Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
032e85e2fb848ea9e18fec458364a2ae_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
032e85e2fb848ea9e18fec458364a2ae_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
032e85e2fb848ea9e18fec458364a2ae_JaffaCakes118.html
-
Size
85KB
-
MD5
032e85e2fb848ea9e18fec458364a2ae
-
SHA1
aadb793b90653748a5087dffb66ad976908538b2
-
SHA256
b8f0efc86cf515e03ef3272c6ceb9798a4a12b846239a36dc628318a9d6e8459
-
SHA512
ad3ee8a1aafcbc9ed937766af6e4ae1d15d4d3db1591a6de174920b1f16de84bd988a1a6446639f4662afc6881d43fce392c450889233afe4101b82a8e5a8dab
-
SSDEEP
1536:L+ipVn1BUNqvLKvr7R/rnVeWCUMSo0mjiMpbqqvmznhKv++nPLB1VJ:LBvLKvr7RJmiyuznhKv++nTB1H
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433890637" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17B0D0D1-7F6C-11EF-869D-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2164 3068 iexplore.exe 30 PID 3068 wrote to memory of 2164 3068 iexplore.exe 30 PID 3068 wrote to memory of 2164 3068 iexplore.exe 30 PID 3068 wrote to memory of 2164 3068 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\032e85e2fb848ea9e18fec458364a2ae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5956aed5b398b1901bb9a6b3519c9dac7
SHA1936870faf160c10f413588d76f9921b08b95b66f
SHA25613e8f0f6f339dfb3e9d4cc04f36e1270bc7901074b22b1053a4bd7578629ae30
SHA5127f38c10a3ac33dd338b4b40f99d500f24505e5787684b3c0d8c3b5eba1219dea3e50dc87d419dcc0bdd4b0f41b2da9de7a6b662c7a2e1ba3f6da19d9f2fc01cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5452f0009a54c4d8cb1f3215059a868ab
SHA10ce9a18be610995ca814e44138ea43c199c6d3e3
SHA25601fe8dda0696078680304972fd055caf1211dbd01797b28d9f8d857c70675d9e
SHA512e79309cd560969d3d1a3e73cc708111f1e88b719f2d15cad5d5de1bc1ad035b4944ee75990f7744d65d6e73262f50d57a1c8a8308e96bd209e68398b50e1f083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0f3714b84dd0253e666f8f24390828f
SHA1172f21c90a0a681b7a9313b3689fd7e1114adc16
SHA256b912b93f6c1ce279fc623184352e800d584bdbf5d70e0f1508d29cc0cd6112de
SHA512aba6913682a03e0419d08ab4303073905cb819f7b2f74d9b8a26bebefbb1152b419930dbc3c781298657ab634abb7d370d9d16e168b7df115d1d42c2ec170fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0a7db28f399280d92f25c71bf523ae4
SHA156434f90dfb012706312db86b2c8738d8b26c4ac
SHA25630acdec71da5b78de168047fd22d82b43dfacd619af0b2ab64ea94768375a9a8
SHA51259af95a2efe4460f92427fd1fbf15014dad7557c23423346d653fdc3c2e93519536b34a91589220a1e6c65ab4e689819f4fde7fde5d02c4c3bc56ee27981c77c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e237415981d08547f93b294d1145043c
SHA1e88c210dcebd76031c964b2d272bd043fd0229ed
SHA256dc8342059995ffcc43a1ad1b8938555bc85db6f3d4f5ee29cc718b01bb1886cc
SHA512195f6dca13aa0760c45b84868a2ceeccea8c479e717f768ab1bab25989e9f1390bd64bbdd734634141d3fbb2df2839f94505db4c2c4fcbd3545945c032eee6d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6edab3bf45a34569cfd9815e84a2d78
SHA1dd0314853e27d5f9c4e978e005b14508b5485d11
SHA2567d56da9d93437a36d524b35f0dd8b5fe621a3d25ad2809555a6450e69813b126
SHA51210c1daee951b8aaa9f87161c127360e692cb052eb30544ec1f3da8705d67a86e8f548d13ed45c6e470987e03c0a1369f54f2807172cac3eb1b8c29ab2d9e996e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547760fe8e01f59b39e2931f4f80f664a
SHA1dec0e59b0d124f32ff430858b23008d67c01b2bd
SHA256139db7803681a2fe57f5de3cebc0afa13972a7a9d8009593fe91411c323cbf4a
SHA51241aaa737b467be3a8463cf0dff4751c4c9ada2fb08b87c1fb31b593cac1eefe64b282d9931c815938e98c014e5176f364b54deb36047ad9c728aa01b6846c8b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56852a9e24eaa85454726fbc197aac8c8
SHA12e71ddaa7aa59dc12b192ef1a800cc485bf69c1f
SHA256ec37387b490ba6a6a55a6c0c10cb03ca0af82fe26bc4630dec1f051ed8fab16e
SHA5128789a31647519892da8aa4278edb2d2cfe271922734144506acfee00cbb76f651e2a4e6e0a3642854ee6a1c1807792d2ddaf8f6fcaa04bbf07b1f1b108322e6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c1d22c2c1a7418a7c3c8c48cfd63f24
SHA1152c65702da3e8d0ea8bc95fea347644211227c6
SHA2569fa318bc9eaea05c2d9b6bf750ec8edf9bb4f80d3aded82803aaeb800dc804cf
SHA512e65ac7a2c77bdc046f7f0f5abe7502b85575e2bc3635fe914ac3b06d3108d3a8b40d0777f49b5853b74f75111223d02590b029b406af5b63728d4445303de0d4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b