Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 05:38
Static task
static1
Behavioral task
behavioral1
Sample
eaafb0a0039fd22a5397480823d05046_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaafb0a0039fd22a5397480823d05046_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaafb0a0039fd22a5397480823d05046_JaffaCakes118.html
-
Size
200KB
-
MD5
eaafb0a0039fd22a5397480823d05046
-
SHA1
85a824ce2307c1dcba73bd5e97374c66bc64b998
-
SHA256
3e725ca4634c37dc953ab1e26a23c58ad4799f95bd6b91a025872d29ed73dfce
-
SHA512
4c3f428b1ffd88876eec9ad2b3e29c44eaae38e107274a3f5f5b648b30d82b9479798217dc92ac6ec65d407240bd9277cb0080c0382925f95bd8fb2b890d19ac
-
SSDEEP
3072:ZxVveUCyfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:ZvtHsMYod+X3oI+YS1tA8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76FE34A1-7649-11EF-81C1-5EE01BAFE073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432886204" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2588 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2588 iexplore.exe 2588 iexplore.exe 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2588 wrote to memory of 2424 2588 iexplore.exe 30 PID 2588 wrote to memory of 2424 2588 iexplore.exe 30 PID 2588 wrote to memory of 2424 2588 iexplore.exe 30 PID 2588 wrote to memory of 2424 2588 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaafb0a0039fd22a5397480823d05046_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2588 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b50a7810c7682034091b3158f992fda2
SHA1b1ca4ccb0d088751baa737d508fb2632983546ad
SHA25678641b3369504572e4344d93cd636ea46628450b417f83005a5e593c0886bc0b
SHA512b95dbe17ce8571819113e1f3d87c6b4bd551d614c9878b5c79c9c156bed86cb21029030fc460ad7b675599a2d4cf420d3fd601262ee52a0516b5763895b58be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bac49587f36cc406c3ac10aa4dd55643
SHA1bf5eb0c132eb72e58aef2260728c8d2bfbd9c352
SHA2561912dc7772329af0875bc0fe20d9661f2ef66bf90a2eac9ace623ef7fcca7c8a
SHA51267f6e12144c1bf8d527e81eca41266d83d1d406c2b9bca7ecefa218bd60d3d258dc03b4f3e6c10d5ff27d7f400ce1a60dc66448a911367402e01b5c45cc77726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbba934c263f50a3dbe7690cc31bbc94
SHA10ec54c273035be4a214e217032680cb170f6440a
SHA256a0c481bb547b4342d226e56a11e7aef98847160467579cd5601527ef15328308
SHA5128dac79903f0a3bf220f1d65b75182bc7771febaa047d79571dd28033b20c1624bd514f240d0047c9f810d13957f3d382622ac10dc0fabbcbda95b1516faa1bd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5151bde5c872760d561c4cd74d32a837c
SHA117f00c842f710daa86ed522dc2f42c56cc31b632
SHA2569f13f201a527a514c574edb25e6254747c4441d6239e94c00cf8c54605df763f
SHA512d7b8de32c5534e721016ba9975b39c1a1a5ed1a410192836e9eada2c6a3213c051c63bec30e096e64eb97365dbbe7705aaf9cbea7bdceda0bab7a2ee4310ec19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6eb503d6eb9294e38e471dea631d1f2
SHA11fae6406d844b55a541eec45ad336dbc0316adf2
SHA256b0a08752cadf958e34bb70a1cbf6b59bd5e9e119cc60aeb7cb38c7558708ef6c
SHA512974e29b1d9c5f68c0af90478895396d73dc9871b46f3a523084ba64a6474d5ea6e25610a1da9d0587cce7e084e01695cca89ad997eda6463c8c7b3c4f8cb655d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f04450080a8fe3bc84e8886b8189cc2b
SHA146220b64b7d868d865619f5a7bf6d3d642fb58d3
SHA256e114b439173c29365851df014fe29f9adcf453186fb6df0a59b803701db022f9
SHA512f857845588748504719c684eada70d6eb0d4e655737500295a25c0e241c6ab3f549ea160c2f5d77c6b8dabe30fe6f1640b4ca1eca408e8e4e6e11dc8797f262b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be968e93f766b5a2d63cdacad33e0a5d
SHA167cdafdf9990629c6429a51835a7ecd7a398bad2
SHA2568ac6b062e6aafafde287576c7620c43fe454ad0972fd1a7ac0a3303ac53e72a2
SHA512c282ca9ae11dc4efe5345b17ca079fcd6d04fb7a69d4f0f977c70fc3d0e4f4fbd89df46d3180b612b063af373c6a0aa746c2a5b4d2273ebace02a8177b99ed24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a2ada6fce1bc0e2735e67d91b673016
SHA15e75773e593644a9fdf9e6949a7fa7d82907843a
SHA2565072a83be8de6884c74e9f9e050cd5ac9fe0051fe813dbb32ed75ccb1dc1fbad
SHA5126220f980569ce043d7616ddaef12830bb9a0700cb1b6498264d273122d711fd59e964e5e6cf981f098254a175a128b6de950f4ef75999f642958a86e62474f07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1e8954f71ccda85cfb4de1a8e375b31
SHA1dd1e7d0db3643966b760585aa132fb11ba3ffdfe
SHA256579a6f8cf4e8789a698f1aaf162c2893608d85449119e744f9f202f24fe2b26b
SHA512553fafe7a98629446fc5174a674fe52899ef56822f1357dda5c84fcb0788ae80f52ccc0b592229c8d51db8f7e66932fa4298775857a1b755f21bd1331504f506
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b