Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 17:30
Static task
static1
Behavioral task
behavioral1
Sample
d6cb18ac0894adc0af06d9d0ee104c67_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6cb18ac0894adc0af06d9d0ee104c67_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6cb18ac0894adc0af06d9d0ee104c67_JaffaCakes118.html
-
Size
18KB
-
MD5
d6cb18ac0894adc0af06d9d0ee104c67
-
SHA1
ac25049cb18665777184c087f722fbe112f3ea40
-
SHA256
8418800b953555fdd323a5be5d23825b0654c49e9f6ccf33bf74f14908c2716e
-
SHA512
37f01b629ec857142eb4b9e5813d40f6191f31eedbef55f4366a5b7fa9b856e3d056c50c0bad47d5d7f6b1665a018b952ff544d34ba00bc017f0617d9c4b24e7
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAoj49zUnjBhXZ82qDB8:SIMd0I5nvHDsvXyxDB8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432064930" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{47C7D711-6ED1-11EF-AF60-7ED3796B1EC0} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE 1708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1708 2344 iexplore.exe 30 PID 2344 wrote to memory of 1708 2344 iexplore.exe 30 PID 2344 wrote to memory of 1708 2344 iexplore.exe 30 PID 2344 wrote to memory of 1708 2344 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6cb18ac0894adc0af06d9d0ee104c67_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567c7dfb047b686f00c498c8fc5bef83e
SHA1ccafc2f15b2d14babf5692df111783bf7c074e63
SHA25690906bb52707aeb210cd55e2fe35b32c8f0b67a88ca488e7e70e7e07620cfd68
SHA5120da97575c4206d8a3d09f69c745bb1cd5664291afd5a8d843f28fe1a3dcd92edf8a639768beb0c0414b5e99ee916533e4c330efb93e3f2526c360ddcabd32cde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575d3b5bb176cad3aa51a83566aaa0ecb
SHA1cf6a23933e0c25cb6acbe2e7e978bb11d9ea76b7
SHA256b6830f53fa5ba815096e9208f85ea993295a72ed5468da34ee2331492bffc576
SHA512e5f45eaa3e8e5ea54bda84b68188886520ccd37eed84283b150a0932a25d676a735dd1c24fd32b86b4cdbdba94068c01ab3a65d2f5f74a5572ff89db12ca85bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594f83670d8c6e8b694ea40f6555edec5
SHA1e961ae552e382e066975fc67fdcb31875c84c479
SHA256ebcb51238439b7534e2436169a02e78fc6af284e70b050a8842f3534b4d69d2f
SHA5125bc780badcc1be85e9eeaa0635e09f9e880b40b1ff60bd4b4a474806a3e6ff6bc4811a0703790e1d57de5191d073387c4dbf0559ca117d699d1eb1f1344124f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7da6d5c9c35fc6eb0b1ea7b7dace44a
SHA18f5ce1391dffae5f5c7a5daa9c0229e9da139d8b
SHA256e324fdc7f25e34340a409d90a1dc8c1c43a3dcdf6fecc846631692f83b354f76
SHA512e9813df7c3f4a790d679fe1d999fd3a9e73cf6602b9ba5d838f4a322c4b0c9795288ef6709ac4fe9d34d349e59b75afd63cbf131d3c3d36137baead27c2351ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f8750faa3fdc6cec943979dc95e448f
SHA1043d759d00ab6c46b62a23c88356c05484902516
SHA256ce05d6a498c759349d69d2bc0c6181d139d5d3fd91b9d5127ce4293c0dad32d0
SHA51235936ec543d4b946ae3eae3eff5369e9e9503a212d5d5bb2752b005d35ede2302e12632482387e33fdd773610af62c4bd398c813a0bb630fbc4a284e3cc541b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7ddfd2d05f07671bc309dbc6c5a590f
SHA1330e23d83cabfa299efc49897a8c9e63b8383e98
SHA25662028d44daea65a1336f50c3043f94fad5e98a3bd9444b1c58406c923287409c
SHA5129c13225adaa94d6338198ce813c9d2c472dd611016e3252039c9241e7c58acfd9c971e545ff2a4d7749a8997e43c9f61d49ca468d5423db3154332386fdf7c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e7e8571096f6744f8dc27d76f0cc970
SHA1c5c09c28cf4428288c05854c497f7a2b791ed8de
SHA256699269de75ab7cfad00546800d177f832022a19dc359f547d8b7c300953a09d8
SHA512103bab855959ef404ae6afa29bb9d0238fdc0a548c1dab10fcae4fca2e39ab785a0de78ce6124fecfbc4dbd5853fa2919431ec307b692997850364e8c2c7cca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5737392a16a02888ce672626f5544effa
SHA183988f8fefe69e2ac03e8e4f115b6dd24adb986e
SHA256747775e464f5eb6344de67cde3d8b7367588a2c4a00dfc57c7c1d7d256067b8a
SHA512bd2b13098a6ec6ccc2de9d7deecc25f609cea721a190c17d1a1fad256edc540df4d6fbc349967bead0ad92dd7f4e2e9988ff02eb65a0334697217367271eeaef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a5930259229810d9528d0391d8e306
SHA18fe7dad0fc9b0a72447a95baa5654b16defdd122
SHA256aa3e133a36d503103b07d1e239882dfb6c85acaa29d62375abf8d6ea02c02fd2
SHA5129800b065930f3ba850731471335062744c8a9b94955f032d031dee500c8b1a9e87edb504e3ab3004e5f80bd37271b03967f6ce22a7276d116b99bad55870ab20
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b