Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 08:28
Static task
static1
Behavioral task
behavioral1
Sample
fa10484e6161b49adf7ae45bfadb4497_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa10484e6161b49adf7ae45bfadb4497_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa10484e6161b49adf7ae45bfadb4497_JaffaCakes118.html
-
Size
470B
-
MD5
fa10484e6161b49adf7ae45bfadb4497
-
SHA1
147f6b5df9f4d1e222f1ac4347712b733e81833a
-
SHA256
f5d35e7d5f2c61860329db7bee115076129763931c92213a3a9e20d313e0e75c
-
SHA512
3cf4bf8f1cbcd50fb05be4816a03c3d64a380d8b8d2c655afc5cd6ca93272884e5108c7190c8fb7179296ecb019cb98350d0599f76406594834762292ea0889a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{85350E11-7CAA-11EF-9D9B-465533733A50} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0a7d55bb710db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000002701036c893884978cbfa0a2e649073a0b2fc88e3dfbc32b90af781eb83b072d000000000e80000000020000200000007f2a5dc2ee224cf937c207f2302a72b607769e2a64d07864a4ca8f7b0c403be5200000009449f03e80a0fc54ae886c56927bc0c7768398cf2fbe6cd600c18c570ab166a94000000063953e7e49a4d6d69d6c6d5fdd3d40373ef60b0746da685907ef626c93ac37efd8e9f517b0df25b635bf58ef5fd84dcb9384872df8ef169ab4ecf9f52c32eb98 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433587598" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3040 iexplore.exe 3040 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2348 3040 iexplore.exe 30 PID 3040 wrote to memory of 2348 3040 iexplore.exe 30 PID 3040 wrote to memory of 2348 3040 iexplore.exe 30 PID 3040 wrote to memory of 2348 3040 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa10484e6161b49adf7ae45bfadb4497_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580187267aac67ad17d921a590a30c1ca
SHA1a4e5a259db344c0dc7e46abf192a5b670343dcb5
SHA25610209e96576938b0209d4505ba619fe48d1d678a0f980379a6d052e1cf12e5bf
SHA512f7b991f95225a10098ad2c9811509e05ffe9813acdb5c9aca3d69fd9a36ecff1bb323c4d4055b3f7b55f27c09e0720122d2512ac29503e6b7aaf7a4b3688fba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccba1de8da4a1a9cc2a0f3e9dda58a82
SHA17c5be97f654d43f58420cb60159083e798655671
SHA256a3c49f4d0d4f576e0e78d86b4c2da729d0b6d91d28a31619a5d2154f33832968
SHA51233fb12b2d855de86c0824a5976c2e238d3a0150780aaf4efb73c0ac5c32c43c23d0c0499aaa13ee1c890603b29e521576c1e3b60efdc281dfc2d1a17756d236c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1cfe9949c76463707eb6cad3dfe77d3
SHA1b28629998bb107261102413fd85c1857f47a0f20
SHA256a52059890be6ca018462f85fed93ccb72d1fa13c95c50871e1368be0a29f4d6d
SHA5126683b47c924c70d4f42faa5ba809ea1745731e2ff67fa8865648a20cec9daefec2c542602089d08f1012cc4ee18def4a13887e30ede4fea7a3552230b7094be4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5667ee5cc3b9b7ae6c193b4b7a981b94f
SHA1e43a44b895864bbe6e28604ae7a33f7b43ce5d3a
SHA2566d35c6f0bd51279520f2f53a3fcf81ff3c665a4c9d6339f4be21af867a69791e
SHA5129e326ffa82b65b4df75a63c2d71219fce8726bbb15729e7967a1a80f875cfec9e8eaf1b0e0121b2d429c69270800e51dd1f9cf338e4d7337b28cd4512390ea3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc384715b50eca334153e5adefd8edf5
SHA1b6cf114e5f2d227b4e27a6f2bf272b05181e5950
SHA2563968bc10415960245d5b8f922ba2310ec1153cfead90dfb84e0f8507d7578462
SHA512c2518e0130e59d3fab1927b187a6cb49b572c525ad2abe04217b590842470ea86a153d2eadae3b37568755d068e69862465eb9b2faf5543ce7e788c7904057cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f4862484f32ed3e107aade49f7ff97a
SHA1250d0d45213ecc79901e8c7b4bb6d61db5a116f2
SHA2567ee265776e8466a36a42d92a26b5b958d8da1a68ab0e984e5fbcb436edd2d51e
SHA512c445e3f7bb5a6304258725a126ba542c3bedc31b205be83d8b7ee251b098144c4819db531ceaff6e72f372c2e5ebf6655f441b362253946ee27bb3242a944ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50585c879bc04f83c89304168f924e5e9
SHA1eda357ec96c6ebe2a3a77bb9ff4445e24c53e7a5
SHA256e2e290887b832b8c12418fe52b0cc29bc0b57a0606e8f628a4e4293bcd455a8e
SHA5127347cf8747d7c26a502007dfbd776e2ade3c083282ee77e13ef4a564af0b5110c0f6603f841e484e76964da6d87d042293a1564f501a5f60ac76c32ca3375a71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525437f96e58cd67e53541331ef869b4f
SHA1f45cf1d00d3d3b270893466c83fd81799cb36c99
SHA25698ed6de0289c14d4f559574982eafae6dc64e21e7eb4de462546690dd571cc1a
SHA5122ab8b01202437a4339ff4a6e91e5d1f65d5989f7b40212a0692a8dcb66494d93e4c9030d45a36519fd0b99fe56e718279233a3896c4fa3d79b0b6f46988faf5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5409ce14659e0ecaff010a94c2a9ffe9b
SHA16b336b721641f668a8443264184f7a6aeaf508b6
SHA256e1767046e67d9746e702ac2e7cf45676feb78f170895687f4da134582b2cfa35
SHA5120b8358c88bf5afd29b665eb5a39f51238f886ec9a18328a4fb11c7354635ebe1c481f367b64b55185114e4762603ea96ac5dfa0c4ef3666df3519f2ce8becbc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59edae45d7d2186432d4841e869b47494
SHA1524af6caacc2541cc3bdd1b4fe49e127773989ba
SHA256e49224a2d533a45041a2be3b2f1b6447ad92637b91fbee1e08eef5ecc2846daa
SHA512ae91be3db12ed5f0a09efbe0838be2163a49d666c91dfbf3b54b1a3d5974d0539b36db1fa8b05f5eeef5da078429fc3b4df16e67fc15a221ae23c971b6482f57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b178843e390f5ccce657a28b73755d6
SHA1b37a4d2763d771c15a939a8935533ea42b9e5348
SHA256033daf5b666bb11232d14659daae26bf6f014c178f607ab46297d5c2b26434ae
SHA512bd5c85a77f17f140fc0a7661af34d7f5a5b0239f2674c1ac3a91813f1447cf3f2a960e8893f4c4a3f1dd2470cb1bb9f35a14de019b8abd530e80b7ffdc6f0e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d840634a9999911a2459457dfdcef10
SHA1ba22870986906a9f9f40be550dc7749d528c8c11
SHA2560d83d045fa79372927018b3b3163c8fbd87b8839de9b54fb8d27d3ef0fc21c99
SHA51200dbc1ea1355e178aafbd54acee4b77b05e1e77c52dbdde306f9367ba941ba5bf5bcca2212f5f20c3ba7d6b467c9e00eb9dbdd9c520c500c36595c0f3c91790e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffea2ce0d2ceeea2af551c55eb030026
SHA1cbab945d0b7535c848efed82b749ad27c71c1cad
SHA2564521976a8f1e1805e72a44b9a09b7bfe3a9cfa0e0851995c3f8322554610e6f1
SHA51235660750de59b6d032dca1f1f77fe697dcb327006014c3cf1cb6560cd703f08de95a80942cab242a531c7a2da685c9e87637549a2e594c4a80bf9990d48d5d95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a012feb0cc41c8f00dbfd815cee5ff32
SHA145ff6629ad67a2188e2a7f0f3d49d9c7760031d3
SHA2569f01d987bc90c40e8fdc60dc25ca0b2ead2d0df32dd47229527c798e48f72386
SHA51207e16d4f36083f17c0de1c55caedad94893943539b622a42052186d38016a6968a94090613c0c1dffd373eac39ce85f56ce206bcb0ce22ac3a1f0b2cf54082cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f3d48c1540ffe600cf49e53eec61ea4
SHA140cca8cd5bdc8509a29061b77757ee58a1ed93f5
SHA256db5b1c2edb48616527b662bbc6df69c7dfda93c5e5307e1f837fdc646ce7ce16
SHA5126fcdc93fc25b8f6c4b6f51320e76c23078e6f879d3d8eee415c37143671fefd1d1146eb72b8efccc4822ebd5b81f45a0abb86c512ab7088eea3cd84e735b8339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d577a816e1e2fb0baa99bb2889c84f90
SHA1318ed0f0661fdc8df7c0b96b2753ed3adb98a1f6
SHA256e08bb50aef18d6481e498bb4f87e69c054b7cbf7ecb453c50b600e4f76e38771
SHA5125c1862b4d9785cd6bcd924f83767240affb5f8166c0ba1dc5cf8fb1b12955f474fc2dd7126539e149c6577b56c500235573f2fcb1caa8d65ce1c92919dab4dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e04a5a022674346a2d965c2f7dd4348d
SHA1f3c3aea34a730da55a26b3f4400dc1c19b3a9e76
SHA25679ac7617428d18772aa1c4cd39ee7fa17448ec48ef518508a6f9750ea5cea07e
SHA5129e9543b40c759a889133f51f7787ee42608d53922b925a436e6d9d5b13a9cce316ed22fc04cf37e27af967691b47ec926a61ed8fe294a409101de53ac36df97d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52088962b50f90a77379d9109421c7e92
SHA12ed20eb385c9bd656f48df740cddf590cd8e3db9
SHA256bc01406b1b68a8bc05500356309044806b78df523f8ddef2247282a05dbd1c67
SHA512e4030e1d04c3affb36acc965c4920d162ad7b4103a8772294cbd7762634de8bf2ed23df37bfb2f9862670f8fb87a388e7b6db1dc1848f563e62120eedd1feac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c911a04610b8cdf600e64c1fd05fb708
SHA1415061d812a311c41953dc976d724a79dbde1951
SHA2561df3804b7e0c9605f453271eab3d24d93403a6f28c9aba849a765b8436e61380
SHA512d38b13b86f68e12fe6e0c2eefc4019fb5ea1032a1cf5557f6a08572d3230f9b0e54e0af05790c8648f8d836d433803dae249fdc6551650e3b319470f715badc6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b