Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 06:58
Static task
static1
Behavioral task
behavioral1
Sample
f57289e18ce2a340ab3a6077bfc069c1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f57289e18ce2a340ab3a6077bfc069c1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f57289e18ce2a340ab3a6077bfc069c1_JaffaCakes118.html
-
Size
18KB
-
MD5
f57289e18ce2a340ab3a6077bfc069c1
-
SHA1
32ee291cd2aece8767c34be35b7d35d6a5efbb3e
-
SHA256
6d738e7980d2a0f93374f3632278aa332b9ee83aa38dc80e756f3401aee0cd81
-
SHA512
90c110b6253eee2f14403a161e1815b6cc450adedfe076672cc4fb0671a4b9c14b6fa38b3015ce002bf780cad3e877c0068cb176567ddb3c3403fd243e4e7837
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIg4IzUnjBh4C82qDB8:SIMd0I5nvHtsv4RxDB8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433409370" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8DA210C1-7B0B-11EF-B0B8-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 3048 2132 iexplore.exe 30 PID 2132 wrote to memory of 3048 2132 iexplore.exe 30 PID 2132 wrote to memory of 3048 2132 iexplore.exe 30 PID 2132 wrote to memory of 3048 2132 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f57289e18ce2a340ab3a6077bfc069c1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5603d71fd671f62b0c4421876ceddaf11
SHA11cb2fd79db5d8713d8e2a51736b09defcc773c84
SHA25638c9c74d85930aefbc07c51cd26bcd6bd365e7763ee2da3ed1b1fb4e78460898
SHA512cfc3000b2ee2bfc922909b7e5642dc038d26427fc9e62b6a9b14256b2b39cfc795fb6c451ab0b24518ff58b122e28a5337556799a26ead825e11999de98e9bbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d44524ef0efc58f0cb9a51207e2d7d4
SHA1d8a97d41fffac7374c5651beda23cd2aea10d506
SHA2563a97d0989f4025839ff88e41972e7b652c68335644a03841867e6f9799ea1620
SHA512d1a303526781c43b1b6c34ea5be40f92ffa3ee43271edbcb62282057b33d231839af239243c171da33536b591a6ac71a472e07d6257a3ec04f0e52aea23fc42b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd67158ca708a84d571eda5fe1338c86
SHA16ba00833d37c5c4e2599682081ed667cbf2a252c
SHA256f90c51188833129b76caedc22167828e90069dcbe306d4958e3810287201ed63
SHA512bfc04b59c72af92399f71b12d26d5e516b34872c6e94532f47f37fdc8c83d478c5ebefe9c3f3268bdf9c94edb04e668d272449ab1f357ac90efcea7fba2b34a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d28a532791e141e8fa64a96e0f32a136
SHA1078b0c738aaea86ab887d7d2f0dce9675e287309
SHA2562130d649f29822865ef102bb31822bc9ff92103bab1d589f70f003ca8c68305e
SHA5123c25f6c6b5ea69a67426327b8c5849a4456d619d526f0dd5998675a5d17c36af77e39222ab625311a7604080928635450433273a62e7aea93c83e912ec992aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e469bb672325117e545d9d99c55ccef0
SHA18bf521aaa296156090917882f4575445df15003a
SHA256b1dfc92b77eb16f696515a45178b9c14d6017c10837d50b17198c8d9c40a827c
SHA5128dc80037ebd19a701c1b9ee97dfcc87df9729919f88e2878a513da13e7ff7b922aa03bcc6a271a67f5bd0a5572f303e91e3c19e1d51591816fc6f1f21c2ba843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596fdff960a2749cfb82a24a2e9f178de
SHA11a7c2708d298f64824efb35ed8a1e2162e3e9744
SHA25608998630ff52e04d967a160d1f5feac71b0b4444e8c03619ff31276635baa8cf
SHA512bfa102f39367786785a562265d83ff7ed5e8383d9ed1f86330e34e72c66eeebef517e229d25b314e2255ecbbca7bee69c8917fd6f7592d35d767d4b37cde221d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5526ef36e2dd68b1b7b4edf4bb6bcd147
SHA1c2fce6471714071efdcdb3b8d6b359b60ec0e4c4
SHA25626081796103698f194a8f05ed511ad4e9d009d8d2ed303c141155119f18b2b7c
SHA5124f6fa4413f327da3614411e0b5da2db7c81a7aefa617ca3e7776ae9eabd2f715661461f14ef322e533e208392484857fcd0a3ed11475e77466cbbb8b3ca00c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50186a875b819e650567529e61910adc3
SHA1e5139a25c931521629fddbf3d52df79b8ab873df
SHA25682822335d5b49c8cd6e27e9875f637a86a44fb249f68fb5e096319c068f17630
SHA512417d246878c67d66796b7c5b95ea820fa1887120a8c7fd560dd4ff3b1c670644d273fb32e60b91fb65bc53e25de5ed1294c380cc46946652a50137e749d0052a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5171317c4b3d5bad6ebc706caf0446a8e
SHA19e0288f983587ac3a64db245d8d992470da4cea3
SHA2569d5849b750903f153e63507f7f3cfcd782a29ea8e9afe0e90a94b9d0cc8b4b02
SHA5129a33da76bedcfdab81e7e0cf78d085561ab05039dc95ac7d157f23808e8c7b5beeafb3f87fb2b6166a5b886e7578462bb1b22151faac59a18a9fd287c71ac38e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b