Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 07:19
Static task
static1
Behavioral task
behavioral1
Sample
ddf0d938ea67928f2620c587896f370d_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ddf0d938ea67928f2620c587896f370d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ddf0d938ea67928f2620c587896f370d_JaffaCakes118.html
-
Size
152KB
-
MD5
ddf0d938ea67928f2620c587896f370d
-
SHA1
26ae39b41ccdbf316546abcdcc34b4c71fdf22e5
-
SHA256
c9c0594e95eaf746d4f959acdc09d545a204a46030f711fcb8d5aa1c847450fa
-
SHA512
736b3f021e63928432c93933b051d95e74fd227cb1524ccaeebabfc6ce07c1abdd75211073f2d9f40bd49432dcc5a7c23384943f5677fa97fd2b47ef5b38c785
-
SSDEEP
1536:SLfdPs4pbdQHKHEPUeSaohKr9giEdehKtqxfI9hn51m/1njhpx+ISChhH4yUCUwR:S2SEK2ZUKshzFlVbg/P
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8B9CBDD1-71A0-11EF-9816-E6BB832D1259} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432373850" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 1416 IEXPLORE.EXE 1416 IEXPLORE.EXE 1416 IEXPLORE.EXE 1416 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1416 1656 iexplore.exe 31 PID 1656 wrote to memory of 1416 1656 iexplore.exe 31 PID 1656 wrote to memory of 1416 1656 iexplore.exe 31 PID 1656 wrote to memory of 1416 1656 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ddf0d938ea67928f2620c587896f370d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e02562a816e2bbf279983413782f53be
SHA1f31155ef6e427ad46115ba4a8b4f64eee12f4765
SHA2566af2a43e85186f01f9a3db3212fd684869724e65f06f406d15c0df6c31618ea7
SHA5121584567d8d159a58f10fca3cc236225c3330e79cabb6163bd778f656efa0d616429c9edad29ea71bd8036761246f8f812eb137f784d623239952ed1d67d390e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525e087a86367417d51a8a248df134ec0
SHA1596764095582a2ae87f77dda91778cb57c8f3064
SHA256b0b01663a22f46046da7794eb14df996a3ab517ff42c8eec8a9bd6f5f5eff319
SHA512f2962b53ef772c2cf1c531a2fbc36ba362c1cbdb3f864990cdfea8c6c6f57a6e58d4a7cbd8560350bc476ce82b45e97e277903b71e9970084eff28bb9fdda421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f032724106b6cadf2a6d8953f9f2d009
SHA14ce26c801d6c11a856e64723f916758aad6ab59f
SHA256dfd8775973b363101c639bd67b119cde8e4f1b2564233dfa7cf8af22f102a585
SHA512c5e05e0760d94231bae6cf83173a93ebf5220083bd5c3bf5175b7a0315446d26c0f0353c4fe14a7dfa0bb29a9c58e08b32adaef2a528e865ddf63a2add516ee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569ce876c5820eb34492c826e21f6b1e0
SHA14daa70726c7d7439092da902ed9ef835a88b7739
SHA2566e267c5c845346c647d32242dd82e7f453cf39eff5962a07938bda28cb5cfb63
SHA51255f41b8d661ab50c473b219f6a0149eefcf05fc1eeb540c0c9bb6268d8996bb7b04e0a67f535488cfe1d9c4701a97598b0f7ed41c820f19ad8a12caaf31abfeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e939d342d496a6c754b3cde4d2bd764
SHA125e1ca2b73999152112a997c93001ad0736852f9
SHA256d64637fcbd5abb177327625285ac67fa5b3c20e7edccf640632dddad77946365
SHA512d2b68425cf7c885b68da3bc84020f9b08adb437c617764e85c98bde102c6994554fb12121b2c6ed52c9f91217e8f1c2183a722fe31bebe396f679196a4fb32d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5747abb14f136a9606321e02073b8d2de
SHA19e9e73aba866a07fec4e73e33e32000c2f3ac7c4
SHA256ada51c43c4b3c10dd0f7bfa6fd139b77ed21b173a60520b31253cf81bc8de227
SHA512416bb7f029355d864591c812e700a8a163b947d188d2448398e1455e4830e33ff002221f1de0b3ddfa86e69ee2e714953d88828098aeead2938d843ff07e8b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b8a22aebde3b4a52d76ea9d67a4ca61
SHA1a3f00d02c1019804fb343a849c87ad21b9b16ed1
SHA256c219066eecc1302c706b78688fc10dd8429890855a61051d8ce05da9079adc9a
SHA5126cd631a1905245f3913750c521861e8af9f84149acc3a8c6d06fc9c1365cee1e3743ee607fa1c2c005d609e28ab390e70620a7afe3093077ac5caa2b0cc49c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4525807c8fa7f8767a97ec7d238ac9f
SHA1a14d16c96bec405b97c335cc705f5906f8edd4dc
SHA256878fd0f1a6f16e5cbe09e4ce37b2a28332365d8db0101d74baf78b1489ce208c
SHA512a9b9cf26eb46006c79786b4138004f0daeae281ea969c4f3ddaeb428ad890b364f06798726dc8d3a6ee78e1a37276049405e11ec37109398d1e0027246ea0fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5516bd4445d80e915a0d5adf8e3cc0a7e
SHA1b8f814084cdc05112764ee061d61a8698f8649ad
SHA25642bc24ab1158c38b9a6a96aa9412cf629b20fe7b4ca4f24ffb0ed1c46b181989
SHA5122933b205344615942fd9c40af6fe68e7eb36b98f47d258f5a31d8926aa7061bd0cca12a39efdce4e16a4e8c8141c2fb75a648167723a97257e0f7c3e87414d37
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b