Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 01:11
Static task
static1
Behavioral task
behavioral1
Sample
c1fbd052e407826de7efb38238b0ef66_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c1fbd052e407826de7efb38238b0ef66_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c1fbd052e407826de7efb38238b0ef66_JaffaCakes118.html
-
Size
55KB
-
MD5
c1fbd052e407826de7efb38238b0ef66
-
SHA1
9ed61cfba7124a24cffe3dc881b3dd88994a7b73
-
SHA256
1240390ee04d7e57588c8f02d8b8c4daee7661319beb7798f114804047376f23
-
SHA512
c53230854b543403fc5a62dce583bb714d71ce07ca9252aa90f0384e69ef57145f5223ec4abe009391aafa11e8dfe5bcbeb93a6fa6cdaba0e04a4763fab6fc34
-
SSDEEP
1536:lmsIgSyEZdor7reguFuInh9EKwFrMnXgaHNk4RP:lwgSyuXRP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2BB38861-6348-11EF-BF21-724B7A5D7CD6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 204da20355f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d99090000000002000000000010660000000100002000000001e66f9f3addba99e867ec9aadad3c574d7d04c6f3b065c223b1d7ed831b05ba000000000e8000000002000020000000926bdeed737213ff82576f8e84da361308bb57bfaf31484141203ad8190278ff20000000b46ed2cd964b516947cd3048d76b10b8958968a942da5fff614b4e2d8811cec940000000bee4caaf11ac9ba5da36c1cadceba66487fc0d91906859e814a933e91ead2e0df358b3a1ac679c4d86e17c085843693772bb1e5bfea09bfbeb9b7ed587ce55aa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430796583" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1776 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1776 iexplore.exe 1776 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1776 wrote to memory of 2332 1776 iexplore.exe 30 PID 1776 wrote to memory of 2332 1776 iexplore.exe 30 PID 1776 wrote to memory of 2332 1776 iexplore.exe 30 PID 1776 wrote to memory of 2332 1776 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c1fbd052e407826de7efb38238b0ef66_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1776 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a31b893cbff84309c5bd44a0b40082a6
SHA145d0be5807d4beb9a1a61c510db3d9a53768f51b
SHA256f6e9f0f0731a705151c5c4e62b1ddb8047f8e3d014f6448536e3b164d69f7366
SHA5123549275acfbb43b4bc0993b2477840ac27da4ad26a8eca68160e42e59f92f0ce9abe22d385fc51149383457b7e1d00382e027660ed5796de5b383ae4b97d706b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a589c44339c2a33c0628f1759a703ce
SHA1f4c8f44124b661974211eb8c69906310536e3990
SHA25620a98221905fb40688c48138c7ab3d48f0f87f0d319c711127b451a25812613d
SHA5121da9fc6719951e22a944d2396d9d352e93757cb7a19fde9b7a6a8177bbf9d58d58caa72d19990f47add75232c49fb8093ffb68036ba75726ac7d64a1942f87f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f381cf3dd8aa50ab9eb3aec15cc6563
SHA1a459d84f29ac87e7001bb5d1b6bd29ed6f782bb7
SHA256854221773eff231521d66c556c3a971e69d5baa2b52e010a3e523db1685ccefe
SHA512ad18d475b10f048e98b3032cb4688286e019a3d77920454b29b58913fda2731d6912916d14ae26ac2158b606dfbda2bfaae4b9e9150eca58082d22e009362410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf5c1f5e499ff5ce279cdb264285bcdb
SHA1727906287197ccec7e166d6ea7e5bc9077a7f601
SHA2568b916c54c1c70b83044e1b0088f1b34d8d41aa6b0cd1ff0b538d98fa475dea07
SHA512545ea95d8187c8851e8b62d42cb68ffa7888ab48392b2a83bc07f0506cd6d3ed3da9e08b17fb1180cc4efd1eeff885965e15a9c502f8cd6e5b40c5b14fb088fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572f1b4292650159f9a26d4da484fe130
SHA1d27deaa3694c1bb7efc64b1d6b22b940773f3925
SHA256d2be1eb3c2b2eadc6e13160d0e7544087e30ff39cae91dffe1e52f58b6a34b21
SHA51285489a1f6a430afe2c3681e81b122da977bd25d3a74e014d43aa0d08ea5e34beb78858b7b4f492a46c226689b9efa2210b6071db0127f7fd8df6b4e441bfc16a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53abb05a5bbd75ed8d69565271edb5425
SHA1c67a80c9ed4c8726bab77a018cddb4b1420c832f
SHA256b32cfab311851444aceae3892e553ef76fe156a02b1a8cd33df4d918a543e49f
SHA5124dd5d79495b85b0cb3ab690aab70519390f267597f2d65bcfc2ff2350c4e7e6e0c27aa793977c24222d59db2c4d0ebd49d3ad4fdabdc9f869c7d95326df78c70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5884ec59441193e1a012ddc3063a55b73
SHA19ced26bf60f1ba27f6be1a9709e0ce30f725188b
SHA256045a234c0e9d67040af1965d8230c429bd4ead7039f499e4b14deddc96a862d0
SHA512ff5554b8884a5fd704484979551d01e6d6ab0daa8ed6731a6dc4aff58ba087215bd06a6cf034ec23e6a763e85253f8396e92fc68f1bd48a33620306f8e3ce239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511d33275a9404c5c9feeabc5420bc170
SHA180ec5ff3efb0f7c66b4404de38730848c64d9403
SHA2563e04aa7a04bd72fc9c6b9db5eea473d529e3e7b6c7797b032431d30d714da01a
SHA5127cd8e6fbb8914d2b2a3468a93ff309e1179c7285f55634282b8672136e434f477e588d6a9f8590399554fecb387d0ed45cd8f0ae45eaa5edf6a4fa36c5cdfc2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eab956df395170a629824cc4f49f50a
SHA13cf7ff6a4e68765afc97666645dfccbc8b3670de
SHA256afed7aef1003fef1f3dbe58059986879468cd6a6b782c0cecc9eeefd6cd846a9
SHA5124bf38c076c62316c98b9b0199986a1b6e5d1a5f28d13ec32c8345caace151d39979fdc279412fbae270231a0657207edc17a005695060c8bd411c8d794fd1802
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b