Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 11:29
Static task
static1
Behavioral task
behavioral1
Sample
fc358d75597dec03e9a9951ee33e89e1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc358d75597dec03e9a9951ee33e89e1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc358d75597dec03e9a9951ee33e89e1_JaffaCakes118.html
-
Size
68KB
-
MD5
fc358d75597dec03e9a9951ee33e89e1
-
SHA1
4a66148bb790e2f9486debd56d761fbf1cafdeda
-
SHA256
722093c542a0fa9468a8a803cbfff61603cded6996b30a91bf496d482379fad8
-
SHA512
0884509b9686a285a79d1552de02bf4a46c223465b1bb89f5ae22d518913e105d7b51ddce8ce713a1502a5a089ec690f1da94d36f06c355ec25610402134b580
-
SSDEEP
768:Ji3RgcMiR3sI2PDDnX0g6i0q4oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:J7ZTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA756611-7D8C-11EF-AD39-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000ec211ec6ce09f7a72b6f85be137f960f3761adb1a042836b51d8127d3f179716000000000e8000000002000020000000dd2bc84b2639ac096033db9221a55f6991e9230c629f65deb44f0a1f8a3cec72200000002cbb9e92a61207d6285844723e605c584f8ff2d1c2f12ee4ffc0b0eba86a93dc40000000d9585d522618c5385442676bc1c4eb0161963facd9411f93bed5e66b16196acbc2e60befe7fe0049e0e5366ef3069aa5bc40e0c0bd4a591145b4a4d9079d2339 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000212414005b9257fae7c68ff6f86a012d0746e4c1f52272fa9b4c0d157604734c000000000e80000000020000200000008ede1b7c3a42b9dc9e86b2191b0976912627800a9270bd7fa9589e22f36a551f90000000fddf30876657eb8a50048e9f07e1e6293e45dc0b2463dc4329bf2f91ce06b938a1ae2f419a7a6a4f7405a9cd709e6a808455c20b80902e3defe83c6f6a956a2afc4438b46aa491dc851e3675edbaa1354a44dcd6fa2bfb94459943a38a1a279fbf4ddd4b54bccdff5f3c916dfa501ddb63bfe582d745810c5907b29ead9c7f0ccb7efdb2911a7458c2a75887033c47144000000017e1bae7a4dce39f884536316d2262bc0bc0be27a0da74fdcdc51e40c5e8a078ae3e23832952bb246aa39f93dc150d4f54ef704390c6973431611952f9aa4f16 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 107e1acf9911db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433684859" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2820 2084 iexplore.exe 31 PID 2084 wrote to memory of 2820 2084 iexplore.exe 31 PID 2084 wrote to memory of 2820 2084 iexplore.exe 31 PID 2084 wrote to memory of 2820 2084 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc358d75597dec03e9a9951ee33e89e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57809dfe530cf4f6a06a0d97216c2f14a
SHA13d42f1a0953f3dfa15784557ef357993d402ea3b
SHA256bcf1ef1187e0cc2da38960d01e3661ae21b21e4bc901715ce6d9ee4bcc9d6b07
SHA512be9d0943516fedbd35508bc19518556e45bb4e5e578833ed796828b625ca3c9eae1c145771e74354cc85d1df22c118ca76f1df14f23bd7bc5d8d5952f96cd34b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50205cb18d44479f2e21d5ea4b04a4b04
SHA19feb2d2b484c411b1af392737f47787ba7cbbfde
SHA25652d2382ac60043783fb4a837af357c56474e9fbe725f5887d5942480c074a02a
SHA51294017ae272ebcda361a1b7c65406b835178ea2c2a00c9fa1df6ba6ea1785a3e8c0eb9d0c7b208a5057057b0f1a0fa77937aa8f77ee40910a470e9a94b62dd077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f525068d6f947ebdf0380d051364505c
SHA1cdc3328258d07fe14cc03b80541d9009c217ed7f
SHA2565c5e03ecbc4cd289f88282109be7ab703ac059f578a1c0d7c21be1cdf404ef9b
SHA512379cef127f1bc555c98fe787ba017f43567a6ed363c983c8f9debf9a4f55b8c0660827a29137099deffd14438084fe8e4845b55667fbb04e2296142f2f16c6ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fa8abebb926b8e42233b18b5f524707
SHA17b7f6f1cbbd53a54a915802a6091b9db3161848d
SHA256d20b04b061552d05ccdd0391f241ed46c643bbfe1028cc8596588640cc873091
SHA512e1dd722b22c7dd7e17a145e8c5eb56a03c1d99b9d5a3d6b7fb8d8190f992a036b245f238b0045d611b78b9d66c29fc59a911227a30c86a54d9fb8ffd07ea4459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524c23aa6a1a44269458885161756b665
SHA16dead863f4c13811457d4f42b948cb2d11f8654c
SHA25624b5a8942531716b2602fc85cce99d3ea84227bf1a23d3472ec1efac541361bf
SHA512538e041d5cc575c2771e4342555d2ee85da3d0de05ff16ac7db23d46ed3b8b1bf4175b01aff3f31041af07d188eb0b29baa7987dd7595080e404beedc91d9094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e95aa3fa53a95f9258c234d468e3499
SHA179c550c2b31f2cc366a3ce1c70976e48abee7de7
SHA2569ef55dbfb39c44df5a81be4d4eee9dd4b52dd2a9005b177614ea92dd18e80f69
SHA512eb8bc03b43c8b4bd6137223024c1c1585e4abbe3defb987743c51df2dd0fb5b9cfc32353ebda8988859b2943a3f36e851fdf52fd33688036f6dad5d5a5734e9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba8aee1746d3070f094b83feb078c7cf
SHA1efcee1abcc81cdcb51aaa396f56899353578ec91
SHA2565908171d5430eb98b4e3fa610d3af32c3cb93ecaa2cd69d3a5ce38a9b87a991d
SHA512ada556116379778c742424b4e28156a2c1aadc183bcf2074f594ef83644834f7b46f416271a755df663f9245a1d3186deb953e4df3aa288a505f98e78eafe2b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb2393812bdfaaa84b0972df34658282
SHA126aa9c08bf58ee5c0245391a20d9e133837b1805
SHA2564acd2549ffbd65ca061f2fe0af4570a50705cb08ba617a1612658b2b27423b70
SHA51290ca3e819812a459d7158c3f76700d4751322ad9d3f0013934dc062e7f35e09341018456218724019a69350ee405dbc1ac7ac72c966b5f8092e066d4a028d55e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5947ac40d4a1ecc485b558c45f1a89af0
SHA1c3124559eb9b626d428e5e21293fcbb1c38780df
SHA2563bc096a015892df7b63be2329e877141a5c636932cca057e51b033f378fc74f3
SHA512cdca64f021136dac58cf01e783c14513906d8e2056779a270c42cd4f9da3de8581489a7081f63e470b0bc64f9184f71b6bec8448ba70796bf6c8d6377d383a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8c95ba7a0a98ac67e539f60b3a52377
SHA147facdf89ba59627ed753fb50aef4f41c1c7be97
SHA256e5669c4acd55fc28fc19c7040f1b33604631ef85844fcac66b353a1103346bc6
SHA512bd656ab174c0686634ad96bdf3a86f8ba87e954fc8282e54aeddc873cec60f0b8725d63f3e4fc42f815aa24e9960f57880829fef01a77fccc3c422ad78037718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef974111a8a1847a91229208cc82ee13
SHA1d9a119e5dda4479a18444cc65bf0b1e75896a5fc
SHA256268b43dc1a8492f752412917c2f405bec0b17e4573803b27d08efd52b1c15d17
SHA51254cdc4969abf8e900141828e4caecbcf87ee76b746a08839103544b18ec226995ce410df3ccc395dda906f5cc6eb333c1301d6b308a6fbd42a38e65d01189a3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538e26ffebd329cc90bcb5e2201ae2d5a
SHA1c9b0f46980f9542144629f62122d0c1f9b4ac90f
SHA2562dfd1c4b080dad593c4b02d0788d9f7eff26300376ccae8d1e3cd9435583476e
SHA5123f8dfaaf262fe64ef056dcce6556fcc21e2630781104a3a01506444d3f918433a1d31d288795f6668ed2e9893a785b6aa2986478b00e82537a84944244a5b8b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549b7d616961a2d3d9a1bfdbd44975d07
SHA152fc203b7d4c839976f242bb2540c633a5bb1a7f
SHA256aa0239ba951d3633b5656c56d2eb62a0c7df31aa1dc5501983f7a98f79684a34
SHA51202ed374a294e20398ac94c474911ce8fd846c66bac16f29f0e8dac50af5fa14ded84201f792802f1a5377752f9e98798748ba0a85afec349084439d0b92a6a72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576cd5c34415f437e1315f45011e19c8b
SHA18f0d0b608877d985d685f8fbc3ea577f6bff3206
SHA256be975ba6f51f8be0b4b92b1239ddde3a6c0a98c31730e0f5745a84846707304d
SHA512d5162fab7ec33a48236c5b322618ff626a7a8f74e6085ac0d7a1e727edd82763c1d2023a8325aa690eac39df43d733bbe26a8d7fab0784dbd07f1ec2189295f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eb0a76efda7abd9ab1a02ec770d1f58
SHA1b6beaa48f0ae4eb0a3cd287127bd58c4fd0a07a8
SHA2565a32b85a5551bd88fa1cd0bc32771c6ea0c0655b9d9607591d4c624fe337fe3b
SHA512be0f2852d95fd48a2c4d3dcdadf561b3fa4149238aa608901597709c7454c0c6c01e5d68ea686324a88ea5724c13458300d13be9af5919abeca5da1d955796a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575894f877a0bab583e6cabb4247c338a
SHA18ea837e0f04bd556c5b270e3b8eadfbd412baa6e
SHA256fee4b9dfd727de76bf5fa0eb8b19dd001ff5dd70a208677e077f497e27ebe5ed
SHA512600dae5a5963ad28c72d043459dc4bd1564e922bfb0f907f83bdeb1ad1a40659ad2b915a75dba1667902237b4d2601c90788b78f9ea740636a2aed5349b270fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd3186f60ab8f69103c557eec0ced827
SHA1b857e547b4bfd086384529dc938bb9d54ca6adfe
SHA256bd2f705941cb32eefdce8ed792bbd247a9ee7ff2579d5e35fdf45960f70e756d
SHA51254a39d15ba812781e370f6d4ecea10bf2958c13f95d6361c2cb1772175d156b1b531f18c859a008c095d6eb8f35125b117bf3591dacd52b4fb256f881f4cb2d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51769373d5547922798538480cfc42a28
SHA1691306a4446e3431e726ae98c70ddcfea2909b57
SHA25635221b6bb7d7b0ca1e2e2623f4b555f2505e0be84361d65183182e115497abdb
SHA51289314ae6b4f2efb2977570a60b4748fcd8ef6e3d5c3a77d85235bf82c0e15143383b76dec3a4316d5789d772b9d23e4986c8eede8ef6eab17d2b0050755ae47d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b