Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 02:57
Static task
static1
Behavioral task
behavioral1
Sample
fdaa44a41e8c34e37cab523b051e59d3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fdaa44a41e8c34e37cab523b051e59d3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fdaa44a41e8c34e37cab523b051e59d3_JaffaCakes118.html
-
Size
72KB
-
MD5
fdaa44a41e8c34e37cab523b051e59d3
-
SHA1
6a8298b9990cc50981a79b47be047dd846d1bf02
-
SHA256
b6e306b0d4a7cd7468839153b071f56a4704de5885fdd26c93c3ac8c87a4be1d
-
SHA512
c41e1589b2439b329d40b28acd0df529231b34887a4bc60d7c310d86a9a17b20a1b324106aeffb6b8e56190967d526be6ec0671584934fb2812e7817b4dcb25f
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sn68LeLeYbAppbtpzoTyS1wCZkoTyMdtbBnfBgN8/lb8:J33kVAftiTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88E02E91-7E0E-11EF-AAD0-E29800E22076} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433740504" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2069a55d1b12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000007da60df254c715f03ba1f44c7d0145e443dea318f87893018c2fb88e265d34d8000000000e80000000020000200000002ab58d748cf9f126460a5825f6be60357005781cfb30bb1ccd9c27de4b0d2421200000001062d52a9549673fa636a68e4abe8483413da08e69c1666e5ff523368367661940000000350c8fbf5442df23566df3975070d8f374aa15eec0c660de3ad4110b2cb8ef20127934a5f8281e5bf5963d9fe3952db8d58b633510d710d17d258603656adf57 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2944 2688 iexplore.exe 30 PID 2688 wrote to memory of 2944 2688 iexplore.exe 30 PID 2688 wrote to memory of 2944 2688 iexplore.exe 30 PID 2688 wrote to memory of 2944 2688 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fdaa44a41e8c34e37cab523b051e59d3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586e33f46e8beb7ca620a9be9f998ea4d
SHA13771444fb0318ea440f39814e4db16b637314f94
SHA2561b67a03482f2a7febe08fa7e983fa081fddf5c3efc5462241150b35a756138c3
SHA512e202c47b02d9001a219bb0a02d8335574943d66cf494ecfd0a293977eb8e281dc91214035577f5bb9953458e2810acfed89e9a0e858b8bd6867859624a09043e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51382cf8072e052b96139bb9561fea034
SHA1603c51ddd3c42de72313a96f2dffbfc38047d1f4
SHA256c46696cf4480f0d0e23d60187aa7fe1f7bf443401c805fde6ce23234a2445d2d
SHA512a84bb4954b8e3cb673589fd3a5978c0a2af90cbffb134dce78a3e4b33c44fb841e5e8aab98f6291f48c9702696e9138cb0767343e8fefb667218a193cb52c1d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55da05042955e3c307e8517df59b8c82f
SHA1a490d348607aca1c30821b1c6b200b19f4436180
SHA256d36516dfeebac86dad6656414b694b9aae3da3b73dbcd5c355395e2be5fba837
SHA512c4b268434ac426cbb8567cb2425d1350caa4605f1f9ebe7578816cf226c752bd7026115b711a2adf55f2d2a6502eab69127f921b56a8b50a0fde9a978f6a36d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcb68dcc4c718b40a34baafb3a59dfab
SHA152f80c615e9bfa7ce375c9432e0a3616557c3e93
SHA25608095ad8f9273ede29a7aa00a53a17abf811b6078ea93d6ed3c16738c95000ec
SHA5126eea987ec40a78e6689a647562455e30bed713f09d803849c5a57ab21dbb582155735a65f16ff454dfedc6562fc5754e5a341232af7f1185d1eb149e8fa3558a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5100baee213b5601ac80a515d1d632bb6
SHA1e1d025ccefde36199ed3e0e6a411883049ec6ccf
SHA2564dce549b2c14427a7b15498a743dfe425b327e2ddf9ee4270c7cb12c43d6b4a4
SHA512c6ffbac45f26bc964a2ecbbffd532473e68dfa0afd7da53dd61c0e595c6597bce5510a2d93b095a4aa957db122ea504aca136f3c57af42332714507156f7b840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5805457f3c818b283f0c952d147c5fdb0
SHA107a17365da8c8f278bd89319daa17274a2c66f22
SHA25627b2ae0dd131153bf417edbda40382d99aa7674d082d98eefd289b71b0321760
SHA512c9c86149ab958f8b2f07024bf3d21ae18ef650c5f0c7f95fd7f1ce357a2bcc31994b3cbc2ce5d4801cd5ebfe2a41d67e4a1bd1fd0da90e24d2257d55b79d7341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5784872487fcff24d6378b53410ccbb4c
SHA17f1682a92ea0076d3a980411c42495b5f15013b6
SHA2560f2481414e3c2398b8ea0f93424c36fb51ded88969afbdf4ab564f3570d67e24
SHA512c36ae4023f572ddcaa06a1e3b5b1af0f96634f40d13798ab3cf24a3bbc4722dcc3c2827ef8dadec81e5c1b230792242ea7b74b26fcedd17d1c41cde836b8d8c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5849d5dab0ce6609f276a87b70829d0db
SHA12196eed97610e1979761748dcb0a67cc1aa7bb11
SHA2563c4de744cf59d6e2a90333d94bd23cc50ea3df330a399a1dcce3c46304ce1c9b
SHA512f4a247869510586b971ee643fe4ea67fb783ad2c93d12574eac133382324ca8a753795381cfaa17d451b69d068ccf69825214c3ebe08ef879dab524ffbc78742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50916ce2157409b5da15d9587934ccd70
SHA1f7448d4ab5ab2bfdb410d1eeb0b7b0aee0353d15
SHA256d026dcabef33cb170f4d95a5e9b401bc1aa26548c94e19c3361efcdf9ebba46e
SHA51276a5004265ad33211d0b034ee7456b1ac6590b3973247c1b8567efaf18c5fef5be8f0ffc5147a0f0cdaef19ad924a81906017f693d80ba72c09363dd5540d48e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee4dc70bfdbe489568ae8ad0e5aa3eab
SHA1dbb41f7f0e70648d25960918024255069e45d2ec
SHA2564f30cc6b54581a22343ad90a6fb7b737cd93543b045ec532d0f30949be4a2b46
SHA5121be2a00c502d92ead1fafb193678a655085a1bbc402832ea742b727f5bb3631461da1f0cf884e0939bb2590a72b1e715b4c1a1d9fbb4163f8c06dc9f5073c594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eae97c110990c22f7f8abb80edc41693
SHA1b44ccdc8aa0532048d7a4c379e13c37dfd7f0169
SHA256fd7ab73fdaeff4ef34e5cb17079825e60d0626ee2ffc550d53cbe5641c0e4b6a
SHA51205174741eba31552fa973d9bdd3705cb6ea6d7aec072132eaa6d48213d139dd64de9b620ec5835ae1d77b5f3ec52c62c5a356314acaf986629df5f44d6e5cd9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567de63e77b27ba49e8cc76f21c57e465
SHA1dc3359dbb992b38f5ff381963c52db5187fb3e71
SHA256a2b1f38ca83b6ca27dde91d9c2bc11e97a9abffffe93fb321e028a993bb3df5c
SHA5121ff8db4b44f59fcd2bdddf1b184590e0e424496418774a5c216756f795e80ec562bf5e7a5f8ac769c65a7a94cb8cd31c58f2c28419616f1754c1ef861bdf23d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a828ffc4defb3aa3384fefd181f7e97f
SHA1aa135b4d43937d2661a052308a746dc6b1582bac
SHA256aef17fb54e7786ff6a56ebaa83fa97b611f9dfa1cdc9ce8ef7c2dd53ab8e48a0
SHA512b19fd60b5d6aab1623dbd9f1f09917a156f64ed0696761a641aefea4b9317ab310a9f0079101ad916867964262c7e7b12a474d2f4bc05244e4b6950d52199c9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d7ecb0da651c8a5d3fdb1b1fb1a882c
SHA1a432fe67643dc0875dcd3fc1937e58c25f126630
SHA25674695effcc2cabf50f83f228e72a045f50c01a5ccaa455c700a9f8c3e52ae366
SHA5126dd7eb8d0f9661d9886ebe4022d313c4a794003806a03c8d7f8abdf6b0490a16402214933c6268bb8cf0f7fbc8d4f516063a1807f3432961f414cd8b73f76f55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54149fdd13776d9f4378dc9cafb0e4b7a
SHA171757d8ce8b0018551d702d90a168c37a1d7185f
SHA2561823670cda07048856ae44e5808c9ac3d7836994fe91f9a0371a04a9cb637b96
SHA512643b00bf0d81e0368124544c7881b0e2b349f86d8bf8a27b3864efc2502f0d130d42c581ba92c713c6d2a0d3930379c238873a0720eae0d19bb52ad6767f072e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c1c86ee674e8c8a5ac6e8090c005c2b
SHA1ee9d406cad994b36859a2d77befc396548b92814
SHA256f4fa9e7cdf5d146929ed1ae097c8456869d9d3b6d47cb3cd10a19927231f1164
SHA51244c5aab12efe9802ea224178785aede77d16986f54acde8d09d19cf8a1fdeb7f4d1a1e03a989bc1d91a22128c6bcdab1691b2222fdb691e7fdc10a497932b687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502714d674543eaf8eb4fa301192167c7
SHA14fdb39dafb2cb23e3f947003eefddd77b5059e7a
SHA2561d77aeb6b09cb8c926e6377897111e75bff009b0d8174ebffbd5682117147bcc
SHA512c1b7e54f169689a5a6a7d68df45ca2eb8e39dcf36a32c7d413519da46ced6197691b28bf398b1a84b01c141fdf51de8cb9b95040bfb363a4d2a077a5dd6171ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e73fb49fd5d4d4f985d9f89fdba7f6ef
SHA18a154eaf1b893d95d5c8b266bc5961d74153744b
SHA2565ea57639a0a269d05b0d72ecafda5118624a5624611a05a6e21c2b96ce85ab6a
SHA512b1ba6d26d5550febfd7d2ab2524eb59108946f5507d100c56b1a43628cf404a1150ec9159e0946abbe6b4f7b878fa63e6349886addfe0228ef1d6dd9de012087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567964879b1331553546fa7f4950a85ff
SHA16c6ca6a8e2ff6a5daf4b1fb5eb63b49f8c6ebb20
SHA256728a5c1fce8ea99efe1f0c7272e58e12693ccb43633ec0caeedb4849c936edb1
SHA512fa87f0ce08aee5b43acb16c06f17f6af5ea623c06a7e2f7a8c71db2040a35c527e7fc709c83fa3323126afb98aa2e92dc89d64168ccfa83ce7f6a5439ad4bed8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b