Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 21:02
Static task
static1
Behavioral task
behavioral1
Sample
a42390a4917e3c1dee7f26736e09798a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a42390a4917e3c1dee7f26736e09798a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a42390a4917e3c1dee7f26736e09798a_JaffaCakes118.html
-
Size
15KB
-
MD5
a42390a4917e3c1dee7f26736e09798a
-
SHA1
6c9597a5dfd8c8fc9ecf5f5be77f2b1ab8425725
-
SHA256
e617f3bfd711218e705799ca1f66d1c5bd8e46c61a50584b4d1a87ab24530bb0
-
SHA512
8b21600749088098b1276b630a1a9388fee2b3299f7e5e0c59604e6ec6a28da255650880c724038f0547c8a6600f0bd63f64c06ad154d517a6fe880e66e6ca91
-
SSDEEP
96:yiIdnUZC1AzgdG/48L/CTxzdTSkBcIzGGVPOFN13XqSTSTu1tEoTF3iKEfR+RQyL:NIdNG/NAiIzONZeopliQyUMcexCae
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000b517e08e0ff6e026a917f5cfb72166eabb4b16732702a7a7e487b30880e3b4e6000000000e800000000200002000000025c9bc1e99e168da3b70cee4820a2b387dc29cb8171f5772f745f849da49a6b22000000093868968a59a64fc6d6294f35ac54176f1c323ddb2f19394b9aa06e80a4372dc40000000d6800d03be462f85ea4532626228f0d85be4005015c05589e28365caf0ee4e35a15ec20c910a0158801b02111e01b9c5dcaa7006e78f4b4a7cd2b83c8c1d299c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8049ade1e8f0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430090437" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{092FF0C1-5CDC-11EF-9143-7699BFC84B14} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE 2464 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2464 2120 iexplore.exe 29 PID 2120 wrote to memory of 2464 2120 iexplore.exe 29 PID 2120 wrote to memory of 2464 2120 iexplore.exe 29 PID 2120 wrote to memory of 2464 2120 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a42390a4917e3c1dee7f26736e09798a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7cc45dd5888ff3015f5bccb11867950
SHA16d16bc73b4a47184109c10a761d9a78090d11718
SHA256c3e14232d4e062b72b79bddef3b746948ca63e74a7166476715023e350744b96
SHA5125a12535b5259fe5cc2871fc77a5ef6fe28b2bd2b600cf2ccb995de2ac3ec32f6a4153c352f729869ce604fe4af0260a4b4a631c01ecfe29afa21485d86428f64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d92f5b5ff6c7f6f5b240b69b9f34fa8
SHA131370dc94e545f60061b8f066f3a54ee505e0b30
SHA256b2a36b9720a9c3ffc3e2bbe84ba36418a0d98204f46de6eda6c8ef06f5a51d5d
SHA512c12d80e02213e210663c85b8e5e22b6b4b7ff3e30ed27d5250834ab7588187ba3f55ecdb334bd711ef9b0946b86b41968adb95eccf63676a2975cc763e07bd7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57339c4c53c0ec1d0bf57dd19080eaf9e
SHA1f84e9a41c2ae288de745fe0187cb86e5fe983792
SHA256a587a617249596b7c3b0537ec9ac3559095eb29cf70d394239c2a0b6c0241f18
SHA512d61657c1a96a765abb51403b73aa642b2f4bd64f2ed7e67ecd0e3131c15be1d1d60d3272fd5aa54c57ef5a38415c8d00a4d0f6f2d6ae02854eb445a43b9dedf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591b141777f8440242c6834bceb60bd4b
SHA15d32fa6c295de1c731a1fffa2f410de4be0c586f
SHA2560125d7f536371960beb9f2a6557e2d5f678edc20ade58ab0725be9f72d5bdb0e
SHA5126e7e41a58e8cc157f6ab4db63f1ef5ba5e3bb4a32f8d0c8fa1299801f3b6c9ce494639cdef366af517f7080bdaac8a42084d1751ed94feb494823dad5a89b73e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a92812b47982381b43f1c0d28056a20
SHA11386c8417170cf2c2b26c677ff43f985d61d6446
SHA2561d58c9a87589aef2c14e5e5c62fb1619c7171fc0c2a0c1e6a80b8f37d2fdd415
SHA512bb64cd392a853e4d71d7c233699f4b85015a6fb10bd1a54613ba1f1a8b41568d253741ebe47b6136edad7e0522361b534a54dc65bfdbd3a5d95f09bc3d4177f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f175cc1ded8eb3a12d72a6b7e5ce4872
SHA15907d0e015700eca0f4f0db8e56e343e8b238fff
SHA256b73f2b5fe473b30f598d3c8f8f58b9003d456260ca019f1e1356f71cd6d1762d
SHA512572625e24c4f891a43516f573f93661485684edacdabdec27e8c4a7e11611ccbc3d3b9d5cb40c4f088a946eca2346b85fa8780439909f4e0fd15ee9563bbe77a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54189cf84bcb4af028f4c617cfd3067a4
SHA1a06d11e5da863fa769fdde8e71bbdcd2b91f4656
SHA2563a4b113b431d17a4a8e5ee3febc389e4a7686d7ad56b8a917ea69b45683e0d14
SHA512c737c7f6eb2924efc0785f60e8dd737552baf29a7970f6e0e694c41794f37da4644c4743065271b08739fb99663ac3fde81d7e7e1a1dfce790eeb9b00f8b9ed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564dbeecd6c1e0070355803211762e609
SHA16a7f8d1e590a64b4366c381ebe3bb6f82cc1d8ba
SHA256d6433cac5c0333aab4b43a5d145fd33182aff300991d7a15c12fc4fd767b3767
SHA512a3f502be1da444a180587dd943957afd1d6f8fbf87ebda683531e58942f58c64b453c5067507feb3c7c265b94d14bfef0639d6bfaad1cedaf5a30fc5022d0054
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b