Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
fa855af1ec77440a0c230d7549d279a1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fa855af1ec77440a0c230d7549d279a1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa855af1ec77440a0c230d7549d279a1_JaffaCakes118.html
-
Size
6KB
-
MD5
fa855af1ec77440a0c230d7549d279a1
-
SHA1
f859a1e9abb0305fbd4ffd5d4699e4e52db3c5c2
-
SHA256
a4404d09a95e69886798ed2744c9b24a40941f91541d4316d15221363cb91f67
-
SHA512
624d70266dba9a6b4586eba683c3cc91b7e8ff9798a8f2e51cd54dc4e7831dc1eac6045850eb0ddf91f7eb8fa856a70ec450780c411100d761abf23b7adac195
-
SSDEEP
192:bsCx47zPc9jI2OHZDX/ORw3RXPEqHIvKxm/KEYRRqphnWhZVzaxmD+T:bsCU6EXGO3lPE5H/KxaphWhZFS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a03cec9be410db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433607034" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C69754D1-7CD7-11EF-838F-D692ACB8436A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000006055572f95f8e4c3b09ada07c132da03573a81969bf2321bf95f82543de73763000000000e8000000002000020000000ca58b7798944f9ada8b9611f8f8fee7cdc628f5eecc4f17d5bd1f5c3623ca6e52000000025642817feee7b4a19e3ba6b7872e326dc43a99341c23bec4d074f631f2e44e2400000008b2b2c4f0bb64fbad53f04378511b4b6dfb1bed1e17d89998b2e457f844a1e95f6e89f4020f89cdc1de8f44112e00b8bff792be5d466f3dbb54203f13767a165 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2596 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2596 iexplore.exe 2596 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2440 2596 iexplore.exe 30 PID 2596 wrote to memory of 2440 2596 iexplore.exe 30 PID 2596 wrote to memory of 2440 2596 iexplore.exe 30 PID 2596 wrote to memory of 2440 2596 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa855af1ec77440a0c230d7549d279a1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2596 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a66a4e8d51f2962324c0820c56bcddac
SHA121ef6575eccd5dfcf1c97eb0458cc14da0ce1216
SHA25661f7c4e7e9b6100a4b50b486cc73be486b1de8cddade40e559c395b734804209
SHA5121c0c865a8d51f5ed08d3ab02f728ea1353f12cb301c260eb5d38df91b783c29dcd2ca989a97351437ab8c98c73567b88d6b36eb452ecd4468afeab5bbf8c01b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572b9ed320f40968d7ada3c96e174fad5
SHA1d2c67e8b8c4e1e4a70b55437c3366ca98b02a824
SHA256ef7e51a829d1abb4ef1ff809e300a76b2f4fd02e8c17105b61e98bc0a588bbcf
SHA512d8e79d4cf78eeec72a099cc978ad58e47c51cdda4ac286c425481556cb1827cfb51684866ac138799be64461fc2dc129560539e7a21cfd93a623bd92c5a16de4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8c20dfcc157fd3f9498bee1a537cb98
SHA1361b65811398b8cef7b305b80c8c3d6030bc190b
SHA25689fe750ad0bc2d993a985f5b550ddb511cc6705f13d24f30434bd34cbbf22a05
SHA512a4ff915868effce5d9afb7766a79660a092c9c749512c425b47334eae27366b5d29bc0b2d5198b2b782318068bf30e643bb08061eeefe5cefa543b92bcf987b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e6fc9d7d83646ebbb420e8e5ef01d3
SHA151845170dab35e1f5c0129fb837a9c25b91b4d30
SHA2569f9d81cb160e1088161d18459b0b83d602d47e7630333cd60ca93a485f7161d5
SHA5127324fbdf9d5915680952424e8ebc0e6679bc8121980deaa1de3cec0a00429aa624e0f955451057ff31f990735526c29dc1817efe8773833f7815ae5a1e2f3ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0d082f5a54b17e63f0fce0993901682
SHA11334255c91ae92e75b19e580b312d3aa5a50c746
SHA256daf6c8e964387da72cd6b30e7eef0e065b503b75ac46e0adda261473fa5bfb99
SHA5121aa8466362d4b2ceaf08be61c5ce149ca9b58300d138fa004318112a29f5aa0c12831286394b8031da8c6b14d87e4d29534ff407b55509de19e87133286b612e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5016d1451cad941a8393a47259d655aa3
SHA159d4ed24f7f6ad3cc9e58745467d898a0c91caee
SHA25686084f18a1ac34d0e10e6d3618b2ece2a6dfeec76182ebdc06ef5b0bfe2ccc5c
SHA51269204a6b3bcaefd1ea51dff7b7c2a30c00df455e0e2f9e1ca0d81c04427aec67012113f628353d627c496c71068a2a994600967cc3376c186cfcb1630f7cd586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540f71d1a931dcca179fb4199bf287088
SHA185a595aea58590242d1071e36ee7cd4d5caeefb2
SHA2568a11d69aa7c6dc6aed471edfb374d15bb86b2654089de7dafa005361a6eb5594
SHA51224c4df7518576e1fef0e8fe69daee218e458ef464686fa46a6ba5c72eeb6d9b64024b30ffb5cd0d1867baa0c235604c589ccfd0501f67c37d3cdf271cd151bb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597eef0b4667183091cc3c279248f575c
SHA179c9cb54943579a2ec2152fb55a5baaa7c5d6455
SHA256c13345077a0c124033dd26d07db72c5b7f87f417e83785edda3d1421b4f69bbc
SHA512ec8c0f79060cf57669fbaa5f20f3ce28263e9df921cb8fb1b5efdccddfb37c99cab66291b2f7506048e612fc53a549da85893cbe8c3036938da9014b39dcbeab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5350cab59ede45e5c0911328f423c00ad
SHA19e52b56b2e222735f3e776d304f34972d0d2c178
SHA256402d06ed14127dc5ee41cd2ec5d91d6d8407502f8954993c53a8c2df2af9904c
SHA5128b8f16ec01b1cb5fbe79844b0d1e600c5d28809a82d8e2cd4e73036140d3df5505ac9d37ad54bce4cdd51511008ad88bac17393883c55b8d2b5ce88949057f44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576aa50904c853b81637e49e4a913003f
SHA16e8586cc03223f7fa23148301608e91e66c9a317
SHA2568496d978960c02cacc55cd27426dbed0c4e61cf05abe655fd3121391acee5074
SHA512d96e526818cae49ad27c784f3b206c0fe29297ecf10352b2170e885bdad3466477177d1ab2fb51dbac71212089d9339c6aa7e4d4741c50fa289986f5b619eb98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5952fb81a793abbf74277cec513038348
SHA1e55d22f89e2dc6b39b8b406c426a46751a02b346
SHA256091471c8205c711258eb64d1a79a3461abdb193f430e22eb2faa44df08b2cfae
SHA51237e91ea07d98760895763f4cc125744132b6236dfcc512f226c3c61681da3b06ea0d1403413e0c09d934061f40c99ada10e1826b154b78e05a5b4b4cd0cd424b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5083480fc896ed744bade215da51c7b80
SHA17df1d101a8f8bfc6b1213db422ab95a5e0d615b0
SHA2561e98f088a24ab91ba36793a4a03c19946be60b6669cd42d2bf5774a103ed2b6e
SHA512e4da28faa8f23e279014ea945b4db651aa072ef20930bb9f4c9128574156087a54809a5c71e462f1d09e64ea525725a5c92980e8179cc9595624c7a822f09587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b4a72b8fcd3f9274440c728e6595987
SHA1d8af5e4dfb39b3b81b67d182062807eef7102f7c
SHA256b65388ab5fefb063095583095ef26f459a5813df8b02c28a7553700551c908a4
SHA512857363808daad5bba8e081482ec72e5b266ddeca907fd303aff01ce06c4a15eb0b4e24c9520ad2bd9ce6b60056558b584d657cb151d58008ab0e6fa65dcada3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5481351835bd55848012127442ae03c90
SHA1d7862531b26ae8eaecf52c08a13f541fbddb48f4
SHA256c3447eecef2a3465c51b4885b0a759b25023b8040c1218d1ab755b8259ddb52c
SHA512e133c97fdb72289ec58c09932a4585e7400794f4d9d03a76b3fbdb3617931e2254b5a3a79f39f658b5f65e295cba267e9a3bad58fd537bda0a7d1c04bab9cb10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cdc9722b00fb15c8455228a4bce7141
SHA1f80807c9905e3a96bc9e1be07bd5d1269ea01657
SHA2568fb1c49478fff4edd436a42454bb9ffe93e9ea2aae5c301faa5ce34d88420b51
SHA51245a4b378c7e7a96b3e122f0f9e1ce96cd5d02fb615349880741cfa5329ba3b0a6e05040e87e8ac1973547591d98e4e35c1a08238d1d4d238274219415ee5623f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5096b37cb265204ec4651089626c35d
SHA1290d8ac03c8482d1730e95fad0dddd4003c67114
SHA25659955bfb5c4a38285808a80f28ae77f9181b0e21c9ddbcacd0ea2161af8914fe
SHA512cf00b006195027976ee7aba324978ce5a8cbb36bb68c1251d45dfbb9c15f023866fc58a57b955015e9f547bbda52547f9b36fbf58385db9fd8a556a9d621a59a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bcd8b317c1c2bb187e6d8f4e625d4e5
SHA10eafbc5a9ee7446209caf9a9e6b3bf732ac63b67
SHA256fb94c9bac2019667624d081d4375c492150ef1365709b47f57cbaa9e923a86a8
SHA512ac605e8d5d51846384946ba8d6b1bcbbcebcb3d0df8da348cd465f0c68b86424f5b539d1a39fd59fb12b26b9a70fe04f5e232d07884a29e0bb76635590d219bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56453240abe79e327ebad7441f67daf2a
SHA1c42e326641344bea1f22f3cf1de9dc440cb7f038
SHA256e5eee87487d13e8286bd99f071cf710b5f766159d9394cfe0e747265abef4f6e
SHA512b5076bdee94be8aa61bc40031cfdade33f08ee0d8f94d832df6148c6dad06fc3d84a16514103150c07bf1b94bdf1e028f2bff00cd3db241cfe511939498d8dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4c43e380dc629839a660647de9b1445
SHA1828d4b0ff13c9fe339d7cf34a52546419be1ff34
SHA256337554b8f5624025e27d4f4fad44f0f205dbfe626e84f34e94a4ed8f7f4d100f
SHA51209c8f9a7890fd561d3f6f9293a74ff5321b5537f145d9c10eeab1adc04155404f994e68794f5dd9ea98d16831ae89b546b5991f0aa18a2a557b9c4994b3aea80
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b