Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 09:45
Static task
static1
Behavioral task
behavioral1
Sample
fe44996a66b4fb7fd0bdc6978158c0c2_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fe44996a66b4fb7fd0bdc6978158c0c2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe44996a66b4fb7fd0bdc6978158c0c2_JaffaCakes118.html
-
Size
870B
-
MD5
fe44996a66b4fb7fd0bdc6978158c0c2
-
SHA1
d59c4206fdedc949a40d0d562f07b4cb41918c88
-
SHA256
f6b216e213790b60f5ef5fe4e1c53968acfb2bd2ee7d2f9acf022bbaa4866bac
-
SHA512
49047988f29d774d58f35dab37084989b7f0aaf81f140ef1b1dc8d84e04c5ce031327716fea7112e9edcccac5d33809ea9adc4dc58b90e84b8e43699f6ca4e39
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000004734f957efb1806a21d2eaef53109be82d115340a3a6bd3c5c812af76c8e3dc000000000e80000000020000200000009a5b1e47941f1e9cae41c5e35084ccf8d1810771cc77bbcc6217c6fafd30030f20000000fccb33cc2719e80d2ccb4cec5bb92c2dd29fb041c19e397fff4843197c62a5b740000000b8318423ffc15a977c573960c85752ec550b8495c15495cb19f4cc34ba7439612d0e52d334386a5e00cf8dd57b2aec248ea7fe3bbe489247340c7d10f1e7f30d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6041de735412db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433765022" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9F5C0B11-7E47-11EF-9E5F-7A7F57CBBBB1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2772 2088 iexplore.exe 30 PID 2088 wrote to memory of 2772 2088 iexplore.exe 30 PID 2088 wrote to memory of 2772 2088 iexplore.exe 30 PID 2088 wrote to memory of 2772 2088 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe44996a66b4fb7fd0bdc6978158c0c2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5055d47fd58bf3e8586a1bcdc1faf7e14
SHA1412f8430b2953f65a94a0da8ecc15ef8fcd6aaee
SHA256ad49a9f2b7bbdd30a373189e7d3929cd279d124b61ba2ad15a9618cf1aa217fd
SHA512e1b5d90439aed4a94df9b4eeb6d650d522865c74f396a02678162890587270a67fba9f67cc1cbcf2f9cf63e49317f232c82c28a07727f9876ad33ab2d2642d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562b7bdb88402feb238d05579e3e7d4c3
SHA100106a84f44a6be4f479a0b4a53345ddea4982c8
SHA256551774410f3d2f0878007d76c830c8b9cd38b0533399d898759cc2c4ce97b58f
SHA5128080c61ba83fa8c1ac7812d7831be52adfedaa92dcd3218215a4110cc2a547e0224d78eefebe5f3ceb585b7dce1fce03d2eca2bc82e88ea3a87b08554e40a53c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc4ec6c68ddecca90aa1705f402edded
SHA11ad2f2c210ecfa12d0fabad1e3626f0d4c192ef4
SHA256b8faaba8b35cd0ca1d2c1c66447ee69532bc4da8b9a133b622a76a863c292d96
SHA5124d9732791d1d10408a20ca592835f31b8de7d6cc6bcc2ac116af406c5fbae87a7e293b30412626f0b426cabd16d421c5585e2b01391e1d94f11e78abfe5126dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53710189a010ecc11418d4b662a25b1b1
SHA17a140b3c6a148cff1a0ebe1ece488a9ed5569664
SHA256dad242e0b76a0a844bec3c9ac07c081d2683e87c8826d50c0da099330bc5d2f5
SHA5125a594575ede87e28b13159056d9d9fc8f893bf8e968d07819dc05e181a97eec8105ae13295664f4829a084c758dbe03c76d54121f0935f2e69e3521437310144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f0531f113d0e3d6980f14c4b42d8e10
SHA1b72293142f836e207e6e53f42643516a2f93a4c3
SHA25677cf9e91e8c76b93a2569a81c25781e8d4b59e7aa83b6081d3d9f028bc51dd4b
SHA512ad35c9bab1a3da9ecac5adf05dd3698295303a608c92b4915ed4b91f5fee97c0d3cd36e8cf6fd11639db853ced380b71e6b652909ced847d846730fa3bb0194a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5009f56ea5af2ae7597ab6cc212674573
SHA12b8c5bb9cef6cd063dfc3b8705c9ab1c6cdad414
SHA256a642761c90ddcaa4f27bb0e32419a5749a50ec21e040e65af6e707a4b0d68c57
SHA51240b96eea23ffd0069cb1cde70220a529a29b9ff83d2321a46c6b4173549485e7335c600284e9c8147ffdeffeef46d05e0a9c3f2ea96becc8b4f4cd27b36b8d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523882ecfad172e0f21961a604fe2ed66
SHA197eb4e2ec8e5f5f383242ae38ab437deca5470b5
SHA2568ef9cdc71c5303ea63715cec34a302abb2fafbdc4cf3973181595532329c9e2c
SHA512067a182ad902348a08561dca3c237f94ed10cda2bd2abae6543616aca20a28b08358e7d63db71007191d9e89948f71bb87c9058bd72a4413dc7512935292b1c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab2ca85c83b4882b0a126ec502535f70
SHA1e72c46a9b9ae0fda1e39744f1872af99e7016706
SHA2564fc95673160c31c1ab647428be775d6f970d3d1081c55ba0170475d9e8c42b89
SHA5129cabeba4a5729973f68210e0bb795558cb6ec675e80be9861cab7d3ef745ee37737061c792cb528adc0f333971d633271e5223e7bd1d18813dae8ce6fe3ecfd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579d804ba399980356cbdcfcb8a549a96
SHA17254c6bc33d06ead2f24755334f93a1fca70e434
SHA256e93f70364cb06d9080ea9e977e1117133f2e86eb14d760e9adfe3b81a2f322ae
SHA51270dc9edbf73468748f681e9a1ba2979d3457030d53e1e5fa3fd806736f8143d7e331346625ba18cd30b8d99027b5930eb991a02777858e09eaf2c1ec623866a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3913ebf23e47679d4acae86525c2ba9
SHA1d7d5ffd8b92ba06d169e968de39ba0596f28041b
SHA256fab8ad27c430292497279d91443517cf73389c4bf7346e32a074f704b53213dd
SHA512c7426ac1c8a2fd6253ab2dbb41fdb025a8953e9c352643f2f914c3905c281a900f35e2d1e644c82b99610018bf791ac8680ab145251c29f0d6f0eb386875635d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516ec3425faddccf39334d3225aeaa279
SHA10e55a1cc8760a893e682a53d2543338eb772d453
SHA25618ab87d38e5aeac986ebcdf3919f81f53e98234976444020b93c10c828c442e4
SHA512a39acc7b3087309aea3c9f7583106f441611b37d718954deb97e2998b407abc3ea4d88d46b6f274fa2f271947c459049e3ce0a3e3cbf43699ecd9e3b7bb7a4c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d380fe37e03b75ba84b701392fb6c705
SHA1bd954c3821a5eaede370de9a4e6cc838a32469ed
SHA256a38fd5e6cc815f4a5b4350a3cede75b7eeb3135220e97c3b29a8a272d1afe5b0
SHA512a503aa0218855dff2bf4069d9cdf3b88f7a8d26ca20d3047bf9a86d5a8bd52ea821dfa3e11355afa60ee20ce7d86000ed7b6aa949b8cb980c6783d8b95b04492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586891b49e0a62ab31c82833651375877
SHA1e4e998033a3056766044bd92da119145f0c24f44
SHA2563c3e50c5491355807858110adf147b1f8c5ced73df77b3803bf413620fa8442b
SHA5127e248a48bb795cec47d849ce678fd2686230b9447d94e7875986410cffb538728593f440a1682a9f965ca784dbef0e3ac238698c8a170db7e8ed8211fd0fb113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af7370e3a655233fb3c40cc8a6d6073a
SHA13d9ff2d45ca17f1de57e8c1cf3ff6954f98a7043
SHA2566acb54a1144a96c941042e233b149d3a916698a5d5a25ff4858ceadfc67ed011
SHA512289a834d38ff67ca798e96ed1b8db8ef6dd8bfa46db574333192e36cc4efd939d585ad61056a1d1350d6cab051adc3660cdda2c4abd47b6a7e59ee0c9f75eb85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5449453744d814aedf3aa8ceadf53303b
SHA108af39e59f089acee7a0f788994c233ab2c139a9
SHA256e9916a1e3d585751eacbbb8daa671ca0d850a24cfc80919f51b315392effdab1
SHA512421af4100ca8a3d1d9eee095567260164124ffe9677584fb92dda3a2e842744fa2aa3fcf4c5cef8ae79da8be4ab2c919b0399049306ef364a3e3423d76868ad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bc9c393228f173de12faf2586d59060
SHA1d805ae2e507494cd2f9e6c703b3aa5c5a434a9e2
SHA2563242da2b03c265d11c5eed2d9d1f28c50ab1d727d5863e841f0b774d4c0d5c08
SHA51266c45255bcb72cda3d9151d32453fe5070af08e520975899cc7d2a7edfc24f063e12b3f94d8eddb62738b0ea069061c2380029a8f968c6337efad31b1e05002d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5748d60031ce1f30bb80d5e647e289032
SHA19d9f304f58b11c588a2b95841c63fa93cc9acafe
SHA256b49f28d9e3b6fd8530ee660553056c162581c49be22a9a2fb7656904ca4754c4
SHA512d1397fee7c95141bd612f56ed2b36173cc6c894e776817340c35be94eb467663a941ebda48d4129cf7284caa61f90fff27228b5303fed3f0e325ab314d0e750e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4a3964e26fafa69f2321cbca89ac7c7
SHA1c28263ede6388b6404169c3b6b9528400d336989
SHA256b9017e4d0de99644fd0f76b7a2d2c1f194c9cebcaf520d6eea296f746f1e5b13
SHA51234e6e3e4dc4817dc4260e0b8310f4a2141822ce51aa05bae66612f5be709b4bbb8b1b50fbbaf842402c6706a49f7fff9848e59d6f5b14a5033458bcee141aa02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c16eee8452da037c6b1e9482d0c5a857
SHA134d4f30445282915b7dd73e5164ba1d3dde70f6c
SHA256968c26330b309492893ee75f35730693403850870a81a52f2a7899bf6f1542f3
SHA51243593f5714fbfe926419058d3235c25708230c5b6e89644d670cbb8f6f9ab1afe1ab546c508c5ae705498a7c1b4cc5b4bd50b24d4fee544f125a94503914f083
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b