Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
44c7e129985139d590255e3da39b7a2e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
44c7e129985139d590255e3da39b7a2e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
44c7e129985139d590255e3da39b7a2e_JaffaCakes118.html
-
Size
142KB
-
MD5
44c7e129985139d590255e3da39b7a2e
-
SHA1
51f578be350cce6aa35c9cb337ac2eba4fd95aef
-
SHA256
8191f43209b9a15fa69659a047cec065f9c3464fc8e6f4633fd8fe1bf88d5580
-
SHA512
43a29bc2a5278c117ddadbb530839359612be4789a63ce45dce863be27895b81d32e1fc72adc613c36f0d6908b9f46086294adccd4add048ff5ba5f86b90060c
-
SSDEEP
3072:SLFXoFx7dyfkMY+BES09JXAnyrZalI+YQ:SLFXoFx7osMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435111614" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E4ECC661-8A86-11EF-9CB4-D238DC34531D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2328 iexplore.exe 2328 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2340 2328 iexplore.exe 31 PID 2328 wrote to memory of 2340 2328 iexplore.exe 31 PID 2328 wrote to memory of 2340 2328 iexplore.exe 31 PID 2328 wrote to memory of 2340 2328 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\44c7e129985139d590255e3da39b7a2e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b7355f5a48f69222253bde3d8dbbb87
SHA19d81c2d3a21852cd9007c6d996f0c84b155c8da6
SHA256c445822c82f27e83494749e3251133f9bf4b17457348e836b41cc56f4934a524
SHA512831c86622dd154ff1af7bcd5c93b09dbca75ff8452c11f91dbbac081582240d8f7b227b7d4abd3fe501f9af807b193e206862b994a79e40fdd8fa3a98af67af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a6b62bdeeaef44763962f0149722895
SHA10cffa1c2fb2a760bc17cc5a627aa0220ce1eaff2
SHA25603239d5247454784f78041badda637503f8b19f9de8e562284c97bf2b69ce8c6
SHA5123133a03034c2ca7e76c342448b515341df7d4a78d8eb1fcd57616157ba09cc43d8edbed30ae8027d39f1fd5bc34879a61827cd0054e45806214495b263a8e0ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559759135b90138a8c674d79da4d8d9a9
SHA124b859570d44fd1ebf853266c66dd3674c9297bc
SHA256eec4201fb3ffc8609f66b4ef9808b41169e4a631ac09a075b7fdba0c166e43c8
SHA51295e5544117953154e008662dfefddea18cf3d0e97966204471c75a59546fd348cf0c27bd70ac81939794d03894665dd6770590aaf4776954cc12b794f3164a1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59459b6ee946f83bc59010bb06233d904
SHA10c4b2c2026f6823a2c5baa544bbbdf7cb6ece204
SHA256c0af55d8116000843f84c364770b35182ec39221cc169a4c8c4b871e2a426604
SHA512725fdac72d29069bb525a668fb5bd3d525ca66144abde53d5267369414f5201030c252866f74d8930de13d6abfecbf563b1aff1fb2439f2627dd9ea7c838079f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fdef48db5e96d5e89b6466d2f644c92
SHA194080263f9120251468313ad46e7a7cce2b3f548
SHA2569334649142385b73804eb4569bae61dff9b0502d1761c6969c6c6681dc3a2c31
SHA5129609063f8c5d7080365c40e71713e663bdb672fdf43e63673df3ff691140dbfa483a0540975b2e1b10d146d6396c5fb5b9c9db25ea7e234e6c015494995e2c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5505fbd807b381d45e2e53a57d4ecc8be
SHA1e1f1e9f3a7d2fc44f1c651217df0f01e66011ee6
SHA2561cbaf7ae9a96cdb18a1227a0409724c75942c588693cccbe0ed18f8182d789eb
SHA51243956a0186c55e20bb6178962e57a81211fd7eac116319ea81157b6398d01bfc5e9d468064dccf00121006a569fd0a41690e894f90fe1a567035ef3de80966f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598a5d23c9c645cdcc336291671959b71
SHA1d92f5fccf2b6a61549f2686979e56f03bd63332a
SHA25610c6a4a56d671a3eed51ee6f4639b26b3d0fe0c2ad82e33d9c65d44532b13cbc
SHA5123fc6207b4e704c67b93fcd6e1449869cf2a1201a50208de4980da5c04a7973a925bad26d0c05be142080258781d24b2a1433dcb36b84c6fad8851193a2dac264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d91642a1b8469d99d0cd07c260b100f
SHA12d84fa842246f6ba1a72bf5f60740f26fa92cfed
SHA2566a53ccf3962e063b9414226e8cf838a3e112277f2f10c3d740d291f93be2722b
SHA512e680e79cde1b45f9ae6f95352d293d2f831ba5fe154e55e4663d0d6c6bfd0f182739bd673a268bcb414d67d015350877470aa7079c44effdb1ac0153c9940b69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583fb4070d2b861c5073db3f79f9dd941
SHA19595e685c710c741d64c547774822ef17a324b65
SHA25630b66e82182a37f712b37fa5f73dc02261f898bb0faef42508795422a4886262
SHA5124e55f6e75acfcb8ab95a6eadf13329ef6d4ea89de24c6ff66bbaa75823a8e0c49ab4052df8fface2c19ab9340e688791fccee0303570a6acda481363b0989745
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b