Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 07:27
Static task
static1
Behavioral task
behavioral1
Sample
fbcaf6b1db65abb9d150e2b8ef05acba_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbcaf6b1db65abb9d150e2b8ef05acba_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbcaf6b1db65abb9d150e2b8ef05acba_JaffaCakes118.html
-
Size
35KB
-
MD5
fbcaf6b1db65abb9d150e2b8ef05acba
-
SHA1
30f10f17693fa9e16c9229c27f714aae469c15b9
-
SHA256
3dd46e737655eb964416bf3f3d8f080c6ab6f6b7480bc4a33622cd51fb2cd2ce
-
SHA512
28195a24dd4b5fe9156a37098b3fc2394810e5903b6cf1a1e482d67a0ba8419deb2ebda4da0995fcd9cc498ea62a139aa1844b28e56a0ed8fc8238709b8ef5f6
-
SSDEEP
384:4ts5kDi0VuZZuDXRU3ea7a4037If2yz1jhJJ3d+7VYOWNF11bE92ki0LuZS2oV:iIn02Amea7a4Paek00Eo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433670347" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40804f077811db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{30A57081-7D6B-11EF-9982-5A85C185DB3E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000004d43c21d4602c955b35bdebd32e2dd6ee3db81e721d7aae96a9c3fd9411a6f2f000000000e800000000200002000000050b9926279aefc187e87fdc4b24e01e230b65b64fbab3e5ada6560e4210d34b5200000006e7f1e1099e9071d0d72e1967279a7643c3e4a14060b680fcbea8a7149aebd1340000000b3b934e4671cc6e362b12089777b107ea47739150c32fc5a7226686a0a721fd12185049d3aa07a82a7cfe9e7ac20e4257c380722f3bef2beba40a734e549d239 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3000 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 3000 2520 iexplore.exe 30 PID 2520 wrote to memory of 3000 2520 iexplore.exe 30 PID 2520 wrote to memory of 3000 2520 iexplore.exe 30 PID 2520 wrote to memory of 3000 2520 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fbcaf6b1db65abb9d150e2b8ef05acba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffe3ca7943613790403d1e7041abdbda
SHA1657c0cb113708fd46238bb6888487aaebb89360e
SHA2567d97e61f62a400d3924e8ac3977e8e79e03f54bdd1aecbb4fde751dea6b7c09c
SHA5123c36406588cc448b1a7b0099894066ac41a6eaddf1ed9959d597dcb86acee7a1f3d18d33912b83a3098e283015a013639f7950689a58fe4de89e5de4882a6e4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f023fe8965d469150302cea9532a363
SHA10603621cc979c1a248bbe985afbe3f64ca61846e
SHA2560f6641a4a19fc004af05f18a5e2c49d1adb830edbd7483ac54db4f46872c8999
SHA512b66fc783427102dc337fec020ce1472ecda19710a1e0baf5fbf93d0d52184404c42e5e9edef71cebd73ac7bb1b0c729e1823afb1ea3308596b5836fd2caf9a97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb38133a9e5f7ec3a1dc02b8d019337f
SHA1164dd860324c4cc447aeae0d0404235e6862630a
SHA25646e20fe1531393690c48a4e48371ea74a84b98aa5bfa0b739ac7aafb4f983b5e
SHA512bdf6d377288e52cafa0dee78af033d8bd3f50893f895caa35bec6ef3547757bec2f38ad1812deb6d2f721ca4356e80d9808f99638b4b5cb25fa6bbe533890c03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b635c143a94fb4f612aec69205fda5f0
SHA17da4eb562832286f88a161e71e8e72373fcf5507
SHA256d8f834a0f1beb4828227f973b116b896790f5bf5a1931d75e60323f27c1bf7cd
SHA51260ca436bdb652da649a2d7c8b6cb9e95b06d8b4906d6d38b3117403df20129e5720db7690b0ddc39921a0a0cbd10ca910fca5bc07981c3f4929ce4f4e4439ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1ded5bb8344e3411ecd735da72671b9
SHA1627f758b3fe20d104768b6e33c4f01e6106c50d7
SHA256e8315e5f6fc88c05d734324ccddb2055b25b56c0f3ebbb1975b07b43efe3bdea
SHA512c4ff361b493e3866324dbf43c7f33a6b2b9c59a974ddb6b0f7ad0b54bd122ebf9396dbe418ecb78927dcb1fa776e75f80002a455a5be208c7d06a8d76c2da6c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505ffa26ab14a5711ac1b1e4ecb935c01
SHA18579b6ace74fe001be37ff429f64d44de61bfddf
SHA2567062a140910ea0999031af34f5ff675d007c3a645886acbde0f5d84b31a76a02
SHA5123ece3b6aed488afc33abe77ad4bdf04a4f04adfdf13f4e27a8f8786755a09b863784c45bcbc6a0ec747b920b7b35048879f11823efa44cd25e8ce53f046d9bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546a19fce7fd14c3e0df20fa087fd64e6
SHA1661e05bf4b6eea2cfb425effac954a449f5260a6
SHA25671f5e8734d1609fbbcfa3fffc828c1a018c5f9f257de79731a01b4b639ca53ee
SHA5128d8335ea0f913638235a3d5df547e36a0cf759cce8ad5d76b0209198fb64694ff21e335ecf732700d6c1f439b44d340e57db8ca77f3a05bfdc1f4caa357476cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8796484702fcd09c708e60fb066442a
SHA16e57b24392bf4c9fa91a16049d70a70ca9257ea9
SHA2568065ab7f252cc7af755ad04b9c7e399e4705b7ee659e8cb50b8f228e7bbcd70d
SHA5124fb769a686b111ddc564d62661255731a729d606142243e67bef494c5ce0e93f140024801e411ab571c61ad6d71684368db26d9b6c7785d83bed32e565acee6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5520d72c300625a9b95e95a6b0e3a28fa
SHA1cb303742d8557678ebb9bf86d5aec1bc5cb31256
SHA256201d385601dffe3497e82afffdf3417e96d7c4472a1050dd2e16dcebb7464057
SHA512617431630d17df105897bd5f12c9945ab8a9ee0e50bd3984e1853230aba65bc95aa3790f8ccce03b60dfa312695e81cc38acfcf7c2165ef03487251b2062a49d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3afc4446ed4ed0b48fcabcd4a0fb2cf
SHA1ec1e4a8ec08f17c8653f2e4f6a28d0b2f0d61ada
SHA2564ee97c12e5e71bdb0272b01e133f26790feb16e457c8ac4b69c8edd96e2ebd91
SHA512a24fb566d66e3945ceb72de2527c8acbe18ad3b67b440bcced8eb8cdbdea357ce1c078380520ed9a19243f473238a167316b39cbc9ac0ad269dd9c7300629314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f54584f1b12739c9fc4c65c3a466a7db
SHA10300cfbf262ba8ab986de7a7a69fb6f29133302d
SHA2566c6a95b50e59d22f296dad73b097c002342d5ee756d3c76a60d2052d0e21b7ee
SHA512e40eb90f364c3c2c222a42d75992e40ef3055d83a4c70e0dd57643bb3a794f6ba3ab5c45f08826ea6cd2634a37eb4a5829ca44f9656e97976c5f6664ca155186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aacef0f70faeecb779d3dd9ab32ec4e1
SHA1879fdb146699848dbcf78ca5667cf1ec1eee639d
SHA2569024ae0658034e4d4f8af67ba33a46122a33c54e1c07a517089cf7f1844e670f
SHA5121d46dbea9479a95ddd34e68a0c49470e9985676edcd6f0409665f864a1a1c89414349beb05dfb7cfb7a7f6189c85329a32f731ad5056ffe0a0d9bfdf6d681d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504cc8e009d9ac7c6a11300e6b1912fba
SHA138656b9dc71b7f2f230e7f8a95bf4c6749012c68
SHA2565b4b936fde6a3928d3ea33c2a14b12d3dc753fa2605d294cf65b73e27407699d
SHA512573f01179965f40ce863bead221a06ea2d210a46b1b46c30da9567aa2f58dd6ab11ce47a538727ec48fa310f070480211aa2cd4ed5bd9bc1e1bfa8fb62ff3749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509737c8fb68e6c7c08d5f9518d65c742
SHA1832c6ff7333c11a5a2dd2e27f74e69f5d4e95778
SHA2565ddb3bd683b0aa7e4c448d351a4804aa305264804945f3c182c1bfcd33339aa6
SHA5126b85890bd01f51135bb5f914fe68c33f0cbee8fa41d9c06a4fda7cc772b545f702e21b861c7d86ceb2f2aaab9e60934910ec1fed06e63230d6c53a52cf06781b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1f0509461e3828cc0e4baac02685d3e
SHA1253798f70d0544ad348efd533d7526ad3c5680cc
SHA256c2947bd161cabbabd2fb5a999b5e27a83c8525c8a6357948bd43429b52facdeb
SHA512b495acf39b4791ea80ddb71cdb114e34a131bc6825b093d797291f3e709ab4ddc8cdb19e0e51daf800e193656e88b7ff71da397be55f1ac4d96f6dedba62fff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5592d333d069ea5952c44d2a4dde44b62
SHA12a67ea0517d0a0369fef5f2920bea2fb497ad617
SHA256031c217c1d8c7f9d00340e4975b2e8fd8fc5e75a7169818dc09c5f66c2a8b978
SHA5121245fc76a7706fa76a634c8b439122fc0072c335b750b4fdf4845a80b3c87f026aa313f8fc51340663e6c07796447f905caaba2064b106ceffc61014d954dc80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5175aa9cfd98f886014634f6e6f598794
SHA1aabbd22d984b1b41b5ff60bc2269cd0adbe937db
SHA256b40990827a63fc83009afaa51ecf41c9b2b9fe50c669405fb75b5dc09bafdda2
SHA512e2dba28dfe6a9338934ef8d81d9edaf3f22c20f856c89ae045a4dba05e5615524277a109c1c640f6319273291e60770bfc5ab8ee7fd5030a16b64519d13b446c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abc90909f755d3ed3bffd6ea615068d3
SHA139c5f1fc70a4de4a6b412ec9910c53c14bf50903
SHA256f6e75876b36df74d2d74b0a2a5cd6402214c4dd04e9077ca0aefb53c7e91bb7e
SHA512c9f277d45c263814820c6654f29724fb463fc2499cba7787f028504b549d17186f308df791f5d3502a5089efc5498ecbfde034f0747bf8c3b5eb3541122307e3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b