Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 15:41
Static task
static1
Behavioral task
behavioral1
Sample
faadf4d0e45ba77bbf32bb3a15e3559f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
faadf4d0e45ba77bbf32bb3a15e3559f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
faadf4d0e45ba77bbf32bb3a15e3559f_JaffaCakes118.html
-
Size
461KB
-
MD5
faadf4d0e45ba77bbf32bb3a15e3559f
-
SHA1
722e1981a04a2a9828c23c6874ad1c1eb751648e
-
SHA256
e5d101274e26819a91119fab04354916ff2f9d42e2aa01698e1c77ad964ff1fd
-
SHA512
8556020396e6191d68cf1a3ec18490db8b2c4cadfe190ed329ae6051d54e4a080cc30f1d5be297704fef958a24801be9504d04314d200dd152552472d3a24074
-
SSDEEP
6144:S1sMYod+X3oI+Y/sMYod+X3oI+YXvsMYod+X3oI+YLsMYod+X3oI+YQ:U5d+X355d+X3h5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 408828ddf310db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000008e78a9768d98f417e362f89cff4fd97924c9929a2329f6ed6817d68318686a19000000000e8000000002000020000000023409a33569496eed2682b0eecffe8388f028b173cece48c63d63d8c1a82a6120000000acca27541393c0fb3bd178c29aa7db01ceaab76e42db9d0ec1fdfababa566eb3400000003f7ad915781e8f7e381cf00047be5d8fbea1caf2909bcada3ddae58183dd1d3d0c192c298c2a2866596b82a4b92c4e3f8a8b90cfcbc851bab92d4aaa17ce11f4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433613578" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{031D4451-7CE7-11EF-B909-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2108 iexplore.exe 2108 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2352 2108 iexplore.exe 30 PID 2108 wrote to memory of 2352 2108 iexplore.exe 30 PID 2108 wrote to memory of 2352 2108 iexplore.exe 30 PID 2108 wrote to memory of 2352 2108 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\faadf4d0e45ba77bbf32bb3a15e3559f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b52711ea28984ea3479f39d66d59a559
SHA1faa0813f5d3b7393a918820a30f1c49e9572eecb
SHA2568183448d5d86aa582a6d821e9a2664a341a86b800a7a854f45717cde76983c97
SHA512c554bb3f9b80245bb50eeaf084cf18303d6de3423ce6c25e25ff28094aad6f15092382f0289a6caa06d4e3d75d544f407726c7eefdfbbff6c948ad713b2d195b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591098a6f94ff102bfc13df636181ed58
SHA1178f6bbbb3c1314132771db1ec8cd8246aa40c4f
SHA25613e08d690a6b566aa2b16138e1a03d2e55c3896574355b97a1ff913d1e3cb0d1
SHA512bf6e51675327034ba9cd422ca62a9f832056020913c5bc1e753fd2e57beda16467be23d1e5f7e86b123351f6b3caf04e818c11aad26dd5c0fb398c15ec5bf8db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590d4de24447e8a5bbc6384ac3455b110
SHA168d0627d9c5661c78ee60c19e35286cd233bbc7e
SHA2561c375fd9abe168b7e4ddcf13e61b71b8ee0cca26eca559d79e8ba35f827373cd
SHA512fc0f71a5d9038af7c63756120d36d7104c71afa5abb1b02b1e18bdcebbf5046c44d7d7657a322843a723e2dd80863af975ed9052f8f7040b4b289f8495c1c93e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3626c5145797aa97869155092d97f51
SHA1e71de1022a3a34c9f438458c662c527e085e1b36
SHA2568d87a96bcccb9330bc2cfdada9bbe90dd9e177c3a92405622c5c1961b8f8f865
SHA5126e2c4361bffea6e49c15fe26cc042ecb7a10a8a2b090f853134e0a09df3198075f741ca84b4d4b9dab23c2df3725a2c0f5a4531edefa0b92d82b2899a75b7597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af8badeb8ddaaf2cec6b9a71da9d243f
SHA1737cdc83d666ef8d85b79a1b174173902fb3afa0
SHA25697a9acd2f5f8298579e53dc46eb53b3eaac89375e6d96cd88dc9e0f0fc42558f
SHA512f25c1a599ab6218a61f1a47b26eed96bbbb4e2a40c5d6221cb39e33b901727988e1ed6a624f3f9a3b8d4132eefe06315921c00c9a2022783b7e15205862f9f40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1d557be975d61395d05f6e4133eaf82
SHA1ad24610c4c0a13f18b8e44c7d5e483d0d7f4c2d1
SHA2564467f2fa94c24e483091bb2abdbabd1dbfd6c9319798a830571d01a66b8c3a6d
SHA512c73f19124af28d1458225274e5d933f8ec4b7817393d3a6fec9f5f17d3ad66b3da30e008733cda00bac4ceb11c5f052453cb675418355fdfc2c14c90c14f645c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae98a8150fc89a6d8ba755af53816ae0
SHA1792cdb244ccaba2731bb11ec866f9d8085b7b79c
SHA2568b29645db4aae6aca5159b4bd57222afe10303a5e213feb4ae71ad60061e3a88
SHA512c0632b5f96ba2ca2275d70371fbef95d4cc95e20fa4746042f0855b1972e519fc5bab3e329f678c253b24519622c59b8550b14aff3df220e28823fc6cfb5733f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536ed606e2d03877c01c4677689ad813d
SHA1970a05d890fe4a184d6dfa7053df47aed9505d5d
SHA256a10e8dc1d9cd907b4e7be8134999e715c008a89c325ed34540536a4ec73c5d9a
SHA512f24d9ea07c7439f5d7116185bf5fce3d55e0f6b693ca5387767f2bf447903f84528fe60d96216de50038cafbb6d8e504c87f62a31f44943d90741cf0f0404fc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515bae42179a4428e233265027be4508f
SHA198d4fb600c58d2743fcbdde0b60641901914396f
SHA25680edb34e81be3e6ffa468b89be9cf22539c9bdebf6c3a64f137d1ef5042d50f8
SHA512b2005a2aa3f170083f1fd04259b45bf08d3b89160ce50bd6d9628cd6470c0a47e5f18e82aa94cfedbe8fb6dc413eb51c03a0cfeca4f2c1566d7e74d4942fd345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d506f4e4eed5b4cc002a1aa266d5a410
SHA17e559b29942fc83b3323fc7091520a6f36727a2a
SHA256cac1f4c8919fa964a33f019fdbec2aeb4a5297d1fbd1b2a6abda4db3249ad65a
SHA512aeaaae465268365f421f4d05a45d111a711fe04740114cdac7d0511c0790dc6bea715b4fdd04002eafd7b6303eb301eb2058ef4ca3751616e2a6fd6a9d0855f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0005d893606ac0520cf7b77e08c8a1e
SHA1d7040c397e71486392a943ade79335e8377ed5ae
SHA25670ce663ed96fd4d9c8d514817aa68628291d336cf08ff18fb9ab79a142f6c1d9
SHA5121a741979634000534a36613ba94499152bcf098bc1f3821b1043d41d141b7242fdad5de2049802357370ed435937bb5b512731a52ca2248ccee496acfaa72e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a67449a063e134f49afeef38069e3233
SHA1f7a9d407368f2c1e58db50b4c3ea312eafc45795
SHA256eb046e7792a444f39886cf144a19bd9052e27fd572c342e20716147b6db13b7b
SHA51209ae3c159bb878cfbfce853231bfc668649f317954a0b3c6da6e9e2dd4a1476f0bc73b29ea28bf7ed1e1bc800ebb7cdd75e744fce63c5200cac5af5a30946876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5401e9a9a607a02fe259db622b7488868
SHA17797de4ad2aef5bc26e3cbfff5582c7cc7be6723
SHA2561caafa72bfd211fb1012c44e800dee74002c06dbd868a594cdaf22bd8cbbcbd0
SHA512847eeb5ccb2a17acaf4f239bfb8171eb86d2b4a08dafbdcaaf66898a8fc835f952352ce2e88dbad429635f4ed158b3a21f392766251aaa9031a74c3b885e9412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aadcd0d6162f187bcad3366633099522
SHA123feb7c9409f0fb9f86accc001b455bf244e324d
SHA256ccfcc96e76fde828ead8f9448b81bc889ac78d3d088a3147c2c88fa4a2bdcba3
SHA512ec64e9512d4be901a856372598561d936d7061a71536b1fb77346926a5698e718a8acf5f9aacabbd569d99ce032855d906550406ca497e36253ea6d1f706e401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58102a8d9fa840655d89a5a82998abd39
SHA1ccaa70304b83a73496cf7eb5dc2612a509a6cb62
SHA256c345d7670dd4e3746b2989dc0e049b20f553e072c4efee614c2e9e5ee3405137
SHA5123f78b1493cd8940766d0fd0df4a4910c378b3942b4c4015dd546d611e6f39e5584906a0107964b47ca83606f23cfc8be37cea265ace35d875e062ce62bf63c15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbbcfac859a6711c0015a8feaa67c9e8
SHA17215ea3dabc697bb84d4c81c272e3e45fcd00e4e
SHA256b6b30e33d746bb9a02cf5f4acf84c12ac36dcf309287f5d4e163f78b84c9725a
SHA51280fd96391d2edfc9b2f4ea60aac6ad15f65332981cee58e2d63b5ff97d39490eb281434c991bce2b3575fc85f12fb8d13217a4e398bf467dac8fda9e9939249c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5066891b7f6c9d83fd63704bc767493b0
SHA134c0fac024f86638557a2fd7aaca6cfa46b15920
SHA256779f3414a43071b68c43e3c637227c0ec75fff05fa0ad519657ac9fbbd0520fe
SHA5129e3b56a4a296f63e43db87d1b8e1b70c9cffce12a111edaa3120303717f4bf4a88a79fa4a1c7979ecab85130cee2340bc62aca89e92663ef2be9b2ec94d95da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3b8a2fef06ec83a5818e2d6664ade4c
SHA1b61c078af62a619d2a522322b795aedb4800d83e
SHA25616a5ae8ddf7bfd39fc87765786f9d80d9b4e69ca28b1a87dfa9e15aa18a6b1ba
SHA512a0b1a25aa0225793f2a44192a9bd1ceaa16e11787265bf3474727595dcd6975d6a8cac6f1d2993b4a5e559ac351b957afa965b6868893bfbdcbd15e0bc096045
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b