Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 09:25
Static task
static1
Behavioral task
behavioral1
Sample
fe3c2fcff06bc15b0f14d9241d390f34_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe3c2fcff06bc15b0f14d9241d390f34_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe3c2fcff06bc15b0f14d9241d390f34_JaffaCakes118.html
-
Size
139KB
-
MD5
fe3c2fcff06bc15b0f14d9241d390f34
-
SHA1
71113a2cd43c335b17ad1a3e736e497e12e6d007
-
SHA256
056b1f845aaf7d0302856c97a4cd57846d7f4f9572c03115cf0fe3dcc84fa899
-
SHA512
d68f70cf4d1daf148dc1bd4682ba1af70b26ce2754cd5d08f87f2780c1bf5d25545c8027f6cd220e5fe634b111a64ae2962f9c0fc7e88ad559c1b50b166b31aa
-
SSDEEP
1536:SCFVonPj8lwyyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:SCFkwyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e02948d15112db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000e2b6dc257df0043ce3f7743a7e5d1a97c495d4e5b1a5f15900b80d19479f7240000000000e80000000020000200000007516c73e33b52a3786e909924e44cfa5b4dea49f0fd52dfe83ff5e8ab4d242fd2000000014ea340694f75bb3b8203e6914a6c724f77ed30b47c6d69d8e3c2c6308c94abd400000000953e99813de2a698740929c297cfe1ff1c1dd3c3b809cd8aed73eafb7e8cf8bf10baad7f83d98862e41e6be5fedbd4e9bd0bb38390df47b29e08fca3d034bbb iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433763779" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B897D991-7E44-11EF-A1D0-5EE01BAFE073} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2724 iexplore.exe 2724 iexplore.exe 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2624 2724 iexplore.exe 30 PID 2724 wrote to memory of 2624 2724 iexplore.exe 30 PID 2724 wrote to memory of 2624 2724 iexplore.exe 30 PID 2724 wrote to memory of 2624 2724 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe3c2fcff06bc15b0f14d9241d390f34_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2724 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c689b1d5c24a97be195cd98763ce090d
SHA16d4fbf33b213426782e02a78aa0aa292c2116d6e
SHA256e4d6ceffb7e8a4b5fbb99920d9c1e17aa1b6339e3cc81014c596e4d5b82610e4
SHA5121305542934c82058d88b4a0ec06b235378eca5e60eb34287d92e71da75d55d02ed51d26e089527c8192f5678e1da63a1824c3a342f590674bdab25eb37f3cb6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e57965abaa73835a12b5fe556f8b4f3
SHA1660caaf03d2a78d377a6022d81a01ede4f07e141
SHA2560704a4ad8db6c7a248f6cfb7b4913129e87b68744f2f38c48a98f0c0d6765b8b
SHA512cd13f781c26b9b262dde1f75aeacf8b2d1886184a5309da84f72aa06e4617ccb0762035e809ec8ed74dd8e1371a83520be7e23ce5541efd6d1ff7517443986e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e139bb90f0e02626fbe5337f8e03a79b
SHA10a4e6b120788bf32d03fa90dc5344e0ee7cdd227
SHA2566d255228f45e3bc1b62a1ba75fb216db36d95e41cbc5bc98f11f7a214016ce1e
SHA512c6e57bf77e1eb4d78e3e175636ae6da2249653c2b5544c0feeb55a61c0f7bb940ceeee47a4b95fe56379ecfe07d389d3792cec5eb5dc1dec9033e7756075f8bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f3e05704fa5c17131b83b6a402614ed
SHA194a4acea94794e70948adfddcb9df59ca2f24aaf
SHA256808159a1da2d1a5f2877ff6624c765e10b108b0a8f33b3757d93763e85ada2c6
SHA512b3dbe91c30eebfb9f17b20948cfc5928256e0844c5307d4a6f5910fce9c009d75f9228bbb2d5539b8ef0c212180d9c473b9d7e7b91a2aa30086b3efa3b8de977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f88bed8a739a03498349077645496a4
SHA1136306f691353b11d99f546cad7b24c5c9d85df7
SHA256f52ddca6662d4ee3bccbc0ec500d26f02a1f2437f1b49a9726f1e1759e9b5def
SHA512dab2eb4c8d4848085a2670deecfa68310e85ec5a993640d4dc89e5dcc65bff89c999b69d041e1ff2a7356d0b53e1407e3d71079b9511f609dfcc1b27dce47648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527b87c914b3e2a83419bdaa6540a8b04
SHA15cc262899baee7ae1d002f0b9698c43d70e221d4
SHA2567ec255e4e5d2f3d28942141c88889bcb6508bb14438afa19aa9a89eee481246b
SHA512c2d3bde5e5a6bc1c91624a0d64b90d64201fc61ebbf3c15527f06e3022c86b6d28b796cf3447106fc2497bf17cfd2e60d8b93533a3ed7f63a77fc78013c4afd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fef2aeace0fc46edaa3bab1538e8fbb2
SHA1b8c7c073ac8ac67ed7af6d6ab4f310e90a494c9e
SHA2562dd1a8ae0134bd83a4c1eface845c540fa0f576d678e51fb297f168fd6c2cdd9
SHA51261c7d97e693b66ed8484f3eab209a216e761a4af90b576d41c24b1fb2a36fd74382550c104cde71c44dd8a24c00f39396a7e101d44a5553102e8e69747261b6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb385c9321c95139cb83fa998a1ccf72
SHA1fd32d3541b069b6bf1fbfbbb2b411e1aff64698b
SHA25605990e723e4983448f2c18aeb53299166f872940d0a273da854c786d0f2f7577
SHA51203ef9ec475275b2d31f5b419d0209824c378572e189800acfdbb3d8b51ada0fa9013e627104f35767a7eecbb47e25dbaa6a6dd2d91c278b159b24db3b3fda1b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56da0da9b041b4dfa7b986f66bff0059a
SHA1e68f1ad9cd1e19d2ce656375726af56a2718c895
SHA256033c841c97bd525de6b82a224adf2f81fd617f4b4a66996dbe32abfeb1a6ab58
SHA512eccc5e4a6f5a1e65030aab73789c828df19bbb3ae02534acfc6ce7168592820b272a8ee2e54f7835dd64edc8578bae9ede9c7e5c935a9075d938a1ede3c45bb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bed255c4e7a705280515149b710ac31
SHA10341995a20c6e4e18d8a3d87f35caf9329f3e062
SHA256303fd68b9cc0a03ce9a912eb2f0afcd2bade08c3a9e8d7b3df68137d63f08ec4
SHA512bd3cb61dd47a15cbc980c016408d42a0b4d3fb02da21b97499878541daf345a8d304bd3779b72651ab6c6e9d5462b9580635e5c6d56a9a215b220e77c0acd925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc1d506d6653edf705cf959d96dbfb65
SHA15512cf784b8f5f31c86b6734ad8ddbaf2708a9eb
SHA2568cf5134481110d86296a22427e5187d591a20875bda45d52ccb585b2d51c6b6f
SHA51250bddeba2f157ddcd491c157934f361650bdf7ff446f39fa1a093fd4cb3fe150e5f85588ac43f8346dcb331966027edcd9127c6f829e221a7c22121034a70b1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576bc5063c7542e00029d3cd9a1011929
SHA1aa3b9ce6a6b0476ac5afd149f23a6be208876397
SHA256d784be63cbb9b9609d3477b2d2a81b172c4c91c2d205efe2053d76ee9bfabd55
SHA512428e934356e71ab19831190d4f8bbd4fbce9684a96cda11ea266c3527046639fc2501cb5fecec2262acaffc60986e6abb8d70c8ef5603dd62c94288fc3de48c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56979498683009722962a53ec733c4a4f
SHA1341b8181a4cf135f60a930821fec89a5ec0a6b65
SHA256a0b1bb336e5c67114ac43a2fe7df8db884ca0f4aee3a09ebdfd392feb0ccae28
SHA51209ef67d84fc05efbe8edd56e9f2ffd434e5e123eb872a2e610b435c77a36d4eaa76b25c712038898ce0764ffe9eaaf9b4d605217a9edbad62b9697ff8fe2a2fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e8ea71c593db8150f792cc9c83619ac
SHA11ab32785f564fe671a7275fff9b86cadfce85f07
SHA25667e69baf32f14f64e0a75b8b9b8b7b1d615e904afc3fabd1ee75ee5b1d697a46
SHA512bb615139aa14f163c6eddece5cdc53c1ac0afcf06b11af8917b8308466fa67f700a500d1e23807961de988f4b4365eb5551c389d811f16f75ad06b41d5b1bae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6e29b1ce726f9f0d11317dd746a85b2
SHA10cc49e8d25b89dc786ace8c7dc1c8c0679c75840
SHA256059c3aba66787b6011dde236ec42265766354f759e02e993f125f0e2f8b1fea2
SHA5127cee9dd3a29698f9491a3c38f04975305aa5a845191a419b8f5b6137f4d630adcd34ed0c26196f4388ccc1bd7ab1396f5541ee0ae3c190c03e23a22f4fa284d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8ff7c0378c28de89fcace09ec82ce5f
SHA1803e5461a5abfcb831dfd052e977eeffe526df18
SHA25695ea1ca100b0f703953595691f7286fd749ce0e11397dadf8ac3a8752399fc68
SHA5120834c19af2c394b94d7a3d8dbdb0eec3981bc09a7b5cb626e1a0ac3f0453b6a052a5558ee6c52d576d7bd0d54c2fc8a25d56e050e0c303aea78900a217aeece2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587be32d8c5066e8d341b352497f84205
SHA144095861d2d018a57735eadf8aa93e93c517c4e9
SHA256a063d3d90aa5145d1887e83652706da6bb4cfa0225330d7916a4d39a6280a3f4
SHA512653ea2308730ae23a88efe8a5fc68cf08db7c90b289a831a30612e3de324880ae75ab08118747e12d993c78e164dd91a2db7648551c0ebca10e4cecc59bcb460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9c3905f44673cdf3d28675fe85d44cd
SHA1bb3852bf9676950923c53fba200ab54099262201
SHA25612288ce5276c348d22e85a1bd488394381d88e89f6b0eba0b23f744c682b6549
SHA51203f72c74400c81028e25cf518ba988669b32bddc9cf696b3276538ddf4ad1b224d61b21f61d8bd7f8954774a2674ada010300f3bda38b20f76e3cb4c58774cce
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b