Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 09:33 UTC
Static task
static1
Behavioral task
behavioral1
Sample
fe3faad368529d6dec5242aaf107efb5_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fe3faad368529d6dec5242aaf107efb5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe3faad368529d6dec5242aaf107efb5_JaffaCakes118.html
-
Size
21KB
-
MD5
fe3faad368529d6dec5242aaf107efb5
-
SHA1
14bb9821442a7062757c988f90fce55f5c4d6b05
-
SHA256
c9d92dbd05937f4900e7ea1e05f7c441043584f706bf56e81e73af6589eb3d45
-
SHA512
23e6ea27998b4c9d2e5ee5d2e35bfc1a336ecea7485e0f2991a0c32aa6c8025279de110340118e0e35581ccd9abd74d91f04c3173de3988cea2363268d90a022
-
SSDEEP
384:FSE9mmfAopz/CSvo8ukoYBK8EFzPoni0TgSsmTyd8Nc1iVBEJV+9bTk9fYHwe0n:0mmmfA4o8uf8EWStmTyn28fY0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a018caae5212db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D75DD9F1-7E45-11EF-9112-4E15D54E5731} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000031c831fd9d43a6f0d86db664534870ab464fd19baf8047846bb80920c71eb9d4000000000e8000000002000020000000161fc8e92536ec7bbf5a5d1ab5831270f2df8e30850bdcf206423598fb821c08200000000a48940a00b31b628ed1de4aa843d6fe57741f70d8735a112ad318a2b0119cba400000001b94702440c5ae0dbc827c17b75ba1a4ce7a27cd7d2a2a8d22c03b6f190782b6fff7e2616495ff6c514de1e6fd28bf832b201f2695e7767ecdbeb508c62da14d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433764258" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2844 iexplore.exe 2844 iexplore.exe 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2460 2844 iexplore.exe 30 PID 2844 wrote to memory of 2460 2844 iexplore.exe 30 PID 2844 wrote to memory of 2460 2844 iexplore.exe 30 PID 2844 wrote to memory of 2460 2844 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe3faad368529d6dec5242aaf107efb5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2460
-
Network
-
747 B 7.8kB 9 12
-
747 B 7.8kB 9 12
-
831 B 7.9kB 10 13
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581d2c54ecd60773aaf7c304f1e7d4ba0
SHA13f4e85dcd08a42feda7c373b9cd7966e154d6e08
SHA256401b82b49d0810619d234d7305f0af7b40eb7e65073b3cb80bd65dfe91e59757
SHA5125d546350126439c3d13e0d8ed6d039691a2ef25e244925629c17df4fce85092e18ea5bb793a004eeb43f924842c2b54c396a56d1304deef3eeb4112b0872830f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fd967272366c11d85a99f90f5148f12
SHA1b4264627ad8212724a0f36ac537881be0d67f395
SHA256c6934b02d1ce34762d25a544f02f8dc67987dfd323192992978f94d56ffbb2d6
SHA5120eb26f51c3feafa55f73ce0d3b26fed31981c081f2b99b75895684ca6713a099c3c3a3172ff7aad8e0e3c9ad14ca1bfd162da2bca3f0eda1d7e7e6cde5eee3db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e13fa5a9d434464c7eee640cdbc11e4
SHA18c006fc11a321b04d6c28f80497b9e50a660e8fa
SHA25627f755c868ad20ce7e6726f669e225f70002585a6471a34483e9292ceaaca38c
SHA512a6d7e353eaee454e55f4ba3ea9314052bea61d06b0dc9f46fdbbb327bbbb3e0fe42f0463aa01124294eeba57f8433466aa011853af8bb18501d1ef0593def39a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5924b0f135be3db787379a90d5913cdea
SHA12dea982f68fbf14aa7e4784716f815747b4db0cf
SHA2565db8ac68d48e57257204b0e02e86a48381afde72f42e2375fd2e05c0b45d0c48
SHA512cb4c644c74c71040218a5d2848f0c19b064b3a516f0aef6c313d6ec2112cc07cd65e58aeeae7abd492b0cd41efe041009cc2e3788c5b0c89b9c613b3ab391b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a313adc501b8065573fba7513dc7b50
SHA1c09fcf6e2f2f0d1aa7d597b5342dcb7e54d6e82c
SHA256ebfacb6630e2f5fa5c44870c1663c70a15ff217f637afaf0bb942631c9c6cca7
SHA512a69107080b4c8c9fe0cb668fd8ac8554d7717c554e7391d830e954679bdf54790978f1d2e6c42e46227489caf9477429ae89e04bea3b0fbd56f9f34e9822840b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ce8cc3b25c85f9d210282ae908c3aca
SHA14969389e9004e3c47ad72fc66c8ddc453362f9b9
SHA256ba0fd32df3aa6208a1c13005b2fa4e3f695cd7e18da6f615f493d0890c3098cb
SHA512543cb9542451dc3c9255252ac2b3a27a3b542f6d230558c1dec2b565ae279788bab3bca6c814cef7cffb3a64fbff685330b0af9febf48b98ea76b8db823087af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5435bc3f4c2078e077a6b0b3bd35442f7
SHA1795542643a0b12a41335313e44645001ce512956
SHA25698a7b1367b80f89b5c9198a2656ee676559ff179eeed6b5fa51af8cdfe575e95
SHA512fc8ddac89410453c115dc16f6ca68f7ab83568d610866a94aa457d5373cc2eb23bf25ea1e8e21502f0e48bb3fb58ee70105eb6530788e2db8de1ca809a319e79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542a93a6911aca61e30cf7e7c5ff30d73
SHA1029f5427690b4637ec5e088b24b0847eda3e51b5
SHA25653e8ad02a2a723c2553134c0c0c2d449446a6f83af7f0b60b685668b040489d8
SHA512798348a92eb91bacd96bb84a7f377015e2f5c12b325390ce653d647407d30566a9ceb6ee37d016909081cb772d2448af0417ed2859ab7f3a13d227f9b057cf5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a322cc4650e854edec9dbe169d24d700
SHA182f002f8239ad80d6de5c2dd336374e519c87641
SHA256f5f8357bd092705ad5b556da795a40a1921c11110bfce8c2727f06d15f990412
SHA512417d47170580ccd05db2cde7aac60a0a416900e84da18bb296c6d56a5086a2b7ec20096f20ab560a307363dc7e770d4c6b57104a0d7335b939e9c5ea71ccbce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3f054bbf857a6bb85cdc4b9d676b2cf
SHA1ebc7fa1ddbe5c9a07c6debe91a640e3e4f8a30aa
SHA2568cbed4970c6d25a246aa7c7da6e4d214af7506147bba5d96af09ce02e89a11e3
SHA5127fc228e18aa7066e2b7c69aee0b6dae9de732df56ce6de600c98eb9f95faea227397ff7bac690b6fc164e440e8fa2fb26a413eb050fa024612ef4a36f00db07a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a22cbf60badaeaf420390baea23ee1d2
SHA13058201b61d2b83c9641b5d55a0966bd75810ee5
SHA256dd2bb34b2510fe240cfea4d416e07d5c4955e99b8d882a7727f1e6d41b8dfa50
SHA512a580fa22a40db461b3b521861526e5f2d8ecabe817a8f946b8344101afba580d0899c49575d4b5fc36278e94bdfaef2883007c827f0b202030c6e7bf819492d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5320ade4790945375080bc9e0f6bfade2
SHA11dddbb17b43e97201205d9fc74307137b27be8cd
SHA25651f5a9b2d8905201940846f6b824156497a885a06b8625cf123c9a9e3a7734dc
SHA512a63ce806acc24ebdf543c6d6fc28c0e44ee9f13d4fbb9e7e4f33bf679b9e18054133a2fa75caaa4a681193a722331fd9862efd03bd67c32b4947e28239988e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c02d8b00c62cff529b6d8018169cb10
SHA1e4fdc078692382e8ff93a4255e125ef04ec7d7f7
SHA25688ec989a50c21552bb11681cd5c1465bd83bb211cc61ade6f91d7c2c5d8a5c0f
SHA5123318344332d6bada9adc2a538abf516dfb7b24cfd64245a9345e5680762261736144cff34b3b1e89980f34e5222facafbaf85e34ced075456f57ee4dc417c538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeef047b3fad6d6dcd1976763217828f
SHA1bce4b540a6a5bcbca369919bd3dccd743f0a866f
SHA256540e5663202ecfbcd293d8a9b8e562bde743d76946fd6aba3db1a3f69149b157
SHA5121d34f3d1dc1f248618fb652f4e549473a49360f1d9e678371d02794160abca992132820acab415c6e0835af5bebc574ee008587b8d833bac0d908179b33ebe02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dbb77360f3cde64e98b5228f15635e2
SHA11a0b31471da538680d254671d6d7c17b972a4299
SHA2560ef6ffba0fdf6b88bc19e0717dedfdf82d76c432d7f051bd973dc84b35481423
SHA512e3c1653b1dcd3e951427a353cbbfad7b2854d6d12e8cc8a78191708de88512a6b39c324f6e80598bcbdae5a1cc798abab85eb7b6853f49ac3bbf74d6d77c5405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596acb58221b89eb886a0368fe03c88f3
SHA1f87783871df44768d534e54ad26715c3cc019ea3
SHA2562e9cf184e31ec43de14ec70bda91743bb80dc944d4b00808793cef456f98d8a9
SHA5129a00b7a55fc5bc7570b75cdf40e33cadeaee546a7e1c2f58eed8591954004b6b0a561d4be28d036799c2d3f1d2832ba81b8b3bd9454093039f31a4dd4e20255a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bbc0e74462419f25149b54fd98cc698
SHA1fb364364f81c5485ef3bd39aa8aa9302c0083602
SHA256199426d58042b85311d7f1e29fdc832cc0b6706a71a29f6ef5d081bc20bc116b
SHA512d98fe9f938f11d651fa34e9a8d3c79447d9e020929a574b1459a5e125d96e3816c661f41cc008a2e8011296105e5192c5bd6d85fcc518f99d5b191dbbef6d93e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5633f9fe205adf670a38b5afb7d610cc2
SHA1cc2678449c80f5bef53a5b6da6b6fdaaa11a2f2c
SHA256c87c0e996bd158b9b028eb2104961c6ddc5d8c74c0421a4b7363ba2268c17bd0
SHA5121771468e81e6d5d917ae85d016e01479b56d1ff20f2811f3c18a3e67bd8cb04a44d4278f3906f407b503df1953bb4c345e1fe8b223a2cc8072cad7c75904bfed
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b