Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 22:37
Static task
static1
Behavioral task
behavioral1
Sample
8c41b791fdd6e96c32b52786f4e71b5d_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8c41b791fdd6e96c32b52786f4e71b5d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8c41b791fdd6e96c32b52786f4e71b5d_JaffaCakes118.html
-
Size
12KB
-
MD5
8c41b791fdd6e96c32b52786f4e71b5d
-
SHA1
062d1e2407b9008946d3cd59de3586b85cb56a8b
-
SHA256
90aa68fd8b08296faa4e43357897331b7e7720f824ff55694069b649e7076635
-
SHA512
e33b40c0e9111e9ad33e8eecb6b37e8cab67c2dd97683c47421bdfd92da5530e67583d0cd7670f6c8580b9ec829c475edd8dbd29ab71a19b4f42cc4694d7160c
-
SSDEEP
192:xEuHeaRN6qeXJatr886rPuxjOE/hj2nFelBDbmoV/i4d43KLeO2i9V:WuHt5eXJat4rPYjOUjVV/i8be6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000ce0adb051abf4a87df972700bf60ee9a45a3045c3aa3a47363ffb0565fd1eb72000000000e800000000200002000000049fa8e9d491c2bfd8d98a703bef449caa34370b3673ffc0f4a22d44dd102f91720000000c8d7183419dbe821d23cb293cb7e8d8fd8bdbf31da1bc1deeb24bc1497f9dc01400000006c01630b32abc2c77f7dc408b0cf648f3a937e643a8533f0e88d5fc0764bf87aed80dca9ccdfa0212a3ee84fb0d06f54d5ef039308c27624e99009c1b5fbef12 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E102A11-5832-11EF-A17A-428A07572FD0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429577725" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 507b87223fecda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c92000000000200000000001066000000010000200000000a10a46d8dc25e2ee078ab25a3fa5661038d837290f7d6fd8a436066935c3547000000000e8000000002000020000000b68df47a5b6e92bdc17fd6430ab39d5612afc0029c8d7dbb14f94cb4a27986cc90000000af6e9288185208a58978a0f1891b421287b84138251b2fc8efda535039c94610adb8da47e98195bd6d79d5cfb4e155a850a2bac51673e88bc27a7f85b95852bfe4f890b5b46c227a2f1c1e579bd445d4b6bdbddf14f0e6f489c5810d5bbff413217b5ae64efdf0aba8b6deb578cf08e4f94a774d44a291bc83de75b8329cd6d86d494e0720236b22775094fe95f2810340000000472f0fd160950d08c2f0c6542a74753ae07030cdda758aac7fa6ae9e27a0a0f003857677be295077e2b59b7b49660ae68fbe74e2dc2c63c236f0e658ed231f42 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2716 iexplore.exe 2716 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2724 2716 iexplore.exe 30 PID 2716 wrote to memory of 2724 2716 iexplore.exe 30 PID 2716 wrote to memory of 2724 2716 iexplore.exe 30 PID 2716 wrote to memory of 2724 2716 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8c41b791fdd6e96c32b52786f4e71b5d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5052cced5ccb176b460a296bdfe65fa8f
SHA1fbcdb9f8a125065b23de971634203a4048e74178
SHA2564f456dc4e5feb36cb7c1fc795733b7ef72b64a39e009828c7c738843ed53ff35
SHA5122393eff23e7c40f76f75b9cca58ce2c1a9189ec74cd500ca18f5adcdffae88ec260e9694378a96cbc7a70accdd0332cee8f2393bbe5471d9b8dba06cf2300d64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0f0f663db30187761dc6b21134069de
SHA1bf2df59bbe3a934d321a1549ba43fc0d692d5097
SHA2566002aa08163544afd90d7e5a9da9e4a20ed05ab6120e89939f307a39a7f807e5
SHA512a7a6a7679e8bf2e12c817c7a3a2c48fe0eeffb19be1a25cf436481ea5bf7c7bdde721008956e966fde30907eeb1df054bbdbcb2e485e42c6c8b3450366d575ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50145f6235853de34bf941cd06d2b931f
SHA121d7246be9bede407dfc5110b78ec949664d08f0
SHA256308771532fb559b0026c6898d4512207e3e8673882e637aa0ae356d963369dcb
SHA51211c9ec0b0762ae395d82a5e2a946b08ce4272e013aba21fad27e20de219133910f39c509d0b7086c119386ad3c41399d4065dad4fb0d7dce597c64f214f56395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b761ea82be41b922bdaa9e1a3cd4de4
SHA173d7353b4a8bdac6502e88fd0c990e84690b2591
SHA256a364eee05c667549c8a32b51ae6807822f5c5fd41d9a6a5fe183f1972f116ac8
SHA512fc0c3b263b69c33a2db10602bde5e926e2be24b069f80ffcedbfe5cb121c23d622720c7148313f84a25b2056138b5a2efef7bba7fe384a44488d0904ac2bf898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53583f9075ebefa31312febcbaef19f86
SHA1aee736b9c74dceff005ec55fd4ed2b99e9fb7362
SHA2565808f798427cf5ceaadf14d84322a580a92ecafba72c0e623ff31cc9662683de
SHA512662c8948e1e3b9c7681836b8abe0043778d073e326018fa8565e309dd8f573fe4e635b2cf1d5e9881f4d69b3a03024a0311b80b69ed30664248d5af7acac918d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5d73e1ac6917a82883d77ed0cfdf560
SHA13f3de3dec259ff772ce6b98317ee81f839df0cdf
SHA256894a300d9e38bbec8c86f53986b5f504b132a432d086fd855e97f15fea01793b
SHA512f8260f68b139387238f510be9fd7f05f22cc5219c103c9d89cc5e3cc3cebab8b28895d3a073d2e142a991338478b4a51bdc204c17e2ff194906bf9135ab2ce54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56697671328ef18b90cd6337bee20c26d
SHA135fd8b6ae4043b9b79526da83f572ec6dff994cd
SHA256adf910fe013eb6af9f69774a86943a87ceb104e85753c22d6b585e0494ae4121
SHA51256a0f01b7a52af47328c80b30301a5cec784b36f7c54b770f23263036830d5af49d2b8e1618c2a25c59b25896ee0198daa70b89394f07f7e85731e6ba7e66335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59db1f6886d924c5bd66cce5c6fd52d28
SHA1653ba499b47391572c7f5a66ae96426665979201
SHA2566063953aba7ebb1e6e51b1ce123e8db41f8ac3ec4da3ea7679241ef4bd6f6fc7
SHA51262592926c4a022456fc10eeb56648635c3dd0a74825c57f03605e6885c4b453e115e714e021d9937648d616e5a037f82656cb0604ee2765045b25b6054e95371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff0f3eb9da300bdc08a6f296f5d31fba
SHA1e8d201095d32b23b3f19f7610343d144c98a5121
SHA25608c44b0badadb086bebb229e00f5a3e11b54f102a4320e05b2cd7dd656d8dfe9
SHA512eb9c1f920852d4700b201fee43602d39ed5c05973817b8a209e570763f4318671f91ac1ddbdced9e6cc8317784f2cc2147cdd54d64db9b06cfb289d42a2868cc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b