Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 09:51
Static task
static1
Behavioral task
behavioral1
Sample
a2142ef8be8eac876e8141afa3e69523_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a2142ef8be8eac876e8141afa3e69523_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a2142ef8be8eac876e8141afa3e69523_JaffaCakes118.html
-
Size
64KB
-
MD5
a2142ef8be8eac876e8141afa3e69523
-
SHA1
082d0bb63a935d7d98ddcd38c085f8e2c2e69da3
-
SHA256
5d8a4098f1a2ad78f640054cfe3d50505432e5d139914ad2e6b594ed802e152f
-
SHA512
624ce54d22dfb1664350c667f531c84d8313e67f5f1d3217ff28635ffa3140972ff203779b843d369c78369a1dfc00aee56e6e6f4a415c6a629eed6e2b5a2a5d
-
SSDEEP
384:IQ/akcDPPXh4JlLDSpbiF1JvmP2DHIskDln+5udtaN7subADyfntwewX4cjfefkh:H7LubiFPvmAeQD7ayfme5c0kh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430050152" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{444D9301-5C7E-11EF-84B3-46A49AEEEEC8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2976 iexplore.exe 2976 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2832 2976 iexplore.exe 30 PID 2976 wrote to memory of 2832 2976 iexplore.exe 30 PID 2976 wrote to memory of 2832 2976 iexplore.exe 30 PID 2976 wrote to memory of 2832 2976 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a2142ef8be8eac876e8141afa3e69523_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecd757b882e17a19d126c5d8b955c49c
SHA14b8152f6db530e2d216a653ed3a03d636a03020c
SHA256e63368853685f6c9293b97d74268bff393ed53452ef7e94e7295385c21ccb015
SHA5123374fa3524c4cc7099be9d84c2405ec3a83db9e3a33b1da1df3cd12dc94df8a55c0302cdb01538f084553932c41d99e3670ffdcab2ce56dc617b12c340256ffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50728715ba8e7b8329801a2e8566bc306
SHA1355ffe70f5d08d8af43c7a4775462b045982d3d6
SHA2565fa63628face8edbbb29aedacb5a0b200e83df59a63db1737c52b4420ddf8ea7
SHA5129c6a1ec1dc7346d5a45e4c47bb2f048c5573af0d3fa6677dbbe292f5eadf526b86ae7891794b14238f7839f7a913b8b87ca934a0aaab9dae753303c286a3584a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3c54c90f30cd607ece674567c9345e9
SHA163af1afa28d937ae1a35e1a73bbdd963832e52d0
SHA25632ca4dd64ba4bb057d42d6fd74110518e194c12e912282ceea15c6f0e11e4d45
SHA5126f9192f8a85107fa2b6b7d0e725bb53978ee9c5a7fd9d8c4f8584b70c0574e00a5cd32d55203747cde78a2ca80c129842ea7ef7cccfb0451977eddba79600b1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509f1b1ca95c05338be96e3268a8a4748
SHA154ee80385674735cdfc241f84dfae9cfdac32691
SHA256de8962634a8e96ad0299647f3b2d4941020cc655808f5aa12ccfe43391cac0b6
SHA512b11396c5cc9abf223186eb1f568bdfe52ff9eff9dc3a8671d1ee9e7f5728fdf7a82d8136853b7bb4fd74f2dff2e73abafb11878a72debdf2b9a36edd4dc2568c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5535168304270cdcbf283428b55a18089
SHA1ef22529f22a3f4e39b8b6fc8e5be25f76c8c9175
SHA256fd4b8a9842c2d67e5d81bf784029cdce661acc4fa57132e34f1cb6ac17c2f183
SHA512d5d3564953f1589c89d7d5ea5c930a655ff5ccb0ee59b38bee9173b28ff0b0baeea281f121a2499ea11e02d21559e5ce00351c40561b7da083f15b8c16b13233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d39e0518b115f84b896ad4741cb4917
SHA18ca184fd5cac5f2710b0466cc87c246627b422fd
SHA256187f7a7d4b46c1976b57b4a835806f450320118c8509708a6d08cb2fbe6bb82c
SHA512c457bab2b58b7819943dab32068ac690a4e9c0eabed67fb567e7598eff1c1e90269b28fd5aeab29958611a8d67f5cd5e84393c270ee7f6acee40b9ed072d03a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acec3613efaabb0cb856b241c8603e19
SHA11ea64f08824d2437e5eae4f9695c2730a2aca164
SHA256c756303b96a0ceec9fc4072e4f7ae15deea8a72848ba476644521fcffb44a869
SHA512307a3f2217dd80f48a5325f1a4ac0bc7bcd126a0a73267d4c8439b3a3443540ea26fcafe2cf6b8122f8f0ce3208d7f5f3fe6eebf8ea096786815c316cf1ef2df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9a1ad167912feb6c39764ac4d7500fb
SHA1568b62c4483e9e774967ccf5c4df384d893ea4f7
SHA25634cc077085283f804e83498365ae58c50f284ce0bbe4e12643c100c466a1437e
SHA5121d98028d56e33e7f950084eebf79b84c71a18c4b0421ab8c483c065910d883e280d0f28c009b14e4e805ff71e29763e8f1a7b3990159ae6d1b6bf6a3b5719648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8ff04375daaa569745104c4d662a265
SHA1b20326f12a291caf3985b9f0deff5e434110cde1
SHA2566478857fe3174f3dbf1fd07c4103b9ac6aad175759ba022f12233258f6221da5
SHA512ddd5c5b6a51addf431bc903a624ebba3df6393e714809d7deb99c073e96901251847045f169d66d35eb1b071896f493506dbd6180a4994907a52dbdf34265b1b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b