Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
c798e0179a1b626135e620d85655a8ef_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c798e0179a1b626135e620d85655a8ef_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c798e0179a1b626135e620d85655a8ef_JaffaCakes118.html
-
Size
19KB
-
MD5
c798e0179a1b626135e620d85655a8ef
-
SHA1
8952256acc347a324ba35303c39e71dd8328430d
-
SHA256
c75f7ee314005dc7ed4866f7434209e1a8c82cecab063b8556270b1644cf3f47
-
SHA512
2250c1f24fe5ed6838b9a48b57ecdd51c9b42e5cd24220df393a735f8852722c36648f0bee0fa94dc98f8ed398c1d91fae30a91ad35c57775853aa325aad8106
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIv4pzUnjBhDF82qDB8:SIMd0I5nO9H9svDexDB8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7DD84BE1-657C-11EF-9245-EEF6AC92610E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431038951" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1000 iexplore.exe 1000 iexplore.exe 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1000 wrote to memory of 2296 1000 iexplore.exe 31 PID 1000 wrote to memory of 2296 1000 iexplore.exe 31 PID 1000 wrote to memory of 2296 1000 iexplore.exe 31 PID 1000 wrote to memory of 2296 1000 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c798e0179a1b626135e620d85655a8ef_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d1da75b4d1492c1ca6ce5d7e9fd7486
SHA15df55c082cb701781410be87ce91f0899211681b
SHA2561a062c6acb00eda0a9134a8af9acb5420506f461e2d27adffd7274b9dffdbabf
SHA512656ce028ecb86c0e62b32f28a7b38ad9ba889868eb2bba4942f37e84d2a28e328d30955b5d49c4f3469e393804abc849b2e1da80ef65e2fea192ce1fe32c3e6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e6e107e0544b52868b72c0d5efee4d7
SHA18b64d4edd2c132f91b17ac5a10654e4fba27dd07
SHA2562e60e69c6375e1cb577e596c0e83d3f4bd6c1acd4d5ed1cbd4655d35b7fe69b8
SHA512ed56089ebdc97b40bf5995769e28aa797d5d1ec6c4b1aed8978f3732e1a23120bec19bd2755d0297b9ccbce77f7e282ce58b1a2b54f40e0f6713c9cc84db8550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5512ebc6b78e755760e2b248a288a4d7a
SHA1fba99aa6927f0d9c6b845d14665015a5669f1fa6
SHA256913f8c3155249417f15c2da4f9d4c510f6c936df00dae8b24237a43006e7f074
SHA512a4bc6f9d1a7e5aada9fb81eca12be212445adc34837a2382d4b6c57e34c1c1731482bcdb6ad28bc23939f3fd24b927bbd6869bb55483dd758444b545a01025f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560f8806e39d985f53e6a736cb03d85c3
SHA1a8379d5ab6da259ff872b41a887fb6276b897acf
SHA25661f0801e0d981eb05e272b19d91f37906550f24472002c176f815f72190705cd
SHA512e9c066304dd1935a0d542c722bd5e87c3b3d24ef46a303864ff759151653b2bc527bea45fa4e43d9f24609d4701640428bc26a4acb92a4449067da79fb3a64bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5396a603fecb8ec57373388b36f30c587
SHA1363e718f42b5da773c5b4dcc5fe3afe1db30eae7
SHA25647616d73d350b52a40ec52de0e53fe92f0cf10fd6e5cd346fa97ea2dd861f6eb
SHA512d6641f7f7b7f4dd4edc8e6ae481831ea88f57bb245e9611a1e9c8f6419ddc2833a7dd9aaa0c21420934d2cb0c0b4e4a4d6d77c877d71f3ad838f45d1beb0249a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5ae52adda015d394381c8d524d2e28a
SHA1812e68a11215dc1d388f984b0e5d276a67395f87
SHA25674b988c5327fbf3f67bab56325b35214b814902741fe8d25cb4bb2eb81f88f44
SHA512d9c26a36a3a9ea274a046cd1f7397eaa425b74edb0aaf3de487ca9f7cc4c0931403aad080278d4ce2d3edde70d38c30526b1bdbcc151c65cf68153996fb04180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535ab31109d3a514130ddc962a7fdc030
SHA1c30579df7ddf176d294db859c01ed95b52056017
SHA25673ea3f492d2531cc9d39dde154338582505c947336ca2193bc284f142452ac86
SHA51258bb931c3540ba998364c057e9d66bebe021976bc14536c00fc18764c2ee80ccd5ddeadb794bd662cb49a72e95bf6890f85aef5b2e960884b199552a81dc94b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d29863fd1e8adc316835caa8d3d5adc3
SHA12a13cd330b990d68b7803ff7bbf5eb4d7669f488
SHA256abec52bfbfff37122e203ed4b6bd365aad9a7a03c229357bdb44469c39283fde
SHA512ccff941a4ed81afbf5056804621486df421c1626b45a8f1f8cece01c88454589ded3a3b4fe8285023e220f6246ac379e8140fdd948e8e651d5579b7fae7d064f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf7434f0b81f2536fec11215b377e5ae
SHA166dec5f2de5e65f6e5e12de488a60fbed31517cc
SHA2563fc79b2d556677404778b9f5d47ef3e51cb289ea3503ce1427ce3e4e0f2be782
SHA51240ee708b9e7896db50328a3a406315713670436127101c820cc78bbd35268f87c32480afbe823e277ff8457635d6813309bf4f0b69611a216d5c7a119a7d5178
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b