Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 20:56
Static task
static1
Behavioral task
behavioral1
Sample
a41ebed772b5034b9f263f85adf24782_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a41ebed772b5034b9f263f85adf24782_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a41ebed772b5034b9f263f85adf24782_JaffaCakes118.html
-
Size
10KB
-
MD5
a41ebed772b5034b9f263f85adf24782
-
SHA1
b81779ff22c64e35437948b25015df90a5eef989
-
SHA256
17be3c933a323e983d44ac40ec5cdfd074d9065b2acd1f9a84cc5230e758e31c
-
SHA512
04891c60fa75ff876e72ef51b45cd2ab1592783da06405cc49614298d9ff9c20a463dfb7af553e045dfbdf353aedc97ba025b85a55ff068fe9c07b602bdce493
-
SSDEEP
192:blZe5t3rGeWfFk6OUfcdvzBKhrdbTFv4jhdNwxjriTO63BwPg:bE3ytNkPUfcnKhJTFvaDOxjriTxGg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000004a0d50995f5ee059bfafbafa4b91635d35d824b5766f810b3999c4fb97bd914c000000000e8000000002000020000000efa70af81d12ccc11196f72b87fe8448a57d4d436cd1b84fa25c8b7ebe46b114200000007ae0f3e969fc479783fc0cf27d503ab38660f08fc16a7fc98a65d6bba77c0339400000006e18df24009f9eaefc76ac1d16cdcfe803df21e7d73b71aaf770c8001798316b16c31c3ceae71ee91e5ef92dedf0f9dcc86d162ac9768fcd5227218a6d63b55b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10ac4f16e8f0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430090085" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3D971741-5CDB-11EF-90B1-C20DC8CB8E9E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2632 iexplore.exe 2632 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2484 2632 iexplore.exe 31 PID 2632 wrote to memory of 2484 2632 iexplore.exe 31 PID 2632 wrote to memory of 2484 2632 iexplore.exe 31 PID 2632 wrote to memory of 2484 2632 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a41ebed772b5034b9f263f85adf24782_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2632 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c6dcebae311f6d0db3b5f31a9692545
SHA1447256790e469897f574766fd36579cee1b8bb54
SHA256b246c84cc35ff83ceb43d9004ff6ef9b6508ee11ed7d732ad33e193f3c8276f7
SHA512fe65d2b4a47616102c06179940d76736090c5986fd1f43d462501ce560ef52f9ceb608beb0e1b953e93eb5756a6057d7f6b6954619ac25f98dc6ead1b1a22089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceb1d340853dddda536ed2e7bd7a3ab9
SHA12b059d6bbeeca78e7bfb0def27e5dc5a830b83c3
SHA256d8be09f2b72213d7c6751ffd0eed238ff31b9e6d888f120db5e36f9e36c3cad8
SHA512040591a7984de7bf327e0607ffc7844b86a0b8b00ff9045e6ade9ca934e998e6f9af531aab04e1a36a9c3d5689e26316e82b08b5051cf32b76466848a96333af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e30990ad56403b362c9e1297a2ba56e7
SHA1bb8e5202209af914b5e703eebe61b0761a36e53c
SHA256f1428aebd8c4a827eef3a773d598d171034bd1a5dc9c901bff9afa1cb4abfc0f
SHA512129b35c9759c305f2369994a6b6b5f2cb309af94941687a7e744ca5af53170a421cd2fd404e11dca7e25fab5b12a5904bd341014540e9a0f213f13183852704e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f885994657052c7f22276fab04d77d4
SHA1eeb7c888995e9a341e9c4a99b394d5643cff9c95
SHA256f6d175cec48419bd6b5fe0da2fd972867df65be2389c9ec918b8fe8f878db5a4
SHA512e3d148f416562f23c9afc488c4eef0cfd4a1d2e00543fbf8311526e0e7f839414566d41d3c04f2e4fcda59909d9c94e0c37b89991bef45c6c3da3750469fcc5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e980c544164001ebf6d17ec375b7123b
SHA19bffafaa3db81d1facd0656e53eb892fb740e03d
SHA256f2575d5f6040ad808bc7775d7ec5734b5597b1a851d0d2acd1d8d9dc252b2e6e
SHA512f07a5169417003c986c70a011faa307f8f0b537e175b27d51ce890e3112d535f787499457d4ac1a6fc121b4a7ca718cc7e206923bb2642f0078d64ff41e76e26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7374d5941034c5da3eda20b2935ec13
SHA1610cd894d770fd69429410e8c9344d82f1c2b7fa
SHA256236d67ff1d3df9b6e1163193cec2fa1670bbb3dee5b8faf15e2cafb93ec3935a
SHA512f31906574c975ba4da88614cfbffa0ec2e63ce6027b03e86c56a4f93e7504bcf4dd1abc75c4e57a7110b5cdb77cfb20dbda165cdd26a3ce52938392ad43a79ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5779d187894f1a8cef3e940d73a4f0dcb
SHA1299eea92816f6ac6a091b6f33f28f2849d590b62
SHA256342ca4ec6c797b0746b3b8079fb9310f6d76fb2ade87a8157491f5e10f0172de
SHA51255a8d61ef4f0eeace736e087e0985cab22257a287b7f61b3b4c53dc49f5f8995ad1569a563cf090cebe84b83a217e9d767cf263b2dbf2f4c55a90e3fffa4b6b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5038fa3db2c491245e26e5fe6aede5c06
SHA12a5ab5103613352e2517580736a554c5b32835bc
SHA2561173a282f1f563762b6fa766fd6aecff6ed335bc355d5063f15ce717bc32a6bd
SHA51297b25f6dd64bb997710af058a51dccaa7874d0c27ea79a8888031ccdea19ac117ac1ae3333d6fc90be55928d4dfafa9c2f61df0464dd1288c140a56d934a0257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfd65ceba91ca3f9350f7935246c2072
SHA1bbbecdcc1e5fdd1fd2f53660f2446cee43449549
SHA256dd6684040e4d408b5dbedd6a95b35e0e4d97e18df8eb0180d5e5e39cf0287f32
SHA512af70674924f6bbcbd65dedefa48a790fb4d303f95e15ad118c1a1d46ca61060aee5c2155111578a400f887a7efb5f59f427a3e293252a93271429c2fbb158e04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce6e61f36cab431c2207909b1627c0c7
SHA127d3f352126d5027d1690f95f81d506e0eb2ad18
SHA256350dc8c0df51baf639ccb00bedec63fc69e0bbe38bfbffb35bc06e4ddf236aa0
SHA512469fbcb0f84325f6337206d56101a54e299bbc622c999b14811a6e62afce621993164703377cf382c6a3abd1a5898c2647041fc11abef98eee6aa3b6079e0133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b8d4a723586e5e4b639f4d6cfdc19db
SHA191ccb23f6556dbe5d88697bb66c61a79e617671b
SHA25618e535deace808e87a6db0d6af0dae685c590acacc34bb844bf0d56ddc792929
SHA5122d154fcb1a8f0518184b9a4d34743731f9315ef6091e85cb29463827bba1870d73d4dd99663b694e6ed415faeea41a6393f8a7af813eeb6339a9fe9d4e8ddd3f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b