Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
8cbb131198b19368e283a4595ad888d2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8cbb131198b19368e283a4595ad888d2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8cbb131198b19368e283a4595ad888d2_JaffaCakes118.html
-
Size
20KB
-
MD5
8cbb131198b19368e283a4595ad888d2
-
SHA1
0bf548b728d8d79d8225dca47326e0b22e567953
-
SHA256
1da1545306d777bda1c4d253974a4d1922911339d2107bbe595440e225fbd88f
-
SHA512
d610c7863dcbc2c0bb073de84f075fd443c482aba6fab5e087c7ddba2254bc8921d6465bed630bb291eb26c8d4a26950692e58826d3d4b3cc8a81b814d59f432
-
SSDEEP
384:GNlIcQtL4CsGTH4tD0eZhpTfn6Z8T/gbMmguLZ:R2ds8zgYmxLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429587031" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA106EF1-5847-11EF-BC8E-E6140BA5C80C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2344 2088 iexplore.exe 30 PID 2088 wrote to memory of 2344 2088 iexplore.exe 30 PID 2088 wrote to memory of 2344 2088 iexplore.exe 30 PID 2088 wrote to memory of 2344 2088 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8cbb131198b19368e283a4595ad888d2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514e30e056ea17035b20155238377ca68
SHA195bc4ec8c0e583be5b2e8d82c5ddcc2ae2583725
SHA256e8ff71a7ad99d0dcca3149e1dc9a119acc58967ec6b02065ee9785185db640cf
SHA51239d65ddcd33aed78e9c999907a69c671ecb9d79fb93cf5b48c2543a62086acf242abb9c8eac4471d719917ce7316e225cb2b0800bb0eeea2c14fdcc1000b397c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f2962fe8645089e0a8dbedef74ffd07
SHA1d9061fa4816b21bbac06314f815daedc9a305972
SHA2561ffc90af1cbed9c4557794ed9cdcef99b5b85371b945dc9914d18236c586cb06
SHA512c668aa10c5f1943f6385ec261f6d253a0d0677ad07629870d3f4c9cc3a41fab233dd5a0b9c43da843322378a0baf96d3bdf68cf5851dd1f6825d7b10bf2fffee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56096e53ad444393513a500c70e3229c4
SHA1a5426c83dfc5d0bb7644481333bcdb0a7b5d6bce
SHA2567202daf9e7218fc75bcce0a1df046a989236f4363a3e4414fde0bb73596b9c71
SHA512e375efee76af5850f8ef410bb1283c451efcc213a59791f04649c2d865eb3151fe3d331eeb71a4b97b7e12267836aabd10350de5736e8a7c7c07affe578ccf58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3b23d02680fb5d240aca76d261417be
SHA16fbe465e457edfc8039a771c446286161334ce17
SHA2564f07ab21853ad5bd2acae84a689bef0244651668fe36952641100f84c6e36cec
SHA5127ca7b789d09f12553009fc85a25e69bf02dcf38b18e4c742d0c05dc5d9e8ed91a70aefcd84b30d4b6f07ac2978580e69df74b8abe9e9a1d8d8c51e8d6db15d6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5444b0d51f1cd4186905553214954608c
SHA1533206a0d9c3466e067b1f2c1adede3afc2f7b81
SHA256b51c6eb85e04ac79ac36fa89c50efc511525a2d47f85cb4c516c7cc5ac28c3aa
SHA5125ebf78b9a002dee72ae9631b6f19c5e551bba70c617577e4c19c9b50d1e6340f6ea76abd2b9b409b00b4ea590d2be0f53d4f1ce222a66f2a9d75df3a1d40ef33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5446a1c42af69da5e6a817656e5f4481b
SHA1450243793beabbb6cc01177602e9c8bc93072941
SHA256709114d6ce6b13cc55d7aa717be3df0c4c048dce863a06a341a23b2fab1a9d0f
SHA512fef594170d6c511c8fc1ddb1293aa3ddb71b3b57dc0a2b5466e9a60341bce1094846b3bbb66c810c8c28d8ecfc416181fb415578cb1949e8515d646b96cfbe02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582ab883e22c23c9e245ea6c808417a67
SHA126fe0793557985053f43818132041d7b5133cebf
SHA2568058e6b63b7ddc48666729310374dd82ea7a344b3f9154ee412be1f719a54df3
SHA512e4ac5e88c3d94740f28be0310d4c5223cd4ef9d3012991728e1950768b1e80bda75c658c34c0edff9dc0bf8a2743c2c197551cb75b853dc73c8b956433844689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6318ae5cc8f9b51111fdb748d8b9f5f
SHA1155caae580b2b6d35ae9e66b99803bb6a9dea8c8
SHA256929a4d22cc3cb7a8720480ffd9bceb16c414ed2018df7d1c85533ccc1239ba35
SHA512ea6ef6a74842508fa03fafc519dc0b2581b6a47af8707da4b684b13e050c32dcb44c13b30196798679eda14427e3d539dbdfbdbd20888fa4c127186e37d34dfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd9cbf8dd28cc66d04f6ec69debdb2e6
SHA12c4b3bd4de57f6ea8ccc47681611363cb7c020f3
SHA2568b86e4a492f145f6134f25dcd029397d0f05d08f6b5a6fc30ee90e5a92c44332
SHA512a886bf6650253c300c63e8468a75299dff22928f128c83fd3158b40a3999f86e1678b165c53d7b528e04331f3ab882a64560c167e00185372f75e80a044ff02a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b