Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 17:11
Static task
static1
Behavioral task
behavioral1
Sample
4347cbe878b773e945258ddc793369f4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4347cbe878b773e945258ddc793369f4_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4347cbe878b773e945258ddc793369f4_JaffaCakes118.html
-
Size
38KB
-
MD5
4347cbe878b773e945258ddc793369f4
-
SHA1
738e159ee26eb5aad861925b7e1a255c3b204256
-
SHA256
7d08a7eed0d82aeb201fa11579fb232c823f36f17d4ace9fdaa0f3358cc5fcc6
-
SHA512
b08ca1ee9082c95da86777de8e97f665b06c0f89613d7c452c196f86c6dfc87278c7ac7c0c6245c51ae4f290e6a2e4e0dfee18cba4d2e0feaac478c123fc9beb
-
SSDEEP
384:sYlIcUtR4jVGTHZrHIyhtl/9MQTGRMtktYgktbu3RkxGRG3wEtARr3+xkfPHC6O5:9/BTDZZtgGsgExLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435087751" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{56B3BCA1-8A4F-11EF-B8EC-E699F793024F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2216 iexplore.exe 2216 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2700 2216 iexplore.exe 30 PID 2216 wrote to memory of 2700 2216 iexplore.exe 30 PID 2216 wrote to memory of 2700 2216 iexplore.exe 30 PID 2216 wrote to memory of 2700 2216 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4347cbe878b773e945258ddc793369f4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5971c932a8b4f62e1068cbaa8ed9c5588
SHA1e0551c248260602bf5ae86bc72273f06f7fcf39a
SHA25623005d6998a55ff6891fb264378e6b39097f99f4ef756120134d4152f2e6e641
SHA51297923911d3ece41e8448c379ff10d8cdbf1a21f35614c8e890fecad92d6f969b563c7c860f96d1e3f2f0738268edbcab6edf677704460c951606664901d47c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53641c2fef021a3e638e81f7c162d52a6
SHA191890285b4e2a993dce4ccbd7a0ef11bcb53cf54
SHA256bedac8b781241b99a08b2f04da19524041ff472dc29b8b0e12eff0b0396fe238
SHA512017add4511bd22abc2438b8811a6e81d8b7e65750fc1d853137cc6fa2e047f255dec83d92b7f12a1b138db6b44a03de721e10f57e91b6da8798f22c56202d20d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7fa74ff3d7e2b60ab457df7402405de
SHA1afe2cb7a622be4c949c59afd0e9f0ea21218e412
SHA256319d831a42a6ade4e13ddf967df28278de7e91da7f6ea9b8f1571f9d28961044
SHA5129a41a35166767dfd57be7b8b3be2071a5b2b20510ab59b548c37261fcbc3a443ee143b1866f82a64e4ab73edc0397796355e796e4ed846fc39074d3dcac19e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511c03cf8335f981c2d6eaa0a8646ffeb
SHA1448fcb5a03064a721779c478303f11f458c34e5d
SHA256807b7c2db5b418488c0b34c40ad9d0a1a61321a3fccf13eca91cff51cc14a617
SHA512d57ebc7ff7013106c83e0f4d8dcfff0bcebce7f17a9e389b1fbf802f4a2182a23dea48a0452f0ba73900790d1a9939afc5116a591b0604e41b91a2a1b4e4d6dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e442122087a4f62296094fc5c7fcf7d6
SHA1f458714eedc32563b9975f4b896f92de70528685
SHA2569279ba7a33abd7ff3fa41db43495f552c6cdb53854c6956354f8a6d2b252be16
SHA512463fcdfb165a1e2f1785b8e9ac7ee25205031205960aab31cf4fcea49a29dbb6167729b2406f7c9a2946c4c9052e7de28714d9e737423de7126ddc29570dc67a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df47db0e573647cabef458f36f908fc7
SHA10626f31d45cb1d026bc942d5ccaf91c667710e34
SHA256aad907e4a3515c7e2e521353716efefeb03cd099128f7b4d72ae42a905c2195f
SHA5121f79379c5526893cb69cd76d265b6713974e8f2649de9d308dcd74e2f62cb842e8c030c30107cca823512230f316646360cb40c71aeeb94433b421252820ed54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5336439b2f2434ef6630550b3881f9882
SHA197d42533edef922ab3318282f5c0ac5dcf7f97c4
SHA256875afbe7e69279c6536a0443a41aa79d16d5ce07aa5caa35d539b1cac78737a9
SHA5121b347a0e38c052b6cc654883f2eed0a36f4360e92c8bd03007ec5d10a4340855c1338be83a7473fd53c52d33c7d201cbd1a0c1826da6621af0412535b31abd8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e0faceb6b235d1ab3e8d657ee7c5a89
SHA1fd4612442a0f2b3e13cdae9d01e5184596484c0b
SHA256c11ac06eca4e33620ffec4ee29e6a10b7c3197fdc77a7d1954b634aa6e5793d7
SHA512e62125a488b0fed9cf36d96ff59e1b4beb99c44b10297b2d24877fb5435aa4edfde175c5eb456626bbe98ffbab647c66ae53329bf51aeaa326a0127ed1a0e566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5241f9028e8dbfc755f3222ce198a2472
SHA1a65361725900934a7f658d09ee8e7716b09a102a
SHA2567d0c8449450ee155b9102fd287e3ada8c3dfc20e85a8686b16a00d2691c664ca
SHA51299fbb05c789e4775913bd542900177ed6ec50f219b7435c668b871832da57ada1c19cfef196cc8705bd80ba452b1b827fd395d0e321b57158bedc113af4ad2c7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b