Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
68s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 17:47
Static task
static1
Behavioral task
behavioral1
Sample
06c9294a7e3f54f6d6b3cbde19d3c66f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06c9294a7e3f54f6d6b3cbde19d3c66f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
06c9294a7e3f54f6d6b3cbde19d3c66f_JaffaCakes118.html
-
Size
12KB
-
MD5
06c9294a7e3f54f6d6b3cbde19d3c66f
-
SHA1
95fba29693c5b32ec3ab72f5330abdd9b7ee533e
-
SHA256
9e9dbcc5d6060cf5cbae892785b8ad732dc4df3cb67989e8d7d509b1548a229d
-
SHA512
14df7e82fec8d1be17eeda2ecb8b6f429cb3494da67b8f175f09838d27b4a0fd2023e8e58475e6a8443a7424f084cf0fa1bd3cd47d8db6499175d16c2ebfac70
-
SSDEEP
384:sElIcMVfjGt/guYB3Z/nNYeFy0Psw8guLZ:zg3dhkxLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C901081-801D-11EF-9B59-D60C98DC526F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433966722" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1140 iexplore.exe 1140 iexplore.exe 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1140 wrote to memory of 1324 1140 iexplore.exe 29 PID 1140 wrote to memory of 1324 1140 iexplore.exe 29 PID 1140 wrote to memory of 1324 1140 iexplore.exe 29 PID 1140 wrote to memory of 1324 1140 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\06c9294a7e3f54f6d6b3cbde19d3c66f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539fef95a70817051b843bdcff81ccc0e
SHA13573b3e1d295d018444abd2f5a2a3093e70e0439
SHA256662a1557fb6c943ca020c6696c2949c78bb82248958b5a28a60cf308ef483d90
SHA5123ea8a0575a23ffdefc4a0bdb74d8bfa8c476f9adc0738944bc1b6fa42af2886c12ac80710ae27bbed579954212c6868f61ccd7683d7eba7e6fd20f0cf26de3eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b78f6447ea457bdeb23963cc8ec0d322
SHA1e9b6594b4c5fceaa0a795db8239e71a0ef94abf0
SHA25676b04084302e15cf2ad6fa8e00cfe011910bce6a8d9171f48227920db819bdbf
SHA5127ba8bf8d1e5891410c1da3a60160cea77010ff621b8f78a42e3ff942b275de8360b3971d9018ba3b6d4fc7a0f612f6cc502d8ca258b87ca7d18c2167b2c6fef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef7d60f89a9b6500549dcef18b6da93e
SHA14ab7fb2da9e05eb74f6330410bf76fb934403af7
SHA2564e6a401ebfd40fb7c7746a461b52ef472038bd016377d9a4e7214603894f9a66
SHA5125d765aee59a29255722c8a5bb7c3ab019129af6a629102cf10ccc1dd9311f247d0950fc87200aef82822a97228ecde6f266c6523537de4eee39889dcef283006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550bf4418020585662dacaac15062fd34
SHA14eaf10ab505ffdc0a8df266fd358e6a9747a62f9
SHA25625195f3dd121bf586d05c835b06d8f7f3b9e2b625e880f7b4cf018f3a9009c98
SHA512e029961feee1bd4f797507f531d5ec3f4fb39c4a01ba339a50b198e75e11dc7eeb0a83c1eb97ca9e612b467f62c9fb5c8d54ff3d511c6ffd35e3544cc5b6b6d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52639984cd9b581531c2e9a6d1bb2a9d0
SHA1853b8608909ae668f71a1c53e55b035c0a8449be
SHA256efdf6398dd9df70ae1d4a784acc62ed7fe65640635f4dc4b77b2a0e502aa0a51
SHA512771d841215222adbc83b692053d351ad69fbced1509d5fc198b8e4242d723d734b8ddcfa3f49b782440dc5d7c56d1958bb92169a98afef76a0d1cb11abdc2b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5281e9cd6c12f3abafcf63c610f94367f
SHA1f035847186230362a9a5c2701d06dcda37cea1a6
SHA25619caec9a24da9187fa2ce39dddfb882962810d75d90749b04f7b82c2a86960bd
SHA5125b10e68b3879a704064c71d558fa3a73929aff3859d93dece399e82843d69bc108acf89340cfbfaf257075eb2a5ee727622e94216dfb6c27429334b121b43b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a9a894eee899e137581417c396b0b82
SHA14b28024722d412cc652990e4148862d532959278
SHA256d80bf1d494ba6049b4d02fecb0627514c4fdef8d84558243cc4f7ca90feae020
SHA5129e9ad7d8461fa38a8902baa2bc4c7acffb292d1f39bf5aedf746144ef018fadd76b80dc4ff989915561dd21ce4b1f606ab9c0492b6d6e275ff34f44de4032c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fe748fb3aa4ec4dff309f958a3aa19c
SHA1b5f923ffa2685e7ec22ae9460a4cae2202eb2f40
SHA2567a4903896ce2b2dc6b46d0a114a147d9018e625e4ea58d426e27e71acfb34a67
SHA512dd1d7218d00e20a0f5306dceb5c00ec71e1d14ab0f2582844f93a973a2fbf6dbebfae8dad061d03b7e72d3ae7a7e8ff754bdfb3ad693a71b002db0b9f62d7986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8f2b263f118434d8e67cacc33b6915f
SHA19735caf376947847ed448c547a73e1dfb829dcf6
SHA25624e2a44dd81437c85690d7248426873df5fae438a9978f3d987dfedcfe06d896
SHA512ea6db39373882f71d844bc57d98f1efe2d5433e8a86a6f41c51914e00b5bdb4f19aec5685cbb81d182a4a20a9a08f2bde7f7824c54468664e6e9256161d410f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520df77e2d60a80b619bbc31aa3180c63
SHA1a6ba561b89b0e1833bdcaedc9f286cba170a4ed2
SHA256d3e185d3b6855f58270988bb34dd93e7ef5bfe246357cabbd2efce8b1954cbf9
SHA51282e2d58255cbd05d04ea0354ab1c3ccee2fdb85abe3453c230fe5cfb69f7c0a74a55b20c840e5f11ff90b686f13b2deae7df3cd0057fbf6addab550826c264bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cda7e953540f2e938f12fd9839fd2398
SHA13a78d26252b273f2f6345b5977971a0add5cadd1
SHA2566178f942a69a867aa8274e01af10daa31cdfa6eaaa48198b2f071c37b52f8b64
SHA5122a3a5e258621d3ec6b16275f153ff8c2e7e0f864004724ba6c5d93d8ef8eb2e137a21730a4f9b3ae93907e4312f8751b323d7fc428210e32429893ffe2952c98
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b