Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
d2def6e36ecf585789d0eaa88a222c91_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2def6e36ecf585789d0eaa88a222c91_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2def6e36ecf585789d0eaa88a222c91_JaffaCakes118.html
-
Size
244KB
-
MD5
d2def6e36ecf585789d0eaa88a222c91
-
SHA1
7710fffe247393e321f96951419b1b06bab61be4
-
SHA256
136948e59edc04508f88ef1f1bb495b39971d3b648be1a3740e40b3620c05afe
-
SHA512
adc331a512881f87bb31bd5e888deb766f1c3d32972a8df3f5dc64188975f156053bd2aa5d5bf731e6d3a2c0d54c954d900712d2e76183b5677128a5546b5a61
-
SSDEEP
1536:hdYkmfzp5cOPL2BotJzI3kLjT8Gk6lzqWICVAJidLAaRzf7VMZnFVHadERGFIwEv:hdYuye+E+GpQWTOpZOhsBBK2KKVBTja
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431906284" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E7644E71-6D5F-11EF-B20A-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 3008 2204 iexplore.exe 30 PID 2204 wrote to memory of 3008 2204 iexplore.exe 30 PID 2204 wrote to memory of 3008 2204 iexplore.exe 30 PID 2204 wrote to memory of 3008 2204 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2def6e36ecf585789d0eaa88a222c91_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5871bbc8ac930d3d1429b589f77f7f379
SHA1217fc106c858bd2dfe3f733831659d597bdd6887
SHA256865b8565fa712e6ef02b382146d627b09cc35ce893e966aa0b05894a685c53d8
SHA51270c67fd95c9112eabfa0a06a68d1d85491fcbd8d5f9c959919cbb49bad70fbaabc6a1ab72cde540f46f049eb0a0ac08ac6342d8f0953a4609249aba8ca503833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f275cebc698e633cff02f2dc72e6e845
SHA151de32e034145e7c0ffb60d7af20261adb08bc46
SHA256c6c2ab580ff914175c9c98e3912d032a2cf87134febbcd9d585d3ad512db4126
SHA51211fbebe68dd4d0319fe14096fed82b8c38a45dc9a24a088bf2b48de56ef50bf96d522365ea03e69c0d780f054a71f2ec7aa786e191d33a9a3b23b8bd30d71977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5335ab232683bf161a7384240aa6f100e
SHA1d5ae47d7b2720a83f201d278cc529854d495981c
SHA2568bf01b793802437f5e4688d0df4891d3ed38f1806b251d27020abef0d8eef097
SHA512fa1075fb8c5d21b72a903e304b3d4f3a8f37e07bdd01d1415a68543694c88cd8d8306aa46c569ec4a75afcc2af6c99aa4499c5d64d4d88d2029994d344f1351b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5922e8fd7e490529aae92fa91c123e86e
SHA1cf3e7dcd0681c60780c239e0c436ee7ba630c842
SHA2569485e9c39f7960ff85a74948accec474fbebd6b8ef446b9646fc8d2795c7a9aa
SHA512fc173117af3ea3b1ce2cf8d48732cd4aeff28047004ed133a1a6740f1541b100ed1fd9019140599cd5d7b704c37425b271270a45727a7abf51cda48172b952be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538b4d5e3d0880cceb74ee9d367b62182
SHA13f1db76964e2bff5e06e0e5f54e21021c9ee0c77
SHA2568c471b47549d96f707c453a7b86b34e2173db1bdfdb5b3df07d59833efb9c00b
SHA5126489fdbbdeb4dcadb35e9db483239f2098412f5046c532c9d625dfd992a57ec32fda2bedc33de6ea5f69178caabb6bf98971e13dfa7b0eb74397cd3b9c4ed0a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c89dc658c67f71c0e08810aa49f5f1c
SHA18b91e04b3c8e10ff9549ec78b4c7487cf6c65c03
SHA25654a70545fb3493c5ada025d3331a4ecfa25d15accace6cf50bc582b76db9f6c3
SHA512d579143f8ac62a3d672674c6b93469ccef96712bd52f75a04a57e649e375da7b3ef4e6f41c97581dca6978adb9c8bb0c378904e8a8b5f9f1f7df8dfc63e1a891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511df5e14fb9de822716ef5b80b3c3c21
SHA1868a615a9d893f8d5b61429bcc73af5a567e4be5
SHA2561032153eb06eb3d7132a69d10521ceebb1021b7bcbc26a71d4dd46124cd9a60f
SHA512e3c6377ba09e98922e1dc2119f88d8bc4eb8cb0966c84592d27be39ac0b7da8609f737fb4c86663874e600eb4683e93f69659ec8dbead9337938be0733468ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510432d240e73da8a3a5c4fd1b72ee9bd
SHA198ee387a607037acf76d65fe61cdf808921f1504
SHA256b6e8f39475b948890ab204d86a53e7b774823ed0572d18549048472c01fe0020
SHA5128e2874bbe98f02006a8c792a834d14d8067911e47291a0fb41d7bc5daa116db3c2ff2c1c7c164a6c30a6dd49942e8251d6a74afb895b3d6cd031de6e0801a95f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e8cee0a40d911dbed527e7a300254f9
SHA1df588a192a9233a5c8077c92837895b94311f8da
SHA256162d98d4aaac4fba7ad7eccc752b052be679a1cad886fb23c7781a256fba870e
SHA512aa2540469abb50789f94d133827fd8ec7d4cbb13dbfbe5156b7a2744097db522dbf27507a4d7eb943f0bc15f7c02f1051b505ae0079825ddc9d16bef4bebf0cd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9UR26M8S\b[5].htm
Filesize178B
MD5cd2e0e43980a00fb6a2742d3afd803b8
SHA181ffbd1712afe8cdf138b570c0fc9934742c33c1
SHA256bd9df047d51943acc4bc6cf55d88edb5b6785a53337ee2a0f74dd521aedde87d
SHA5120344c6b2757d4d787ed4a31ec7043c9dc9bf57017e451f60cecb9ad8f5febf64acf2a6c996346ae4b23297623ebf747954410aee27ee3c2f3c6ccd15a15d0f2d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b