Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
fffc7170d4e1d199d964c6fcd90cf6b1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fffc7170d4e1d199d964c6fcd90cf6b1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fffc7170d4e1d199d964c6fcd90cf6b1_JaffaCakes118.html
-
Size
22KB
-
MD5
fffc7170d4e1d199d964c6fcd90cf6b1
-
SHA1
f80baeab2d894e1753ef2472e0b436cea65180d7
-
SHA256
8c5bcfbee14ec28a8b571ece7f8530944eaad583baa004b2cb757e5bd703494a
-
SHA512
fde092eca08b335cc177a3a7fb0ccc8c1221a48a1c16496fd3c23082fa7961b0530713f44c216039f2462e7dc8b7a0f6ca23f3755e7e829a40ae99f1c47c9168
-
SSDEEP
384:dWvO27Fvmf6jnTOk3OAj6pP+HrnbtmyxxT3v21GaWq7w6y:aO27FvmyPtmybT3p/3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2527C561-7EE6-11EF-9E7F-EE9D5ADBD8E3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 607325fcf212db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433833107" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000fd47fa25dbb9cafa44b25edec9f2586e40f34e670706acfb98d027d0ae0f7fbb000000000e8000000002000020000000c475b199482cd6398dcaacf299452a878d1e204c4db2145c778919761026d5812000000099486519328a3a47fe4e551d7c87aab32552097acf2c1a73e4946eee0680fa1f4000000047e06f7ff5caf46b0e1b215e3caada8b3b3439755b0d21d2d2926caf8b3c797bc686f5806fe4bb32595a64cb3ec9b720bc74065f2d7e382163dd0b58e3ad9c02 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1944 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1944 iexplore.exe 1944 iexplore.exe 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2360 1944 iexplore.exe 31 PID 1944 wrote to memory of 2360 1944 iexplore.exe 31 PID 1944 wrote to memory of 2360 1944 iexplore.exe 31 PID 1944 wrote to memory of 2360 1944 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fffc7170d4e1d199d964c6fcd90cf6b1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1944 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55150a9ce5e43aa834127e3738583da2f
SHA1d08a60d28a97aa37c4a7df070b9244e275880aa0
SHA25653b7222951a03e753d529936fa771136493a557a60d66bd135bb18d7739aeea6
SHA512f03385cfac9d88550506c6584b5ebafde89b2bfc7f7d553d7db46f865f912fb85ae0e17cb6c922d49f95fcb2bac6b8693be5de1956adeff727bed2715dde4da6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b587ffb10f255df320fa947c276e0a3
SHA1de62d473e5eac81f36d4b99d3fb54441a215ee30
SHA25675a07688f970a0d93b848a8fa9412c67a938d8517cf808a69cdca6294a85cd70
SHA5124fac5424b78bfef9640ba0523b6869fa925195274cffbf08966fc691b11bc5c75e0e7743acaed69bae0aecc4d745914afeb74b94392d324611958b0f0ce51ee7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d80d383f6766fa79b3dce22bf492fd77
SHA1eb3eff763f7f9c12388f489e28e966226682a798
SHA256f1e22bc39cd41883b1e6065928a4f04606ad6fde77d5fb37bd16718bb777cd34
SHA512aa85093289c1c5893e7132ff25adc3e736140b3dbb4fdd9405a400795bfc900f58c88b6a307dba7bee65d0a243abad6c450a8fcf5c4bc239d47b0186be55a6c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ace672a8f4d9cbc1cb8d10f354aaaea
SHA1c8420ef5fff74c08e87329e3e96e67fdfa5f22e8
SHA25627b6097526cbd7543fc95b229e489d19d02ea4eb6efea3a06b72e483c9da1e76
SHA5122db572a7bb07fabbdea7a9e49464a4d07da5dfe29c263a60bee508e233d6cb374e1c6d55bee5cc17cde6221249cea1f3507f80b26e1f1522ed221976fccf9414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d8d55e9582e56c901dea57f6f333ce0
SHA1a5ad65f15394f755c9b31b7a7dd1cdc60d916c47
SHA25660924bee4afa7e3d3931f6b1fc5808effb68bdcdc32d4c55a628c32d92044e11
SHA5128c5f5fa56013c405288c620ff13b3423743334ec5bacee46d79f78461dd142ed9c7ac75f287db5211ccb31cccbe16afb92b6cd0c76413e88c044fdbd3230c816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551ae0e6c494936a9ac63e5bdcbbfb933
SHA1204e1a30e1a3a1e11fdbf2d455ff6c4b52c4145f
SHA256e8309f930a611bd20d7ffec529af08c663817ce833341a0fad6b8390301ae1ff
SHA512e0159ca33b302a74399ed63b718493ca5ba2b5ec84ebfdedb6795e72fc47959fc8f53d03b4623e864fc5b114e6b02840cb3a38bc46d60211bc79dfa25f7cc812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dedede20a02120941f60ff7be25e39e8
SHA1005c50de96eb1c3839326a4a8fd1e0a8ce5906fc
SHA256d07f4a4b77ba308603307863464a7b9714966e1b9586ed0375ced2f8535ff2e0
SHA51284043aa48cc82bfcabc4c3aff747095e49b4b86e40f0cd3a19ba05d77e18130cf68f2295f74b6eeda7afb28f5b2a3a75af97dbebea1567995a4c60c63253c95b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d67969cfba24fbfa6fbbc28ba7504a9
SHA184d2cd058f02777f5747a9bc0174b2efafcff464
SHA256e71614c347f554f320fe1259b4c5c3ad85b489e113b85e875a3752e72b7963dd
SHA5129628cb159a0368ad832165957fbb968dbc91837f42ae31ade309748431fbe65c39abc7e4e8016e6e90218774e3e7a1bc04c14599a4219d396450f67b777f5093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b70d7ecd5e8e1aa3b18aa48c17f8842
SHA1c63c134fb3ce97e9b564189a3b5c1643846ba2a2
SHA25618f453619731e451fc3e2c43c85010638cac32aa820628b939f8ae308fdcfe11
SHA5123a5e632577614090a5a15cdf263d6d45e5d5cb67174bdfe0c3bf347233908f254f2a5adf62b0bed5d751824a482d3b657b4bfa16654aa604246e580bae9634e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562d4800355d2e73ff181a3ef049ed9da
SHA1ee1f620b97704c125431c50602f6ba5381c64d55
SHA256dcc67717598ce85a69a0f82686646ed9722a83a979ea7ebc950f1d506604da00
SHA512d769937fad04bd26b1a512a33d0801a977ad3bff3b7a1abdba635ff2187c4c527fcbbf16c4208f56808fbb180f267a8e1237c8261a6245b187056f15075fc9c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58012c8321cfe74bbe745bcd277b67eff
SHA1c09932e62774b39bc195f6230bc4cedef7c7ca98
SHA256acacdee373a64cd2f6b916e029fa7918c57e153afcdb41e477d31a938b0e2f8f
SHA512e8a984e251a304616097239a2b918b97e0ba9e69005236f3ed017312168e4d6371281c7ad3a7eb0f55fa7428bc41c88c742834a0b52e6934544b45a80edc6ca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58140de75157798a6c76d0f467e802e16
SHA17bde6f52cb223ebf28477de85259b208e20ebc95
SHA25623d11596eb120d8398618b237de3ce642fe52da07f7e7d76914b6eda03d2d435
SHA5122ebaa4087fdc00daf495f5cef19fd44a4e221421cddcb252a5b72723a227d822c24ae0422169cf6fec6107f1cbdf344b2d6152dac1e51432a543994451944c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553737ad05aeffe689b5aa16e627c4ac2
SHA1f0c708a05ab784099e956913488d067614cbefd9
SHA256b3613bc2c62228bf46decd1c8286e6c0cc2babe7a48024234b49ae9892b9626c
SHA512fd82bac8aea114dbd974067217d3c35f22adf76407dda252b4b459fc9649a6359f5871e5d0113f668652e49d441b233a191ec6877cc765f306abdde8de13fb0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce7e82cc392f0299ab1cb3fa3bd798f7
SHA108997271ccf20ca0eb78f10990a82515af8403b3
SHA256ab8dd528b1ab5562dd151c7df483f2faa3c386bc6f136f2b6f5561f9c7c67f66
SHA512cedcb12d3d3554cdc7c5465f5df58f4f0280897cbad6e304a76b7db73920c501a98741414315c315f55fd6f918c765ab66b7f6bb23c1469fe29ee89d03c33b5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d11b7cd4128d145671e023179102afb
SHA1d06cfb17d469144308de77f5712afd55a3a92122
SHA256e8d457e5bfbd951712ccc0a180fe80b1b5520b6cf98df13b7cbc7153106aa3f7
SHA5123f0d291504502795f176190ba709c91ef1064c8fdace056964a7f056a1924f5dbff70fa06506e875154827f8ac71b00822ae835d5040cca05acbf7f53384e62d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592aa5ee757cc49971f8d01e2d62babea
SHA17585d04b9d884472624884d1c9bf13ee7359bc1d
SHA25624dc06090968b15e7b113200340f442345d6776784235e29173e34e45fe99e92
SHA51219f9884914e4536070eb4f887922bb471816081550658b10a38cdd7074fd8d95e757d87d8cd8208bd91488405681c042e98544c4a52cda4d1dec97766a56c7d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae28b3b458a7686626683ba7012d9b75
SHA13ecd7e3a460104b85c5e6143409ec4985d64889b
SHA256461e953b65ad7c4a550b030580a462ff19194f468d580ad1a0a4c26e86f32b69
SHA5121fa18fac26713a746144ebb68fab940d714f014a3f20fa9b88b4c5ef7eee4d87ebe8d99f03cddcb22ef605649cfe89088bc09f5e16bae3ee01f00fdf92e319bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e832bbeafe02304ee70f7bc3da50b7
SHA1f91266fef88638b6bbc9d790ffbe9158c5b2440d
SHA2562631e73cbac0cad6128306c896aaf484d5cd48a83c4d64dcdd4dd4925cd21869
SHA5129402cf998b9380a10d9aaeeecf4e5cedeb063b1c465b1a6741c8d9ae48fc29253c98294f972352e3fa25cffa824f24f70656297e57426f230460bec04bbd89d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eec0e1585e7132bed4ab5031cf2cc8a0
SHA157c4d7c05ca1d6c0e01615e2f5210953e420042e
SHA256f2a51764379ed7f968e3fb393b8e81ebe4181c2969f2f65f392cde4fb081cac7
SHA51246c3451d2cfb810f8929da673a101593f6b09df3b42da18c934cec84d068f359c7f8cf2e779669918a997ac20008ebeae94bd596b1ac197b0dcd2af0df2cff32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562902dd15bcf52db1c71cad0fce488a9
SHA1df8407c7dbae7d357565c7654a760833512dd5a4
SHA256ceda778c01d1f480e2d1263d140f66a9a6b65d4a165319a30ab85e1e29f529f1
SHA5121074c93c004e5fee64ca8ad484e80170cb325c7aeb7f92ced5d23d12da980435c27e48db735cb9dd493ac8289c9e8be2dd13bec0b7d62167091b87a42de8528a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b