Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
fcb2a62dfe8b6efae3df24fd6be00ba3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fcb2a62dfe8b6efae3df24fd6be00ba3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fcb2a62dfe8b6efae3df24fd6be00ba3_JaffaCakes118.html
-
Size
18KB
-
MD5
fcb2a62dfe8b6efae3df24fd6be00ba3
-
SHA1
9bd274fffd5dcb4c220ddb13ca928160866f58ce
-
SHA256
9ffd30deaf22f6b46d43cb25b104049ba7938baa6ed70d9c375f61228ad7369c
-
SHA512
82dfe09a505a8e27dd8024797a97c5ed9a88eec24b65bf2a0c259d5a8995d76b05729c4bb067d20ba2479f9177b7e73771f80612fa89d063364cdf366343edd8
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAI+4WzUnjBhCE82qDB8:SIMd0I5nvH1svCHxDB8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{12648F11-7DB7-11EF-946E-F64010A3169C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433702939" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2024 iexplore.exe 2024 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2860 2024 iexplore.exe 30 PID 2024 wrote to memory of 2860 2024 iexplore.exe 30 PID 2024 wrote to memory of 2860 2024 iexplore.exe 30 PID 2024 wrote to memory of 2860 2024 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fcb2a62dfe8b6efae3df24fd6be00ba3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596cb98ccdcc87b529a1172d2075b1656
SHA10d42c9b173c453d7243ca7efe39f573d5de30665
SHA256795b59a3390766b1b2e2670b416513183ba589f7737709ef04f35af1a62f4949
SHA512008791aad0ef278109f76e485b21fb091e88e1acfc921dac3c56b49d1414c30da9552a46ac0582eb1f0933fa2165f2285bcc1af82715c885b4fea86ba92cd76b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c96fc898b8a25522688d661375aec3c4
SHA141fdbb4b253b1799370b06a3a2e7cf7d2df654a8
SHA256bca81c4951e0f02529682c35e744ba02f3c4bfc217b7b6a3c238abc00466ea87
SHA51256576b2ffc092225d6e0477d86cef3219e7e4acb4219bb3373dfdcdbb662c58e50b5f9e0666811dd69f0c5cfb8e822854121f926ab6be455928b4eb83a096d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6cec63c7434307818cadae9d26da046
SHA197ba255e079ac3e08c50f064c0a38dcc31c0b2e5
SHA25696cfc811f2ebe026da2872b9123614a3601fe5a308f365158b0e45b5fb0f861b
SHA51279addcde19ff5ebd20e9d4dd7eeb19ace95c2e40ba3bc25189faba9e8e8289585203b2f5c98b1126834d8971602c881cebef9a84b2f387ecf9fce225309d9952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bdf3986d9d329c3b8d6ca3a1c7395d0
SHA1529903588972e6663d972d58bc02077144185f3f
SHA2562f2682188ce39f0b977ec15098456081c51f7a3af5bc9e5027b2d1bfbf370425
SHA512a267a75dd002f6e3993aedc546804639a6898d8fce1b58363cc854a6000111dba2968e0f92ddfe0e102620425f0a3ca1dab8558fab192f4609e13242bd9d75e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52de605d8597142246f9358d8a0e76b55
SHA1363e93668e81e339fd38168c479ef1370ad5faf3
SHA2565dc780a40d3428298755e1b08fbdf61ea1d25f30c26ba6a333717c2d4f4096e3
SHA512a0d2e28972050259f766b70c0f7639a9afb9e8adcb477542a3bf36041c42364c9a84ad8f82c444f0ceab9f256f5f2b9a35439c003a518b8df9c20b3471753385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534d7f088d74045f5fbc83a5461e04b2d
SHA101bab3b83863bbc85447c187ddf69e5ae4a5608d
SHA256eaa7086c36c0548302206b0b9893f67ed582bc2b49b638db665b963b13673a14
SHA512dafef2ad1c4913893b18f50501c94d385fc260c114eb2155599f4ededf190642fba6927efdf61b58c4398ea46de2a1944c5e07c50fc28a391f9c7933865e1835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536ab94d557cd7133db2ff496d900a43f
SHA1da2f4838b5789feb8ee57f24117e49f6c9eb8c09
SHA2568fa0a43004fff264248f2e5618b0d88636ef2c3450abb6741aac88ff63dbb882
SHA5126dc993192dab4aed34557b354c9ef9f93c55c1988d49555433321d16653f73d7cc838b81c21963aba3ade212fab59e8ca0017e00e96fe4a0ac2cf840fef23abc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc59936f9d93a27a030e87f611bfe268
SHA1b4f53fd91e731f7bdf9268ac5e9c1deacd76dead
SHA256871e20e9ed926d31c3cd4ac1fd6f6143e0a4c9af8c12677a2e8f15aa35c48a13
SHA512b5482ad42905742f86a2c91ba544f2f4c40dca45637ef218a1d68e48e1616ee769b1c4e937c5ab8f106a2cae821b1e86392caf8564ae0d5a194b4e49e2e6beba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5826e95d6d05bd09e387ba8a52880f4f9
SHA1d590c8a92a5f138c24e3185a40d522f082c745f4
SHA256d411d2db3ebc0a186a4de929fa81d77e2940fd8f91371f73fb864154ef11ddd8
SHA51260a304f864c38bffaedffc15767ad1db044e60e0bbb6be1bafe02c5897df4482ae12605cbf7d584a1de5fa647e6043168aad3c33dc328d8f35ea478924794a0e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b