Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 12:47
Static task
static1
Behavioral task
behavioral1
Sample
fc552458dd4832eef4bf1c27ce4ae160_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fc552458dd4832eef4bf1c27ce4ae160_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc552458dd4832eef4bf1c27ce4ae160_JaffaCakes118.html
-
Size
20KB
-
MD5
fc552458dd4832eef4bf1c27ce4ae160
-
SHA1
07d983951d5358fc2a98c2a80b6e47d055e62788
-
SHA256
657f405cb10c1394bf78ce5bfe3233d40aa6aa35f908402b0f78ead43be18662
-
SHA512
06427b53303d63a4025ac2e8b2d437943fee9484c2e2f8a854c8ea4954e437ec402921c012b4d9f611fcdc32609f1c6f8368100d200643ef458dd667bce0f0e5
-
SSDEEP
384:+fr5Sl5Zi617bPxQozizx5zEIdxOW45ikXytuWTEZwBvPN6VaO7nCLfLAL:+fr5Sl5k617bPxQozizx5zRx745F9WTk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0f7c1b8a411db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000051f8e1e2b3e86d1da74d5c2428505d4e38be0691cdda259bc7500b32a4e649dc000000000e8000000002000020000000ff220ab8a9b29cf9c0b9e393f8fb25e9d8a36f2b50c0aeee46c4b247a1b4cef620000000e54b22e4505b9e2d918ce3c799b7847c973f568368fccb80fae0f4b3a2058d6840000000bdce1688cd4214ef05d2918dc431f6e84fbc10923934f940c642e728d7bac3ec987b570ac913e484191616f1758d70990baa3bcde2407f7c4349dbdbc0f8dd77 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433689547" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E429A961-7D97-11EF-A839-E6BAD4272658} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 3012 2088 iexplore.exe 30 PID 2088 wrote to memory of 3012 2088 iexplore.exe 30 PID 2088 wrote to memory of 3012 2088 iexplore.exe 30 PID 2088 wrote to memory of 3012 2088 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc552458dd4832eef4bf1c27ce4ae160_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cdba52544200b7dbedbffa8900bdc8e
SHA17c4683efc3df90b699ae945a50d016863683b41e
SHA256a67401c3f3de076eab763fd5541734a76e905be2e241f706d490e950cc000a55
SHA51272abd80cbfb2c370d99c3b7ca0e8c0584bc0a36acfe860ffe248bc605e1489f4f3684f7e6218b02491bfffbe59d80e0b68badb119247eaa9dfe8600abcc67a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510e3ce1ef15e7e2a63622361ac129d8b
SHA1d9f970a61e7c69b98e171ca3dde4c251087a38bd
SHA256f4256276d80419f2f0dbd2b11f326d8f99c77463399ba63eec2e02b9ef62f371
SHA51225efb2a6c06fcf8834eed8b91ff4ed46e26dd14f1f94061cbbe17d25748deb6317348732fea4edef4547c2373501efccaac8aacb3812971bfc1e752820908268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534da620c061aca13257b31477bfb8b90
SHA10d3266820450822e1c2ea8feb79e4fd472f81312
SHA2568a6a72ec5077ed95dc9dda5fa75e10662d720636040576acf2642ba7c215adf2
SHA5126a523d32db3cdbbf3f5a6eb345c40508464516b8d93007284fe19b45ff2d904a2db32720b5597e94f1ef71b492c42970320b029e9a92ed1d1e1a596661244dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fb2a4152d550d73a0785d8608704e7e
SHA14a8c830a2781197d6e0473ee6506e7fcec620d34
SHA2566afa49cd6f7a0dab5e474f7d694daa33af99939297955b3e1a302617f050d4c0
SHA512385340c1aa98c7ee2af4eae9f36a99a4a3b649a912f9354f1b22dd47132cf146758eed9020d73a6b5bbf514b031dbfb626886214331eeb87526f7b2b1031e25b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59db8ee4e753c34b59f34ca1ad8879733
SHA1062cf77a5220284391c71233c88cc2b4c7e42bec
SHA2569e7a5e8c744fd81169aa7e354aefebd6bbb8e0bc9e6eda62b1c9dcdaa885ef35
SHA512ef6d75eb5e9fd6f11836c1cf85860b10448c38bd1e70e3501495f60bc12ddb5112957ec795c6c85e6e629281e5f28996354e30f316534f6d60aa28d713abe44e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b9bd32222181e130903a009f2f882c2
SHA1d0f4b282241f2490e17b5c2abef4e2ec2dd6de0d
SHA256336ee62080bd653c979fa9e2e3aef5a4b03f4907a04dc9ea882c6058bde3dc78
SHA512cfec252dc6c1b2602c4b9770b49cb6084b582cc4b937cf9e0b1cefe5e139f47db9cf0f6c01858cdb9ba0cc6cd656399bda55ff92462a6356fa46fe0c3a5f16e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52180f823602a9ef38b1f50b75cc4ddeb
SHA1f0567883395a287135b7d6942e615986e8eed89c
SHA256f097b3710822b0c38b82d3941f762765ae99760bdcb7c134025f86ecea289fa2
SHA51283b249f27f6cfba1ca592b48ed50a26f5475336272d5abe87e185fd2792319c059690f5bb594ec8c04a4cd40c1622fbb78393cb20f675643b1f54b40058b1957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bf8788491c65f6214159d0a67e3c52d
SHA16502affedd2cfb820a992df41ce85eedbda21065
SHA256dd078a5fa5a495397e6bdf4dd665926bb23e8ff9ee644b223b92f0a4fd734ad9
SHA512074446b18c1f6489d9874167fc16b99921465e1c2d59458970bb423281acc139a85b5539c1c87757eb9a909ba223fdd9e705db940f6c909d1ff4b4eb595c8e72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ddc83d49c6623b5bf1ae5160dcc7a80
SHA1be1e64f086c863223c51f9451fb409184bfedd40
SHA25652d3abaee85f33034553175ec2c5d664c5f1236633e2b92fc4f3e5137a06b0c1
SHA512ecebdf8af13bf0c8a4d2e9fe021a9b97d96b880d78e926680583925750e0986c154ef3b1453cb66ff17b917d0ccafc2a1fa58cadcd4839955ced0a438a207c93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9e0d8e8ede159de3a94a97bfae619f3
SHA1e3262ed56c2feb57a38e5756df418dedfee22470
SHA256f833e7d0e972edde3c5d943e1e7370347f664338f132a071fbb90e9d29bb899a
SHA512b225ad0e61e0f58554953bbe7099441ea6f7644d325a36c3fdcdca510b0b5317339f1e7bc1e125070c049c04961a5ce77843511cacd672df26db1d83c4c5aa18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b41b8cbfdcc50df03be64bf2921ffb4
SHA109529aaba7e282e5179e20bc5a87a13142120bb3
SHA256864a7fb4a1ca2a0a611172ab33c16fecd26b4e96c0a07a2033007f3872d6723d
SHA512b49effb852aa9b33670dc3bafb3f7f503bd53b4060e1dd1e0e9b2bf5edf6e1147f6acd0a4d7ed2ec900350b28e5b7d910a9fffee8d56cd223e0ef4acf8cf7849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5931ed99ec27a0d4b92ee8bf0edfc6f6c
SHA1a34326a59917742222709a0db1b7b005a5988ab4
SHA2569229731311d99418611a6d08aaeff9e2d2df8d49c09f0482dfe4cebd3a933e8d
SHA5126a7eb6cc27e7c3a400ace9f5bd8e09b8933f3de4cc3d34c558d4d3476efe288eb805e44da56d76b1dca0861401c400930ca0efc28741d0ce4d5caae783fa2685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54df5c369facfd1766e91ab832846a87e
SHA18e2b219563c0082e65e7633f08a5391cd69f04ea
SHA2563d722cf858d996fb03bd1d1f1ba88260ab5a571635e7f5a22319cea7a94113c4
SHA5129045165b12763c21f1044f9c382a6e4d8a6d98aefca014b652f3985482e001f4bb4bbdf45e53b5a21e623a03ce25d2caf7257d3aa863e7c6d9d85b90e538bac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8ff0980236aad7eee23a6ddbe0cd6db
SHA19a5bb58d4c61c8321bf1a3790d416d908994b94a
SHA2564428ae241f7a5ae091d9f4151842291d007aa49fd72bc6506de72686759f260b
SHA512a7e37daeed49a2ab6f46dfe46af7f0428c179a300f7a7565551481b008fe00dd28bab07418a587af535cb60621284692373169f9e25cd824e09af39a28526345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3ad520b3c86432980fdf627dc463d10
SHA1aa8d5b17f0014f324956b9523050fd154ceb854f
SHA2566e7a5aa0d99f77326161c6f243aedfbea9e310188e72679ec9684fe1b282effa
SHA51222845b61d4a2df80bdb70b046081565b05293cba6ce3dc1e7e5137c318bea072dc6d3837f9de34b8d0da2d34264580f0f74e8330556ed024df1af47f393aa2dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec3bb1524e9a39d35863414ca0a22e91
SHA1d858b7bbf7963b39e7d42387404b3fde71ec14b8
SHA2563c4d16c04ab8be67293a9a62fa2b23a98ecd92a4961a8f79ae261f6e6fed713a
SHA5120bde2a885ec5b72e511d88b544df542f6e3ea39e0cd58b798c2df49f8e54a7a013e8c31074e071a1e0527d0c26364bf55eebeeef9a4c96c5e806fc04f612402a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df14df7f83b08e61fd3b7889dc1f7afb
SHA194d705399597513c1fc5976a003415b274534ea5
SHA25660ad17766eef5227b5fe6acf76c7a954d1f4d25fc73f155677804539112bae4f
SHA5124444b8f7162f063072db32c70f3d730a93e6cef30cebe33e762dd93da47e258e5faa5ccf022f21e8380204be884dac8f288c207ca33411f871b58127e946c375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e45f3d64052d0fde86670502ff179e49
SHA189d4bc6a29c95f17809cd464e9fd4fa797aed9ae
SHA256acda36206b688786ef77cc454a3ebf74a00612d8d255da333b75852fdf685180
SHA5126f798d6ed83cdb43f43b4b75af547a32cb8f60176c5575755b6a39b312a099ec6e4f4bdee4bb7e2baacff2b2364d82cdd199f4b2baedd276cc3c03ed7fbb9b3b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b