Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
26e3fdccedb7f54a3937d1e1c49c470d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
26e3fdccedb7f54a3937d1e1c49c470d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
26e3fdccedb7f54a3937d1e1c49c470d_JaffaCakes118.html
-
Size
13KB
-
MD5
26e3fdccedb7f54a3937d1e1c49c470d
-
SHA1
68d712805f516c88da97aa125e47179d048d9809
-
SHA256
ffd43ba1cc354c6506a7762dbfcca623947238489a7cb329ba79b6dec7e1797c
-
SHA512
1db73c1cd1c1e2ba627dd0aa4d5376d3826926f0f4083f1c70f27677cd53896be9632d95f8e783a7dfc1076362f4b03766fadbd16caab5f4201d4e79276ae968
-
SSDEEP
192:uecRYDyQI1gxeDQPqRY9Umq7dvhrH0B7zK8I/2gq+bZ8Aoj/Ig+LSA7Y:uecRYDyNG7iROuTUBq8Q2YYjAzps
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000061f04ca8fb573a746d8296ad5f926c6f2a48faddfbbef9d8ee095d88b015a19c000000000e8000000002000020000000a81c396d303fd54f1b27c9403f31953c72d66b2a4da9afadc128607276a014c320000000213fa5aeab5b9b056296f845af3479b7bbce457f095d3819c104d2888f01d5ae40000000e67f09b37f614a210830aea850debbe97c33aa65f5a38fbe9c3bcc20b695150f9b2492dc1161faef32d0bc3baa614e2499b8a0dc01ace736cc974aa6ed017e7f iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434615096" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80fff2b30f1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DAF320B1-8602-11EF-9107-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2916 iexplore.exe 2916 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2176 2916 iexplore.exe 30 PID 2916 wrote to memory of 2176 2916 iexplore.exe 30 PID 2916 wrote to memory of 2176 2916 iexplore.exe 30 PID 2916 wrote to memory of 2176 2916 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\26e3fdccedb7f54a3937d1e1c49c470d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c75a9e9c0a04791d8bcaf6ec200b0e2
SHA15c93b5bfb24981e03ab46a84459c8ffa8c03d222
SHA256053f2038b89dd377ff4f05fa3a409935dfc4cc6f768afb078cf953b476289cef
SHA512cb5da10c7b394d3206c1beb323c177eea1a2f3560603cf1060e9b7bb7686d971b818ce0b6862dda1c3ee452790bb017683fc5b21707f735ec9d6b41d68dbc892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1cacbb63b4905c04d14f1baab95c58e
SHA1b5052496e573408f6dc5358d253c7b2473201512
SHA2567bb2145dbb86144982fd087ac426677da20f4a2357aa23fb43115a41759f7112
SHA512b2415305a19105372d0c5b3965004f3082e8be7522e9a0ff5f8e8de165a381813b5190c3b909d46698eb2f364c9fd83ea4f4c11c4d77bb39e4c33b1205cefc4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52451f10908b349fc672d926fc7506280
SHA198a8cb002d780d16ecc6cd30ae19acbf62b3d405
SHA2569989fe44e11bbe5ce4d22600acc61d4a85bd18a1eee33838d175b128ecda3063
SHA512f68cfbbc5c5665129407380f35d57654371bf92142b8619a948965d45f4e9c3f430d10fd594418834f6777f969350ddd2097b7d717e5a1c23367849b5f60f418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5176a2744ad6f8a8ef20d10a1116bf2de
SHA1de5849420232a174b6bd970fc0810ae70f95765e
SHA2565ab2d5e168400d844fc73b3b9620b3d8540d019c6a0c2b0659b538998a5e3fea
SHA512ebf14e23cdc7ea1d8a9bf2026a6156263691ad79e2ef7d24d097ad768af2e1fe56932640cd4b5be1c8a81df8db29ccc8dcca1df19d8194d2436178a05466fd1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9678779c2ca88ad32e813be6f94360b
SHA14e59f343d0cb43aee79e91681d7bed0d8bf58770
SHA256e1f967af500405978f1f98f6e6911deb506048df17f2ff994a013e43f22e42d7
SHA512ecc627b8fad150fab9ffb54c13b50ccb0a3ac42771513f98c62973b08f3ad333fc61d840252534fed80ca768adbcd372793760067226be1277f600e8678f59a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fd8114ea6aac3b1bde662c7e57e2116
SHA14111aed84c67cd90606692b067e5a756e8538533
SHA256026a339931f1b9cf7ee0606c187e4e66b0b856ace2002eec3a6b871c3b190c2b
SHA512ac66f2ec8826313521cdf7fb845d289e209db309d96242765a20a12a1e7917a040a0bd72623d8968b0fcc392ddac1605fd59250fa6432138a3554e593de68b29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbaf35cc317e383a44b5d5c062d0790c
SHA1d802d6b3598774b4978b8350e199e4573436bac4
SHA25684d2c5fdca6bc3978f000b96db8c95c40aac4619c537a827e5dfa0f1ca354a3c
SHA5129868e4c976ff64e2378f26ed17092738ad5fc0b3bc7be70c5aeed2ced7955984c5f0ffe7c94548cb43642c79aa83eb332f9be9d8f487d15b29d6fb848f9e554d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560d15192e9e6df1c27767a9c5c3da5a0
SHA151e2c0d276835f5198109813a604595682910187
SHA2563db2f9e15ea485c94e684ccc61979f1b8dd72b4fc536f9423677d66343eaae1b
SHA51243a03b9db2989ce9b4dbba5d0417780841e0e9aa423b62805697693090e5bf7fa394c9c84ebc90982f929df1b563d4f0818c679e21c21cd2765bbe697f08b061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afb192f6920f592a669318ed4c82a298
SHA1b0236dbf07fd8843953b4047a0a8cbdf1c6dbec5
SHA25677d26f4606d545145cc6d9cd829ae2d8a16660bb6ce50a7eab1ad5fe150b3570
SHA512f4337965ac09f16d3f2a1bca890f428f479ceacc74f2088323f38bc65c0f404a42e9780b652a43a8d3aec95a8c44d264254b286450e36bd7d8c7d6043b0585b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bde0f1b0399d375baa2d30515fe99c37
SHA1371b9c6e9abe4ac67c56e802bfa148092bc115e1
SHA256be9323192a9614abb51f21df1cffac730381e9a2ac6c93ad7c4bbf0c69e50c8d
SHA512dc1c7773aef9bbe7e8ca378e96c2de193d91fcc1cf81722d634e88191dd0e803300e6ee18cfc6665d2656caaf288d80f5f0c2d13263f3bc25bca3fd51d7506c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5513518702b605db903f72d7b070263f8
SHA1a9a78f2e3a2b23282036e0fceb7a81d71debf19f
SHA256c6ebefade9fd6ef91647cf44f4be32768faf2b0ffcacdf304f2dba5aa9f16188
SHA512158416c21dede2884b39f74d552d11961fdd99693aade3cce42ec8bc42c5e88663fd9e2da6c4586f839b71c5152410725599c4e4e8dd525f99d1bd1535ed45e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa10fa6a250b7dcc93ef174944df330b
SHA1913d8ab91125c5b69e819b9ba68d5d4bd115404f
SHA2560868569ba4189f26c337bcdc2dc2d9fb84881d24976c54021e2d13cdaf520537
SHA5126bb7496176528b26faca92fc0e2a6cccc315ecd77ba41ab54ebe15246c07d2180d21a961d98ef72a7d067986d11a6b10510834ae25f44faa95406740bc5acbaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e12d6b4aeacc3c472a30920225c4619d
SHA1870df170732e65bfd2afef74b3d42087eaa1ea58
SHA256dac2c141cb42ca884356948c6941e23961ae2cbb344a0b3ae4ca3b1c99ff9b96
SHA5123a458e421d41347d5964663f3fa596a2f862309611c8f818086b6954ca4e803699c4f6adcd6df8e46ec10ffd3c666c383f64c1024439c940c3507df5e61f88a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5033443c2f364c7dbc6b3470c759704bf
SHA145a993aadb9435632b4b4e1cd54413c11cbb86fb
SHA25634f8a0b65c65048580c38c1a0ef7c45566153345e1605f0e7d2f2dac4f8ac703
SHA5124dcecb64b1b171961a40bf19e2ae8ee5f15ef37ecdb974efcaed09f0592a02fd165204a5c9367e19473ede59f46340128133824d47d496def3e744e5bdad082d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed3afa82262b1122c1af3d8f7997d537
SHA11e21c7f1fd1b255a639dfbee41083ea248ee4f47
SHA256da852cd8a5158e573b4c32f599900eaec65f2ec31698907d9538e56605a6ddd1
SHA512a3be2609e0a5313113462ee2c42eca9e99b8caf0dc251bdd39e032fbd04bd84d93eb57257bac1a5021ecf589f7a000a541f08c3dd4c194d9c0d245c1eb3e7c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58304f459bcc12bff568d1831ed3cc0c4
SHA1902fa8cbdb36d019b5fcb4ca06203e6c7b12d7a4
SHA256faab97783bf16ba8856abccddbf58f773d78ed5294d072b85b6fcfc7998c40c5
SHA51228bd4e3dca564a09a3a7d664ca59769ab403d6f8823f8496ff8d8fdd5d54e187d76aeef6cb539f3adee17bbbb057399e2cf5171c7738db71d32df6da5a667406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cf6bb9e4e37a8e5d3a0d1b0452dc8ae
SHA11048846a01edb5e7b00b05cfe7a8a18b9d2db39e
SHA256d604bd809ea3d9fcea62d0f97f2263fba5adec004c8581781c0c5a3842c75127
SHA512b89eddccbaccc1632435ac26c5539c0b6485353de26c3cacaa77be50c633a8041b2d41cd377e9d0757a146986a622d8d3c8360404d955d673bdd3c5f82075ba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de3cab7dee6ff273679e4afae02ebc07
SHA1f517919cbf4b6273bd04ed43994e8d04d90f6c38
SHA256b33d07a7dc2903a3f5fd35dcd4f82539bc534f37dcfba02faa42e2d387848632
SHA512b768eb91413c36604186ce1d7f53c7361857396e5e532536eff524e0c9fa5371d097c49e0d118254a8b57bc22e7b77884628b7497ba3101f156e890f2258c5ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502dc1ebac417d243c37dcc11db16743b
SHA11b1212a199784b4ca9ea20061ad3d2547f9159bd
SHA256c2e79f8f5005997117f100f53d5650c7031062a4a89df03c6e21acc046c543ae
SHA5124ab5e1484cbbda9396ce5bec636fb40460fd2647da3240a6f449bf87c130b4afa89071e5cd432baf2ff05532270d40670bceafbb092af9bd945ad40749778f5d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b