Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
facb3e906f57f19ee25a7d8d4da33b09_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
facb3e906f57f19ee25a7d8d4da33b09_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
facb3e906f57f19ee25a7d8d4da33b09_JaffaCakes118.html
-
Size
1KB
-
MD5
facb3e906f57f19ee25a7d8d4da33b09
-
SHA1
7660873ffc8cb86b2712e3a353005134e97ce8b6
-
SHA256
d3aae41be89eb31d2b3bfbf8e8cc257ad2a9dc4756966fde410415c04c1d68a0
-
SHA512
0cf5f6532f7cc9db764b8063899e3e299210ae16509bbe70254607849368664ddc01421f170868161cb131d52734d9b994d669d6e876d27dc024b0f0cace6ff0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433627985" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000006e10d53840e5a4afde60c8d8543ac85ad717e752a908d6cd89e02be4a8882fcb000000000e8000000002000020000000b055a942098ae93506a5ab04a91e14385b8495fa5df3f433f086f12d9901a0aa200000006fb9c7e4825d65b0d7f7c67d4b082941fbdc4f0620e9440479ce263ca0d14048400000009fefd436ae5e759bfc8805b2dccfc3d4c82a5558a8281975f051e2e6d23dbd457f399361f8068bef21bafe223dabe27e11c7560cbedf0427b56f2646fb751ae5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8DA945D1-7D08-11EF-AF16-EA7747D117E6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0454d651511db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2764 iexplore.exe 2764 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2668 2764 iexplore.exe 30 PID 2764 wrote to memory of 2668 2764 iexplore.exe 30 PID 2764 wrote to memory of 2668 2764 iexplore.exe 30 PID 2764 wrote to memory of 2668 2764 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\facb3e906f57f19ee25a7d8d4da33b09_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551731dbcf9bce813aea0a556e2859a07
SHA1513bce5e3984a9e6fffd92f167e5c71fb3645e4e
SHA25636b76160ced2b1211d450e89a61b0110ffcb0771cd47ad4c2beada2acfb82adf
SHA512c5a479726688ef942c1f847d204e78b5a849a93a94a55966d44cf42cb3a9b94c31483c6d8261d5312d96ad669955033ea38274c482d6acb48ebe10b669886caa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c378660c886f5a4046bb111ac8daa6d
SHA11ae362e42917f1a1d1ae71194f5bdf14aa695846
SHA2566091eb0d5bf47866c0c867cc093c837a3db958903813840a8c1c2b13b3c55a07
SHA512ba95d356033a6eb098108f512a52c14c1021ff58323befcba3bf1271ab41c3a15cb6943b1076f39be53233128673f5b6b8e58c06fb5390037c2deeef8e576654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56770fd7bc223df4e1294f26e39504956
SHA1c89b9eb47cd5f45a9ddc8b441efe38f68a1239bd
SHA25658fc84d649ccdafb2afa1a4872acadf86461d6d1555e019342b2aed62907e188
SHA51296bcb212ec54c4b2abdce6ea5f726d1342aa722608431851c408310acb9bdcc1c2cba40bbc9b2959b5127dfe981844b8f4a8bb36b6367f324e817801e0bb70ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a73be2c8cc5b74b0fc21877a3d32d178
SHA197239feda3ba57e9dca29be97d9822b734b6ed3c
SHA25600f398378b49272c8d6fabc5f387cc63d64c5c214ef286729cfbee37cc934cda
SHA5127f33f80ce0da0ae2530563ae611422abf4ddd8ba7bdb1f4faacf34f7daf5a44cec8ea562bccab99c79c128de297adfb284becd550afdd065e305610d8fc5ebf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa9c1bb03b7798a935a6afdf0221828
SHA13d76d2c1cc5a519a67c25288ec848b700279464f
SHA256923e835fa2c9628e6e3654d157fa97cfbd4a1460c17e96d3be49a4038efb91a3
SHA5122a180cbd0d01921761316de03fe57a3cf5a61fa2454ef6c8aff3d77db5ac4d77318fe3b6aab5ffc64092520789a196d1c2377ef456dc72bbc6da617b920f3d99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539926a83850a5d0ab0b523eede87ccbe
SHA18d601f0eadd9c8b58e69725c8e97c5b270f700aa
SHA256c20081e28b6ac8e0fa7ac92202dbbd94c4d5e93957cf61757312831dad6155f0
SHA5127218362a88481281a698b633fb91d018e9ac0b1c1e929b8a7be707c771c4bb518f37751409d5b1ddfd49ff81b8818a899a48ac91e97da86b1651631a5a8bc148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d811a180fdb8952581e2d42f3150936
SHA1ff36713d2590c35c63ccb6066905c23188c587b0
SHA256ac38fcc667ff784dec2da674d66d3392e788ba6c0f674cf1133fe032b22dcb11
SHA5122fb3a5c9f01ffc5d67b0033ed76e05a2eacda5b8ee28f107c60d4fc3a4c4c891fbf2683a0f4a10a71286a08d0dea89c98d01d1db828cd1fb9aefec35d55161ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3ef9dbbe07ca448828ec384c963ed26
SHA1715d57b0b36f8dbd0463b5d09e317ec63027e32b
SHA256c3a548e26b6ada1d607687616db82777d75d174f5285948f44bfe065fc9cdfc1
SHA51263bbdb396f5190f8bfa01f79cc110be01b06a9e6cfcdcbec86bbfbece00e14d1c4fd1334f6d0021110dc6a527bd0a656e7c25ad9cd998920692c3ae3596218b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5554f359031d93f83ff79dd97f983640c
SHA170e63ae667d8f98e51ae714fd991998fb5a08576
SHA256efb161521e6626a9adb3dd562944a77c927f53b48d629a86e2365b684f8ba914
SHA512435a104cc92b59397cfb828a212a891e9fd74e68f0db1bcc28ad3063067e81e0211944b17945176b38509e606425e231138e0ac8090a34e2a9afa465c0ad2bd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521924adb59b6bb79a8d93292dbac3725
SHA178abacbeba7f28e23b5ae15672572aa47366007d
SHA2567281a2b477ff38d95b1f534739db3df15d1954c65cb5cda1534194ccd3d2bba0
SHA5124bc1d24ab8b12ea2a9d66fe80150ed65a203c015b3908f9ee64eb0f3eb00cca37a968f7aad07a6e09a8a864e58f30d108b5a7f6f2fce2b934064b75957f08289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505898e73a82bbb96654085affa043eae
SHA15c335d1ffe1b6a01e2532d45a602f38dfb56279a
SHA2566c46495c4325c8dcdb896682144516410d827bdd3a812746cb4e06fae39b7b75
SHA5121b1862b2686da03b1c24488c9427b19829a98664cafee27b91f07f33bb45aeb957731e6aefa0a14f107a8019061854ec92683e60ac14ebe57088931148d2837d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53251cbc61ac171bb52a7bc3a03299a01
SHA1c85c013d8386116dea2564fb5bcd9928290211ba
SHA25605d3898cbeb955144e2f3ec102b48a0d11042f63f2c6b5cc91f566491ea17995
SHA512b6d21bbe4e6c953accbecb7e903c6007f8cb93307ada124fc96975c9624efeff780f6fcfcf5e5870a3a6a22393432a891e34d12eddf4d7b121d83bd5ed1d13d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5137ce96468cf77f864816e5901fe8189
SHA1cb7ac61e7dcb7e27d88f992bf42df75548b7e797
SHA256369fa8535fbdf3df29b85619ce6fc9466e187c1f79e1cc23d1b4020643b3343a
SHA5125eb7d8da556979a5ba3ea8315723a94abb27ca435570139bf83a26ace3d83028a29ed5a4a5ac4d394fd013ca0d8bfc4500c6002bb6dbe6446ba276177270245c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac0eb0ed5194f97523c410c717da7d4f
SHA1ac2d0e0d96e966e327f436c0edc682bbd3d62605
SHA256a7cb7ea2e60a05a2c31add024ef1df5cacd257d64923403258957a405dea5b28
SHA5122535b3d02d5ea8d09bff5021c186afc73d658e908a1881dd4a2b0364551d02a1b20b52cbd312648fece257f020b25ca933af14658186b19f94cdcab39b57ae1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582b3f91be256943f9ae6742331a700e0
SHA1318863ee1ee877d545c06dfbacd8857c66baf544
SHA256b9c318f225edc9a424dcb99d8be5ffd0d8d635a4a545b7a56d082c0965ed2638
SHA512b11fd8ed0363787d9aa5d20181634b5867bb392beef95b1d5d859ab40d8ae08d8602e193092ae1119c72b9f9cda66b7616232344e6a26b8667c1fc87d68955a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a167a1b4dd3f85c6a0e3350200143544
SHA143bc2ce893aee5bee6d7439264d93d2260b724ff
SHA256494f384d874698a49cf067792edb93bb2f22ee7b1a24e56ff949a48154a8ba08
SHA5129f40c801fac3e6c5ed6993796155c1a1d99e07527b60904f2000ea516e26be4e417a6c142af5fb2211533144642163c1b7719f5e2e90229fe135e8a179a49c4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594d81c7ecb050ff02f7a83fe834d07aa
SHA1684ae68d02a42f6ab5f36f417ab6631ec9c8bac1
SHA256f431be582a75a4871b4d5183773d23e4bcbe606d244b06efbf18e4a66b7a4003
SHA5126ba6bba3efc2a31b0561d85cf8e64eaf70cb616920f4b465c7754f12f04d6026ae79c60ef66dfa3193c23e437294f46d89d3d6ec19301993993ee806b1c2a270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f652a734beb4323e01ad53ca61c68ec
SHA19521cdf111fa6ffc80610f6b0dd9d6e9587a83ea
SHA256747c55af5adfc09041674477368cb960a971699aefc7a3fc89cb3659d10827be
SHA5126a897d351bfeb0e6acdd9e6a1545c3cb95a963dc1ba8de061634c0bebb7ec0ea4e9fd53e5d3e944c0f8e4da0fa52c3cd4dd103d7efa2433c6cb3d9663c54c5ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dc11867ab2d2a8c9f7c3412bb47aa70
SHA1261f350522e0781242ea0c624bd8c9bac4bd923f
SHA25666a088038e41f7718da7a7aecbca1563ed051db7a0db4b6dd3e1324dec2502c6
SHA51215f77c829b99a82be0c0e9facc1678777607e443cd1d72fb92b7f4929a1ec1168451a94490b1204138237e44a611318069e23d1e7885fa17b65b6a9fdba75012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550bf133231ecf5b46b10b024b2ee0625
SHA154e3e34e0acd7e61ece7c4a3c15fcf7ea8ec2801
SHA2561cb2a25ee7805ba68a04a89b679807121b86c7dd72cb58a5b9c3d2e961e51c47
SHA5121fbdbe7fc5a205f7476694a6318aa7549881e5a35b0dcfeef3765ea891ed6f63fbfe05764c62b12dd21d9b83c1ec0368054f09eea2fe381d108e5cdfe6135d97
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b