Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
fec12584539e35287b401db0ecb552a5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fec12584539e35287b401db0ecb552a5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fec12584539e35287b401db0ecb552a5_JaffaCakes118.html
-
Size
745B
-
MD5
fec12584539e35287b401db0ecb552a5
-
SHA1
74d61f6f3c9ef5e2ba1c0f3ed76cf4438a79480e
-
SHA256
9b9fbc80f2d17b3ae5eefb6932db14f01ca84e38b596a9f550d4b756d80c1cb2
-
SHA512
f9bcda2e4c71ecb55bf1b6db95784559487c83a1541c9ff55f8124e18a248d8c3e9c1489ae83049aaa68497adf45b6c02dc10fbdc77427c0e4dca375d9fa196e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433783210" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7A0B761-7E71-11EF-A0B2-6AE4CEDF004B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a000a3bc7e12db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000079c1b4859916b63d1c65f6f29d9ae3efdb3dbe10ec7e6afbb3e49f9e2c4330d1000000000e8000000002000020000000ce5bcd84fcb30e011245df510bf74cacb68edf7a2484ca7ac820656efffa5ad6200000000436bffcb1e09dfb75e095741a3b7ee08049571ce6a4b76170bad6b4eed272e6400000008f08c184cff09b21cd6a85341d08e4214cef5046badbe45f32a3f428ac363dcd92a62b77e770e2958450e1c4abd393df5b5a94120c6a01f42fb6218cbb128a62 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2540 2388 iexplore.exe 30 PID 2388 wrote to memory of 2540 2388 iexplore.exe 30 PID 2388 wrote to memory of 2540 2388 iexplore.exe 30 PID 2388 wrote to memory of 2540 2388 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fec12584539e35287b401db0ecb552a5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6446c5a746b2fe7d832afb4fac250ae
SHA184bfb2f1710f4d99ce9611505b9a4efbb7229cc1
SHA256fcc383ba2e2f27735a90ebe6a8df124b1bc8661e8ad64c5b4f3509ff51e737e5
SHA512c4348dad88ed6596e9aa3f0874207dea63697d6ab28f0f669570d702f5be0223b422db52e4c4ed362d4d3fd0f1c88cafb2f1d31bab68d287970b68dfc4f79def
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595768721922269a7e37ff8469886e75b
SHA1601716c2c04d6f77b22614e09f8fc33bebcb9eec
SHA2569823896c24e99af9d3b00c8ba59362a9be0bb454a97db56812ea6034b2fdc05e
SHA5122a6a95d3473522607a609248d85580933a753c470f7ef6634177c15307a921d12a5c7ee387f876681a3541bd36aca2ae31b67db60fdfe4c5a6c688fb0c93d0c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d907a9ee02e7f8cea93646c5e8b8ebb
SHA175d1549a8b18e4665033150e7c9a58ff139c78e7
SHA25681a637fd5927a7a74954e559e4d1ba327c298577fe7a368523e8a8ac2e3ad545
SHA5120618d402136cc9b4a8d4599c7c13161c518efe400a11ce34afbbc421a0cb632267d204e263e816e1cda84c6f1799717cac736d9d00407ed97528629028782018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569c1383007a1bfbf62783c7c166112e8
SHA1c8228a8280a93b577bc243fbfefa2846d169aea7
SHA256d97a2225cd8a43673863e5cfabf2c5f9b1fdc217bbefb28136d303a2edbe4c9f
SHA5121df076bb31caa31d9f3b4b2a8a94399f901f1b2e013e1b129d4580d7e9fd7f8808ea056993a6e2dca110d998d2745b13bdc567d6e2d336e14d95d932fee5aa76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1f989a35dc36e0b39ccedbe9cb7306f
SHA1d0eff8894ba4eb56e6df52568db3166d6c125fca
SHA2564750ac1bb120c2aa895637aaeedc7293decdf333ae7bf285db12b1243fe6c377
SHA5120d1b9367c8f0c4a0ec3a9d25008b60e9d2930809dfe7fb60562a921ce2952ba8f6ba586812f7c35e30c473510fc71bc121f21b94f59e526eb062aa14a96d893a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d438b06fccd993d0a1f9b612924b120c
SHA11412b7bc356eed0093b40253789e259938e47728
SHA25687d44a879d7ef9c2c2d713b362ef2f5055f014b7e6ecad00197d2eb2d96fde2e
SHA5128eb82696aa3354c7c711d75b39fed0c53748b4fc20632364ab33496a6349a8dd42c0eddf94bbe3b3721b58ea2c446b75cde31f6321f145f452a1a9a784dcf8ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e885ce5ba1e9cb661a244106155f8a4
SHA1a179125bcdecffc29036433696f4e7928415eafb
SHA25653b086a1d9e84217df803fda029a3b48276809a304b4a5ae7ed3357c89adcc6f
SHA5121ee2bae0aadef2af647d9421d88864be6dc7f71618c647f98967c8551e8d3148a1ee936b22e4187a9fe6c3f9a648c1ddcb5ccfc977098b0f2189bd57b7219dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5379c6dabd648e50ed537f713e02c9a0c
SHA1183c4d43b710435c1e17d22e4389be37967b4f50
SHA256ade18074b8b10c91780d56c91c87aaad9e297d8131980a95e64a07cb018a7184
SHA5126825b856f32be25e561d0718fe79aae9e78bbc3c645fba40fe298025e2cdf9d51e3511bf4460df0da6bf04997f83fefcff5937d76c6bca4d1fd7c61a39c7a435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539edd2ea4bbc46e8395e5d17469676f2
SHA1a81287bb3eace166ad7c291860f7a520f5e63700
SHA2561bdcc16df9f88125420bd96a66f76c33bc4a5ba651d7f6370359bdd1c9c8ccd0
SHA5121a1c3c8bdcf9f83f813e7e4a283321d44d36b8f0d4666398ce8ac43c6bff82f10c7d47809df4f1a052d775a2c799cdcc2840a6a12dd71cd63825682e7fe27399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521da85cbb8edcc8b7f20678e65ce6365
SHA10dc3570508deeddd6c6809f0086b96b22e74160b
SHA2569351aae3cf88fe119abe48542e66aecc66ae1a4b95cc72b0ea1f5ada59871848
SHA512e2d38f0a60244a4de3faeda65ec41df820c667b621d4f5ab14838654bbaae2f1372e435da5c74d93e33a07898cd25e8160da1ef1cfba172a79ec394f7deb83d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd87f53c6e4f40ddc1657bfc488d0b38
SHA18cc96749c0ff00ef5c829569cba4980bbe4e3a0e
SHA256dceff040b1dfd8b23eb199d360b8ed79655a75e63c5eee9d4f42ae4002b225e3
SHA512af0e144968bf20f0346796e065c71b86cad1c85e5491d4838ca942a6fbf864d5b5a1f5810c906d2f3d721249c44632dcf0983b649abbd8e159c52d3246ba9951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa25d4cd9a7b3a68292150fa5067f41b
SHA12be2b5163c80db54f6e80e67a041c96f61a3c4e3
SHA2566cab132ab3da097e4700184be727a02921f122c1bc62c952385d20c2caae6c7a
SHA512e5a8d19afa71c6aef68b28d7984d3a26cd1816eeba08e5e54bd8977f451f7260959158e6b7a5519f02b8c13dc3a36841d90ab43f5e93248107449f7f12d01785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab86538a689e119f1a6b3ab7c44e2d4b
SHA1f7975c34693e957cc23e15c478949e4e09e6d33e
SHA256348169fd1c57e1c23893890442a01eee22bffbe74c8654302851da707728ced9
SHA512e6494eeaa54353aff973889ecbe7b78424e38e0462fc0894b22d1a3c0c91c7a2f8405db52fc60db113176cc4eb667439c6db164fd8bd7b3c983926d81e94e9fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b299469bbb8dfa08030f89d8b903eeaf
SHA1fc5fed175200435c801d678937e86b9b8178ee3e
SHA2565011597dd474c6f8c277249bd29017b7a3c1ef289b703286f253570d74ec99f8
SHA5124e56118fd28df32d6677664b6967e48f213e27f5070a62fbc8a36a50890d899c44a228f10ee51941fd535b3693918a5b408261d8e031ffbbf7bf40e70c9f1892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5483c37b7d70c027d93012d6198040d64
SHA1801192ab36c87b08ed8bd6887156ab348e9c7a29
SHA25645ea56877072426d32ece303c88e3bed2f534edef7b32545f735eb0c72a76a2f
SHA512a50a1c8cad5592983dc7009bf244c47fa74bda37e4e28115b82f4671fb580c862e3b2e1662f0e7db533f60a9c122dbc2cdf9879799a3bc95b797c51df530ad54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fad5e45d32743935d7b3b8734def111
SHA171466ee5d2419a882201a9ce2382d713ac01dcde
SHA256fc5815f379407b3571b43478e3972243ddf730208768552f4366ad1d1d6f532b
SHA51262be4cd481933a205feea798d405ca6fb16ab4a113e792a3b5e2ee4c10042fbe53851c588c59d8c97ba66a0ba8f3568018fb75fdf96db09f924539953abe86a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50388d24fe10e2abad6327f088489df8f
SHA158cd2b215d437e94735a251941fb4ddc006cfd07
SHA256f275bfb7928b930b9550a5151b4406b55f4470b5104a2420a3b502cda241520c
SHA5124a37d754cd1d8e9b57497987f2203dd35c595ab769e1ad8e4801d4946cf39feb131b5965c161b034c08b19fae5bc38e3bc1416a3229c6b67e7006ec9aefc29e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516b8e015b1678bce2e6815f6692ced62
SHA1639760d1fb265bd2f6ced7328af4003c91b34b91
SHA25686886a972c3c7ce62ff27ffaaa173e7f8c5a486b4ae3f34311cb3ba1e36e7f96
SHA512dad2664231cef71e49f81d0ae8eaa149344ea96d7dc39b17c1ef190f2cf71e48d8614290dc37dbe13321a1cc6bba9f4ca840e3a12b0f5ed241acd49b2c62c427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e6c49809e1f1f4cb3b1263004648b4
SHA143710951634f3460b88692bc7eea0800e1c7dcf0
SHA2564527147f88977984525f657ad675dfb745d4f7dd3d9655b8a01e1d1a0b74ccd3
SHA512c9d221cee78b690d4f7b6a44787a81bd609674a04cf50c28ef38bf073a987a674045ea8de1ed0a4506c2ed65496b0007b2288a2c29a54d508fb264a464878a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a455433563d91571fcd72916af161fe3
SHA1209cfaab733860edfbaf5740576e6fd4a19f883a
SHA25673c87fd4a3eef51ec7e430d3663ade1962650049e990a456f59fbe6ef61bd2ac
SHA51250f96e5bca62e4330c56d1e894137ef717ab6954b656d84a2724ade5f3bb6be11f238a2ecf0780109204ccc48dbe95f43f3b5502585219a0d8adfc67c916b558
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b