Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
fdf248d25ebaa229ab62a512e7d23ec8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdf248d25ebaa229ab62a512e7d23ec8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fdf248d25ebaa229ab62a512e7d23ec8_JaffaCakes118.html
-
Size
4KB
-
MD5
fdf248d25ebaa229ab62a512e7d23ec8
-
SHA1
1648cffc28af1913672ca44c572dc7f461202e52
-
SHA256
74747305074915f89991a05621317f126d4c2368216cdf41cb75cbc234348511
-
SHA512
87e24f0609dc3721b9f82e85602c55af2fde335c862406ec432d83ffb95a192525657938df18db3734a8286929e67015d7c59887a53d48b541899b018b9687d7
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o6F3e7Wd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000066fb368f126fb29c701704a3d91706d787a609bd5328d6846efa0ecfd7761b0e000000000e8000000002000020000000af981641984837d7c052dc49a529cc5201c4c5cc22c02655e4bd7e044d83753b200000008ab8c79f1ed978ca3dc5ba866f2125eefc63d52550a61e5a4422b839550f1e3040000000a5bdccc3fa25561db1b42c3cdfb9e1af8b9eb760f8355ac4fcfafe57eeb1f7fd2b3ccbd7443461b6ad227efc15152309df63646d99226f90a9d4c0cafcba9489 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f07d34c43612db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EFBEB351-7E29-11EF-B2CD-FE6EB537C9A6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433752273" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 804 iexplore.exe 804 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 804 wrote to memory of 2428 804 iexplore.exe 30 PID 804 wrote to memory of 2428 804 iexplore.exe 30 PID 804 wrote to memory of 2428 804 iexplore.exe 30 PID 804 wrote to memory of 2428 804 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fdf248d25ebaa229ab62a512e7d23ec8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:804 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518c6c10baee03622cd00d96fbefb132f
SHA1f75683a3037b44a539b90bf370f62d41703c68e7
SHA25690c8ef775e36d9145d2929920becbd60aea96f92c4b237d11f2bf2afa09e582e
SHA5123ae1b9350a8683a259af6b49ca71fcd545d5d26a1bed5070c03f90819e433f6568aaf15d31c6c5886943e8b5fc71f67534fa39d99283a4a6d7fa8c0a62703d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d204f5f54e18a4a269f6a36ba470577b
SHA103d77c8ce751603f8ce5651b8ae6af0bfc0f85c5
SHA2566ed8171cd03a63db5334fa97e19aca4f32e3690303cbf62e8307e283290a10f6
SHA512b1898c1e9eb5b0254cd655b988d992632651795c3ab31569998527867f4e28cf89fe91a626ccbf4e9f7e4f30f5b5473653c1fb68927aff7c89103d35f1aa1e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e758035657663f936f0cb19134e69e84
SHA17b3d07247befa302dedd58fb3290268f010dbd59
SHA2560367911352bcc7af58ed4030d4676eb72d869b85d7878aa16969dfadac35915b
SHA51208fbb115fa687dd9cc3fd79b63a42253123619a41c5bb13450d24888bf1517ad8c41683936ebd4c79c2f0be37e48f18f9752185ad0a81d84b18472ea24b5e510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57617444bfadcf7298a56c21dc4f78d94
SHA1b9abf4da69a1d2a8fa8a28395005645a09fd6f7b
SHA256a3db5ea553ca26a89c190108e3fd320528ea3fc648b4150542f808edfdc02252
SHA51242b8bbf3f717e3beabfb746eb600d5e07ca781a0975422371e324e5a9a212dc43a7ea774f46d3afebc050b7714656f93f3a4be5a5a234f7939f2bae09287332f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5d9207c854fe305d1d1e34e3c3e6477
SHA15ab7506873adefad86d6d2e2a6854aaf23dff8ae
SHA256545359ee62f38b23f2b5c585bb42ef73b001ed119ede3b305ddf8b74345e7917
SHA512902d60406645ba10a0051a6d323fd3136319f86820aec4f8a523209ccc3d23ddd5f0f5bb21b0e53c0422a00acfa923df1feb2b8f308aec2f886c368730420282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc4f45312c77443d84b2e2062aafeb8e
SHA1a460161d26ef61c7853c0be6f6c793d20554c186
SHA256671a930a70f82293d2bde1934f6e0bea7b276745eca989cbeb99816a467649f4
SHA512a9d485ac567e90666251d23af21f65c0747b5569e3ab4eaf8f16058496a7e740c5c45ff5f0644e10ed375a00b80ab90faa0ba6177581164328a2f7ca0814ed6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5210e7d1ba78a83ccdb3bfeb984e0c829
SHA133023d9f2c677253c22ed0f34e12e5a57f837dc6
SHA2566daf571d96c5126765f1cf0fb3b453345de84905e33f69271e7024c92b67af0e
SHA5126fd9fd7f111f068c60459cd226d4d38d9fa745a7d7fccf36558d79874294dbf023d37b943ceeedc6c3ebd415a5921b96ea06757d3f99875451199dc0593b4411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f436f6b81d7fbf820ab16eaa051cdbc8
SHA181dfad0d45d6cb92135ec7cb9bc9f3ae48b85cc0
SHA2566a5f164abc050eefdf5384511ace371459a712ef9a55848bce85a8730afba3b8
SHA512692c1737cd6fa70d14f3cc5a4b164b81be0fddb8d62bcb23743fccfed51f815a4cddc17eb0c7018b3edd3e10003b2d313384a89fe43b96557f2627b2bf2696a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55602ef3b525f006b8255fbef30698626
SHA1f59cd7e70cdaa1f2992bece39fd97119e907d235
SHA256f8227531ff8775ae990cfac36f4ad10dbd9bb87c5734c8548f096caf072ab9ae
SHA5125822b2bd52201eca3778d7fffac525e41daf14ea4fe21ce9251b3328893bd7be00c64951292b285154fbbc92b8b03973a4970b75ed4eb0aab5b9e7ba024a22a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ec9915c31ab4170f7d238b4a29ea741
SHA178f81556077b4784d6a383c8722c30ae94c48061
SHA25602a2d3a356722285562bc03dc7d4516ffcfc4073b39dc34a59dbb85536da85b1
SHA51225d57ae7fbfc8108692dd4d837aed31a04d1fea3fadb7c74f8ec489c0db4598a92c33bd8c58b12c1de931a1f4fa07f30e990371e8584640da9a99e9218b41f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9f923a4ef11265979fa371336e7970e
SHA13fcafee20be90fb11086788b7d2b81665e4cb769
SHA2565b95343168d1953c1bc9e92762f738e87e978ffd33bbf8958c3646ebc8937435
SHA5128feb10db905ea004a0e6a4867df6cf05b621866eef99af625269d2fef0880b0b49aaec290e664e9d50fa11eb0d499793e40b7c9a125bfe3b119ed103250599e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e89a142be83c34ffa7593d7e41681e3
SHA1e6587b90241f23619d4e6dbfacec803656d988a2
SHA2563736b6c4399012bbe79564991fb3046a1f13f96b3e5d1247830799495da3fe92
SHA51297b96e7fc97fb8e7e58243fb9d99e21c55c889a7755b8244bb432e17616153f2993eee5089d41c641867a0a38c50297be28da0c55c41a85627401874d8709916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504a757305b4902fc826dc633f78ca010
SHA168f45703c2c0cb881428367cf2a562fb042d557e
SHA256e80da57b05d7b527f43e15bcff9a445b05adcea386ddc681050c0be6ae21a56c
SHA512425a57cafe7624735d78eb337376716f55d0c6b6d250e61e66ade51fb4ac10be69eaa606714d7f038a73ffe32b21506ca928db45cc2a44e9dea730d9960cd6a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d1d1805b0c58c43b7169bf116a421d3
SHA160a8b21ef8344b7d427c1567e6f8707d1ed83f90
SHA256955ca26ba32ed66082ad9a4acdf5f2db4a9df0de1bc9e8213023fb2d2e1f809f
SHA512e10a2cb36521fdee5e97af45f271967459f6c95fb8709a04e15aad46206c383e8992c248b0f02d9dd949aafa28824bc194867b1c3ae34bdfedab8011e3489be5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5113dc029ff84df50f4aaebbb54a74e54
SHA131d0d40662ed4f3c1658db137cbd1ce332edb4a3
SHA25616c205b44d11267aba2362bb87503a9f17b87cb36a872861a4cfb8b015935e0b
SHA512f184c86b98ae862dea7547b3ad5a9c1682603fbd2643fd9b819e887579039d76f140307abf86725dee5bcdce68c81d6f332ae585025f959d5df0d358a2d8eb6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9382c2b89fc50206d6919914e3f5f06
SHA11c468bc8507b8404ef4a247831ea0afd16b2e592
SHA25624a5c222a20d27d0f81356722a111b646147e43f42f1a98ec46861156ba87a74
SHA512be459426209f0e5ab18562f96ce3d8acda118e036f18dd9f9fd0ce1196128455cded1a5f422f703a6bf3edc826f223f28e449592dfb73fc39839b54bdadebf73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa5a402f1fcd72d921ed28393e380322
SHA19b8a0cfc65344f263a7a37c24d4b92c78ca67aa6
SHA256831d9a2112e4debcc8ec5b516d0cb94f1cfbf74f8eace9df9652402b5e21b3ca
SHA512f4d0293dea8194f58fb7e0590d3f3e3634fa2e15008bcd99376041318a970df3247efa8888c206c632250b0ae75a66fae472ea6c808a00ef2d19cb195dcc1fa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3de4f29f92c8c189aa0e6a1cdbb3779
SHA158efcad74e7076d4fd622bc2bd8feca921bca34d
SHA256b58438f14bb1dda9c27fa572bd3f95061332a31d98c374db5fcff2706d003b54
SHA5128173f40c3aaeef0140439a94a6fa1840ccf28f414b0c13303a65a80e9bb118bf174ce33ae831326af85adefb9d02f72203fb50dd266b14a9b648d516ebe98901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c8a929d70897c1f904731830ed5d075
SHA171e53bd86d6088ad2d180adbc385360c31a72d91
SHA256d1cdb42f40f487ce07947b53f53e1e32db9e997d910a13120f484fccb1801cdf
SHA512bcd29ef072d4968be7b40b889a8d773471da297feef1fa02b9b0e2e5c7cc13ca1a91586795cafaf9c40c5407b540fa59647a812d6a92639267ca1b1b8ac77c20
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b