Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 15:31
Static task
static1
Behavioral task
behavioral1
Sample
afc90efec9844b6fe2eda41247af7e12_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
afc90efec9844b6fe2eda41247af7e12_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
afc90efec9844b6fe2eda41247af7e12_JaffaCakes118.html
-
Size
53KB
-
MD5
afc90efec9844b6fe2eda41247af7e12
-
SHA1
33e43aeb454a341b6ec1524e09717460222d7bff
-
SHA256
2f5e24d524f1b120791071b7a1aae90360fd6c6dcb1aaf9588ae8acbf366998a
-
SHA512
75049cb7798da5edb5cdcadcf94b988ef7ad0794731dba0be2ea2159b85b0cc2c7f3a8477030e3c55ca9b1c53d7d2b03cc0c802eb54fbdc21a870b99adaaf19f
-
SSDEEP
1536:CkgUiIakTqGivi+PyUtrunlYh63Nj+q5VyvR0w2AzTICbbgoO/t9M/dNwIUTDmDm:CkgUiIakTqGivi+PyUtrunlYh63Nj+qF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4FF33CE1-5F09-11EF-A446-DA486F9A72E4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430329805" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000007f58c90a7f9c006606783a84f89923486619914252c66b4b95436ee00ce53adf000000000e80000000020000200000007e66ca722bda14a80f4c6fa1a7cd4db7737418ce0af9eb3ab23ca0de26c7021f90000000960700accfa66d6978c95eec15680e9b9236b0262189bf98fcc5c134cdd1e949e22b54613379d61a5e07871338fb402cd7f70cbbbbb115426ddf437eeaddaf18624bedbd00121667231582c46a083176f843132abadfc65c45cba4ccd37358886b6b70a39fa9685706e39ee2b2ca8e112232a945fff9824ae53cea341bb78f25641f7e5867ba20a8351f0723c7dd416740000000f1377b1d61240784358f39d5a7e4b5fa734548c3deb7b0d7669ad927a1f310c1fdc5e895cf7df3b78dda7004cfce53438bcc785c614a4e1c205d9fab5e3f139c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000fbcf9cd2e32cd2719e2048d36b9dee758bd395a9c6ff42e6fb08bed0a81f25e2000000000e8000000002000020000000eb5a7c70bcd3751ca23fcdbec1a7af94c22050dbd34fd3ef5c823d5ea37b359420000000c6306565058b49e101d062f3fb5b5ba613bba294f69a6adeb987144bba868d5b400000005012d9739ccf4381cdbf1664d3c6a7023c6b25992c79d76994256722452489815616e54d1067dd03532a1114b70dab7d9b2c8f45e761ca45b4c85ba53b5bcde4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05fc85016f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1596 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1596 iexplore.exe 1596 iexplore.exe 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1596 wrote to memory of 2444 1596 iexplore.exe 30 PID 1596 wrote to memory of 2444 1596 iexplore.exe 30 PID 1596 wrote to memory of 2444 1596 iexplore.exe 30 PID 1596 wrote to memory of 2444 1596 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\afc90efec9844b6fe2eda41247af7e12_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1596 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aed355c88370c6f1bde3eea10ee08b1
SHA142afd70450f4e21ba162d1781054a1ad005d0ed3
SHA256c85827c4a8c5ab445853f434550faa95565b946e6eb73ddd7413fc99dc3b7f54
SHA5123f2ab7333077a04bcc2de7e4481869ba364c4d7df29eefbb85fd8934e3abe4462d266838ac037dc540475ac2926a83966a3429d74c3dd51312b1019dc9a03665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5566cd1150b1058e86502eea1ff0f5137
SHA1df9480ea7eee2e681c7f2196dc954ec81e5f3250
SHA256dca2f2b2c410bfebcd7fc899e55bf2b843a982532ffaef91426d72e031e2cb16
SHA51286f02c23ac4ca081e2fdcde136eb259e85c2894a41f913c2dbecbd79a498f0884f2b07d01dd88b20e3be6f4768f3ad8fd8f799492d642c628013bd5c1163a3bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e39148bab7b400215214a65985b8de0a
SHA16fa92a9a4da0fca48493e2bc8f7bb0f2593661df
SHA2566693a26a9d337428706f2b0020f82c03b3aac76aae836cffb11991db85a7d9aa
SHA5121b125060fa4f4fdb3d336ad089f4b5b2fa69e21a65815ed4584735f53753551e95ed91f577ba97a519bf0e84354de3518bb60b33963d69d2e4f8f6b918175932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5029480e81c073c2fd235aab40e5d0d21
SHA151dd71891ece498f5f953ee76a0bdef5eed291c6
SHA2564f0d1f7b3ec72c577da1e9ba35b4b4ce576178990d9f6d762f7e67340ca97593
SHA512a097cb9fa6fc6d6eecc5b1af683f1a1d81fe9d2df4525c361e591fac361179ca7e861a4bf0816b5cb101abd64518ccaffdaab6c15d77d5950534b047812642af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56699a3a2a5e65a03eff3eb733c867d1f
SHA111fd5cda9cc0bb95ea07296fcdbf8fa8cccaa8eb
SHA2562af918d0e2dc425c85615e9c10d3c049147e19d6a361d8b51528fb563c0d76be
SHA5128a9caa8c24f82b424f4dda580872dea6b83579e17626a1b745f8756939d9644b3ac646d4e5c241bb9fa3430f4b7efff2882b71832347a0f4b1b540f55fa50da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5944237edaa1da6c4348f3d8d55c4c87a
SHA17d6e0006c45bb5f3b59308217fb4f73c202728ef
SHA256d669b5182104be5e0f08cec47d436bb5e99bd3f9f43ca2c4fe55251a750309ff
SHA5124e8e8f608b0d3f9f1dfdfe7be2aa0c4f35ac680934686a5430e077a69734221534d8edb3cd9a61daa50e4345334c689f713ff0b8fc4fdc8447882bfc06b05e89
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HNGGU6NJ\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b