Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 10:41
Static task
static1
Behavioral task
behavioral1
Sample
fa422bf03dda671911a5a95dee00f97f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa422bf03dda671911a5a95dee00f97f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa422bf03dda671911a5a95dee00f97f_JaffaCakes118.html
-
Size
25KB
-
MD5
fa422bf03dda671911a5a95dee00f97f
-
SHA1
73e7c2e1d12c668c4a36f8a6ae571a04e1a369f7
-
SHA256
fee06df3ad2d42e6b178401abc136f67baad0021260e0c92f7bdee586507ee35
-
SHA512
864df1b582fc5a2ccdb021c5eb052b978561fb8a049dfadfdffc2c61a2f8927e47702cdb0563f4abb8a8cfd4a721d52a230362b81e4e983faff0d9f36dd8eead
-
SSDEEP
768:FIQcIy3hblbZ5s3etpY1dYxTq0P+u/BUyaKp:FIQcIy3hZbZ5s3etpY1dYxT/zUyaKp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433595575" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{190B4981-7CBD-11EF-A087-5EE01BAFE073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000070f3013ae63983b3ef0a0dcce73a42c122ce2a7e1c9410be436804044bfbcd0e000000000e8000000002000020000000396aaedd4a7079d72e88c910447c837d87f615f42999469e2009d025e161ff0a2000000052442c8e8cbf205c3dea02d267cf39b1a55c0a96d9cef709a9ca7264047139a0400000002db2c688965c4b36162a099b886c1f341ffbfbc2e9faa6a8fbd02f6fcbabdfbb2ba8bc4fb47912b989e5aaa7b7512cdb56518516d5516b1f80a41e99aa5caf02 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0cc3808ca10db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2100 1732 iexplore.exe 30 PID 1732 wrote to memory of 2100 1732 iexplore.exe 30 PID 1732 wrote to memory of 2100 1732 iexplore.exe 30 PID 1732 wrote to memory of 2100 1732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa422bf03dda671911a5a95dee00f97f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58beaa7d0efb91a7b0c5805f4c7a5d5c6
SHA141c4c03b30105e308db9279c64aa76f51c11e37a
SHA25652b9d1e6d40e275dd62d6084ade214ab6700a306901464db51d6009608a2b941
SHA512ab97a8703d7b9c8aafa54ac8574acf92cbc7b055b57f9148e358e2e29207210e58eb88bd1b855b93ffa6de3b4fb1109bcfaa205f7e0a530d705699afb1e8b509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0e40a9af0c15cf6373393d0b20963bc
SHA1779bf9262942ccc4bfa7c168df25e33d36fd0217
SHA2563a369444ce955a424f670bd85a747b6c0b56c9edb8518b5f93800f219052fb47
SHA5123910f08e6d471e62ec19dca51804a6e9a3313aa2992c95870084fca7f01e40aee610ed2beea1e549cc92da1ef893fe663ae3ed5a29a7433888e98f7dd4c4a016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f842899201d9cad8c4328c81b52efef
SHA17c5e6e38a1740b1674952bffbd60d8d78ca2f8c1
SHA2562fa49a1fc450879655a8b90c51f941ee371a02923f0ce216ea4f53eeb40181f6
SHA5127fbb6e65f08241d39b6f17d237a6dcdcaca011008fd5708961ab10990f227fe2e9f9522b6b7ec90fd838647d35abec495b3b24271cacceea20a0044fab75ee24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6a4346d76b222dbcf332b48a01ba07d
SHA1ad4c4c65ed9947f7943a09450e230fbfead7dbea
SHA25692bea46735efec5d0e058c63b2f3d8af8d4032d42ea37d576851c085abbd2b87
SHA5125048e86bf6ad683c19c1599d7380970b15b88c6d0f46208048c03460ae92f65715808910ee22eeab68364a0cd50bc3f6c5ad0d24b5112446925d22ce4aba5960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575e072a76ab9b0c484608006a195a989
SHA1221afeead8059514bdbcc245ba9552064f15a56b
SHA256ca1dbdcb9a9bc8a48939eb5cc25769a6cf472c73386b4a50f541e6ed1ba8161f
SHA51248478dd7ce43f3ddd1b9cbf1ee9bf536824c614f4e6fcc19904ea72398a3285fc3d55ae42cd4fde493394f73786c74d7b53e0772098eafaf86a659d4e7ccd94b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fde1e56c351a45e36e3cf3cd77fd0db0
SHA1eb664fd03d0259df638b75a18900c74584629199
SHA25673c1fec0f928f2b2eb9a3c54d12f678217b68f98a5702886a27c36d7a6e9ba69
SHA5122f86e34aa977bc219e949ad23a62bc3118e1a77bd2ee24259887c344b986fa8c493041c63933c9dc67310abb02f74d224ccb7dec7e99c44c2cf1fad034521421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55722f40eaab335c1488275484e4209a2
SHA11a9dbdf959e2365b5a7ebc7d2907cf7f4f7ed73f
SHA256732c04acc9d03511aa75b63adb08c0a8498abaa6c163e79d05acb644744138a1
SHA5127fb5cdf18679e4c2c3b9300fd174d1b47ab35e2063ae94519721057a062ff43be062f328fd55476d13ec8d6e3e281c7245715e4839363f238a163a092623e648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6a9beccbb668b74f1b6fb86e07d4bed
SHA15b5f9c53e4f2127ab189bced66ea58427a570740
SHA2561e37d967d12406e1d2de8093b81bd258f4793c0d101eb2444ccaf07e6e5601ac
SHA512fd9b0e42964c3e02171241c2d0f38f3072933dd981ccf918ab587d86a36120c59499a62c61417b6c8a2050922457bf5e4b50ae015736277cf20b94c85c77b7a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e5a1a3521466d8e4f316b4edd121fab
SHA199e9b53d4d22c79f96f15500d74d3fc600e9f316
SHA256892cb476052743815b8e68af69dd5fd5866cb7019d5c166865170c791e3b03e9
SHA51203621541885e58dac30b10ba1d677fa70f8241162f2a8d3f29c736d18b9527d4df8781ea615f8816162832e671fd7c8d5619271e46e431c0b0addea53e00a9f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5041ea40513582c41a1b6295aa30b4e25
SHA1e64598d65e91663ddb07b50d70acd1fa594d5088
SHA256018861c7a693147a9cdde2b21eae6a120631f4e3a2b75f42897a629c33c006e9
SHA512892b72df9c3d465aab3b715adf152e801016c2c8bcc1caa23f616a2a964fa64a75cfa0a635d43c13e641bfd8c4f87e6122ac0dedf8b123fc6f0d80ef632b0d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1b6cca2c1ff535dd1cdb1e79e511235
SHA19fee82fedd6b164dfc880297c6d79ad13fee1598
SHA2567343f28ae8429c910dd108830a5a5062aeae52fe32ea773e19a4145602cc0b0b
SHA5126a8c24f7ef31234468f72d5488e845b64c26d59542c8a1548d96f321163b51e8bbedcbf7eff4205cb4e47a7c67e28f0f4c2665acb66384a26c08772d7f4f7320
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5311f4eef1fed78e2aa7cefa9fe8b2984
SHA1f8a1859cba970da651e941617cdc1c8a2e18209f
SHA256bd2975f13536864ed25b5b70d12d5192b2bd143325364c90b599d78fe1154215
SHA512808bef13376a6fc8be1e15165d72000cf9dc588d75e9e49f5ed60876d7d26512390e59a3dfaa47240202c6e2c1d3e79ffdc898bf27d32071d465ffe46759aba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a2fce2772301ed8f09c4261bcffc60d
SHA12d0d297a980962d1b84cd74ccb07ec5cf008f4a3
SHA25655f2cbc17abfc65dd7dab7d21e6dce684e6382d3be948a5e4f9371c7088059bc
SHA512f0c842aa9b0427089e8fbeeda369067c5ad7abff832c734c26527da437230d49db976e0146c0b45b8cfb05f3cf9b63c0b5eaea3fae0f40442aa92b5f32715b52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551ce7fbaa9a43c1c5de980b2837a0525
SHA154589b395e314cb89c0cae01e2014d5502292023
SHA2566afc3d331b9fd063b3f77e8f28b1e4116705e83e5cf367077f15d91f94bf5c1c
SHA5121bd167ed5f3f55deeb9a6d0442e89a841120ccaedc16d007da721574e54d7f5ccdf1183deb27dd98988a5cc6b15b33e1a1ff5b37fbebc6b7349f41d07667d583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a6ca24aad418032556b221d614718af
SHA1d1b07ccee43d1a18a3fd0d12f1d80cf5cbedf435
SHA256d3b8dc85ec26b780272c7aeccc9b4f5f1efa0ea52d9ed9364a9d4d296c30a69c
SHA5123e2848985225fe3bb2b5af85fa7fd90dd3c5126bcafaabd9080711a889510cd0bc9731ca94141a3b6142ef25f9a0f0b979949342a810de7b6534d7f66141faae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4b91f3306090706fe101e79eb6cbe3a
SHA15ecba2662e92565d84f472a11834577e881516e4
SHA25667ceadcb7c186052172534e6fa52f6c5284b3dd91a63940b94addceb39b26b25
SHA5122c6e89de5574bda1fe6fbce3a8eabaa578c83ef9c1d39144b0b0f5b6d686fda89c0561df211d4960a765b9a351867730f83e2fad1a102bb186815fc93a24359c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a46b114e6f1cc5e98ba5779ec87d70c
SHA112d187c96e0853ea361520b74fedbc61818c9a87
SHA25678fed782cf23a7a4590896869cc7569f9f37890cec0a580977c9ce4dd92a878f
SHA512068cad117460cae1db451345bcdc4bf42b8d37cdb4a2675804e9a7b5c191270a64287595f63271dceb52c43964b023780f34448932d89d4df4e144990c921670
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53607d58dbd9e4c0711bb20aeee36d710
SHA1fa8d81ee1d04f83810233a0100ce5868abbc5204
SHA2560dc167b9844a1cf1633a05c13846323d4f16d6e950a08f253b32e04e5166c674
SHA512fabccafa93b48cc52a969ff2889d859ca383869c244da5a6a51446cf7caac76273e5473242e855ca4f6335deff91195f051e8e51085c673faa36d202f5855cc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1480269ce23b32d5f3804215ed38240
SHA10c1a0cfb061460bde8381a9c040a821d122a3596
SHA2562e7f29b65fbf965ce70634088243b681de5fbabe1a91fa18cf8822f8393fe603
SHA5123ecb593aeea719447620e18621d543dc5fed0f75247b4f2e4fdcef34f88ff33527614f33e51b175bcaa1e4f6bb81ba2097c0071e86e5a1184f23a3d20db41068
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b