Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 12:35
Static task
static1
Behavioral task
behavioral1
Sample
fa6af39af55c03f69a9a77dd2271abbc_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fa6af39af55c03f69a9a77dd2271abbc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa6af39af55c03f69a9a77dd2271abbc_JaffaCakes118.html
-
Size
434KB
-
MD5
fa6af39af55c03f69a9a77dd2271abbc
-
SHA1
34ed862da79a16cc1ca927a2ee9772bb72a57bf8
-
SHA256
13df4a9dfd13d7bb673bcef57858ac83ac6221e8dc5fef6782db4a14a2c9a340
-
SHA512
5c690d18687a78fff595b77bd197ceeae4a13333f22934825d706979f1cf7b60f45d3b6667e66ccdeeaad6e5e3ff5ebbaa4d564271911f205b1cbccaeca7a5e8
-
SSDEEP
6144:pz9VxLY7iAVLTBQJlPz9VxLY7iAVLTBQJlY:Z9nLYWAVZQX9nLYWAVZQ0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433602395" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000008c14772f453b0bd9f8f8a84258fceb081216c523da95c9315dcbb25cd8113c07000000000e800000000200002000000043a46b9ac85673ebda535e6300a96da94bd42c5c2c183c7dc1820b654ff4f6f3200000007221c5a75cbab2c20eeb78aab107bbc28ee8bc0afbb416d5ecf96fd6eabbf430400000006f9f16a8bfe1f973815254aece2544a15e85986a36fcfbb5796efd6117300196df0f67abf05ac13cd8b6fd63dbcbcb973d127c7695ece389e0bacef1482db79f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0445d0eda10db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F9764101-7CCC-11EF-B190-DEC97E11E4FF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 780 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 780 iexplore.exe 780 iexplore.exe 576 IEXPLORE.EXE 576 IEXPLORE.EXE 576 IEXPLORE.EXE 576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 780 wrote to memory of 576 780 iexplore.exe 31 PID 780 wrote to memory of 576 780 iexplore.exe 31 PID 780 wrote to memory of 576 780 iexplore.exe 31 PID 780 wrote to memory of 576 780 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa6af39af55c03f69a9a77dd2271abbc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:780 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5926714dba3cb2a36202f6416e1a98a
SHA1328206e1d40aa532975c352400170f4b2bfbf69f
SHA256c15947e0acfc3e9486213eff85b0ed8e4ad4ad8b364916df076b259bec6dad94
SHA51264892705ac1174c6a0c916e9bf624f808e2dfcf5c65831b8679ca468abe43c9e978959cd76753fb997a2290752403c9e45706ea175abf732e391fbb8d9f47300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a9a079f67cfaf6094885c68dd759b1c
SHA17ef7f25e9740492c96afc9143b3705e3f5033c05
SHA25611a2b5586752e8f7191ced76af40421be1a58e1bb06a4b27fe3647436591d854
SHA512b7c7b438d518957c9e488418950784c762078cf5f2f5309c54dd1ee40bfb55da6a891c99f5955a535ee1ee2c9f32cfce7ec3688dd19f5a02b597675bc57a80b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521b6773747cd0f1c8a119d18dc190c8b
SHA1b2e776ef75c39087a1072215c07d1840796acd22
SHA2563c217dec789c20426cf34f136c6a39dee4d3d00c794805342bae3b1d7f3e6948
SHA512e1eff4e3959ea037d89d3ea8762cf2eb34e8b3b5142a725f5bc950f1673d9859f156734621e05c8b5d0b5058f2fcf1e454f5dd45a0b50e9183e7544abce0ed8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502c621db5ba5a8605a4b974072e3494f
SHA1b78ff5bb1f211b84142ad165b3129028d50ada01
SHA2566f7d51803ebd7f8245a3f6923bbc950e6ead53761a683eee3f6cb97565aafffc
SHA5126964be53403136c67e83b2619b29d160e2ba904ae1b9358943c8d16b5927d21622263d7eea9bd78d857ab959dfd2ecd026cb6bc85cd5bcb907a84cd859c40d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4b0bec9499378fe0d8c4ed1fd2092a7
SHA195c14b9c9d05b5f81c65e91a7e907d62ba18144d
SHA256592a64b048356a7be45a5539ba0c152a0b6b95427551b07978a8894cb08f0342
SHA51245dd9af8363b02c953694361aee9bc165fba84694a90b888ed10486725f5c9860af004cffef33fa1e05f7ec2067378e203d738bfc4f6ed53e5b852aad3b40e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5457488942c3620ccbb40be1811e871bf
SHA12b159ed74eb11de8d607c8ae48a8ce4bd6a46a92
SHA256f66a05aa41b715ce66dcd68a9d04120851e7afdaf05503b110a6e6a10afdd1f8
SHA5129270e690f8a15ee2b61852fa340aa8e6d18901cd620cfaf11d642ae301d0b4efa78218da18708886b2594d9c3ef62388f14f08cd0887d7fc3905ca3ba2b3cd23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5447d27db33d4977b03d578bec4281842
SHA1a57d38c3f745564bcec8de9b7c57aa5c87f41e8f
SHA25616b93cc681ec704f29f8a201cc0b2cda4e80f98f11895c398c05316b0961fb60
SHA512c2010f07dfaa7f6c6f643ceceea42388cdd0ac8d0fa75e6642d26e355013b90c228bac09e6ab436e0ec6b12a8876e674c038a5ad32ad342b8521ed49ec4696bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b89a7133c79073f32c3349fb1686a59
SHA1ed89a38d915d6c73ccb51ca6c6525df0dbfb34fb
SHA256797252357479a1def6f4a3d452057d8aff10ff9c195228018207d1b2b98a355d
SHA5122d9568691044d2d4b8f0a7dfa62b801aa68661c7fe3ed5309c55ea35d71b4dcde0b315f911c44f1d341928b0577a27925f7888ecb1963fa022b8aec7a26dd086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a4693ccd10c56a4b0a380351b3bed63
SHA1e1cc2add69815d4aa93a9252a22d253a27af7dc9
SHA2562487abbc3bb273fe45c00b05626c50188ba8258760f93a362e098eb59bdf326a
SHA512366d9ed70e9c271b76e0bda997e8a76d3aa5f107b592af94c0c96ff3d6bf36235507dd311cf3e9e575492c07cbaaee5435dfe362b171dd4b06e896b7dcfd6d01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52157ba2c5016a98ef007a7f9c94660b1
SHA180593e276da8f34be939e3d4e2936c62081ca583
SHA25636b74a39ae6888d23e0904a2c766a2538bce9e016ac94d5e22c05c6c99b0995f
SHA512b3894a7327358b0c291c430dfa1fb2999a85aa517e5c39708fa08984497b9acd253de9fc6800724b0c2c1de86860b076a444d0c1a1cc65e0dc5937fa37826352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51878514add87b78ee6fe26bf3f069ed4
SHA1670afec5b1737c4f3b00cadf87ad5e4ec200305d
SHA2561d111950816a30a1d1ce13c669d961ed8b3361adebe74dc9510b2661b6334806
SHA51276704e13d085d674304d52a0ef055fbe963ee9123de879d0f202eb281115da4012368774d43d398067f3eac75049f6cb28dd46d492b8f278202307b786ab5162
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53265d9118069ac92918161d3cf4f1d55
SHA193d0c7704513128f57607bbddcc36c55a1756243
SHA256dce448339385033090fb91a74e9198f88725cb81c5ee4beed23a4421b92f0a20
SHA5125c04e8dde8471ebd3be7056ddddfd069a858b07358ba5ee5a260407c1b30c452824cb1aacdb0fea0fd8c3119c98218f9f5a7f096fda70804f1fd6749b6ccd079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6a099186edb888d1f897cdee60b45f3
SHA157cf7dbf6fb7068730b02606b2f9fc01a99dddbe
SHA256d4dd4bbe43eabd38c631fc242ab47135e34f47d65ff800eea67e55495376f005
SHA512ecdc1a71093183f2582af1e905628c40dc5b20304b414f8089ade839a5a1d2e316a714c0270276b1f4f2f163f8ae357dd6b3f548d12e5908dc9630b55a020893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6d7814b7e52969e6d604a34f777d230
SHA12a0a6ae6dfa0e29de63b8c56c8b1cfe8670923a8
SHA256846794e27ce1b1664753e4fbb823fdb74a35a05b859dd737d4c64e193cd87647
SHA512dec63de1696e44d43feabff69d21fa089279f7b4e833431fe37afbe00a74fff24ab3c2688cdb087f278ac4b5f83c8f5c1d829bce10c2a631af079bb8e1db264f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f482e701f5798d668ab0092f8ea7ef5
SHA1f9566d60d3c8267eb18e3a6800dd7df6025f67b0
SHA256f6c1bdee44eb1811287855261092d24864d636f264efcc94fc5d272b1323514e
SHA512c6ff88ba9d6829749933b9cbc727ec82d03f031c29c0bea30692cc0fd5882d296bdbaed253250496673a54e42d79b97d9b233ba8ec84c3741b3241c4b9bb5e1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5927182fd96f8a109eab310648a8035f7
SHA143d2dd0422b32c9148b12889d936c5191f703324
SHA2563e5ba058ff6cbcc1d86fa4873b9736f5a3e3543a702ac3505b6d6b3c355b8b3c
SHA5125b4bbde343d3670b2612c6d48e9b22654829bedf83012207dfa7d9548e4a39ecb28029f9a7181bf34fa237d7472c9079cfffb26e03dd232ce0911555869fcc80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ea3a68fe4fdb96200790e08a21bad57
SHA128f0512e3cf8d8384f17ada8cadce1ebb8e3ca84
SHA25624da7a4442594e24f2461735f2d63139db1da61186da372578305d5a1635bdb9
SHA51256da235e1eadfe0540f0f3bfaf5cb10c1e8cb2b4cdc3bd95daa38ccda5e5882ef0d53ac57bd960a76fc1e9532a3014688bf5c31c6be99a9e7bfc126932812c63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5981a5622118aa5016a75f9dccc73f875
SHA19f7bf2b89162b1028b841be88cfba3225c1c52c1
SHA25638867315d868c52de35a0de80cbf88ebb89bfc3d3581af48c68dd9f5f5f18992
SHA5123f83d3cd2c66bd0f93a10411dd28e493994d9d368d00c295df3ff35c37fff1cca4ba1e32b581a373790ba80c9df114a8b9b31ca218e20ebad4880093d2d89074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da4d0ec19cc4265d0180637af6f036c6
SHA114920dc99a5de12edec05690c0a7ddb66ca39dcf
SHA2565caf540dcbc9caef3286f8aa4e787ef8fa4becf18e7575a682f5b8088dc2c394
SHA5121ebb4704583254558403dab9f92ace280b9501e7f62ea5625360f553b5cfc6228842bcaa88007cacf672eb35a684cb5c4ff5af820f499c45d80c4bedfee5a317
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b