Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/10/2024, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
36fe6e7bffc50919dd13ffd7978ea311_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36fe6e7bffc50919dd13ffd7978ea311_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
36fe6e7bffc50919dd13ffd7978ea311_JaffaCakes118.html
-
Size
53KB
-
MD5
36fe6e7bffc50919dd13ffd7978ea311
-
SHA1
1369657bb4d12245fb55addadd919479b7d7d71b
-
SHA256
7025403972429f95d5596ad75b1e379a767135f08e77a8e7c84731b42118365b
-
SHA512
bd0141ebb22bbe1400abdb051436eaa7b4206a15786a3ebba690e5ceab8d6d540a44bc7878153506e8b62ed7b251283ec9776e4d1fd54f5526d5a9fd161e232d
-
SSDEEP
1536:CkgUiIakTqGivi+PyUZrunlYw63Nj+q5VyvR0w2AzTICbbco5/t9M/dNwIUTDmDH:CkgUiIakTqGivi+PyUZrunlYw63Nj+qP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DC425561-881B-11EF-875C-F2BBDB1F0DCB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30a127b3281cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000069be103fee703568f392fa35f082e4fd7fdda05fe1e810dd8226d830ceb810af000000000e8000000002000020000000510c3f2aa9d4a99f2c742219f3154dd26826f4aa718a8304cd232d996ab275ac2000000053b96a6352c5d031b2ed3a4a5a386684b3a93209c83a86e9c4cd7778b31e7ccd400000002be2267bdd05b71c29ffae51f85942c599d91ac388ebe6c09b1385ac61fd4f0bb5385b5ad862095eb3eb92d742d597a6e34efe9ff5fd31a778d847dde1cb892d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434845739" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2428 2524 iexplore.exe 30 PID 2524 wrote to memory of 2428 2524 iexplore.exe 30 PID 2524 wrote to memory of 2428 2524 iexplore.exe 30 PID 2524 wrote to memory of 2428 2524 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36fe6e7bffc50919dd13ffd7978ea311_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d57e37f7d0f6024f5353f884143f4c1e
SHA15550994eb6dd824ae1932e8f8fce5fe711340e06
SHA2569a7d311da79f2c3fa61d36b300b0f9eea48e8e75ecde3be82108df52c70b8c5d
SHA5125b5f53a465017a982d043ba2eaf4e6c156de25a087b4fa33a6e5132d6c189187457b150991ad39a00d3aa7f0c626fdfe78d2dad09b9dd9d716c70f7abd443afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5994671589768c2b4876df867bd6b7ece
SHA133b3c6c194dca67a720a2fae103a49b5eccd4f02
SHA2566e3dc29aeff99088f939496dd70897426f983ac376d0f9928b51d342c9350ae0
SHA5127ca0ca7545f75ba9ddc36ac737ec7b5aa9b114d0106e88bf8e68aeaf976a40b7c56cbbdacc3a7300c896799ba8bd1e852f70f8b43783c8f6c4cd3aa12b98ea27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52238ed78255c69a3808aad8b75c11f11
SHA1e41862a4b700b3d1a398c31e0cba5eeafbd3afa0
SHA256a99fa0b409e759264e4f1d0fe5c453b68f678f10c837750005f37df88e48924f
SHA5121564017477fc761d12293d484560d2e7d6fc10069fb6bbb54b4334c79334c83bda17ab55ed19ba66a8698063a6bd63b290dd3e27c6f8caca186b96d8c44085b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc54dd8d8498ce86bf6c2d53398b3ce5
SHA1a91254f7ccd163304658935cef7d16d7370d39b2
SHA256d0b77c56cecc9b96024f658f4b4aa9f088e89537c29e53d3f2bd905c60b014ae
SHA51252d4ffc4ad7751e5a044755a49f3b020204e97037cf10c25dc03c7464200403613661461840c9400ad0e3b8db44bcd1401e33704271262e186d5cc710ce34b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c77faf17dfe3748e8a60437dbf65609
SHA10a9b00a8f67b6697c2245b9d495aa9f8494114e2
SHA2569b6aa521e4244347c46ef0f8e011062603794e4e5054a4e62223b7bdbce5e09c
SHA5126660d1f0f518d94bb56c007cc59eb7491063a4b9bfe04e162bfa9ea3b32d70eb9df6c79308c3caec83eeb475b61754de1a774b5169016a17c7d2a448dae96e1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ea2620641aa3f0118113f7a92741704
SHA18025da9e56e17981042d0b53d52124c5f148500d
SHA256c00115d236b9d3d9e36c9a413e45795a7534a542feb3d3d2a940e4420f3844a9
SHA512badd8f0873e7f4cbd4cd57b1d2f2ad4b7ab9f8ba49992099a22bb4b2d8e613468fc48347204aa43760db324842a2956888a0995b3c751a82a1459d69cd3dd8a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543bd59d7e863ad2452e4f285dd048aa7
SHA1ad28f67f346c2aea76c06b4bbb212dc7c925c37e
SHA256da5eaca4e1caca9783a42c3166801133f473f0da80463876ba1d760ef2466d2e
SHA512d6561da416b433c17f7fed1c7bdfc86bcd66f536c8473a10e0aacb8cf499fb4bc4741b1175e272617c296fb981be3f42dec89583244b17bed80284b895b3c475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7902c3c8f73a8f8d84a8ee65f3033a2
SHA118f186f353e814f0de2ba13ac32dd7c87439ce8f
SHA256763c6fdfcf40763e76588ad56f2badb2a7186c56120580a357c1f64f203d422b
SHA5120c9a7ed59db4d9582e79898405192626c8cace9546b8366ab04a6928f88eb8fa157ffa82f8ee9e1737de2a2e367c60462c5f7cbea241fda27ac576cb113c80b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57817f3bc93be9c7fd478d63dc688eb6c
SHA19f873c37873b95f7466bc91df5268b101b027112
SHA2562b2316ddfba47deb0c69799f17c3d62f9eed5de0f76b0b2aa501a33913996806
SHA5122ee4a630dd386af867eac3578742152a10f96569255a7f9e002e729e604c2e0c5e8db2cedb7d7a59ce3737dd223f2777b228463bd2132c54d72118238b113e39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597546059b333d6d107ccef4f8160fb9a
SHA10b4457bf9b362c46b4c93a15132ea060578cafce
SHA256ca6cd3135ca37951424435cdeb7246e21d4d1a49708da679cf2b501ce5260be3
SHA512084d61503d8c6ec63a7840b76777a45faccb1f11a4211838c5a2b2a480a0f151b52349677fa83b5cd47f46ec0423b8477b53b2d3e16efd00d13cb0381e2e3c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5130e6fa12138a3086af6e4fa913b836f
SHA1d8164a76f51ec7db6c836ac73d5a0491c44dd434
SHA2568ad3e5194867c787fab39610e92c98dc0e07a2ada4c6f18d192e12c3cc419913
SHA5126401c259ccca0c979be393027c1d45cdf658976a8b0801290d5dd5575fbd0109ad4c7006b10c57cd867934beb25e1086073090e0bd2db8b65ff95771c43aadbf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b