Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 06:56
Static task
static1
Behavioral task
behavioral1
Sample
dde73f8054db5b4542be86b241f530f8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dde73f8054db5b4542be86b241f530f8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dde73f8054db5b4542be86b241f530f8_JaffaCakes118.html
-
Size
132KB
-
MD5
dde73f8054db5b4542be86b241f530f8
-
SHA1
708f6a88e348758f7f17bb115ac6094911da9167
-
SHA256
94e4ae22fa683e0f8080d75f8ebabb653c8359f88353e28ea54c16050562c123
-
SHA512
35a767911be0a9b59fca2be776e5b10fc939119e053412f21182cdc9b106deacba53322d9125daddc2744a863dd9bbcacb89ff4574760eeb463d4dbdda711f57
-
SSDEEP
3072:SuDv4fSi/tGWyfkMY+BES09JXAnyrZalI+YQ:SQv4fSi/tGTsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5178DBF1-719D-11EF-A2BE-5E235017FF15} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432372464" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2908 iexplore.exe 2908 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2548 2908 iexplore.exe 30 PID 2908 wrote to memory of 2548 2908 iexplore.exe 30 PID 2908 wrote to memory of 2548 2908 iexplore.exe 30 PID 2908 wrote to memory of 2548 2908 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dde73f8054db5b4542be86b241f530f8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2908 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5855d3b54055e45189ecf971989d7f126
SHA199835dcb08482a711277d20eb41b6e8d8b979839
SHA25639b071a74acfee247cf7ff240c8e6c136bec85261cbcb33d1a7571b7e167988d
SHA5124bd76188a894b162310ef5f6dcf37847744a0e1e34dfa3517296b44cc9279b88f3395e9fc80bcf8d453c97fd3ce223c6317a8d7129861a8d027260b0e3910e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f637e3f0d3b328d33958f6b2b86ed9f
SHA12eca17bce2ea1c0201e7a2b74cb0c3347cbbed9d
SHA256a1b57c4e00632621531f1f55d4c3064342f2208e7c0d073f9ffb8cdc29ed02cb
SHA5121e2dc8a973ef1a61c4d8ff0758ac4b6dcae31dd1a176d5e832e7e50c7da86f607f027b8b2e41ee8e185d20a85f647d251868aa4403aa9b3614df23cc24f00b5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5646d1ce75c3c0f0b2d132377a429f8b5
SHA15824746d9c0b94a645811e9c2ebf654a021b86e0
SHA2563ea4037647dd316640bf45d1a1ad916b9466165790029abb530a6708341b6eb1
SHA512094151cc7a25065e557bf09a73bbdc76f68ee243e51ced92aa4fbfeae5247835da5548afd7fcacf63310aa8f7594178c018dc92f90fb85ee60f0cbf78cf48256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52db4c68d43334594db729942d6110ef6
SHA1c7f2c8a7fa6e7c08a2bc3873d0722b160b3e3fa6
SHA2569afb747b6f3bc3cc6f0e9abcfbc2e75bc2308ab208b809ddd203e9e8cd8df9bb
SHA5124151ad2c421d1a067ca63f4b7d9a75a00b38d22046eee0b2958baddd2cd68b8bc2b15ff06acd5f51652ec3e108ca84c359b838b8b3ddb5e965d7d710fa1775eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597dd35502468de1f7cea85864fdb1321
SHA1e72ebd5c16accf2ff0d3837846b0d2effc1f4a1d
SHA25686bb06a60a9dfded219e0dfd79e02049e944567ae5816bdd8ef9eb1cd51fb2ea
SHA51281880bdfe44161ebcc7c57239d1737d23f557b08e17757726ed97a98c183684572a06845231947083796b2cacb5be4190f7ba5a6b3fe2af5e3dcdd2fbbf830b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e3e05b171d5b5181d2361c1ff34611d
SHA1e676c58c7d4bacbf64d5e73be490b22c93610d2d
SHA256cced7939de98d3ec1f26beb378cd3fcaf59ea2458e7c22edd5286a2c65523f3f
SHA512ffd1842cf747b5a236164d46e2c28c672799d59e20141a6905b0a806b6ff521f2a63c401ecba7efac303b82a66bbf5d08193966d5e61afc738d11b90efe81d54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587b6014a52791aa52cf4aea6da1f3583
SHA11d72f146f5ae9ec45f7c89927533068e0acb1ed4
SHA2560af98f655b726a863e69accd06292d021f44c13d9e557116ba8fff495be35c73
SHA512cfa4fbd0189ee3486ba420ba51d042ff002bb3c5c443d7b418c70036f0180f6ec2140fb3ea964d722de5c8a5543650605cdf6cef2e971bb384c675af6ca46916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59badc43e324892721a97bcdc2820b51f
SHA1d0770835791d35b5bc386c44366030f2a934e9d6
SHA25625df34201ff80513fe9eb81244fca07a69cc752c4293a598d272e8d5abd0dfd6
SHA512ef01d8332f7ffa589843044e51fd64b1fb827a5b333edb323c6410c012bcb637bdddc064099f00018cdbd97989528766a4f46b61cda4e05ba95001924ab8d44a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5487fadd9fbaa7f6da720c5c2743d5e8d
SHA14a5beed0531a16f5b6606d876d2796d4d563f383
SHA256b05590c641ab4d0d8bd5688ac4e97c1c04ef04862080436814ff74a42619ae46
SHA5123887b18b2c3bb86995c04fc9e2f41cf46e532ef71a2876f2cea6ccd35f06544617ebe10bab916da691ad2de5ea8698472242d74ff8d47f9c390d868e8a6404fb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b