Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 21:48
Static task
static1
Behavioral task
behavioral1
Sample
fd3545b7ee8e36b510d130adbadfca5c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd3545b7ee8e36b510d130adbadfca5c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd3545b7ee8e36b510d130adbadfca5c_JaffaCakes118.html
-
Size
70KB
-
MD5
fd3545b7ee8e36b510d130adbadfca5c
-
SHA1
9a5839558330d1b2f6b9f0f4dd4323b63e48bc5e
-
SHA256
f381e356cc3bce23c0c474b8eecd9b8227b810499c4b365893217584257290f8
-
SHA512
6418cdc1ca24a59929aaa73899092ebca59fb1cb534771f0bfdc9bf0af0ae4dad321fcce9079493c66ed6e84f03976980f7dfa16c98c7afd9f013a2b4db8ccad
-
SSDEEP
768:JiqHgcMiR3sI2PDDnX0g6sn6bQDLoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JMmTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0092b439f011db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433721973" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000088dc373c03961bf9c6ffc495df9b1bd0add607325db802d63239a85ca7d7e522000000000e8000000002000020000000f3721384cfd6e908c5b889352bfeea77256d3e6aee711451cc34e5abe933c6b920000000b48159988fdee058b5672c66742d17b0426aa52cd8869d7ae5b7cd3f8d9e455a400000002d23430722fe5a1b9c32bdcabc10e5fa34f7ace5afd226f5a9cf70e851493da4072929b755c119ad56a89498db7e5b9f47f137f0f81ee40a5ac5ed197c2cb9a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6389CC31-7DE3-11EF-B525-D686196AC2C0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 536 IEXPLORE.EXE 536 IEXPLORE.EXE 536 IEXPLORE.EXE 536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 536 2552 iexplore.exe 30 PID 2552 wrote to memory of 536 2552 iexplore.exe 30 PID 2552 wrote to memory of 536 2552 iexplore.exe 30 PID 2552 wrote to memory of 536 2552 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd3545b7ee8e36b510d130adbadfca5c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a0bbafd785d7ebbf48836fa9bfd99e3
SHA1cbf3f405484f92b332fc70d82c095844663110ba
SHA256d9c11bd1a286a34483b33aeb757c8830f3a2fe5918097246f0724c00d5b20d0d
SHA512030d6669d047202768051c0a76c26012cd2a07f596fa36a32c02ab2f4d72a8431dcbef4e7b2ff9752adf44c566e40227ee053afc9427d1602556f88133f353ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3d76eb5ea0b4ad0711d8ac9239f9234
SHA11f4cbf625c41524d96afb9137002d75ac0f5d6a9
SHA256a7896df2f7be07dbfed8a9428813e41a6b958ad39aa800f0492ca5a021eef768
SHA5120537d9e681f7541a479c642ef81060a81c9b6b936f40274ac17db468da69e841440278d62033a13691a3acdf0629d3c2237ce2f8a79ed6522dcde1b56938979e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dd07e01ef74cce1b9eea31b7b958c8a
SHA1ef47fa7d9cbc18e879d47e475a2120a40c0ee78f
SHA256bfa2d803e1c5276f9eed901c06dd4f290c1c9f664e9863ec315bd7417378ca24
SHA51209bfe99a30820bc099fef7ef41b40243f63b908290f0a7ff6ffb493553cd5c7ec4c6a93c4d24afb54af1eb00d3baeebd575f773d2ea0bdc5abc656b22256d26e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdb16986a79f28df5b211127d69b207a
SHA18f64f5525662bbbfa4af894d320e071337f345bf
SHA256cfd1f4dd85e158d4aae3e7707a3cce97f2969d2227e632caf67ca52060813dd3
SHA512507536ffc412cc1a38db5c53fe86a9daa38e04c2214592b7b8ac20019ccc920a9812fad6b0f5438f2135cd2b3333f145d15ba491375c2843cc5e789915b000a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9a8271f2a797942338bc6e10ca27682
SHA1eae1c9fa17c8cd86bf2d81a66bf6459d3fb74e56
SHA25673103312d0c99276e8030ac58b8f0d686ce985fec7ea1414fd32f7f4a42d77e6
SHA5121a8f5e88f905910efb084b1352f38c70d941c3ea0c84d9545359472ce16e8656f058d23b0309f5c8c7bda906d1ba03ddbcf6d77ed85c610d836215ca2222e960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5923d6a00f75f10b01363402982ab1ea3
SHA10092a2460fb3573105df08557cbea6a3cda0905e
SHA256638f3052e7204576bce02dd04fcf452edbd5232d61cf9a5c5dfe87177e7c376d
SHA51264d81820fa297e50fc86cd3004c1b742437cd9940c535711d5ead259e32840f638bebcd2f4167e5dc1ba3db8fad7706f0c9b98eaa45b566d58f9ef11c6674b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db6fd298a98ec91f945968ef5c84cd6c
SHA1ba0189906a3a0b848356436be27857b5bfd56273
SHA25636a398709a8307f7a01ea611877654c3462e16dbb70961cc8987ded360a9f437
SHA512f8e1adb43ebeece1da3196241a691f44d18424c46b66737142e88ebaad7783c821e3a4fa428188201c6379d1793450cefffe30de75e505f6e5ff40cd43756928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5871ad24b094d0050ef249bc6ba513b80
SHA18380382d05532e7eeaf03bd1b0fd5841ae794666
SHA25665c24fb62c67035c0ced1d00320178f3a73e494783289ac83615b93dcd7812c7
SHA51245c61a6563411372b2b928bb09170ea7d43e36cdcf025aedf9875e56e53ecb81e18fd88395ea312ae9c2bae65de02a35b9cd03b4d9bf203beb4681591003ab6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5227971706aaabbf290bd97913e22e5f7
SHA14c586f6f33ab39c38eb67a5b73dd099578370d1e
SHA25679e8ba256176b0f836fcb0e987cf72178e83c385c549b7182e642b0dfb23adff
SHA512967ba5784e0511fdba60d9c2bcf4ad2349f43aad117f6dda92dd3b8755c3558abf98411b1ea9d7cb9c06aafdeb4a8fef4c6cd879e586026df45108b09f173a72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ab08e1b5a5d3458bc4dc6feea31dd39
SHA1ed4e91caf1d9811e5ed46f7abfdaffe69b837157
SHA256cbaea2c2922d27ab7ca4a8a0f9bd9b7ed7ae412a4bcae4303ad47144ea47e87f
SHA512edec5c314a05c58de189bd9983e43864f65b6126a82afcc8611020a87519864bc94d8a69c40e58b62404803d170739209e08ba07cd8e68d85a1c11b46208748e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ce39683bdb5196f161e66c151dd44a9
SHA13e2ffe7f8a350ce2a1f4a01ae27eb82ad4a6145e
SHA2567247f35d9e1548b5df0f3901d10c737f98879cd03b0bc2cd9acc0f4e98b0c01a
SHA512c55a0c6553955d80703e1f64b95723a6fa451368b6d6573bbb5b696524f063d0248c9f66a9a18e0085dba2c578effec512b0ea28fa5663e0c514302bc74ad659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53df3ef61d25105e8510ffe4b0c6fbb2a
SHA19b4a681694681b0e58bea46313d831619b3f82f7
SHA25670590921ea8120b6d8b50a953063021c4e958b57e985972e240ad80eee40535c
SHA512e70e6f5d1f784daccbf315d4a83604d885a0be8cb154536a4afabc86a31f8d6ff1e6fb8089ba6fcf1f9e58e8d13bce9d49b78d0031e56be2b732ba7d9c58f46d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505a78b6c17a0f61974ad6c8f0fbde7b6
SHA14774db08253a3c8a91f2ba875c2fadb5307e5ee8
SHA2560628dd5da87b69024892c6c3e316c14c7c421e25ee232217263db0a0f382951e
SHA51275a8bbd7e174a869705d73927afc009daa51a1e0e3eb8c3e6c3849e57dba109f1d2ca379d8b9bb65299071cbda70419e7e35b3bfb467817ca89f5e5c3c29d6ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fc5a103c2b54552d4352a4ed8be0af0
SHA1172852c3bc3c832d7e54080cfad47ccd18d34fa2
SHA256d23cdf0a379a56de5a8be0ba3d9c226d0a06d4d7f079d6804b67d510576e67e8
SHA5124cde8b24a3124abe139338ba9a64ad21c8873680d756760e64b1265714ccecec43720470d0cf6f7b1f3254177ec3e156eeb32e282c751e4fec49cdb056680ce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba45693ee2e5071a7f8d8f391878d700
SHA133a4496f96a7a6fa3063b98a1f2f914da8e35fc8
SHA2564e89501c1d1703fd235d9ef82556392728d31e0c1ec353058a5f460a52f30231
SHA51252ecbdc3440e4b9426954c3f7ed031b7d25c9ff16c137b6093ae73aeac6040a51d160e9ad6f38a5ac5eb1a4513bf473446ca9a06f790ff44bf70558c414a6a41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eb3282cce1cd3047ae02212ba3bfd94
SHA13928d00728b2bb625dc2591efff2db1858506f46
SHA25692da9f784b2a8feb93b6af64750ee283f7703681cc2242ef16953437f2ffc655
SHA512a8d758b68211c0ddb785ba0611b73f498d0a1ac4a616a6b66b31cbe65c7ce7f99c4a267ec4064edbf38207f4d7fafbb912075eec9388775c7b9e62a113de6dfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3cdaa455f793ea2d514ce7376820285
SHA1dc60a1e780f688aaa98bf7b1230546950c6d973a
SHA2562e198f6453954ecc42f094cad30a45f7ee1fb086eba080e1e8ea9b033714121a
SHA512a2ff67cfbb06e151d35dec37892c70f89a65cf107bbbe643e0fc586295e49125658b9fee32e28a87c674fd5e55b2e73890cd40ba3f32f77a94e20e15e0340c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b184c1f6d21a224031cab86b47ce692e
SHA112d518c19a942374342e74af532df59018fe3a93
SHA2563dcf4ff81e96d0441e79680595e1c37b4f66a23b8807278382693543b3bc7924
SHA512fe7c0f412ef5f05d48326c192a77fc7536018cd2de5c0f99ca1f60a4b2bfad60fe8c728367b3cd900c143f4de2092110d6951842640f9e6775387a07b4f2bda4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b