Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 11:54
Static task
static1
Behavioral task
behavioral1
Sample
eb480553dfb0a9ac3455bfb78ca765b8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb480553dfb0a9ac3455bfb78ca765b8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb480553dfb0a9ac3455bfb78ca765b8_JaffaCakes118.html
-
Size
1.6MB
-
MD5
eb480553dfb0a9ac3455bfb78ca765b8
-
SHA1
5cd7ef47a0d4c6311d026150c7b5a0cd223b86a6
-
SHA256
bae00e9ff1b1da597e3fb591cb4ba96639ef5270688d775c3907effe0a380e07
-
SHA512
1d68d447dca220a8e912ac0ec425122fb4c98bf6715b3da3937588a71f395d6c2ce5d03dfccdaf1d971e21ef7e34cd5e08a1935a88b03283c7f23317cc81f155
-
SSDEEP
24576:q+j+P+G+g+h+y+j+PP+C9+L+t+k+m+/+L:n
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: IEXPLORE.EXE File opened (read-only) \??\L: IEXPLORE.EXE File opened (read-only) \??\M: IEXPLORE.EXE File opened (read-only) \??\P: IEXPLORE.EXE File opened (read-only) \??\A: IEXPLORE.EXE File opened (read-only) \??\H: IEXPLORE.EXE File opened (read-only) \??\I: IEXPLORE.EXE File opened (read-only) \??\J: IEXPLORE.EXE File opened (read-only) \??\Y: IEXPLORE.EXE File opened (read-only) \??\Q: IEXPLORE.EXE File opened (read-only) \??\T: IEXPLORE.EXE File opened (read-only) \??\V: IEXPLORE.EXE File opened (read-only) \??\X: IEXPLORE.EXE File opened (read-only) \??\E: IEXPLORE.EXE File opened (read-only) \??\G: IEXPLORE.EXE File opened (read-only) \??\N: IEXPLORE.EXE File opened (read-only) \??\B: IEXPLORE.EXE File opened (read-only) \??\R: IEXPLORE.EXE File opened (read-only) \??\W: IEXPLORE.EXE File opened (read-only) \??\Z: IEXPLORE.EXE File opened (read-only) \??\O: IEXPLORE.EXE File opened (read-only) \??\S: IEXPLORE.EXE File opened (read-only) \??\U: IEXPLORE.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432908734" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EAD1A4A1-767D-11EF-B2A2-C6DA928D33CD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2700 2368 iexplore.exe 29 PID 2368 wrote to memory of 2700 2368 iexplore.exe 29 PID 2368 wrote to memory of 2700 2368 iexplore.exe 29 PID 2368 wrote to memory of 2700 2368 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb480553dfb0a9ac3455bfb78ca765b8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5769fc1bb06bd2d70b27b2cfb3573f067
SHA141258acb7ea30871f2404307e9216efc8f49537f
SHA256ad715c3e2e30b89a354b5d94d1ac7ea19d6615ca6cd106a35456296a4919a8e6
SHA512fcf6e5274c4896373a4a5de5d6520417c14da599d7d6f4c490f7e17225bb7ae191c5f334055e7697d6b16c51d385b3251bc2c51cb6f796332842d4623514632b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54236a45f2b24bac8d00ce8344e5fb5f4
SHA105d637feb8bc547da8c600a46497570a150feca0
SHA25626dcd09553c69369a8d5d306076276c75b34ef83bfa54bd728f2bc74f90105e5
SHA5121956800ff7926ed8b71c5804a243d6fc66f5233cf2d0b6602591990b88a7d9055f97970b1efc56f1f98bfc8150996f41b03aaa1f07c6de7df79641087dbf28c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d07b27b9e6a7dd8032d9abe36e6cc20
SHA1e8ea0531d7e6bba887947bec6728e5c74dbe85e5
SHA256c786a635dac65bda669751aeb6302020544c1bac0f22de3a75faa3742015930c
SHA512c9065aa6547f9be17cd1294c88f27aadd0e64ce5ceba64297a651f58e0e76f3ab2d7cc7b234e0ab8483ed99d678d56c92713aab73d7d03895c748123de80a20f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a0006d9619bb46b2a8109bc970b5f40
SHA15994e7ca90b7ae4ce6a29872100dde54d462126f
SHA256e32dcb4c24ea535f944c66fe852d3e3e9cdb67664369281a56bea9e87e838cf6
SHA51277df3dfdfe52b8a9fe5b2d27b4071d08c65c1c9cc4c78f976854b8c9a294bd4809d7462248a07e3583ab5175906134f9ab4e58166645216645b666c333564353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536452cb4cbe6e89e449d1dc65cb547c6
SHA1cfdf989cc30401ea3fca0d0df0fdd24043dcf094
SHA256fa61c05b00b92a3e285709395628af566639acd5df5738f0939a06e6c45dd405
SHA512ca3fe3429e8c2386a88306bfe1b29398b1da472b902a8751c66d5e5db7a6b169f417bd3a5c107a24286305cc7d05914722c5935becfbdb38915fffa45573e682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570be8f6f27efc67cdf7113597760facf
SHA1965efe9e60d0431adc8c45ebe118e7c34383264a
SHA256aedc3a465bfbe161f5a93122f9586bf989a2ec7b297bb3101998f422d240ffc5
SHA51286bc91b894e6b2ec93e7d6f49426a46f1ee64b1e3f405afc126c8f6404f90f075b432cdf883509f83f3a5b9ec6de2a6e114bb3a0db836ad8d1b7528b154d0cfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df190b2f038e96babd82f5ab58195806
SHA1ceaca9cb2fa1c97bb1270cbf4ab888226d05d756
SHA256844bc8d262a166d56149bb4fd63ce82af522e51aa33a37329655542f9b11d9e7
SHA512d32d1a3931067259bd008d53853f681ce6ff807ef6d61c9d40b875508cb7eeb165ebebb3a6ae190f91887ea9f0b2890eb5017e40be757d20c661e01bdd521675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ee911a86be50dffc6d80b459051ec6a
SHA148a8bcecec159a595666c44bc0e19e4aa0505343
SHA256127be74da4facfdb32c20d0b1d9d1f35307d62f8ac6607601a8340bc5f9f061f
SHA51274c068a45b3f08dca035eb77a781be84b954c45c8ecae867ac4efde5c36a3247f766c4d85e76ae36ae45ae2af3b27dceb4547f085651265ea3b35fe27f97b99c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5070162dd7a79110221749ccc66cd6a6b
SHA1c3c4a7c9848fdd544465bcbce76ec9e39365f192
SHA256c9378087ebc69775e7c1be193199ae2131e8e791e061f2beec4785a267e54666
SHA512c91aedd988fa44e8d810e1277cf5842264320bfea2c4dc6c179f2fe1e77e88ffd18a35348792605431da9533503259b727609f05253259fe5993f5b34aa0376f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1ebfd6af09f5fdfd32967e20c821ff3
SHA16087931efe5717a141da69bf4717d40c8e2bffa4
SHA256a1e6d8b6966193932fb008d172e9f7f9b5f7652ad31b9f19efbb620168fba2ac
SHA5126645774792320eabeb702250cbe9abb8491224ed710195b2418a72215582ff1a78290411abe3fc943b65ccbead7d71014d138047c8b046558c1e50c9f6b9a2a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bbd5b5fae0cfa2ec3c94ecb378e5f22
SHA1e113482191103e8ebecb139b50a49063a52da950
SHA256c3fefd6f9fd896d57bdabe62009ea204f5302420b544ba921c5e2cd0f73fab88
SHA51206a335f985525fc3fe46ec828142f741c5dc7984e1ae929a9e3fdabfc2b533efb39c691106124ac2639cc50177c587160ee1a305b8c87d8f9fe332af70f78f03
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56KJ964X\btn_srch[1].htm
Filesize133B
MD5314417833b0d327beccab7cb68cd4f7c
SHA1f6bed9edc9ed8e9ff928194670f5ec3eda2763e3
SHA25637ed866abc19465aa2172d651bbd3ffe2836add54ba3065ff7189f1a75410d9f
SHA512c8645c0528d9b7309b2d6870f8250384654db64fc605667aabdc26d8429a1d03d3306a3082b22afff395d2e1669317dee96f9c6dd839ca440283cb2fe1a223ff
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b