Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 09:59
Static task
static1
Behavioral task
behavioral1
Sample
fa32a7ce431618e0a150602453675c00_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fa32a7ce431618e0a150602453675c00_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa32a7ce431618e0a150602453675c00_JaffaCakes118.html
-
Size
573KB
-
MD5
fa32a7ce431618e0a150602453675c00
-
SHA1
f925cbc7780708881bdbbc04ec204f52f4a6c7b7
-
SHA256
d487f86ded458ed781032f244d3271e8609a6a9b6bed9e1228662c6e69f6de27
-
SHA512
c4e4a34721e119737942aef8e32304395e2beec1995ab73e5751e2956a46c81fe35598b7b70592a1bfeff853d9ae0019645fbecac7a1895a8d0b6f7748eeddcf
-
SSDEEP
6144:ysMYod+X3oI+YYsMYod+X3oI+YYsMYod+X3oI+Y1sMYod+X3oI+YHsMYod+X3oIO:w5d+X3c5d+X3U5d+X3b5d+X3l5d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{419E3751-7CB7-11EF-8B76-DA2B18D38280} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433593067" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000de4874b62f666294ea258820e9eb357f2a0c50c560a62e5b7b620ee50250d053000000000e80000000020000200000000af76250a4bb79226a49861c7d698dd55d1580fbab2e54ed79698aa4f20fec7e20000000744fdbaac74d258db70fdc579c0871d98273925922ae12afd5d8a95893e440b840000000f930248179f7852e973d46be920d943b7760ec958464095bf1858c25a69094583b60fc101ffd61c88f1204cdaed595a994a52554b5ba14f3c7ea5969b746dc4c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0bf1e16c410db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2088 1952 iexplore.exe 30 PID 1952 wrote to memory of 2088 1952 iexplore.exe 30 PID 1952 wrote to memory of 2088 1952 iexplore.exe 30 PID 1952 wrote to memory of 2088 1952 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa32a7ce431618e0a150602453675c00_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e35cf4c347a8e35e180212f0c0fcadc
SHA1776e823267a45fd483d3425bbecf055415c15505
SHA2560f40faf1576e9fc1afc05702a23793368011abe006eb315ecd42c47b591877d8
SHA51232965b7492332c6ae6066397504b6109e9566344bd225e300bb696a8e0d1c02ddfc235772aa0722a893d83561666c8f6a012633c5065fab2b8b6508a5446a0d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3b43a92041269ce3da852ef41f08135
SHA18f7ca927cbb3ac3b6afc84038c74bf53a5280730
SHA2564dc60f7231951faa90856fe77632ba12cbc1b388884d88d94f89211381313f5d
SHA5125f2a717bf4a102f68f35fda1b0851298eb77108d7605cc3e1c6805d3f6fd1bb30a5ed6e784560c49be509d01eca69a899e3105fe44481696fde3a1e191190cf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d80d58dafe9e15dc2f79eaaf527095f2
SHA11b2274a4c2413b086244ba9e0a2f0afc3e970676
SHA256665d518a09ac884af2b8a28003407809a4e5ed50a407290cc181a4c27be7dd31
SHA512f9323b8fdceb31b61c2fb6a1b9c3a1a08c0a375e6c176eb8132d1bcb47cc714acdadb0628102d57765ed5bb4c9c42b148542fd27ba75f06fc75788fcc4c7a3fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f759dbafcd3c275a913f5bbe2ddfbf1
SHA133f191d270f564635c2f57d86ad4ca5bfeda485b
SHA256a5e2dbb6ff273bceda1b41fad7e8c636d7a39505a30127900165942f94d538a3
SHA512720bc7f8c48da5a3a8cf68e1a052ef843bcdd15c691d3163745f37e41d4900d4d32f37cd3c0d5b4e34094c8d5eea0c34bee5d273580b6bc1d9abf95170725c79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5609d2e208771de4fc9e9dad6e2034f3a
SHA1018fcd1c572e5c41c2f694f42540c75cac27dfbc
SHA256071fec292f977e96565e70582eb4453af943d5e70ac96f31122a49b6eb0aaeb2
SHA512eb9068ee7d32f785944f801a6fcdf5bde1919c797180202db0d92cd2daded52118327eb38bfe0ea4f1880670f3f0943086efd21fbea2a01cf2f4244a6dc5c6fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e7ef655ed82f5a1c0fb9d26b96653e1
SHA178bc27dd7009bd85118d97a0a73d1c95e5fa68ac
SHA256ba07dfd8dcec3d7381d9bf9f67d6c8a13f5a61aacfd74f42c80da5f2cb005348
SHA512b85286dd233bb6d77d772cb852b7c420884343fececcbbcc64893edd1a35ea58916f24288c2cd79366df9a9febc7ba06fb7bf34ae10546185bda431a849b884b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a32accbfcd0f6a135bd487823efddaa2
SHA154eb8fcfd61ce4bec2ea69a16c2b245aa1f0f73a
SHA256dd2deb1e7166f567e9b458759ef32b97862b53d2937cb3b9ed07d99d62679bb1
SHA5123c73f644a797965c0e191f8ffe75de0b3368006c59e66ad8610d5b4a7cf3c2844e62161981ba637a831c928aaee964ca1dd33b0190ab2234e6db84e80e6aeda6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edad0ec7f0e0a348b094fb78e1acf649
SHA19d1f8581defd0ad5e23cb42094cd991a5e7c3a99
SHA25642639b0000e55d545152c599a306584357f13cc16ce7ec35ba83d7019a80af2b
SHA5122336cf0fba08d12c1bdeba682fc131e3f39451673b545a1c28c7c750ad37dbe9b462c9abb948fe979ef8c3569cb1c51ee9aac9e31eaa234f00d8e11415ae3310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566b477c4120977e138f3eedc43e9e81a
SHA108329f860c05dcce31a29596845830af516f32ec
SHA256bd1076776e30f5625f9c0598d9072e57070afd054319abcf2ff2a9a7868e4069
SHA51272ea0d9de0dd15e2c333bf64a626cb1044b1e5dda1d3fe20bccd154b28667dd34e6c0bff4a9532747a83103ce81ba819beca3b974491e0d74a6316425a996d01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5567eb37ba7cbb83d63c2aa663d622771
SHA16fba1333d456bcd9bc11c8c6f494f7a4576520ff
SHA25644e454ecb380725922b9e746e3f7c4d08e08df08e88dfe55e2dab7e6bfe1c40e
SHA51203086d6a1dcae0181d011aba18caf7896c2056509a31e256a2cfe6acdf9e342e84fca3cbd4b215995e36cccc4bd511cc326fb204a10b08c2938914d4348cd7d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52163fbc44aa00967b9da33df5e3fce20
SHA1cfc8a92564c9c44afe62f15f67bb93cc31e15282
SHA2565047a4c0230c4f517955d3e7b133fd1c109d23d21c9210c988c7c6b0c459a82b
SHA512eb38185caf896ff6035be41cad9a9b86ada041f23540d99522fdab1b660afd181414250ab9bb7d299567e5b34ea46dab065188b38283cd1d436c9f72fccffc22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504d5f5bb0e0b2ad25d1a577d61998ed0
SHA1f4d9d7cc2672432410e689fdb27540b3ec752d07
SHA25611d625f304e73d7f430c9d738b5df31f9994dd52f5b92ae346459fdb16820030
SHA5128423d91a84813161f2fd64ce449f29ef4f312fc476fb251c5ce3b1c9aaa37d1398feae31e367e567b007152776be4e5c67d2a14bb54b066f49fb512056b12c25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfee0628141a2aadff97102e1395d78d
SHA195346edba6986234ef1082deeb58e0f682a82a5b
SHA256aaf2804368d92b12c4e6b6af5ba810f3210600e7528db147d83ea4732d882a5a
SHA512000ef67e6eca309545dc4d4898934eebe6f360a008f3c7493fbc7a5ca16c858933be89cdf7934c00dd6cc1fc93c3d73a5fcd7dd7349fe5b528b33575c877a00d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0c19b0b320b869d1a8ccbc9e5ffc78c
SHA147741bb1b009d675112405be73bbc1267285d0e7
SHA256567724276f8a8fca1a9224aa334022c51a1b4f45693221d8f9d18be0cd52238c
SHA51241c6e9f5424ea860890264a09d853466126614a710cd2285db8189816ba7caa2d73196ea9971eee4c695af18ffb0207fac507b0f8f21fc68fa813f46fac5410a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ee47e35fea825e99a2077639a3354f1
SHA103adc6bf527fb157e3e151c06faa849c731528ac
SHA256b4f5b198ce0859abc5ed38bef0d4443bc28f01839b125f0a04895631095251a2
SHA5122c4cff7204f1ee21f766f681b844f7decd6e2bc863b7a57f46bd84b6ffbb2dd8fd745ef7d94af32b5e1b4ec5851a069455f0717b029766e83377f3700d0080bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb4d1e0ad225bd6906a40f0461c8dec9
SHA10c2623b5b6c5ea4f2d6e901e9990b16e9fc665a9
SHA256b466301908859ce446300921adbd02e645f983f4b554313576865c2e285dfa9d
SHA512b0757059ff2dfeafb6c6ce882ee5b3f46b312e69bc504de8313ab945db1b5c1c08dff1a1feccf81544a0f2996ae9cec578ef15a4a34e2818c31070395311d4b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e5eb86a103e7efc8cfa815198e9b25e
SHA19794b2e44edacbfa9864b0e7d9cf1251a64dd379
SHA2568c9fccd38281722abfc7922f0837a40a2cbd3f882f68455636e8f94612428b98
SHA51239e9bee321d9ffd433071fe8e8a4afc8ad535d47803801457ac9b969c44394115067188da00d75c1971f9591a734d940f4915ba6994d388f0569d89f929cab81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7690c65d2d01caa9374d054123f8971
SHA1f6213e70411561f9468aba89d0030d769e625ff3
SHA256ab1d99a08b0f7c7dfddf4dc9f5913c496065bac7dce0adfa3b46500e0b63d8c2
SHA512cf926eab3dad95e017aadd5022349d1c494a350981691fb8d1fa3ffa29b552f35c13bca9f02e1021e11fa8a0ce7cd1077539c6d0de505b0f46bba0849ce80c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e110e89563a1d205e820dab6a8fdb51
SHA1a2e53a5b4ef94c17a962a9b16e304b90cff3d251
SHA256e53856489d8e5e0c51d3766083cc921e68a21d914a0885959838b13c9722f19d
SHA51292e14b58c070565f9a377fbf9cbc7161180361c76128bdb9d82609785d92161e66a17416e9e7f5c93e8dc3aaa2b775b139632690ed426796ba141354d4ff064e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b