Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 06:43
Static task
static1
Behavioral task
behavioral1
Sample
d9ceb91cbe71b1ab232f29843ecbc108_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9ceb91cbe71b1ab232f29843ecbc108_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d9ceb91cbe71b1ab232f29843ecbc108_JaffaCakes118.html
-
Size
45KB
-
MD5
d9ceb91cbe71b1ab232f29843ecbc108
-
SHA1
ba555c10804b10fbabf390445ea93d2e3c4ac3bd
-
SHA256
b5baeebd601491dd7abaa10d7ed450ed17f5ce8f1f454305d7e1ddc4d367bd3c
-
SHA512
081032fb4cab530ac0cad3c8f31a9aae9af09fa1c23f64b8f8a90cb8d8d49045bdd0fdb476f96756af73b095cb6ec51b57e2a9c072022a0ecca1eff24a9137a2
-
SSDEEP
384:FRpPr1TtAMJ6eYOlMXGz4x0/uyONy88FMKMlNeOC0Pff:vpPr1UeYO99pbZMlNt13
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{371859B1-7009-11EF-9A84-E699F793024F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432198903" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2392 iexplore.exe 2392 iexplore.exe 1488 IEXPLORE.EXE 1488 IEXPLORE.EXE 1488 IEXPLORE.EXE 1488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 1488 2392 iexplore.exe 30 PID 2392 wrote to memory of 1488 2392 iexplore.exe 30 PID 2392 wrote to memory of 1488 2392 iexplore.exe 30 PID 2392 wrote to memory of 1488 2392 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d9ceb91cbe71b1ab232f29843ecbc108_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0e5161f00ac195b972204414c0f42e9
SHA10673f591bb69ae45e0b69ec1662dbb41f53e030a
SHA25687d02fedc6213f08f3102ef8d42e70777b797caa35c6ecec5f070a238b04db57
SHA512760400b520f9a5f6c41ac767075c0eb805f44d383b54b6818a3ee074238f665125df7cd9c0d5a180637d1d900de6158b09e03cc2c827185d62b9f17c6ea0d93e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539b413e256923246d4a50bf614e2a1d1
SHA1b8a0b8b917e23fcd3dafb59af3f19f7e49a33551
SHA2568dda6f164a309c35da033b5c01598f14215a4a42e2646b3e3f3bb3a59335d1c3
SHA5125b861f5b9a70536d359874b33fb49b717d153d0d57daeeaafb3fa61cee68cb7609b3aa3347cae9052276c28217f9fb573c027f6e6e76ecf7db8a86187764744f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa251aacb00a80c3ccb5a1a6e5d17785
SHA1d274df534fb6fb4653ef2e5e328eb7a21fd437bd
SHA2562743c7644d28ad273d94c2003adeb96841126db65f6298b156b3126200bf3115
SHA512645cef132fc3c95acbe322b1615d7bdcfccee36313c83df307c09268a3c54b4d9249950fb6813231ac57ea62f0f2df4e7c550a963399f2d3791ce2de408219e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5263b986838530a76ec5e09f0beaaa3e3
SHA150441576509aa5a8c602dfacacc497cbdd08eab3
SHA25636f6c26b06f5a01e507dfe51c83a7dea8e6d529f0cb34c2e0314b649f82c5442
SHA512b6a046420d64f2aa7f79f8806884729ae83744ca271501b70f026e8475e448c17226ba0d9e0bbf8176798ce195f20da4d43f5225c40c1f81190b699cb1a4a929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb1fd764c206852e8dcecf8d97156a1e
SHA1942a81f270f93291cbf1a72c35eeb2199ee1937a
SHA256fa926f7eda5cdb972cf8c2b5f7e92b0b28603d1a5c49c9933085b96be66e375d
SHA5128d005bea18fe7e559f8646156d934ecd201f61e9e6ba8a1785406a63957055867b49f008ca51af38e7454158c5e090638dbadec2d0b4405cac95e60020b35a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570305482954ad0948e29e9635db480fb
SHA182108f1ce70c3d90067a0414a037d3b9be00c6fe
SHA2562c3673f702117d8d0150b76ca667cd84f77bf379ff04b2e9824414f83d82b6b1
SHA51211b71961d132a7244dc6319e47dd165bb8c953ae3adc5f665da18be98dda394527d1844c73f0b1ebc1e4ad1a2f8032a860c76eb61b81feb5e9beef36b64c3b5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5651fd7f02fcb913eb4edc90ef0e281c0
SHA1a1451055221a059795f8c15814fb007662659e75
SHA2564acb20eb0208b320aad53f47d5da959a7a0d9795f536c4da07ed6c9aae2abc0b
SHA512fba22fcc3e3ec1b03c19482cd0d27227badf831bbc05dbb1338e47d7daae5171bc9a88af60cb55e9b433b7d14c8633d5bbf7190265d6f9a4a8dace415f3fa8ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f2b806fe98fe0a8a5f55591ff215b8c
SHA15d2c65b47e9ebcab64abe92048f94f36b999d35d
SHA256f914dccdc5c53b21e0ab36ff2f44b27b7d43c8e378e2efd273137089c06a6499
SHA51285cba9032994e1846c2140d3e533d264195690ed2e4e015a50ccf885e0b466bf10fb35306bec6babaca27036c0e4c00b5c5cf8b6e0ade7aefa3dbb6f7e56dcc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccff876e700443a51802b7e193794e13
SHA151b61f02d064c0ab40aea3f3e6c11d73a28cf345
SHA256009734f666f17d30e5e77a80673a8bda1bde899013b49b9c949f49043f9c1f5e
SHA5128df38e70bac4063782993ceec5156621726508f80a5005f187ea98a16c661aadb53f4104671307526f735268b741ee675812336fc29d0e2369a408b27b695353
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b