Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 11:29
Static task
static1
Behavioral task
behavioral1
Sample
fc35320fb774ecb765f1e4e1c9d022db_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc35320fb774ecb765f1e4e1c9d022db_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc35320fb774ecb765f1e4e1c9d022db_JaffaCakes118.html
-
Size
94B
-
MD5
fc35320fb774ecb765f1e4e1c9d022db
-
SHA1
e7b57ae2aeda9cacd0832dbbe2764ad8bef7f9a4
-
SHA256
ebffe334c4ff06a650c3dc125d1070836829bee734536dc31e78fe1c79df5753
-
SHA512
fb7eb811206b16082003461fb1109be875e7747d7b55bd19382c97756e9c598271bd58a0e72a22a8313e6914d8827f3d05b2aa49a5ffc97d58980859b650449a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80f341b89911db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433684822" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E3D53161-7D8C-11EF-82CE-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000014c7bdb8f3bc491bb38fa116c72ac75a4b84475eb1c5ec834ff13b9da0fcc77000000000e8000000002000020000000267178c4381e4d973cd6b7bde35ba42b24e5bf3d2b9ee41f8ac1f7981725f1f220000000a5be267f680a5f83ab1b9382b0e32f8ba1a3e33ce214219f030b63040c79035a40000000eb8bd11dae5f465f48e73b04a6c82391aac5aca0021475fc49a056256ae5beb541776e796974cf5587323c0a2b2fc481ba62924f1111ac8f1eec497afb32e32a iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2992 2980 iexplore.exe 30 PID 2980 wrote to memory of 2992 2980 iexplore.exe 30 PID 2980 wrote to memory of 2992 2980 iexplore.exe 30 PID 2980 wrote to memory of 2992 2980 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc35320fb774ecb765f1e4e1c9d022db_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba4135dd2d8e275f17796a579c2176fc
SHA1024eb3ecd79858b083dd30b86f27984399bd6393
SHA256995c2b662278743b36e0e04ffb5ba89c32f6f6c282c2c3ccbe46e95fecf07693
SHA51287bd63855a1c0832612b63155c6ffeef013aef61e0f7cf041299cb205c85d72dbce38427696e952d54a7b71ac4cb7ec7110d7d7bbfc0bbaa67930d8743650dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51745ce9f3e78d56d84b0a92055553729
SHA16de5daaaa1b106c9bd3694ac01fb473efa16cf45
SHA256c44b8cb183d57be50354826d28f102b435206eb719e667a35c8c5c0bd1a2acba
SHA51205ca948b3066d94eddbe5bc6763c120d1d9942ecd2431f393f1436a83dbcd6aeff92ee67b843a0c9950952c33a621fac5acdc381fdbd6df17f6ba0fd87e621c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cfe1ef1bed22eb56786d869a4c13f8e
SHA10d22fcffbae96c849ae44a7704b6f1189f2d5188
SHA256f7aa2487bc976723bf15d53d7eafa1d0798e27e424056745a4067f5da617bd72
SHA512d0fe86e5c237fe17a00656b3c8691af0361be03af5427e1f120270cf36d98abcdfbdba535d957b2d5c127e62552d97f926329fc53302bfe1a4d38d95d099e247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dcb555744063f8ebf8d82495c857b3e
SHA122911fa11594fe85c31b8a9bfb269c1fde4c5817
SHA2563d45b6ad8da4404ba870530715d071f067a7bb1a7c5477e3f99513eda819a8d0
SHA512ebf003c13de28032c9ecad832a4dd4843291d3ce552449ba3486e64962caaeface101428919067a4d69bc7862817c149ff7cf3e51ada09d04d244c2e259f2c03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c24f4bc092bd93a8009f87c182a5c03
SHA117d7403becb92ba5b0b23db2d9c539d2ecd4f866
SHA25678714fd3fd61a5cace7c86222eb785ef669ec5b656d23ba058a1abfeb23bcec0
SHA512379f69f25984967843f504a876b386d97ab085ddebfad5208ac48aaa8581fefc349a663edc5395ecda56177e548f926c6d1fbd85124ad2e1f4a4ac40c0c56087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a31754f6996297ae7bb1a674270a542
SHA12f24147d67e163ba8f0b6ce9738a1044e75304c0
SHA2563fff76ad4da9392239171396221e54a8d21cde475eb70c78ae5f51b1dc47148f
SHA512adbe5451fa7ff3d2d87b7078522bf9748a17e6e9f118b0ecbe0f16978fc9e480ac62f4a3a367956b17dcabbbc0d95eb0cbe4b10ceda94323ef11b80ce51ffed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e8f3006ce779d3f719d8eadc808be06
SHA1ab2283b5b94676660a8d6cc7443c06eeff8c8a4f
SHA25692cf7178fe7f8d8f7cde39652082ce23e8b510108b150c5dd17082b4f1be7e9a
SHA512c9962f7cf8d840ee8f7a34188832174f388e6b20f5f3ac6cc30a8324e558507a31eaba084299ffe41f72ba90d4b2385cb481a22ce87c336e5e5a5cc4e579d822
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59984abacdfa4555b7f064a9282265257
SHA1eddef77267eaab8e2fb18f8fc5eeb7ce455ceab6
SHA25637cb931c4a15619410052580a845592f6ba67620f6ea1711c56beeefc6b7e315
SHA5124f2a6542291b8208c3786331a04c43428977604d60c169d9750a73788b6066cbaefb2c0668f47926a21b60f0be5d9ec50896ad2b48a9baa0866ef800c0ec953d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee8bf168b56af20eeaad66a1ac83bd8e
SHA1157aa68d8cb14542e838bb335a772dfb7e33bf9f
SHA25619b407c8777afb1fbd2d8e9b522a51cc50fbdd11fe0aead165931a101d307758
SHA512abf1553d896021d05fa6199b464872e39773bcaace7c9747199660d4cf6a4215bae9272f54f210ba8d02b903cb3862e166929e855450e421bdb3dde28c5b4a31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516ae4abf1dd2733ac20d53eaf589be4e
SHA1dbd96b7deb5548ef20dd409deaffe6da6f98f042
SHA25676557369f98fd7cd5f76bdacbd6c2203b5d3c1963d993c264b53ef25375375a8
SHA512b975afe531918367f4aa33abf334ecb6e08553252110c5896dd57611f07c44c06332382d61dac9faf90b04b0f3c6a6b73ca915c026c7b2f2224bbc4489edc49e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50786478e9f24481d50dc90418c7f82ff
SHA1d38c107e4e63b0b132460764ce14abf08096caf6
SHA256532d9057c0d3d6e1999bdfb6d2ac9c54755b894bc407ba542ee2162b3efc5652
SHA512042116e3af165f10c91efb936ad9563a7c671ab5471a3278502f1cac8597c6a1ab70359df1279739be4cbfd16222baca9b154db8fa7dfb94ec6fa75b1743d682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5170cf5535bfa278eea5fdfbbd8a413
SHA1f4db467f7bcdee16ee3a5a6202eb1233e684270a
SHA2562c21e7a36b2f0ff0a9d24b7b15deb4bf96dce85b3eb53fb1dbc7f6e925ae4241
SHA51294a08af250c96b4410796b0ffbded2212074676813a5113d56463de4103f1f5fc01cd5072af4d444a4e5c74f81d93e37e431aba5cbc2a5710b3f174401a6a0dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea94eed39359ec1666050abd5e85c7f4
SHA10a705a87b44dbe72be4578d2a08396beea94e78b
SHA2562790e677be20b73de1a3beea6bc8b387c105b317f8448b33a93dea5f86df9fc3
SHA5122d8f58784a51313f985ad3a031c8fbddc0e8572b3e2c8a91d9c47e8676209819e7fbd1be2ae0da9fa4b74a6bed8dacb6e1458d822af2621e80c25675e759a2c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d91879acdb1eb7efe9f7ab840601896
SHA1425474b45d8b9ff5eccdd8b204822107c10b6e7e
SHA256c3997ef0b113445a821c6f496bbdebc4726768796206ad3eff9b45ca54c55d28
SHA512943140c7023d5096f73ab968308d0fb5cc0d5939fc5250d3be1ee24eaeb49b15df8ef3440255fec8f07bec4f7bef4be823f0adb06dcb3993e2214025c1273727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e71f7de5e49fb2ac0ddf15ed3bc33c2
SHA1b5f2f16f8963f02e340dacdb6f12b94cddabac01
SHA256072f19653ccee1477900f7c66f54386d9871501894e7cc3b19808f9fed079517
SHA5124af428a32964997343a866fd89d7d143afcce4396522fc1d75b2ca57df67054186fb982f7b534d4a7333f5d47fcb51fe8198835f17f95df2cbf955cd1d43c3a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2e5b00afd71d038e1cfe6c1294992db
SHA1631e035a533a96a29991f4e9e68a65542186547d
SHA25646eed0e304b49ed017c66a1b1ee16172ec1bf8466f9a12b554436a830c01b2ff
SHA5124d931a032929e70f0b420f9422ff4472b4ae691c202950e4385712a6fdee0217e46df889b3fecd28c78f820f465faff0f7c8b3157c58df269d4da2ca8bbfb42e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbc114163c7b41e453b70124d6ab4bf3
SHA1c446e5eba5cea53398bc5be20fd600f7c91bf69a
SHA2565d87a7683a26159145cd3d23daf2302b807e251bdd9e099bd6798d18989e5a60
SHA51240bfc13360b4684fff2a84a41fa27324d4d7ae4934ff7c0dc068c1d6fc1750a0785fd9826dfd029307440cef7f4205e9fa16ab21161c3bc03dfed79b9ebf3182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5345b3d4c2c1dfb67ad373182e2133676
SHA11b36f3518cb41c49cc3f37eb40fea054492f8ca0
SHA2566284f246e70a0d5c16f08798f16a1b4cf05493749989ab8b57e2ecd95fe491c8
SHA512aa77105c12d3212f1ed4012c82e280412b95bb59c96b713114b967e0360f17e8b4f7839516a9d39e4dede4bc4c4c99b8c2bf62e99563679275e49a50b016823b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aad684135dda8d37bca084c5acf8d3f
SHA1bc593fe2f3d70af93b0798d2004d6c556060907a
SHA256d63bb7b7977f253ef42bb0361cbf201e54cf6cb7b11433975a7536587ebf3a63
SHA512036c33922e91e01112ede70e09e79738c6cb92a7aa05ee9aafd0fa6f8cd0cbc5f3923c87431ec7fd51703881830cde4b837d9ccd2166e2bce9542695a76a04f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51049ba41c569b8211bcd6e8313993b4d
SHA190f28913482e1b0e2a2a55135f73eee68364cb8c
SHA256ba34dd5c4774d3397774e40c7ee166f2fbb4c8677fa28918a4302f556f7eb145
SHA5123b69b7c015afd1873596b3a3cbf4708b5ef098ffe218f4e09e3c7cb1798532427d6960af0233b8e497bb9f0fb4935c471a6ab0e11dfac61c79bdf891a58e5f71
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b