Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 09:07
Static task
static1
Behavioral task
behavioral1
Sample
fe34775e05f44b4ecabca3de91b4e39c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe34775e05f44b4ecabca3de91b4e39c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe34775e05f44b4ecabca3de91b4e39c_JaffaCakes118.html
-
Size
7KB
-
MD5
fe34775e05f44b4ecabca3de91b4e39c
-
SHA1
18472c44de4a1a2fc2dd3ceb1bba6b3d718c779e
-
SHA256
2f278585d1fe43445067fde9b23b5e911b417cb6e7a3c3bb3710690efa2713a9
-
SHA512
3a03f496e33c68a0e8bcbd2a44c56f0d35425d9202c6d517b4e85e57ef072d00542c299429f87f782a7d062071dd030e51149a632f460550500f3ff608e0a3a0
-
SSDEEP
192:SI3ionxuIuuz1hMF36olKGmNvfu046uw1aPveZ:SIahuzfMFflpv3m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{38548821-7E42-11EF-92B3-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433762705" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000c2444de2c96568eedee9ea1f619a7d1f6c8685b9f2988f99b7fc9aac041ad045000000000e8000000002000020000000db907404561cd0b935bf50f21d254e0ab28a09217b609e8773ee14c64d6abd1e20000000d475735cdf0e0b882b940a12458a751a804f7b0bd0b1bf8c8098f9c66a70839c40000000757b72008666f083b34907304a9f1587e7c02e839648274537b417110abc80819f986b5b45d35e49cdf480960210dac1b7c9994ddc533e499177ca158d246b1c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 504d2b264f12db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2724 2248 iexplore.exe 30 PID 2248 wrote to memory of 2724 2248 iexplore.exe 30 PID 2248 wrote to memory of 2724 2248 iexplore.exe 30 PID 2248 wrote to memory of 2724 2248 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe34775e05f44b4ecabca3de91b4e39c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a695ba107cf85d6a15b82746ad8f7f0
SHA1ebcb87a397edf71f7dfb496e76dcd8396ccc259a
SHA2567d5e3a87502fa26f2afd4415f327c33205c61dd6cf904513d264b26235f88533
SHA512ddfaf18780921bc348e2ddd795998e2fb4ff0bcc04c20c61ced8eb5281a090a15a7cc3af0559d5f9c5d8f3620db558d4b844fa4ea0636b2eb121b4954f77fb53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b2d9d66c8b6e9ae69e211e77e169f74
SHA17998529bff25d4b3c606cd1fd42d9f9915da6a1a
SHA256f9ff3640fad0f6446875f01e4b6f547e47d0a58b8738a316ee85a049d944b743
SHA512bf224498e355b8ec58ac9b0e29b1565d5705f74b911a46fbae35bba52e453ad48d1856e2776f435e0b5ac80922674430f8081df12e5a7311420a815d38697930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f15163cc72e59551a1212f1ccce94de
SHA10a75bce90ddf7cf4ee50a91df514c74cf5f4f013
SHA256ce07cdcc168c1a88d3ed86838862546ceb836128208d3b4ac47e9faa3766aee9
SHA512eda188774d8fd1ac003314ccedfe00a7a03a9c65e6ca1b4c6a0436142ea09bf565d6e71b310f1e6ac7600c0d40e99e6289a216e9f5829e9b052ad8b47f988a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512dd6d8af66383d5c787b16a960acbe8
SHA111c5dedd67bcbe25396dc4cc69a511e196b2e2dc
SHA256015e5e083e5a792b8059fb1fd55adc0be6061de4781875fe676b90de9249e922
SHA5123ae3674769ece18ed7244253622829953b508c8b74bd9e3c92811e32f638ea80166bd4ce88f72f435ed1c5be567cdf778e3c6ab3d4952c1e0a0e25c2b1e290a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535c6c0b142d93ab912bf009776599592
SHA10c6ef3925d91bb8e5b3823b9343f59d752bd1145
SHA256334cc26da217c0c205f9fa921842f1f2fe2ced65db4fa614a3fd456eb4236747
SHA512a863b2b80627cf47b8926eb2d4225f9bfc65d69bbb5329b09d57f9624dfa78fc79901e04d7d6334fc0d6e7bed696f8dfdf2f8c0c3a533df0a88b103ddd72dd5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5844d385b88178d71203445031fa1a9bb
SHA1a92b901e82a03bccfa313bd1e12eb50f36425996
SHA25620c148d1e44e1da098e859a1c67fb20f43471c8809789382817da65466beba67
SHA5129d2d06123aed69ab60c03e981d85fb87e42a204d9a1df36adc82064ad9634ead4c2128712a04e2ad8da914c49ecab87782d315b8c39db438e97b6242759d256d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efba46a941d84f0a1a705bda7443d2c9
SHA100397a2cd3533d3af8dfbdc0ba81a31f9f05362f
SHA25659e94d94d2d94717f1385321bd5b04842480403f94114a069e8ee7fb4d520ef9
SHA512295cc7f3746f84c67ff40995f0c1b41463601b1eeca3cb779f6fcfa9f81ab4448d7f32a24f1f1ecd6622c278d96f947b9aa9f40b8d88b5919a6a82651d4416a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57315be62b23a7b844c087e8f011dffba
SHA1365f7302ff320af5cb459d380c83b8cb8224c28a
SHA2562f32d86292255db6b6b223cbb7cc210aa38656f6fcda69de03e9ff18084bb1f7
SHA512b69f0b677d04b1d74394509573fce86c1bc47d55c6e4f4d25170a8fa62f538d8f8bfcd3bb47c089511ddb3148d19a8625d2d2863d7c5390250d55bfe4e9a5d65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5966f259d4989464eb9786a67c3c70e25
SHA1301144fc74d6919bb6423deefbdf75686afbd957
SHA2563712881a2ac28673bb601e4f61786661dfc4c9cf9ee54481a6b32fc6295ddd3f
SHA5128e4516f8f55b6c98bd1008d262fba24e4155e6c6b451c92f871e25fbf9c5605e1dfddc7a11a80d688ee326fb48c744802123cd2dd497f80f23cab2cfbaa0859d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f308e463b7f4d25ea31fdbcea78eda6d
SHA1755bbee4fbb47def8af3735cd0c16c742c3e1d57
SHA2564aba841326624d39d80de55fd375e48544023eec495f4ce68552c4f0049ce3ca
SHA5124d56a0ff366c00c2c1dcf7e45efbb9d9c36af0da3b7f7fb2b91545288a22b8bc262bd5ed85d8687c670eac30de532b8c5caade768f9297fa1ef68feef4f7e0ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a749bd7c1b8286dc62c2435314e0a28
SHA1574f8c886bd74588c152b46c260e703e3ca13ec6
SHA25602cd90618cc720c6aa87174aa995ee06a2ab57eaefdadd961d029f3d2685ae18
SHA512e6b714a99db803c46a37c7b645f1fedbee8978673ee4263ee1aa34124c510859b4dd52a92b991de3de3e54fb169a05ed8e7228cee3902e50c4e72b5f08025df3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7606279834301c0becc3060d3a04b17
SHA1a083374814efccbe346b527cac1f456ed221855b
SHA25692f13df97dc731fc94e808fd131fe7d1a8d95b721af77033e8ef3f8e31155934
SHA512c95cc55a32ced0baa65c392e2915b83c7fa5e32802443f58bf9ac7a0a920f95cfaf0e30faf03f30538f8dce489deb637900b2fe56cf3c9c17b0ec47ce74eab52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571c62e1a464bcc006cd90db2757b6d91
SHA1dc8da6913d0528287ed15e1ab832a6521c9bf085
SHA25650731c320d80e92fc6dc458c2558148ba8bc8411ec0128cd6854a13d380a4b3e
SHA5122df42c120abc7dfb0a8d76d115dab25c9f4cc7f92132dbf3aca340c1aaf6b140566312ee433efcf898b56a8ae35c6f1d8115f95cc301ef2b4dfb482759625dac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f58798f6e92f163d5e750b8e0afc21e0
SHA117ac7a1c50fd7551e412ecf14d6993789820f70f
SHA2565baa6c14372292f5bcee756c56ccb4c85e146a65a15ad362c852687fce2be827
SHA51296d85456d0c6f616757043d4f69fcc2200da06c34c4efc84b2f6e4c8e8e525a600ffd70b30ec51cae77451709a6d6a7af1a585af631d45e75383b386708ac89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9d314cd528567f4fe1e63430f997e7f
SHA1a57c7d04b999136b01ae61afabedeea24be82bb2
SHA256b9ae4d61ad8323f840b0ed5e6381dfa39b0138a4ec2d5d1f07881668c22587b5
SHA512debb1ccb069a63b98529376d7244c1ef7b039450c7e6f5971809b2d8b29e77f1e0b5fd2a52e5f688fb1f3b970dc33bac616161e512596ef8a4d8f50068f35e06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9182ac92de5ae5ede592afbe90f7123
SHA1047fb0aab5bd095e89f3bb875ab335e7dc0b7578
SHA256a53f3a0bfcde325020a93121c2ce83135236d9328c4f00c7080155f50746b061
SHA51282a86b3a3e6ae37518d40529e7b61dd08dd49d2bdd22866797419af3f9e4b323ac281d0eb25681a75e93e12b542c2ef644e7c1c08db7699c4e88e72308e0c4dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bfb5eabebfea2fa4c4a88c4a96f4ed2
SHA1e10473993e77f409d58d160679dc86aa0239e71e
SHA25643481b7311140971aac62202d096ae416deaa093add774ac475870a604de7a07
SHA512ad73cf0a2edbda171967112ec51a4c15767695470675ce47647f269ebc922c58b61129dbeeae78444bf359aa8d310277772519740e294344d2248f27d7beb0e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7641440ec5b50abd291872d9c41ae88
SHA13ce19db99b4c8e905531587af7a5ad607d024e52
SHA256af8cadc4f697839aa753d26c37343b7a598885fd06619597177ed50fe986aced
SHA512bb392f7be4bda9f4573f5d481d9c3d10c61ca6b268c2f09127fcc0f6f673bb448970792e561a133d3d1aaacc9beb6966e2134172393ffdeab49135b14e562e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519a041762db409387b901aa21d316e2b
SHA189177bc8a09d0ec2cd3c921bac3e5b314d1e4bb2
SHA2567d9885ced9409f9a6fa319208de601d08588591f9ef29d52daad1fda4db3e60b
SHA5120a4365c77529eeae219918bda0488c4b4c43401092acb79ef4dae0aba629ac26162bec31de3253f4b32abe15ec879792226bf4f3aba7adaf7a962edbd7fd81ce
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b