Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 11:15
Static task
static1
Behavioral task
behavioral1
Sample
fa4e79657485c7bf0fd26650aefb697a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa4e79657485c7bf0fd26650aefb697a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa4e79657485c7bf0fd26650aefb697a_JaffaCakes118.html
-
Size
57KB
-
MD5
fa4e79657485c7bf0fd26650aefb697a
-
SHA1
8f8f044b72a634e98d5a0e8432e791f8e7c8ec41
-
SHA256
417ae6fe54c0ff20dfbd61301847583dc846ff0f9c38bdf83586e8c265251c09
-
SHA512
693d2f267ea09ce186a5b9a5c2df8ac65a68c1e021b7ce72deab903e9979dd57ffab060a3fe7df1a411ddb8ce77e2e039d3abbda558bd4d2c76d3aba96b86f5e
-
SSDEEP
1536:gQZBCCOd40IxC54lPTVS550aV7bIxDO2+pr8cBg82tIUz6gXRtTYfXlvaV98KGwl:gk2m0Ix5PTVS550aV7bIxDO2+pr8cBgB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433597571" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000c68822701ba76afb65db2f7c902d2388348029805ae5b60b72313fe1b5deaa9d000000000e8000000002000020000000de69fc5cd32029f18793615bec3b95353859316e0aa75ef669b6e09f7357439b20000000da604925e61df2ccbafbf2036de2e7ccd40194b821e47261a70a9d758227c2624000000015f81859f6fabb03dfd20f855181e76695f47fc00a5f086f32d4aaf0ef854081e1ebf3520a06ad59c6c3e39fbd16af14a28dc7e03ef97b0e2b860b52590f42a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60dff095ce10db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BEC7FAE1-7CC1-11EF-A059-6E295C7D81A3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2228 iexplore.exe 2228 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2208 2228 iexplore.exe 31 PID 2228 wrote to memory of 2208 2228 iexplore.exe 31 PID 2228 wrote to memory of 2208 2228 iexplore.exe 31 PID 2228 wrote to memory of 2208 2228 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa4e79657485c7bf0fd26650aefb697a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5471dec86de32bce79aae8a864c5ea1a1
SHA153195f3b6ff29c2d7c4bfafa9e8bb2ec43709b17
SHA2565c84f062c8882c1f1a92920ed8b5a8d1eed94e26d07b0e1c68854371d646c067
SHA5121ddff69f54a7236d8b0c5ea2e85e59a1da8645dea5b5732070f81e69d593d3e1a95cb14a4e8367ddd8b29d7b88d15ce295e4c676c358b1728623401cb3d60919
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52116fafd2ce042cf342abae6122ed3f0
SHA1e430ff635c01b23ef5bc67b893b114fc00c65231
SHA2564d49c5500c15a742ebd851de45392e242285d64c4249c43914c64d3cf730334b
SHA512baa7eb9a8a6587d41e8a1b1033cf65d0a53f5aacf3ae5050cf62c1664cd5bceb5b897f2c31f1fe2c3fffc9fa05633ac837ca53261f8e8697b9a5f4de7713001d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e044ab8d9d2b17f72d2d9df68bd988a
SHA147cedca54d032abdb045c93ff6fb23dc80c090b8
SHA2569722517f31760f2eba4099f89c2742d1cfe39319ed9278e1e53ade764af81498
SHA512f5e57fe1bc4711098bf75842e72aadb88aeca69e193dcb55349f863e765a5056ca0b99c29880fb4d0a127029d75d47665dba6fd934835649c951a4c2f8fd01c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507fdb0a80778cf475e8b0b48643c65fd
SHA19cc289080f3235dd35d07739aa5a45e401214ccf
SHA256d1cbf658507aa3d6fd7078e363553a9a841f57bff1e826e4c163ac9fb375184f
SHA512fb0620b86e2cbd5f12001e5b59b9dbb67f621025595ae89b072822f38cd7fa8c531306545813e16eac4a21a9684149f39b3a0fe8cfe68af7026acd5d117e8a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6c8d27f5c63d41e8e9405c55294aa80
SHA157323cf5b214551cbd77290f1f5a619df7ff6555
SHA2569fa7414a45bc8bc4265b58bbc33a7e12f7df0d609c17d9d83c5231822a641c0c
SHA512b4b2d7c02725bdaf7caadb0fe7b91d820bd7b9f9aa0ffa775ea00a4903b05d4c34d0e4045feb58f31f68c20d8c1096e127f84e4fa76294955f5736f70b0b9c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbb4285be6b45ff36e31c4b5fbe207ff
SHA17bb3b0c1420136134a16124489e9ba75b7a62e15
SHA25677ca7eda262f2ac38d40efe7629d4ee2ea6bda7d8c71e1ad1cca57981bd27ffd
SHA512b0f609427792239c34c3ec635d89a2a9317b7649f1881820136e586ce97b00dc134595da135c8e4a4b6576ff2048bdba08a40467502ab3965eebb37a16bc19ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56644dd1b089018006dd8b83881c18ea2
SHA190fbc12015e931478e81633878ed4077c77c868b
SHA25639f02ab03f9e0cabda829c26e6b30e9187f1abd0c9145b815e16ad06b692de29
SHA5124f445b69b1aefb45cccbd150c65582bb1c11e5093a0bab248a268d2c36a9b0462446bee27637502808e44ac0a4e9e43f2bc6df568ec8061daedc063a750ae35b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae670852976f7d4a51302827bf2f4938
SHA12e1b7caf6b006d79ce8ceee77d44136e2dd51b6b
SHA2569193df9486bdc93b85ef92fac6a62cdb546666419b152493076994fbdfa5530a
SHA51288782e3d8c3a28cafb797a65448755f04246cf6da5b8734751484c92e5d5967738de8b5f70e212a65ea0071b3ecebc1e83645fe3ae59fd3a6b5b67637ba97a8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565d08360ad5899e94217098da876dbc0
SHA1ba6d3369812e63616e64ba2331cc2cbbd778d857
SHA256ce73cc74dfcaf2bbefcc3ec79b69da5bafdd63bda63eb535d3f136f2bd7d0f2d
SHA5128f9da8fc2ca040364bb2d11bbffd9519cc78a92e7a741f43b49607430ed935af94e852aec2e69853d46038ffd4fe311544529cc2924c72c3ce2fd99b4f53f43e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5579c8f0150032e6f992d17fedb6c0da5
SHA15e7ecbcc8ae86c7d1c1a003e957165347aee6361
SHA2561878ccbeefdeca80fc21775d7ed39c365b7fb743d11f6be088e71064fa55ff6e
SHA5120c0f5da0165786b818910ace1f6426d636b534db990e2a9c6161f741dfcf918626467b4d58878b8b33f8289b091aa15ea06626f6b559fab3f69121a8da1ffd72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cb55c3a68147ce079d174d720d13968
SHA1ce0887b619a79bd70e74d63e2c249baf3cbe2900
SHA256b585339609d0f318426e3f5a890d227e0324164522c95210d507f08c0c21d654
SHA512d8dd6894bd3b8c0d4352849b231f46fa6591908327b74d2d900525c24ea38d5667678f29e01baeff49ec91b2abb822ab994513567268dd85749039d9747184d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5748c2e4d12340d1e19a10a39fabe82a9
SHA11e48fbf9f4a5098c31a2c202088edeef3fe2e05b
SHA2569929a616c6036ccc141880875377c6e8775062fdc014ffded1d8f2f3af9f0f83
SHA512243ac60059bfac465cc082196e3c20231e69bc0b0026729a1a50471f9d516132ade37d83cb009f20a81af54caa228148f6bab1ea3177b10396726bb902946653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc683603047817160da9bbe335aca27c
SHA12047fd503e9472fb5dcd0d8c46700e15762c95be
SHA256fc9c92e74ce6836b8082a82af1b41b97e9a35e3412e6077d2d8de355b9b371eb
SHA5127d539ccd591a832f9b19505478f1c6e0dac03844e2be085a7a3d95891e5e0e818ffa2db5c3117f3b94d49f066abd183003e8b71747b305dcbad8c91deb6c05f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569e1f4163884803581e6643aa297a8c3
SHA12d21693328d757e64e5b315627071453df0090f8
SHA256686e6c8a4060370add2f72821788214e1be7531b8daa0c5d363fe2e3fbd8de9a
SHA51235c026bbe09d349ba9607b2217b35bda4e30de9938fb74e23e48860971b732bf1aee693f1ee6aa6f518b794da4832bb5861c91aafcd6f7e59e4fbbe94a9421b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0775bf0ee810cb79c09c899bb3069b6
SHA1274006abdfa93b19ff8c82bb36fb8748a25274f6
SHA256a0d0d8888f007e9110be05a179643ae09456bf83e2a6056da4a4b15eb0599081
SHA512754ba4592a1096db8240979566006647d16b6f87117b09b127abe167a6fbf3500af0d95d0d8423197d980b008b606580ab8400abe3463b0310ecf079f4ef3c18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c64b32bd91382f917056a6cc7036965
SHA1d08d8c307167c07ae566986062594d35ef90325e
SHA256a17730fcf74164e4c8aaf2a51c5f1bc918f8e65c84bcbd7be2efb8ea21b7fc21
SHA5124b916c8571b5e8eb2adbac03f73a9a3f385b21bdedf4a157c64be030d5a0995d15a8c336d6106aeecb67e70db38e47c4ab46b1eefbe176e255b2e4af7324ff35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e776329bf83c44f8f8987ae4817ba565
SHA1de6b5fdf81e84d0338ac1a709a069bbe2ced75e3
SHA25634e3dd3a56e2e6e2cf562896ce98818081e5d111875f789d1efe3b869fa01630
SHA512b27b5f71420083bfe3584624d06381fcd9ecf66db7a7bd4f921fcb20cfbbf22bb0b47e063726dde7b9849312e9fa7f1ee80cc80d6ce6dd447bb4ab33fa297009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fb4e1eb95f2bbeffd62aef38ee51c3b
SHA1079700f719d932aed537723f4d4017e2ffdc2a2f
SHA2567ed5b1fbcb7e4d1dbdc91868fc22ac48e84fab53c38c4e7a29f7218c2936e78a
SHA5120c5651584b522d87ecd3477b2872f04f58e6221b3798fcb91e0422c8134029dbb1a589525ce8cb4c13217dc160fb919216f592437bb6d53d95e0e61af083d676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fa6e102c5bb0dece92301cf1559812a
SHA103895c00614674dc83b452fe7f3748a4f131b913
SHA256e8c6a2d28fa6b303de2b395bfc348d4265010ac2dbf2225ce39cf84aaf9d3c07
SHA5122a68eb94852dbcc84f95511aa131cbc435d6f1c33bf7b9fb2cd3e4468bc14cb20a1b992be3f71c951895276c8a2364e9736c495830ffb6d873f2bc59e4644809
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b