Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 18:11
Static task
static1
Behavioral task
behavioral1
Sample
fcddd59710017ebd653ce9cf861d400e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fcddd59710017ebd653ce9cf861d400e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fcddd59710017ebd653ce9cf861d400e_JaffaCakes118.html
-
Size
4KB
-
MD5
fcddd59710017ebd653ce9cf861d400e
-
SHA1
613e28508290087954c36587234ec9e24115325e
-
SHA256
bb1fa7e6430ba560dae3a82326b815b12ab972b9e79da70a2338ebd991dc76c1
-
SHA512
6cf2770e59114282b80f130ce278ca2a4ffc7ee7f34a9adf7ce1e064ab89a135b524bd4f9f3aef4155b67bdee2332cbe6b110ca93ea9e241fadb05175c94b79d
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8osr8g8d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1AC29DB1-7DC5-11EF-A02E-FA59FB4FA467} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433708965" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0b243efd111db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000dc2c01e879a3101d52f419d0a589cc8e390b1e4ecdd217d7c216d1efb0a32a19000000000e8000000002000020000000485c56e96415525e9dac9ad28833b0ddff34eb1c7455c80b47ba776c6c554a532000000084be18249a83dfb9a3ffab84754f8785c9835376d13e95919d7be96fb6b24fa240000000bfa9c70f556a7700450ed68b37cf7f1da034dd56ec69b073b4a01c12d7f5d3badd9eda248b3d9e18aa6e831b410b1db3cbcea6e45b7c22ef6cefd0256a47bbf1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2956 2512 iexplore.exe 30 PID 2512 wrote to memory of 2956 2512 iexplore.exe 30 PID 2512 wrote to memory of 2956 2512 iexplore.exe 30 PID 2512 wrote to memory of 2956 2512 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fcddd59710017ebd653ce9cf861d400e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c9f9727dc9cd2f874dea5cbcb9f230f
SHA158fea0621da0a12374cbb9dac061079e01dfbe2f
SHA256ae6a13d1452ef1aff2859319c42f5e3cd402dbc83f836964c1ab679521053ff5
SHA51241ee25ca29ec866cdd9504cc8af217c759bcc76d3cd7583e5bca19cf45c13ccf231b46098476c6d1cd1a8d76d3d3a6c27e1304d84bb114d78d1f689726937c06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505265272adb4ece8efa43c85339a43cc
SHA151dc72bd4b9435f5ed415bc208ecb196eba2b23d
SHA25645d37d4332c063ab5d75cd946e57804032b90546c2c4eab2da4cb2cec914060d
SHA512e3b8bff375d3f6da84a3a0ac3cc47b3d3c4baad81d3c24f79177cfeec08c404da1463074cad4b0241fd31f8c73716cba19c9fca2120a206db4ceec7ac0859763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553b0c5288d53c996a7c02b9704e3943a
SHA134c13ee857756b38c8f5d7ee034262cf0ad1aefd
SHA256980824bf57a2593f1553a73960d61f5dcbf9dfa2d93c55216d785059db6a5bd2
SHA512a55d0c613ab296bf04635ccf24c7327c49f8dbb7a607bfffc561824f69aa59bf10230835fd7c87ba8311d4866dbb90fd82be51f0a966b3e85bbc2674ffbeb9b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d3baab9ffbfb1cc0003e6bf35cce24c
SHA177e2665b2979814da865605cf0913233d5d766d1
SHA25629aa6bcabc70877339d7ca7203ed60d009b01fcd45c40215c78209932bfda33c
SHA512f5b8d7fadf7dd416f90b1933d8c80f6640ceb16266e3705247272db20b4960f70c9524d1083741c1ce4cb5a73389a69cd7fc9029f891b3c87c13aa3a65854359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6c89c6b5ff337d7fb5d0d2c27a7a1b1
SHA118cc0fbe504980c4034ad4aa7259244765e552fa
SHA25635f3259082c5e67cb6c6fc1a279ff4aa41343ffda981ba5ec75a015bb9930cf2
SHA512b104bdd74560dbfd79ca3618a490f16d1499487766c44b6bde45766bd58815d595779270de572b5169738e26467095f79c3b41204204cc5364e722fe42047a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3a528e0a1b67d7b05461df9594900d9
SHA15237d17e0a57effd613088f11dbed4bbdf34c1b9
SHA25691e9023c9c1b587c71ad2216dc0564046e3e1e37fa6ac92114c9d6898e12d019
SHA5129b2003914dcb417b028aeea8c8e1097ef29916930d001269826837e40eaa834e74249069bdf3d6d435c517cfcc8859184d31685dcb9b0803997ab15a5cebf1a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a0b9fb531f12efb1428628f1f54a9fa
SHA155ef8049911730bd3a7e37976518648e2e429527
SHA256de9a0b8acfd410760f618b31439a9fa26232454df0fa3c43edf52487efe34807
SHA512d896d63bf79bc42b9836223bf2d23b238a06fc76f34ae2a7fa46d1e1cb3b2360cf680208bd622a6037d945d11c4cb7e1aad7cbf31eec21676a634eab9ab10c8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588751dbaf32d33acadbc3237f7a6dcf2
SHA138a46252b70dee1c8978bd4fc72e777b80959b21
SHA256989a89f3e76628d152c3cdb7b095ea19e013b4abde7f5575127516e793bf9810
SHA5127288dc11909a34d0ef6d7affc4725fab6e0654e92f2727b994442cc2bfd6546dd1a783a90fc4d66a300d4d1b5fd9c04449b113777b3e484cb1ca904ada3c37e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526b612313c030f39ab7ca6c3bf1880b1
SHA136835ba618553d104c0314269c210328f4600366
SHA256bb7e421bbdd27133d7de803d3d715a6f4e70ddcafe97c2b028791a74dc2fa4d4
SHA5127d38fe163b7d4cca0faaf531900c69d065b67fdde175ed7b031b40d9ee281908552ad350d28e62da5656d2b1a597bb411830f1831443a956bb237181b8585fb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1de1c13c5954039a328b229db7d5820
SHA18c75122d8bde54ef36ae94da0d240dcf0d24c2f4
SHA2565f9e06695d7ff05272fa34098c69b2c7317e7564394f9cb5178719da217a0f68
SHA512448c2f0fb894fe5961e8519a75da69d2b2b79923202f8f7d02e4bf4a2dc5f00e69176695b7e7d6bf91926853358a660b5a211ed17c932d47e56158a7241a9717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c53227133764974e985e08fcbc9c53de
SHA1b4853934d12b12c134ea4040fc2e81b54eda0da0
SHA256e0205feadaefe651998124574a60fc1eac6560dbdbb8bec0499ab327b5c66b3b
SHA512ac06beea99fefac3cbe0d939b573aeca7cf813c1b14b68534698193c6b91a7e1f1ed86838060aff9609ad277ad7011e592486d84a5c0fe1b890706b56f854766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5246d5ea629aa5ac80f1f08e0108e07
SHA16736603411bdc16923e84eafc7c534999bfc8a5b
SHA256248a31bebfd7e7791d6022c077e06919bfe312392017585c149ce89f61ebe4e5
SHA512d343ebca752919a0a9d2c1e048b086b3ddc524931de2161ea7b29993d19ab930e7f6aee78a521653bc0d8c4afcfa34ccce0cb4344b4feb13eb67c5d21a9c7bb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ec6c6500abd729a9d8d4f81842499c5
SHA1ea96eabf35da1fca350c7b8a5d08b1fb8120300e
SHA2566cc70902f7f83c66092f9e48deae99022cc53d8fdbb15b9bcd17a7752e76cbf1
SHA5126e1bd1142946af6fe41f256cf40644a0b49bde930ee035cd39102114667c33d0bc00cf36317c318d5c548c62c4b38a741125796f4af74881e100d7e51fab43f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504a1e56c855fafbd8080f1ee12d8f1ee
SHA1080eb9398f0a0ae3bca17eb5770c37b2b380ce7f
SHA256f3c8458031af15494715a88e90e8e473536e3ed3f54fa191a4f9863cfbe5a1e5
SHA5122e43d44f97ed64d85a6995b82507a31e73a9b9750bb99382225777d316fcd4dc58753c8cd9aeb1636adf301959f11bf705fd16bef468b4c4048449ed44a4f5f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5210acadf1ff606a49b72ead77de7c718
SHA17a9b7bc030f7cfbf761f08971c8cff3b609de3ee
SHA256c46a9ddc4565e6ec27be282725a77bfccc91f9b629bea95ece118dd2f6e89da7
SHA512df07540884029a9d6d99bb32b3a6bd190d79f9062efcbaaaaf898618f867b7d3303967f11a47515fb1f1ee453ee38724b203cf2be709b2375f1756bb7ab52131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c618e1c53e3c8b8336eb9d397f883d39
SHA1909c2af0210d80807a516e3a9404e05fdaa8484c
SHA2560c67caa0afedbd67d8fdc2e6270eb9a450bd02c87ade8dc2305cf4a0da06c9f1
SHA51277bf4990e50c5ace92b0d6376fafe50a330330c014f4e9e574f5ce8337c2f4818e72c629b5de52cb67340ace05724f1cb594d6ee8c0efd65b78f2c925d0e2980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5594ebdb45531a71b4cfb45664956aea2
SHA1423fb3fa99ec9f9650922f81844cc6b5e19889d3
SHA25658008ef1ec3ee2ab720bb999646d86cbacb8ae22c1baf3fea618bcda226fd17d
SHA5125a7f1a2c2ee0d6954db76a215915c6bc4d619425c95774562aa1512d728ea9b5b08ae2346a9bb186604af73a17e7700532817f444c999525ebe2e67a244d477f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a54dbde9f87d7ebc3cdc23465dcd4f53
SHA1276ca6b5ae18e37732ccfea4a4e6f25aa04736c3
SHA2567968c118846ae5fd1588f30a04951504009f7fc134b6437a9658aa00670d6869
SHA51215e3d32883426243500b86a796b7b84b140592e2d5b066b4cd5930d6c5bfa86366e4fd0dfb1948909014a02e49c2e9c80934e700ef8d6d607c6ba6f6d5dd178a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d742fe1380aad5e5bddae8967de7f20c
SHA1827314e61bae87d1766121be26121ebe18ff3363
SHA25686f1c51c9812002b027f74e2ec9d2a2cfe3e948b562e743c4f48e195ad9959fd
SHA512123f7ce67280be47e19597cc5aa42e7bec3c9bd35c1aa1c32449d9519715b31f50ff5701852b2100a03b171dfda987df8ea573f1a5fd7f09e93146f5ae5e6ed6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b