Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
fd70786d6b9afcb1fd7e47ef6f08cbb7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd70786d6b9afcb1fd7e47ef6f08cbb7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd70786d6b9afcb1fd7e47ef6f08cbb7_JaffaCakes118.html
-
Size
3KB
-
MD5
fd70786d6b9afcb1fd7e47ef6f08cbb7
-
SHA1
cdc81973f1682764801c326ec3a1b53c06a424c9
-
SHA256
9fe96be3547f2f01dd6dc34475dc6baff63db00c83a7edb739cc88660baf898f
-
SHA512
9410de191a845b6dd7ee8391795a1ceaaa5f14d14786c2ec95c83c330e5a5f54e3a9e9ef816df42bb44138a3e61ad388ad94e754c87e5295b737f98a0dc7231a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000b492c9c0662d48650d532d5440bb5d98c2b39a370f7802b13738b15c0f2a3ce7000000000e80000000020000200000006d16f98bd60d40aafdd294a392185dc625569b5fa02ed3f368e88f6f096a5dea20000000c6b5fa0faae97276834bb98b2ea0590eb090275e095017cfd2cf2b11b27d8b73400000005466dd448a3b5482fc5a609805a96bc0ae46d2be3ff16f6793b3e7bb676eed7d64c7026311c8e93a8fd31597be021b3e0b6322b4d7c8770bc24bb70ecd658020 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433731215" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 007236bd0512db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E7A76761-7DF8-11EF-943D-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 1512 2792 iexplore.exe 30 PID 2792 wrote to memory of 1512 2792 iexplore.exe 30 PID 2792 wrote to memory of 1512 2792 iexplore.exe 30 PID 2792 wrote to memory of 1512 2792 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd70786d6b9afcb1fd7e47ef6f08cbb7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4ca3df89398bedf2616df309b238fb0
SHA185b568cd5cfa91008cc7dc1f87c97545eae90424
SHA256fda49d0c0f59e20ce775bbd3e665a7e17b65fe08a0cf3f6dce6722c45e10e7ff
SHA5125c87e4de5b01cf342a84847cf2307d60e130626c119f00cd0a59663426926ea4763911199326f6130b4313827919672abb8db6390a8fb68517cedad9e4c80d48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530e2cb016d48c7931e8190c786d55df1
SHA1f489c01489cd0122e590a0dd6d656bbb329f5d01
SHA25643cdd1670aa311d752b8f229b15a42748051c989e8603b92573d8fad7e3e5268
SHA512ef6f82c48be8e6162dc7e55c38e35b81d60161636d2ad527559e956af3e56524ad3d4a4e93daccd2dd17957fe8e803fee1d28488639d9bf782956d4b4f9d43ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e9c1486015d4535b39da3389ff4c206
SHA1fd4d4acf51ad429b03b9eabe38d06274a231ffe7
SHA2569bd306c59b34811ef73307934543282789b6a4ad81213994f95879fbfa01d60c
SHA5126c751cfd17c4db92dfee6e782f1cecf6671008377a1e747f16ea61de8bf3c991072618d47caedba6e983b72c5d4dcce76bda0d840c093a159dd1abba9ef0edcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa8db392263e79c6a6290e514391d05f
SHA1855b92e54e68a01400b483d3bac31c2d887f8718
SHA256d58aec49f45949f83c9d7743a7dd02f9959b0f0175719be87a5f5a3c5722c993
SHA512f05a2631198bf22406b312b93a2e5f53858ee60ac34f81ed08b08be73f5a151dbd6ea1dba4b02e55fc9d61b53b336484f25095665aacab4ebb3b1eac44dfe18c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53622f4aebaf8e9d8bf3654ac4487f00d
SHA1cc5263d94f4ca82aff62baa90ac82c7d88423376
SHA256dfa96413ad7169907ee0dc33c0bbbc7ba6764d135f703b90ed5b811825941b13
SHA5125a839687a276df97a828d235c09dfcf22717ab6624426976547e178f308e3ff102f026380decb7c7d314bcc8c42cd7707dcf52da45f4a047dc24751ac32d1ce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d82e760e5d140af8dfa03df32717b3b
SHA15e3360899582425af8dc139aeef95289c8553f32
SHA25697500e9d54053f000d4fdb1b3e930a212b81ce7456f83e78caea20e5080abf73
SHA5127c08aafbeb5bd881458f32b12b1429ba80f9f3826d78a39ea2ff85b11d33b22da6f047969331e803648ece1dfc92ddbc4f1c3a11382c672fef0838903bb273c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caa5bc0f21303e57504bf92074c00747
SHA17e795a996f1753bc1a38fea3b98b268026ece5b2
SHA2569968c28f97b175c8df9c6c55da148564cb583582294fea6f89ba9a5a07e7a428
SHA512079f03caf23426340afe65f77c0a4519a2a105dd8b73373c84fa8ddbc1fd26d7a6c106b58437ae00a9ed26f60131b982ed7fc4760744cc5402604bc4d1afd3b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512c21802e55edb4dd6e7ee2689f61291
SHA1eaf46a89e1d3eee158cb4890843580f8985939b2
SHA256dd5e16dfe7e806c9fade60466afe966aad76cf8cafb9ed1d7b850ccb75a6ab4c
SHA5126cb58efc657307c926918b04c4b7a85785edbede500fcac2de7dbc7cc577167c989ab2aea6253cb57a5cbc323eab70661acb47f5f4df4f14515c0ddbc055a93b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b206d618095f059f3d19ec9facdc6382
SHA1fee2e21723e8d0386aac19fb9491232cae3c7428
SHA2568b304068f067767b3eeaa6d1fc3615e72be0c65a6ccb384cf24f6e5f128ee87a
SHA512cf14ca49272bd84134c4035ddd3f62204b3bec204a0dda9e800d4976eafb294ac6db80d524a2d95ffd445335755708810a9c04f9edd0c88837f9288ebeb32ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c7b28e25f882279c1f487c520b28260
SHA1331f636f77be5f68301cb04f733100cca5b8cc07
SHA25626f3fed96d2f167078d1a09209166a6167dd18ad2c464c8b1f8c87268bba7f90
SHA5125119294008d8250e1770f8b48137c545dca5dfc3f1b3ffe30049171df9bfef319756461e1a45b0c1c7c93cd41bec834b351f1b68ae2532a511ccd81dccca3f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55000153db10ed5273391d9ef33139d7b
SHA1d56f4e3f7d37d99dec9b93ac7f327194f92c8cff
SHA256166ced0639026cdf6dcd2829d485e241fd8fc851abfa27114bf45141996183c3
SHA512d533ae330f734912c304b02c3b43141aa1e38af4f87333cd76d664eba940dd0846c1080e18b5a704f609b4469153ae9c63664e9adca91173de391ca68536ac46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590edfce0b8e61784017f938298cba65b
SHA1ec14f892a59dacdc473e4ec0b90e5767c21ffc23
SHA256d342b0c9f1cddcf267001dcf99b0667a302bb3877516105e8c711849461c3a58
SHA512528ab7cfba0a1bf74e20375cd38e31f0429aaa35a21d44a6b8b33bf15f7e4c1535d379af1f37c58970a7c7541617d620525bd2eeacdf194bf8bcd2832f757254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511834ac50b63cec17aa0c5fd58338766
SHA175f00621b212857e4b54338346f49836c2964a47
SHA2563e6c458582a07b0281a5e1ead03160e9040d30c3e77a67e40b6afd7fcdadb8b9
SHA5126e373e653ab8f2502183cd8ce534fb786b97c5a4cac8430c8a634811cbf964565744557a98f4eced35adb37dd7e08619199fc94e83aea4228cd3021c1e5d7d60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3171785b1fcaa0a7ab1fa5baf198c2c
SHA11af03fd16f7bad85634147d1994c056c25f2b3e2
SHA256b6209e3da77edb1ec740fc24b3c7ed014f6a23f8306e6864b2b29bb2ebb4254e
SHA51221fab16ed9578fa2de07aeeab5526dee809ef7d4b1ad7daac39ac8949ebda48a75b548b1b16bff13257e3506be7e67d4f4dad48f79295eaa26a69a83323be2cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55abd024cc58e9bd831f1de6277f730c9
SHA1f65e4b574d72006cc9020d07b45bed15b9063c4a
SHA2561f977ee0b0561cc86b10cd71bbee20ba10d3ca2b9a2e569a5c64cf22e229e371
SHA512644f743490e9a7359619401aa6601c65bf7d886d389c907b3fc8a492559af3c6a582e053080652625782b0aace218e91b8db3f8fbf0ae1599ab7a9dcbcd4ece5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f582e034801b8ac082ff2d5f2e6cac65
SHA15e01c996bf7b8891a6b7b8409f8446e1df0a5f81
SHA2567227321198e60ef659361398e51af803efa53b52308ae15c102e7e1485101bb8
SHA5126a3db1b873596a3169ca61e36a592b5fab8877dc46466450ea9d4fdfcab309d63d402904c942824761bd43ba6ab3be80ea14e78fd2fff38cfc014ded05784b73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a79e3d530278f0a22fcd61fec850bd9f
SHA19644e954aea3568e55b308365cadacefc308aaaf
SHA2569bf8793ee8fcad3334238a45514f8617d7948375372d33b57c49aa7edf8dc8c5
SHA512d9955592911cf3eaad7f540325cead9ee96998da2aeb83c9ab0e8fdab9e8c69f992181b0fa93820ad3d121139a137f78465036255218001d0f4cea3e1feb37b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5d7f431a507385e7e2ccfb17566962c
SHA105046a6a61e6545fe1b6b82b260819b8db1036e3
SHA256e5e39daf7c071990ca90dea151afab6b4b91c003853c6148a2465357e61b583a
SHA5120ee651513142cf00c59b1292cf855ce325be9ff8a5f784e1dfbeca15581ffa903aa18b9e682165ce767e7a5d3568fc251cb626fd6843721e7afa2e3e297137f7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b