Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
26dcae590634d050bfebf2b1fb901927_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
26dcae590634d050bfebf2b1fb901927_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
26dcae590634d050bfebf2b1fb901927_JaffaCakes118.html
-
Size
6KB
-
MD5
26dcae590634d050bfebf2b1fb901927
-
SHA1
7603d4789dff86d509e414a9b889a19ff9814100
-
SHA256
791af404fb7c2df3be216b4e8f31264afda71e64da73e70f8c5d58d1e7f0b89e
-
SHA512
9831c83545dd62029759a8f6b87db24ba2ae09e492e4b3acb11b7024464148cb1b39b21f74154725b0f0f68c6bf518dde44e6cba9875d9b0c3e5fbd81bb1bd61
-
SSDEEP
96:uzVs+ux7FQtLLY1k9o84d12ef7CSTU1KcEZ7ru7f:csz7FQtAYS/3b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 800cf9460f1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434614920" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000d5451dcf7c32857ee15104db9d2c607f09bcb4beffbe139ca1484fbc24e9c842000000000e80000000020000200000003b52766e99149cae6030afbb1380f31ed277ffb7a3d368e0fef1d6e9533b307320000000d0ec909d4bea441136545acbb0c9c53335cb105e7dff252e070ce3b29b78feec400000006de3a39aba2bdd3f3081acb0d22c362a314c7dc3f2d3beaf936f3bf7718b057aa1bb50844b5f72b0329403c04c665deb066ee4b3623c0cbc6846545ac9cdfcfb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{70F54EE1-8602-11EF-8595-E61828AB23DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2776 2104 iexplore.exe 29 PID 2104 wrote to memory of 2776 2104 iexplore.exe 29 PID 2104 wrote to memory of 2776 2104 iexplore.exe 29 PID 2104 wrote to memory of 2776 2104 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\26dcae590634d050bfebf2b1fb901927_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0cc5b04a346c526f5ee155df816a348
SHA1d43639d84031524bdc9eb4f37be5aec6d59b40e0
SHA25637a9117e987079b41e6fbc4901286f72b7db1a203e36e0ba75016e9dbbe0a999
SHA51208d5a1b51bcfad90c30159f1f1355cd829fc017c277a893207b3b261800f577fd88fafefc3054a018618437f997e1afe367ae70a1cb94c1e5ca0c5d2056bc4a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563dced861485f78f4b705fea3fcf2c03
SHA1c0ace7fb95cc63f65b53b6d4e2f8a2f8aab341e9
SHA256bf5329c8d5b0217b75383ea49fe30462157f5515f11f284da2c047a7628ec718
SHA51253186aa3fb30b8a4fad30377f963724582d99941433f0eb6621d3acb92e8f445c81d19d663d3f99ac807e9a6b0ec8de1e7463a5ed3162f8647128dde5e49e066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c49cda2845cc5246b1edec36a09aebc
SHA1f2488c79d93e26b30d6a6262b950947647125b21
SHA256c61841907139123f1474a8a4961cdd31938de77a0b1c195bced49b75361e8c65
SHA512f70369a5836c2a8c4e86f649ae904791ec9159ce1fb35aea552f6336e57ce91dd7438a38ba136ed65846cedfb130774dd4235f062dac126453386dd9120fa0c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff083c417d44e19f856decc298fe917b
SHA15a77c9eb317f76222eb88bd6fc7a2f191a5b00b3
SHA2565bdf34976d6fb95e61b087e5ec83cd99bbdcd1a8d0105d0ae7fd0371cd59c78a
SHA51222c4b455adf12d687b8b082baad010753da23dc873c31ac2f8d41b9209f2bf7b2782769cae87bc18e9a33c71840aaac4c17fc3d8d14791f8be5eb35bd21468bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59177b330df20ea50d8956d7e8db1b84e
SHA1d713d2d0106af2f37005fcbfeaefb89b0537f3c8
SHA25641b220cbf17d8aba3911e8347c14047fd722e181bad171c4dc8632035c7f6077
SHA5121820b3e93b8411e26fd51231c16047d6085bf11ce599e6b1eea7e11df7d4d73ccf64856e0650da9e261311d0ea6389483d66f826fea2bccfd0d1a4faf7de26f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5525914b03850a754d04c70f24d976e9b
SHA19d223e133a19c052b606305cb95d39c790070227
SHA256b1e00d11312d221cce39af2d6acc30e10ee32b0efe7f7176c9ca44b503c3153b
SHA512efcc9202562e642df2718e90b31f2008cb4fa2429025aac843adb7062d12f27c661d06e7a63cc75fefcded188b1e0bcdf12a051045d710e72f607a5e15a6613e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56083a72b0c3a9578664ec2910f2473e6
SHA148fe65f2c43f79ead61763e75379d97d84e79a99
SHA256ed5842600c2e4d61680ceab9addc95ed9a98aea468cd3d0606b361147d8d344e
SHA512d17b75c87360e5789e80692da41560db2d7aa5bb058398c119c8c88144edcb91eb0f6a5e89696afacf9007c179348aca878310284c0778fb093c339e7700c039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b98da766a8a1ea10270f6d1d881870af
SHA1ffc6b9dbed9f824e81a646e86db707e22eb3e3bc
SHA25624d5a019a9d280e7c05753a77704282fdddb3e4a24151fed75fc4697354d865e
SHA51222982dce541cf89b7a12fb7ae244ecef42a8a6209bdb88ecd36235073b89c4b86d295bbde584e0dc9d2ec370f1bc9069b3ac0944b4b1776a0324f9bcb0c94657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50700c65549b64c3e89e3582c2640e6cd
SHA1b3946f57176e8eb0c4b0ea432c7fabe217f29269
SHA256e52ce86ed8807ff04e8abfb04b17ac8cb4f91c4f5c8708cb6b59f8741e318540
SHA512b7b522fcf104cb7d990b47aea375f3b6a1f2d3572f12de00413a7d13cdeb005abfdd0602c8596fc9ceedebfabbebb9d8e82dcacb82f47b270085ae83f502b472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b6b0fe3bc5909d22b4bc4273b9ff241
SHA1d56a370de99c02616707dd59898fa9422f172bfa
SHA25602efff2f4cd900b5392f0e506bc09d29d0e7dfc53d457fb8f4b01142753e6157
SHA5123c6a31a4002a7a1697375ba0e36216cd01ba0d8daab843b069ecad9e1b9ee66bbc01064c646f517c0ca62f8a937008eba0dc41086ad4c6767e92c6868c0315c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511e4694ff1ddaf6a2a1da5d2196703e2
SHA1c43431f17563d8d476bc4403003bb77fc4ed91fe
SHA2562a97b63507dd4cb9ed5d0688ef73617e6ab652469029cbf8a001175a8101d72c
SHA5126bcb5354ccb3b771e2e61e415a5fb77d440c9d4e2fed4be9e5c2bf64a25b3a733bf4e56a86372229250ea3c52fc80a7c19d5727d6bfc7563694bc959c177482c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af74f657dfa4009496303198921edc14
SHA18316e3f6debf0bc0e830b2e6a6d8871da7762fa4
SHA256e85474523e7646482ec00e4db3c3c68f86dd384e66fb23bacd22a7c8db5cc27b
SHA512a1d14d696e0d9ae46ca01631c1ca2d2bb5b3384d301f1fb54557f39107830bb7b6ff714e04cf3f9ffceb76090aed57103d62fd548468156060eb475072c69532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a4642a57c66f07acbe0a3416f4cbc37
SHA1b718d4c73b583179aae76b4e78583dc0e9c4dc8d
SHA2569e1eb32792f21815ec0ddd3729af004556b24c468908d43ee4559b916a401ee3
SHA5120e0d4696c346a8c445056671f3db903479a167429a41f7d6f25a0cb3065310da7adfc6383c2372417db7630753a59519b735eb71e952e92164d0f75a58b35cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5013725128533d1e2d32d1c7b2a2fc0ed
SHA1f7cc8ff322126498db326d61d579337af583f22e
SHA2563a0348efe99e7af66f06b592c743b4ce4012aa59cc834980f79a3445b807f138
SHA512a916f1a8e5c782c51bab7b305389a561b20a9494a8adaca39789014e57bbf544f4dab2dc3db84aa8d6d6fa7d91aba76ecbe2365ab2b4fc13a021a71ae50ae21a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8c95ee151833483ac79d57a61e89743
SHA108d0f3eabba028488ab385af3d5d4880ff993ebb
SHA25636b9f40f91aaace1e82ba7ff45c1d83811e81d8ef3ee2e7ac62ffc923927d645
SHA512a5426d3a51f2218a957e7f9a4f99fa6de46d61efe7925a262247d095173cd6389b99f2c94f43922dc901cd3338ccd5db8469a006f4b57ab1fe69bb091ef40b40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3c043fdf18081ec4b28fe55403f9b48
SHA115631354bd3bef302ac8a6879da543e44020a8a1
SHA256503ef7f01a54fd93eb3baff9162098810b714702b583e76e473647935a9a23a6
SHA5122f88fd2afd433b6ae52f1c5af03022e2cf9f8ef772224621349f72d2ed4e3279074958de969e4ea710d31fd9d82cc240ebd5ead5067555f143e2d6b2c0169eef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5501c30af668c2bcc57acb022d6524892
SHA126917e3f3554689c0b382221e4425a321c225853
SHA256ecede5a964607c271542bf27f4523951d25cc2850e237e6b472a148a6c78acc1
SHA5124a55c3f68219087e564237a81e2d185f61242368be3df9cf2627fb67ad0fb2c2419118b464cae1985962c253c6d3a48f52a65a10e6ffbe9d1052fc038b5574c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5284f98d6c679dbef71c722175d8dc9a3
SHA1d16b73f1430101f35db79f9c2e218ca03a55f67f
SHA256f9394e9bf36ce59dcf5a2f49c241899f050c6f71eb19d7daa0d60a3d5efea249
SHA512a1e87688c4a6c05c4358dff9d5f34e536c898211ceaf46773fd0cf43e0b1cb9e201a5fe83ee7bb0c43b11dad3b62f46ee93c7d373c8bf4e8020cba4e7d20eece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e598d44898f14a416082f47e46ea3ab
SHA1e967c672b39b274b0b360b3013f43458204200f0
SHA25669a52a3a8cb1177e7dffc8f8a6117450d406e48587e2a40fd88c2cb12bd3127a
SHA512954c950b3bbf10105de920817cd7b99fcdba6c328b24cd5120fb62ac9ee8ea4fd8ed8542eed8e477b8ed5810bf5688642ca7c394f074163d37fe69fccc590631
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b