Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 06:43
Static task
static1
Behavioral task
behavioral1
Sample
fbb7a633ab5d96223a9e80fd48be1178_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbb7a633ab5d96223a9e80fd48be1178_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbb7a633ab5d96223a9e80fd48be1178_JaffaCakes118.html
-
Size
748B
-
MD5
fbb7a633ab5d96223a9e80fd48be1178
-
SHA1
a2fc0750aa1b67a5e2f0a90ba4c8bfccbef89e88
-
SHA256
b448888f35570587dfa1bb3af4961911b2d85063765025489f67f9f85dafab6c
-
SHA512
08f1f8292c45daf670bf0c06c4f51992714be752f861b305af2776622899a9489770a5140c46f4a6e7bbd2ea94de02c1a15c6f094e1a56a9d06ece26bbfa0305
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000ce62f1d563942247e9c0347eb0d8fd7d7de6d3cd1836c9c3c670db8c999ce26b000000000e8000000002000020000000b457d7843d50daa2b3ecc3cf83fed26fba83d207f8500602763fdcc797aa19ae20000000953ff49385720e6a9aec51e060bc2bbe9d188968672da2ddb9159f55b8a62c8a40000000ae5a88c0ed39452efeddf9e0f10adb4602e96b431b1275415df8642a466d242b277bca0d8e56e0f984b501266061f602c8d1b5c048c0c090c0649616ebc22df1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433667662" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0478011-7D64-11EF-8BDE-523A95B0E536} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0bbb5b37111db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2892 2904 iexplore.exe 30 PID 2904 wrote to memory of 2892 2904 iexplore.exe 30 PID 2904 wrote to memory of 2892 2904 iexplore.exe 30 PID 2904 wrote to memory of 2892 2904 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fbb7a633ab5d96223a9e80fd48be1178_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea341eda666e05d7488b7be823dc114e
SHA198a68b4fa9f4ceae172fbf4a6553b18751392e18
SHA25678babe1ade65875a963d642f6f79a23c765810d3d0344e31f869f8b00313fe1e
SHA51225b66d758176287c4b9773fbe507cf304420e8d40649929284ae0aec5a51580556a81c2fdd75f92498eba4d48b3f0b09b565b39b0d9564819065c1a490dc6cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e7c0380a5e860bc166adec19ce43c75
SHA1b7744e317dd97d89b0dfb7678a5c47ed84bcd1a6
SHA25614600d4efe004b6f4b6dc632bf0b1762ec01e2ea1ccc2af76dda1dc11281796a
SHA512f07bf9c4f913e7f5c75a5e90eeea2494641205f534c1f2d09ab936416822bd78a22036215b3d74bd32c75dac3d1eb1e9f0f1ca466893e76118975e2551014167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ef6245fc94b01f6c33786fe13aa2159
SHA1fde974ac9f4de196b8ba87c04b41d99c77aaa997
SHA25680a3a433545657c2daf24a1b0fd241461e8e48e1f38efda7ef5102258fe67e2c
SHA5128f8a5b6fa2a0cd9380bbee6c628a860c3057c4b1517c88a9a9b0ac96a694d7303465a30e7790d323500c046d41dc9986b1b7d2864e8968483cf3fc77c4e679aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ef19b672d7454a9fc3cbf53130dd971
SHA10c3e6d494087dcb2e0c58d10d89b0a284042e18e
SHA2566769e0ce63d9c7caabdb3d261db998ad04119b579edbad70f6ff91ec09e1d04d
SHA512592ea61ed7ae174021783c6ec268ccf44a22240ed2151562f03aecd4ebf141d465798ae755866761a5c6355c1f147561351f4363959438ea85be5a3f27404329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52868b7912338855ff3ef7aee7faffd97
SHA19bac13500f20a87f2bb399ccd7ff79be31a2bfa9
SHA256c5d24bcae94d6a797ee4b253c3fc33387cbc8a9a4bc86a8781401e3b5c1cf451
SHA5121dc40e2d0bd2c2df3c25ecca4d454fc4528574074c521e2555f751823ae9b0badbed0e8d4dfc3198b65d6ee8ec8864e31793293dc5ca59f8fe428ea5c6e4bcff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8f1de33621076b9bfd20b37caacf51d
SHA1b83d4bf0148a8b8b506b31dc6d407c928e6fcbb9
SHA2565137f2f179164dc2ee6640d565719fb34d4fde7c1324285533b5cfe3950a2752
SHA5121aecbb793645ccf2cd9746378e10b5d99173fd7c807911a1e11d2c82321cf7dfc372ce526c0bb59820b7ef1b6e0a4207b503dae4ddd0155bfbbc36fdbf9a6944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ce63bc1bfd8a2c0e4bf318d4b377795
SHA1086b36f116a95514005087ef80b369b31073bad9
SHA2566063e1372a40e3386a60a07e65ea066272f52bc4a182a8a657d5e67199b5a10a
SHA512384adc37c3bb32e455f2e7313a688473ee8a3ab86653bab2565ec7ca0b90cbc44c769d1cb43515d13b6ff45fed7a19520468f558c901949081f579fcb7ad5642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5964b7aa03060170dceed82f1eca15d84
SHA1f994a6427aae468084465689f3695c02c4611bd0
SHA25611857a41b07096ff9acbb9e0975d2f2160950db4c9a66e13dec643f33b80423c
SHA512bef42cf60b05e4dbc4669009e2bf92911f4a9bfbc4feb3f3484b678c734281c122967ad12c4858114e9de29d3e6bf5ad3e606c227d8ffc75bcdc10db5ba4e710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f55ec17b07dae019dde226a342c84878
SHA1282c7c90b59375ef5dba3a1e961ba5d1c66017d1
SHA2568ac8213e7529835ac90752d6da15c50b19d8437ca0e5daa9d4fede4205146f34
SHA512dad6d33c338c1bfb842db01d37e5f4c3bd737f4c795d9a493de48d349712afd5589154a81694a3140ed6aad0920e177e5d6b70c452b1f616cf54d2d4216ea5e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd412dbd6995e6ede4ca107ec20bf3a2
SHA179c53a7b42c82977a77916828af8626b573926fb
SHA2564c18f7a02ade1ff91d7733034c471c036a6f682642bd88a4bc13ae222c6fcb46
SHA512dff32a916c5f463b1217ad857543689ea7f97a210d1bb7baae337842c5499628c0134a7f499bfeb46e890be648d4d83ed2fcbe13e7ac03f3a7253bb0fe095a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504908fa3cba9cc8a61c733f431e3c944
SHA1dc459fd01186534e91305bb00f3d1e6e6adecdbf
SHA2566b69c589ef73e28a0c430be11bc52986bff1efbb1bcf5631bcc95321c9cd6be2
SHA5127adc6b6b0732062a569eaa1d998aa696e507d67d7895a4305dad27b48b9bf7b84ebfac23a246f7fae3d9fd5314d4eb065f016c9da7beb2184e4147df71945ccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525eb213b8c2b2c3d3abfdaed4d202f7a
SHA1e1e9492270d2960ea7cf69d5ef6b12c44305b600
SHA256dbc3a3480cef6a055ae5448ede42f28eeadcd59e001526b2c6ea9b41749fcca1
SHA5120f60f4f39801cc18689280b35f8d836c4505c0e09670cd877f842a850f64cb0befb8897ab7001a1e751113ae5efb55e90ad274b83b8fa60757eb07d7db789076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b23c746310137da9a8aaecf808305077
SHA1462e91511e9ed6802f7e66493b209bc4be7d72a9
SHA25622505842fb019bf3b53d845b50f40fe6a07963e007c8814a8b61a3c28c437b6f
SHA51223a7bd1dcaf58888060b428a9d7e51c4147280b9bb5a9d6ebcbd0fffcd11e05906cd3aa15ce8972c9065d1c2c57ebc9c789428c8e8f5626d42e44ab261b4af6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a9734d3ebb5075c25361b73d29f8ae5
SHA1cc0eba66f358d14e6c402bcbc1be97d5aa3c20d3
SHA256cf49525b8ff953dd7d04f7dc56bfe885bf8d707bf9f358e6e156827b3c708822
SHA51205e4f650374f107fb75fabe89262232ddd9f6c0fa98020d97202949da1920748f26177b326e08300d5a769744da0ee929d3679fdceb90ebcb4ddc60c123eaabe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e921ebccc154779bbf925f3ca6f2abf9
SHA13c808f9210906defeeaf32eba6cf854d02671439
SHA2564d1813139526b4d912ce00ca6263a16a65915935113772a76ca637eafc769c55
SHA5126e57ec241fc396ed0bad7967450be833042b1e8292bff3692572895416541215e5af9715d809ca546aca21eb25d3058913cbf466157239cc975383b4ef1b177e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582e8aa9aab7d9a97074c81d4a9e0d48a
SHA19276c83e7df90db56a887afdffe071f3c3fc825f
SHA2560c5b60b4d1cb4f88edee7ecba4b31024e98506ed6b73f429267191259804c292
SHA512a5b37e2442719d750c1b8b7542fb0e3d7cbca8776fd6cffadd50a83d36177d7bef4d5ea0503aa75a52908e6b4a691eb62ac1d44c8201f197cc558ae4e410d999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d255881bcde939ee016188eb66bf914a
SHA16f9164cd7b86a0113c7701b0dea84e2f3b9448c9
SHA2566757d624b3b04a812a770e456497126a7590b1ff7378b3a8dca2e28da614e326
SHA512233d420279e1ff9827f2ec328b46b1a7c947d97106ad91e9cdcef66089ad93cb2acb0beb2216a0cb7d201e633ac99505836ddd850df4f0c866d6a4cfa4a11ac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2aadf9459e44c9c1efe3d5daf14accd
SHA17e84bb61b811e24f4ae13719c7a97500b13b1bcc
SHA25630c904921df9c2151abbbbd51ee0d97ab9eae85262fdfdff693a19008d7a5635
SHA512d836e50b67fe315cd1feb4c98e066ffce1494cdb31448c513ab699fd731b75613e3602661d979c89fd39328d6508ea8eb6e567f2e8f25a397055bb82484e65c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f329eba0810f7f524d8b7c22f7cb3c6
SHA18db4304652aa1b127da0b981f51446133dd16f52
SHA256a729dc4523b5dbc3bc7ade74ca7c704554583b14e5504b5e7bebabc5131bf4f5
SHA51299f24594f532e6b4b77d069097d2b5ea27d5fe0d55b3e0c9baf7ade70c23dda5733ed22ed32051c6a2acd0b7335af0e9e102b8e8d199c6de80fdd8ab53cdaca0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b