Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
266e39a4ecdf90c77c57a83d3f16b613_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
266e39a4ecdf90c77c57a83d3f16b613_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
266e39a4ecdf90c77c57a83d3f16b613_JaffaCakes118.html
-
Size
30KB
-
MD5
266e39a4ecdf90c77c57a83d3f16b613
-
SHA1
e905f1203a46ef12661fd398ed16d7a05e9645d2
-
SHA256
1f2d73f9df49b9ba6c1984f399fc142dff5d618e66be35fdef1b9db026d9ba2c
-
SHA512
a72a847e4e9c29c846bf49a5efe482bc091b3d794ab531895e9a325e0ae2ab24776a5b8963a8ced298c9b344f1919f35f7ed599fd679eab8456310b8deaba5af
-
SSDEEP
768:CyiSE9hnEZsfttHs6vlvQvPv+vfv+vJwvavxvdf1TGPd:CyqlPHggPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434612022" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f4338b081adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2AE4691-85FB-11EF-B12A-E61828AB23DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000034a5e3b46408437238428484a4faa3cc881e69b44f895d50c855a733563cd500000000000e80000000020000200000007fcd0e69e408c712b0bae976cdd7e1a02c9ae653638868fc0624ec275d24aeba200000002bd63d4ca7a891885052f9ea1f920860eca8e893185cc9dec89de13f5f56c111400000003ddf641aace9c4ffc159c45d5f61e0e9d8c5f6d6b9da16f1554e48462a8479834b6ec8e7efa865789ff66f4c2b08dc463d5f1b2d3091112386544573529afdac iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2144 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2144 1924 iexplore.exe 30 PID 1924 wrote to memory of 2144 1924 iexplore.exe 30 PID 1924 wrote to memory of 2144 1924 iexplore.exe 30 PID 1924 wrote to memory of 2144 1924 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\266e39a4ecdf90c77c57a83d3f16b613_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be1477b948ad296c3c474fda954772b9
SHA188692a01a785fb101d57f7b91907ec8926b79c87
SHA25675b6c9dbb752f229c38b827dcc5f845c3f8c75decb3fb78d3d8f4e1de89d9763
SHA51265d06794f026fd03869cda4cec54ef0ab01ca609d87851ff44dc76c3945a91080e785d95563da4b7d115b9141eb29c5f0ce79a520401c48b6b55806752d0c5b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555f539fb525a8a5f5d748783ecf13bdd
SHA1e701e89af249f2daaf6fb3f9fb71429b48fa7b82
SHA256a42629e88a0fb743427699de6aa969d086ab8ad760fff29e6ea68920d85e9458
SHA512dcc8f361caed2ee01b9ee131473ba9de4e4ed0523783831ddb359c6c4ccb1e9a16b444f33122444fb9240d7bf5b261afbf684fe77cd46133c350c69ec761efc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b98143a1950ca3aa47efcc1af2acf01
SHA1664e0954c5ee279372b575639d0317b7b09c29ee
SHA256626412112fba0cbbded9997e4b2ba7fbb5bd1824b3b24ca66c17d36e06b130d8
SHA512cdfa39aadc2f623732b1de872def9aeb0fcb10ab8eb5d2dd421da092657ce01a547d3dd21f006b125ed1973eeb3d4a7c8fb203c9ed6f0535384631f742df071f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1e3dd5e1c3aaf138d1a2fa1ccdf0a59
SHA1a14d8a35cd3260e5d7a0692c8609853d6ee38ddb
SHA2563050892ad177091f922aedcb69fdd5f9be772aecc877db00756c16aaa65406a5
SHA5125ed83887bb5a125c8e398133bb0d17813d5c2d94944303a63c57be8253e3cf74618083c4943e34f33a97ddac66d07a541515ff47ebb7c71ec0589f58e10f63b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d860885d675974a7fe32c7a62a153b11
SHA138fd22115e3d7f2fcb1dc9c52443e62f0798b12c
SHA256e17b5a9659567f665bd0df93edb7353046d9d1d95e31fcde236b5d8feeb768dc
SHA51238a89917578c41163b276e6b1f477174770c56c5b90bc461cb9cd912014b5f750da33ac5d0c82a3cc586b5cc0510158b5b0921c1a975cc51c3facaccd424634d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531b1e1f4a1b6fc20e015a855725bc3a5
SHA10d6e3b1d87d52252a57c9da0662ae98de8d99531
SHA256a86717448d457ff225423af9599c278b504334ae2b2947613e8ce9b6e5b549a9
SHA512ce3af9e11a4c8d3ba63e65f913300e8f33b93f33f2e6397d6a5ceec898a482f94dee95b73fe0d25365ecb7dcb45de761a313d530f5020f4ec2d7331a521055a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5446c12c441f9e4dc54de9f3c518249af
SHA12574dcdd926c17f479b2cfc8b94fa8c9e5d91994
SHA2566704570f1f61a82c2c771a43491bee4ddd3dd266907b152217b23b4eafeaceb2
SHA51271ca018ff1355e48058361a3e73257d6d476dc83fde37d2d864d784dc285ba9a83dd88528603663660d6b0a276c4f954aa017216a46249e17aaf2d36cccd9094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5661cf237d0ef56b54ebf4c8895bdfdc2
SHA1bfc1c1b0583e67c9e9ee766676256ece22df2cb8
SHA256e54ad3ec182457b5675e4d502b0d664bcf46eb01ade432c166cfb1c6dff752ec
SHA512a987f346fbce7116f28642f3f23fa925430afeaf426f60c8776aae5be68424a78f030c8a8272ef3d2a323a518802327d3773589099700dd98fb1041616526acf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de5dcc481e4c6dd7ef46edaeb872d677
SHA122669134a264aa2054b7281414d1cc841a1fa0fe
SHA25633b6795a9a678317b652ec5a77787afa3d4bb9313f71351802cc9715a91e07b5
SHA51212a637badac21c0bafa24a68c8f3b1b9337117471dd517f61c015cae75b9495ffe127a901df3df3404f2a13048f4a0b570f272c883e41cabd2d72a4403b23a9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c92db41de0d1b6d567cdfde6bb430198
SHA16256264ccc5eaf217121b501a882d9978f3bbe6f
SHA25636ecb91eb3c85fdfe3108f34b12a3d6371e5f412318d20799ddc08275d80f156
SHA51297423cf924edd12e2e8683c230f23caee23d1a5ee09089022e816ebee4fc2e891d48e26f8bd9fdea5e31d1fbc4924b49b1b4cfec3de9e53590d2824d7090bb08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520f8bed84a43bd3847137a9403b729fe
SHA1c1c9c789d6ebe8fd568d2e41c16e48f474959ad2
SHA2561c514a7b125caceb6c703ed682059c8d8c095ab942c9fc1ed2184cd334a177e2
SHA5122e9df36efc4b9ed64fb4bc6bc9d4b381d1e93ed17a1c8d567c7e03f0d279856ffc4addd127c044b4987544966eaca1a8b90c8dabf73cb49a9468a2d04c208682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f6cacd0f24de54f92bd81e16e327b9d
SHA1206519e59d7fa47ee257891e83d325a7df5432f4
SHA25681f615fb689ebc56347e8812578b0fb0e64395aafec1264b9e2d33350f1b9a47
SHA512a117f652f1805aecfe813446b5e08d49a2444b482a95ba9fa45d9cb47f80b302c20e1d2eac0124224fae104fd0e2568aa822562ac6f734137f2543804a399962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c73fb72e0d2a1cc5baef538f4f89863a
SHA1fea9206a72d3bf9f7bb5104e004db1ccad751263
SHA256e6a91dcaf270b48abff40586f79ef5c925bb5c45ffd4576a494f9b5972fd0c24
SHA512235f05c732a27674a005fa6900b2f142f63c1ea8e67d489674c8ab610d03cb86c85469b1bfb711843a7578659619eef23a1d4e078b2c5a1774a7623932ebbc3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ddf5e54d64390272c80e2056e938fc0
SHA1495b234f05dac4dfcce88f8117c4e351995fefeb
SHA256f3e37abc2686c122ec9bcc39ad86ae372cac36d55bc82ad404e1c323ce1225c2
SHA512bae4b2f3e3ab4cfe48eb14f4efae9e16163fd188fcbdded51eb027fbb4c55a588d576a8851f6a3b5fbfc7d51c0746912bd9de03fd86bc3d190ab6b55d7bdc441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508cce9c5ee9409ea1d27a2eb97f193d9
SHA126cdfa887da652b646d498622e86676e6f69662c
SHA2562d2cb340f7d265466613aa76b29c8de0fbd97a07cbd1babce9152ffe3e423532
SHA5120cc0dd1aa1ead879ec4e1a160156dc76e3dbf9de4f20f0cd3f2adde043529989271fea1ebb47161bad1c2a24b18f589458699b666e8caa543a8d50c609d22984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504e9d7cf94514d935ffae0d8799e70c0
SHA1ce6d05b5acb4e46de5c35efc5a6d6dd375ecb860
SHA25641a985565cba0ad7f25723e343315085c62c63c28ec79d6dd80ebf76436fcc14
SHA512295f5eef5ce692699b24197e07e571a23f57e66069fc0bea2d6d9a70e3d6bcb3ab89746cbdd6e1d8b14996cd452ffedf0cbd7dc041a67df2b42971e6af25f5bd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b