Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 12:20
Static task
static1
Behavioral task
behavioral1
Sample
fa65b553191d5d8a45f18b449917f0f3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa65b553191d5d8a45f18b449917f0f3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa65b553191d5d8a45f18b449917f0f3_JaffaCakes118.html
-
Size
68KB
-
MD5
fa65b553191d5d8a45f18b449917f0f3
-
SHA1
f3636b05586b395be4f9ca08d9d3a961524e2d80
-
SHA256
b245822d25182d2cdbf670f84a57c3e8d14237d36bc3a607efd28d4fec341260
-
SHA512
44479f0e8d1c9015d3463e30548c2b471ac086edeaf5f5d4ffb42cc24bd905f3b7322db5bb2459dd715fa3ad2ef680a9eeb92732d86a7b31bf09cc3d3c91144a
-
SSDEEP
768:JidYgcMiR3sI2PDDnX0g6jpsjAp/SV66oTyv1wCZkoTyMdtbBnfBgN8/lboi2hcc:JUW7UyTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433601498" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000009d1a05ba8e13f9a82eb10243f1ed66979700b95b78ee43f8eb879028d3761557000000000e8000000002000020000000e3ea2e756ca19fdd9d3a5e310592f427402e33c61e1effd79b51dee3c58dd32020000000f375e085cd1a5c260146817003fbb1fd8a209cb3756f354604ccaccec64cbbb040000000b597b2b18de19542f1ed6e5fe7af6091bf8698dbba256709d44549252ea50396cf672f1143f273508842c2a547b69ad6b4a8869147ca5ec0f9d4eb2a8fd9be5f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E2E2A931-7CCA-11EF-B954-F2DF7204BD4F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20e87ab7d710db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2708 iexplore.exe 2708 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2712 2708 iexplore.exe 31 PID 2708 wrote to memory of 2712 2708 iexplore.exe 31 PID 2708 wrote to memory of 2712 2708 iexplore.exe 31 PID 2708 wrote to memory of 2712 2708 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa65b553191d5d8a45f18b449917f0f3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54edf4775ae00a18948b323334a199b8e
SHA10ee5dfedc72fa17334c2202a937219b4bf85b457
SHA256f1f6ce3bf5751973568b313d12ff13f97ee67138c527b56f35c0906ad8f2eb39
SHA51294459ab66d75a65ab0074b18943f1de8635e3055552cf487336a5b2576a3097a6e600ca8c1130e0a192a9ef5bc2091b5cd9993db58a2ca37101d07ab020495c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b948b968868d313e3eaea665e58d3868
SHA1441b43ddfedfe75df00794f3c5b21b885cd7001b
SHA25622bd55c65ef1228fc9872292124a9fb860f3b784f8afcc942d8083cdd3a71b0d
SHA5121fc20a29d5e04954f9d31cdc3367bdc48b08f343008f07f69a97515b18d013aaaee71d014937da1b22f0b81c94ce731cc361aefe0e76aecb1d3d291668391fd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561fbe0e91d5725eed65fa0c011af04e7
SHA115374c8490e1f26e4c6b3040055188fd97f06b8c
SHA256be688fd5661239c400d4a21f784c77a2b267bd3d0a6b49e3926dd50c6782a6da
SHA51246be2920d8026bc222e8df6cd43e91ed6595091eaaf3e640b338233a3cb2a4824c75d890621a71b1dcbb363d021fa9e2f4fc5a2eee0b4be07c89c21422836881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5024f55f8a80e70baa3647dd45a9890bf
SHA18bed7bb094fe8b3d17741aee2b409c3208de2796
SHA256b539dac172f80453b394390aab4b2c18ece4bbdfd9a9cb2f704a28b33e1fde57
SHA51281176562e705472e0065b0a4688871de93128b768d38b59a12e96afc9301bb5d113930582581be86e36a18e9959e136e092b92177b38d4d68c4a443da9b44908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f637b3c0c2202d63319c89aafd75ed85
SHA1f5010c6fad60238d3b6bfb557469b7cfa3c7bbe6
SHA256f0a93451cf8dae5f03c7a02351d56272bc4e3c33e0208e64315957159b5628ce
SHA512a638bb46c87991d31a95bf919e1ac7542d3e5c3e581e5d7d5b1ede37e004d0c1c350d47dcee7e2d37c890e49bcea64019e549eb01d57da8570d08a391700eeaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c172a7865eb0a7f8e7813935e2d7d75
SHA11cceebe85c1d2d722f5e781f668dc2a6a2894c00
SHA256f25d21ec0533c972e1cee738ce41afbdf35594f38d27b556145f400813f9ed9d
SHA512bd622cdd83c0e0cc8e9de3c3d602b5d08adaf829f5edb413094c9b38f9b2de61657c98307daa2c41a4bab6d63a84864551069fc87b0d11d9436527e9cdcf0064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe7b004d99e47db0f0776361b0ef3bff
SHA1a89b4ae0d4f5c7746da89e62abc175c2f576bf56
SHA25640f9d85070dd9f44fa3373a61f846da4c88f4b0fafce4fd87fd5d3ede965af9e
SHA512f1b23e0e65af854f1459cc09309ca6f8ed7be8e610ae8799e7f87cefb70cf7135048ee920c38337b48ea0b491a55174985aa721003f31f052d462e3b76b3478b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c95a725e844c95005bbce6367fdebac5
SHA1533fec52e929e7a2a36282cc06a14a37ab2aaabb
SHA2567da89cce9bb0b8274f15b223075171c67b27e721cd9347f0c89c247946333926
SHA5120d86aca2607e08992d0217ff8a1b874554fd87983455b651f31108ae013d2fca97806f3d1cb7dd6e704e4eb929f3439db4a1d1f2898201cb4f63c6ac5681281d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b067395a22812b731a56228b4838832
SHA13c8f41e4b9ab526ede61cdca813a6ec2086292af
SHA2566ea54b19fc2360b97a1cd12b2313452ac5503e649fc8d99343b26a0ebd4265ed
SHA512d422af7e1d2f5cf1b68963f9c3c953a819c7dbe80debe87512f2bee11aea1edcd89d453fa70823ba1c6f1484c5b6a24eba00e4a67b547dce93fa7bd4fa492b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557978ff2b5401e6765340464f74e2e14
SHA108b584865fa4bcc9a5c1a5cb231b78d18a1d0436
SHA256f2e8f0ce7ad7c94c1b8d79e966f3719e3ce0775b1d2329565309f76372064ec7
SHA51268215379b5ed60f5c7090a3ca6fed5790abae3c222f2e2a06adc43c4caa820b6218587511451d1315d74c00bc7274d58fd282aa4f78389f152a73ead35be9039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51495c5690373a5aa9552a24ecf1e6303
SHA19e046fc91f77198c7eab5ae033b3384c79a6d8e4
SHA256b41a943104ccb562262d3fc0d4aa8b0bcdbb15f0971e1a9fc1da5003e15d4dc1
SHA512c4ff66488101e2fb541ee4d605a40829638a016dd3a5a43221dfc92ae214243e29230ecac404c8655a784f6b5a4845ebca9c678edbdc7c6e9e8d8a63a6c8718f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f001ef61cfd4d5ff3bb22474abddecc
SHA1c0c3344f7cefbad4cd6535fcdd7bb1a4d6888ae9
SHA2562d5344b7335eea4e184b3cc6ce5536e9d55afaf9c52e212bc3be1ab012a5c5d1
SHA512de30ab4de62cd3746f26a7f0e9c63b3a6606f193936e312ae7211a1699d010f504afa103eb99109d2464a210ae761e2dff3b80f1f38334ac7ee3920e8dc2f92c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca7f2abe20360c20c9c829ec039647d9
SHA17da750d1ab013063e7533d063d42d990196caed6
SHA2561a338620b705fea26e5288b151adb00257f278c448f76caed3b8904e0b4f0cc1
SHA512df6f910657b6c4cd74475e30d40bcc319083e16aa1c95aa68e2c408c72e48ffb2295854801168aedb261ec5eb33d22538798e60f73fee9cf56a79d989956cc6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e9bebf9647b30da5ce35fb84ee87f19
SHA14ab38298a9b6898dfabd95c83cf70aa787d6b3b1
SHA256bbd0c9a1d5d3d47163d06495e7d81a560a10f0eb4b461ac7dec1218e042a9010
SHA5121721da6b3d374730e1729796845495f1d63f7eb5bc11a6030f57d8dceb0e907f84dbe89abf550f4c4c10257f95c84d688a406ce77152bca144b2aa17c3b6d543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5904b62e96f0c041040718ae1a8119f5d
SHA1f15f0d25713aa1d2b3a05c81a9a5de709e4b2caa
SHA2564fd5fb729c2bbad4287c3bf96f1ff2455b6a36e03fb000d3941f8a6bc0bbca82
SHA512b76119feeb788210a478d250bae0725b34d55f5de9d8d8e6890f8435f2c103804002a88905261af2d756f61b8e194d4bbfdc98a0667246ea363a0551f1b6c1d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfadcd5d6d65b7e94ec4b822fd8649e9
SHA1099bccec22540bbf1c640f7f5dc800620a4e2d1a
SHA256dac91d2aee9c53e1070ff2309dce2f9c47113b474343e126e003a7e9c75aff0a
SHA512be71df9afb32c7470bebc14fd5e1912e799f8571c5e46ae1609be9d015966b583eac26dc7eb4d7f0b2afe9398e41c42cfe6aa9ce87302bcfd5f7fcfc3b0194be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0fd05f1480ca3459577028f857127cc
SHA102b5747b47e46c82fff2042bff5c4d07025534e7
SHA256058e6aa86a606a4f9446bfd88b28ee47d8ade52a973003fadb3b16985abddbb6
SHA512aedf026939b6425b751d65b5a7e271358fce682c9e7e9546b92187e56f2ccb7f8b3e6e3eee74ed40464aac8be6bc980955540e9936b9e134bfa955fbb9fbe57b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5165393b5b636286fc83cbccf790a8bd6
SHA14796f68b6dcb13851bf79e6970bf86d414c1346a
SHA256fb968037c46aa15b072a19bc27de98eb48e8703f6232fb4dea437a183145d266
SHA5123c60b0382909bb7769af670dff840160b79ac7375bbcf1153021f205f3d05a7e0387d2c7cf2a4ce7e223b1e236714e15603fa463ac31d6bcea9a43c36ea63511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca809cae585cfc879eddaee6f39f9d16
SHA11b895b6aa5566f0638894c194bf654ff8418d510
SHA256295fd582ff10bc2a559dc7fd579e2617da8b59a8745c44ff38c4214ad3a74986
SHA51275d21ba6b45c25888f36b8062b147e9cc6624ec3d79304fba1fe05816386fcbac0b3bdc72a47bea8c29022cb1cb8654d8270c3e3086db5e021492d903da1080e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b