Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 07:14
Static task
static1
Behavioral task
behavioral1
Sample
fbc50f15da928882df5fcd3242241f76_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbc50f15da928882df5fcd3242241f76_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbc50f15da928882df5fcd3242241f76_JaffaCakes118.html
-
Size
461KB
-
MD5
fbc50f15da928882df5fcd3242241f76
-
SHA1
9c32df22342be90453ba176e10e942b4e1506dbf
-
SHA256
697512f18872e7f7c52d51f9c869c91fd7f7ee8737578aa4bb2f40fd02dc8404
-
SHA512
933b1e10f5ddb0088dc198327cdfc022b19d6393b1c246f51d4e243d04a438f02ef796369a9ab113860fd1eedcafd28c5ed7c91c708d8e93a101d915bc29d7ac
-
SSDEEP
6144:SvsMYod+X3oI+YesMYod+X3oI+YMsMYod+X3oI+YLsMYod+X3oI+YQ:k5d+X3q5d+X305d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000031ece622d6685a56f4a8caaae3a8b8109812b09cddd64ac771dc194c75a7247c000000000e80000000020000200000006ddd26d919393637a7778db5a6f95ea5d8ee0a9ea92b4aa1e6a0a84e706e4b6020000000daa1466e4d1d8de4ca686070ed83a3a48f664059fd2179005433730e987a9d74400000002177826a87fd032c75f001cd7afe516b3b703287eeae35d3aca3a813af2081e423918385cf6a13361985a35b59cc0d483a3c31dd2c8e5de6a1a568505ce64f8b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4567EEA1-7D69-11EF-9218-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80fa661e7611db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433669525" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2428 3056 iexplore.exe 29 PID 3056 wrote to memory of 2428 3056 iexplore.exe 29 PID 3056 wrote to memory of 2428 3056 iexplore.exe 29 PID 3056 wrote to memory of 2428 3056 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fbc50f15da928882df5fcd3242241f76_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a93694ad8780afabae92ee63e25b0b9
SHA19246c7328a4209933aaa360bba70dc7463fec9d3
SHA256c12152e0c1330d988a8ad69c6e68eadb4c85a7803546bd3d98dbd104e3dc5b0c
SHA512a4ea8bfb711902602f26245b20b717db33f8e03a56430deb835513a12faff7a6069f66eb1a02a3c4e1cac8c523eb3ab1b3c72ed6f51ccb4c53963eb3a6a3a3f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d545181b762454a95bbb37d92e1b4f4
SHA1845ee7edb31c301e081a55fa8433d9dde1c25d26
SHA25648f04e1e28a7b9ef93fe000a6cd34b8b353df4205b262a773cade997e32325bf
SHA51272e1d63959601b70580f522e235435d34250c6c4a5e2e029fb1c97cb94e1e25842169f712f93e6c4658f2f12aeaa7a536f12a9f5dccc6c4896a7d99decbc41df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54860b5d52de15f6503b4ef776c1c35b8
SHA144f68080c4b3873854e3e92a4bfa37d9dcf18d64
SHA256acce1751a830c042d47146bdc2ad78e4b46f55d1694eb394d1381e6d7b1f3c5b
SHA512125044904a1203008c4f4e078c66a5a17a7f2f1b60aba3757006030f05b1ea8fe06bac2ea683fef5013424abe1d4affc01bcdc4c9456cc5a9dc85612e513b50e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5564c7a92375ccf46b5a89793920d28
SHA13341f7e611a52a31e8f86e4346933f66639450be
SHA256c43ceedd803db3afc3c471eb07a009b460b322329714c175c36842df3f9c56aa
SHA512990ee17f218658ede445dc3a90f1b403c70352d84c81346b9def989b17645e9c20e2217f495de03ca7b25eccc06d7022c996a9f8ac0839c5d4b15b7448686253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580896e113e768c5bc1cf384af0be8fc3
SHA1ab13757f444f849eb2f32be027c051c9668fc3f8
SHA25686753dd55d8e5f060e982da36b100d7e91ad48d8f9a6f69907fb6aac891681bd
SHA5123da1f60960fcdbc200d508d067b5dafc33b1cb278ecdefc168f3048843c033fddf4ba39b298c659b7989b582712e4873893d022c60059a0db34e9afa1a69c7ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584d4bc3c634c4d1344a1797de77d0857
SHA14f51db49536f88f369e17bd957791511a5b87a8d
SHA2569938c3edccfe90a8d856dc12765396000c3b95ebb902028b3cce35481c08ce68
SHA5121de7bf7c386ee81fba680c5ca63a9a2630cd68ffc57f60213fcf489db9d8e5196b478119ead8356fefee01924f73ca06d9ff90be231269b5c181d930b59dfdbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eccab6de147cfbce914faa44c4369755
SHA11a9d22cb853c05d661c74f7492b938bdce5ba49a
SHA25617a20e432597b96d3d0356080e3b78e93abe60c385f864807d829de0206ad0e5
SHA51221191534b15bd04fe3c672aeb05889c4d48a254378366873dd495e8c069a61b44a77dbebde97e6fa0d2402a8178713c40a27ba565fb6d25f8eadc5eda0473bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563327b66b740148515dedf3af1afc468
SHA1db5250175ed87607c3cc04b23e308be8412add82
SHA256e11bd6b43f92ebf7318893ffb863cf3a0f9265f4b0bd3fcb2b688ea1ba961f3b
SHA512701f84d7c4a44821b3c08d8076e897648ab558e05439f3cd9271a358381546ae44602830472fd7a9aa0cf5f40d666604da4cb2feaa6980fcca2d0571dc22d199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fecab134213d73d15a457298cc27a88f
SHA184f9e8745ba122cf377fd8ed7fb152a72a74fabb
SHA25651363fa5576f86daf5c4bd995600e0374bdf60b4ed304b9bf5b9729c1738dd06
SHA5121f5af5ec4f4a5d088f61c4e379104189700b7fd61dec0648b4b4244fe317d7898b2fc5f3bf23f959e7fea10288f10eec94483ab0b0308e868fe1742a1c01e4b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d72fd4d8dc658f5258d5b23ed7ed0a5
SHA1a8bbdc49c0161e67edaeab4a5490d9ab9c0b32ef
SHA256d10e8b84f36a548af15644b3d5bbf7d6e69a46c891ad895eb80c76a0d66a02d7
SHA512ff11850496c6c3ff212d31e5075088040c5f493c0059a5c7609a6838cccbd108eeca800fbd85b4b26014c9b3a3291fdf7f08bd71c4912a65107992d661988563
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d993171ab0571b5fa6202b779f35dac
SHA1c4d0da4258018651ad67fa9edc672cee29534cbe
SHA256d4d961a3c0393ce2e7154366930e9bc143f5291b913e7b40f09c1cd567a45fa8
SHA51247adc6e09def2e0a2a3feb79999cb2a322e51018ae35d23d35e5001f6d6c66cd346c9f87fd5bac5ddb2115b30d15adad44b2ba7c8246a3c93f8282b6fcda8c35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537a0c4ee3b49c11744461f03d35b19f2
SHA157f36260a719c213de912b9ceb3899742c82e7d7
SHA256b09516d7c5b9ef18909418a3f9528d9517fd44a77ec7b4b5441ba1551a76f656
SHA5126d789d81bbe563a6b6bd76a0c430d71c5d3f77fc730fd14b2e38ff671cfd9fc06f0f926c8c865ff127ee48590133efbdd46e2ad303408df72204e197bd7b2fef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da8e75213705f6318fd010fd27514429
SHA1be998d2482b5008d347e49b033ebd31039916213
SHA2563d14a4d99359a3f46bbca12b51c8a52e90bd2aa773fa2a63903a01888fcace46
SHA512a61a49594af04d6e26812120cde9653e0d8817f2ea3e865429c40710ee52dbe97abd2044f67023b7630d343d5de3720e296bb769efa5f8a69b20194d3cff4a58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afa37ad09e2a4d7bdb4168e53898f48f
SHA1e467f5a3194537a89ba34a359503c71b3c029e54
SHA2564e01402c17ecdcd3ead212cd0f3f8a98a5c2b312de7ce297de87e0565c034851
SHA512bcfbfa02cf850082f6831b8971e72a980f5531fc50719ed5f914e5f0b3aa8f13262fdb5c2517635034093c4c00ffa0e9d4467349b6b13bf7d82f1e2ada52a9b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9cbad2fc43013b5cb7d1612c0a2a74a
SHA14d4f9fd479b58033acda3d8fefb5c8b080ccdd0f
SHA256c19058877f39004d1c81b0c9975d472d34b4d6276e42ae0f17a51c2633628632
SHA512c08e63fb6db77dc916a7ba1cb8c97d3ed187f1555c6f4b8f4f938739d5154aa1650e21e86515c2616bf2d1bb2c63c1ef131d65f5efa5ed6af42a7fcb03c7e3ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abf0e12ddc96d42ddb4d55a48ae46dd4
SHA103819803f7506b5659aaebb2eaf8ef0e32c01d25
SHA25682db3c0c9996a47da0dd98d7ce06f85baa1ba3febea41d304d1dc7996b994e35
SHA5122ddac4f60ac897423f3a0e9ddaa36acd37ca8aeeed5b0670c89be53df6cd8acaef253f343943c54249077972453c337cf77dfcfd2101cc0a7bae4659b473617a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee4efc3ed4ff773a238117065908d1bd
SHA1d9f664abd9231ce9deedb44c2ae747ab4cfe6800
SHA256842e45c05505a36d00c59c0ecda4b338095812dae960b61c8809c8f03ce3fa6f
SHA51285b89c097c161ce66ffd9ee7f8b4c748b73aa51a50b72e0698dfff70bda0247ae1deebebcf71b5f78dd0fc4ff1c2cf23eacff1a4c1440d2fab36b0bb3566c516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b19649d38ef0098284bea76b85ff27a
SHA142eddcd2acf5aaf4789f544d618adbbf8be7741c
SHA25606008525b93e44c555c272cee29b7ad1e9eb36175bd631973c6dbe92e074eeb4
SHA5121bc9369d6e480300c3eda1db1476924108fc693f7e08d5645585c2bd4940d5dc91b2a96d0e22bc9c2910797dcef817984a0028aa1e3a4c4822d41a973213275b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b