1f524cb15cd1b1
SHA188b90ea3633f1de19223ff2f7e093818309705ec
SHA256eb8e34deb5b1f9c3fdb3e41bfa75ace37b33d6df8b03590fd17b23e2b6358fa2
SHA512c21b4b37fa6a421d675b850fe66d7088b00745c12e30c56d119d26ba525297fb3208d8900927291b052cd27e279d37e8b68953f45e1d5f4d2288885a4f8365ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7c1de83c200e29a8a40fd84e153c8d6
SHA19f35897b6d8e3de700db516b059f9d0e1afb6e37
SHA256e84c8446290ed090df1b0ccce7ec2269ebf6b849f40abc96a185a77add5d8547
SHA51243b4f3299a151b202368819f9233f76e61a8d65f6ec572664f9e91b7a5e965552efac2a832cf27970f759b9722704c3c168c7954967d4d1d49f758474748c7ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524c3cfd09d9b5a8c6991fcbded4607a4
SHA1a541ed8d190eb028ce829b26800f56bc33f589f3
SHA2567fbc7415e866f7322e162e60d1040d2f83b751c5dfb51ba599b00498b59c7087
SHA512018fff6df9555e183b7c680d15b4e067ba1ee96519aac135c315c0c18719c111e31d2de690abb29f2ba6da05bd1560a255a09c6b6c9d9c9254fb7838e26f3e8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5054beb7a9fbe253926929f0529ac6d38
SHA13ce4f13aed45b8703c8c231a783ee7bb41e8219c
SHA25629136fc576b3275271635debf81220297a1371d0dde631e764fd3846587ddf2d
SHA512dbd9d3f494701b94175d1619aa013d0ae487a8d2117e9a904353e8da7ca3fb6240edee03532a171914ec4f9a54cd8d1e370af11e9bfc0c4d033f4db2f1502918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54961e3863645c42fdc7997b416f0b838
SHA19906efb49cbda2fe92ecaccd8ebed7f94093bac1
SHA256a436f07784407f75451bd6f9a2b841f88729b28698c03c63e80a9829ee1acda0
SHA512c757c25057994190fe232703a640de8898cf16d1942ca252739f0ebe47db483d6f152fc19119333d7f6d114c503887a4217beeaa802b430197f2a5c8a43ee4a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517106d6cc459e479809c9217093823d9
SHA1271de849bb0520cb6713d19beea21d09ba9abd98
SHA256c8ebe25609227a337faa3e5051cd8962b7afdf18bc63023af5d9073cd573ea3a
SHA51211febec9d458c9dce5934c437a69a8918cc4b4719ea4b5d963c95617c8907036d9bc2972ea6a2c5780928422d3718b1682d5f1937c90774fc44411142a470c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f0b64f7a75e764f29171a41be055ec6
SHA123121eb311619a2f323fb60f261b63ca7cc0a2f6
SHA256f08ea60d3df3398996c3cea0fec803913a8ae1748351b5be7e878a883dceb2fa
SHA5121998b23e16a5d8a76401a9555fd904fbb223945c22412c81a25bab277cbbcb17a3d3803e9f869d729aa9642a70cc24a58cf505450eb69225c16f08d1e6835f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520ead27821accae68be109850b0139ff
SHA17311f6a2ac37a626aea119160c69a17bd8f8e753
SHA256a07a54152c019e31c728993602f5fe3b2ccaa6ae57c2ec8862d833d6aa371a73
SHA512c924491e3462cbef2424ae9e395e81eafd5512a047eb5d42f46355c44e3c5dc3f6a84b2d9035065d4c2a17c845f65b6e625f100810ad4f71c77237c2213136db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a892ed6272a9d6adae9d3056d7d5ed7
SHA1a6417b55e26982f957d011adc975ddd8f09c42c3
SHA256a81dd3de1ba99cfb0120ccf9ed4a63909ade0c49e1c739bab3301c9fb78fd287
SHA51283a6e05c6f3b60a96b8ab7bf9094529a2398c0dc472475d83fb0f1c694b58647a71a57e9b7bb2d2b745c5ad402c4725a9163b1b60cdec1200fd8c47f3dac8fe8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b