Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
c7997480702a3fe191265dc3fef822c8_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c7997480702a3fe191265dc3fef822c8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c7997480702a3fe191265dc3fef822c8_JaffaCakes118.html
-
Size
19KB
-
MD5
c7997480702a3fe191265dc3fef822c8
-
SHA1
527d2016264313b4d021eacf7245ded6aa569b7a
-
SHA256
6d60529549444a31f94467593cf72e3442a7b3014f84109e1ebb2f3eac1a899b
-
SHA512
aa3d01ed22766222658abed5d228cb526b3c632fe333e5fd104435ddc9aff1824428773b42530feebe020236eb5865aa4387c6a182857310076fe32da321c3fa
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIb4ZzUnjBhb982qDB8:SIMd0I5nvHFsvbmxDB8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431039065" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C1CC5A81-657C-11EF-AB0C-4605CC5911A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2508 2344 iexplore.exe 30 PID 2344 wrote to memory of 2508 2344 iexplore.exe 30 PID 2344 wrote to memory of 2508 2344 iexplore.exe 30 PID 2344 wrote to memory of 2508 2344 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c7997480702a3fe191265dc3fef822c8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dcbe8e7137defe0aeb64c97c55242cb
SHA1de21d2c9b7e30f60383953a30d937d897f62dbdb
SHA256bad6387194c2f3727c4d4756bcd6717cfc9232b2f5646def0d0c61a1d49b70c0
SHA51221d61040defd6be55566c10ec99ec3d166519c04f413ed236e1c510db7c877392c36964ddd8bd9d03762dea9db0e19ce126b22fb3673929def532d5ac6ce06ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564cf56afb9092439154c083c76a38225
SHA1582064264ec61393cba0348184eca6b516559c1d
SHA25651462625e216ce487686117de617f3aab9b880760e4fec650495cfd4ffbcd92c
SHA512b3b9f2b074bcbe15e20b32ef7bc177c2f179e9b062b0428be7c6e93055d6fddbbacde58cae33d36f27a500c2143f107eab00f153a9639330af0750c58260a297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bbdfec76d3599b97fb34a5ce3ad0665
SHA1c6874589e218bca594c2528f388e2951dc76c2b4
SHA25623033d73692dfeb44fcc347f4549146558b934bb5790ab0b8972f2e06677cc7f
SHA512b5b0bd42b52c777f63886f69095ab7adc5d6e112f82319eb8349ddac7dfb4f4a79e35e4b204ebd2bad53abc8dfbe925564d52ffe021cf06a63c3bcaf5c56ea56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5887b52432f386f6f694523f98a685596
SHA1770f3b91f30c234b9dac3604bea0a9e3cd59a53a
SHA25617eb9e4de8746ee82b6e208d725d478e224e910f188855f66498cd02a0c65e14
SHA512e586a8c2c534b1cdd4e8256df66441d0ddb261ae17dcc0c5b477ebf803bcc61cc5f1b7bf398c75abfa880cc68f888ef3ccb55b806f70b44b0d8f1d0283e411bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5689eb942022a5d9ec1763fc96f448b37
SHA10594806d33ae8c830e07e70b0bac5485ae619860
SHA2563a81efae484e04770c53b7a2ee393a3bf2d73f76948bad51547703bbfa839fb9
SHA5120500a5a7db6f8b57e25440743831f34e820a5e3f8b57c2f68db5eb5887c93b792e450df2cf701f4c903d9aafec9ae1a364e7b9598d4483b446812e95fd5be1d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561c543aef5483a266db67c325efefaeb
SHA1614f0d5e1410bdb98235e9e4ddce74e8e148046a
SHA2568ed570386080aa217c669b20ab27a9a40d260d4650b8b4258421c8a3c79f5bc8
SHA512237d4cd58d2427d91f3690dd29c350ff8d386a6d0ba6b6223c6ce970fe436f907d99a852883eed58e06f37906d607e999b5d732ad0a35eb284eb1e75e89fff7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b24282788acfbdd85951a843d499e5d2
SHA120ce7b7b9076adf91724f3debb5feef20d43bead
SHA2561758041d2b516ed05e23d1da024dd12d3058ad1e73348efa99c3ca4deaa39b19
SHA5126b65dde19ecccb18d651eb6337ec666ece3f36f48b2389e5294e4fb135380262771c699054dad1b54e0348f152e90d1d67a06329c0a612d03c9aeb47cc79a1a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aa7e73855f36a3911710942dd97f226
SHA1a3e6742dea71594ac18edb0ccc5da7db3d203a87
SHA25653b8ac403c13bf3c5ca7ab180970cb27198fac3f4dbfbe0e3c62309a032b5f0c
SHA5122896e6bccbf3c211e3d2971c9d5371fee7bf893dc8fef6e878e15e9287c4a896c6dbe9817d51e36922abfffa8822c6699301c13fcc3e6915130d20d081fb2659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556dc5b67dd6a40df3cce082acdfe928c
SHA190ba48f08a4c902e6bb857c26c8beb685a98da18
SHA25604aafbb7e284507e028492c9961a4542e9952a7d4329165dba1508ed8a857aaf
SHA5120c4d9a88951985a15f2a1443e4f111506ac33b4cab0334b07ff802ca70be84fb9f77f176b829b0ad8bcc147b9993a2e175ab7aac19a5f3d3f77c9f94e02e3267
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b