Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 20:16
Static task
static1
Behavioral task
behavioral1
Sample
43ff933d93d874a553d66bb0a61ea16b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
43ff933d93d874a553d66bb0a61ea16b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
43ff933d93d874a553d66bb0a61ea16b_JaffaCakes118.html
-
Size
20KB
-
MD5
43ff933d93d874a553d66bb0a61ea16b
-
SHA1
9a9a7cbcfe376e9c862d7ce1267b574745463947
-
SHA256
6337d1e3daa7047a1af6601757252c7788abb7b1ba09d20d2ffd10bbd67413f5
-
SHA512
372ca09868c8390edc23d52c178ef8ce7eafd8929e0fa731115677c614ef62fc19ac4579021dd21edd5d7dad8c23a77380ddb18d035cd41a2281babb55127fe6
-
SSDEEP
384:4+QfPFd9QZBC7mOdM958x6puKfpC5IgSnbmFe7AckG7Xjces6D6pT5MxH1rPd:Zcd9QZBC7mOdMYupC5I9nC4DNPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{28D31501-8A69-11EF-8B3A-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000006e1653949f46b18d1da38c34b5dfe954c5df9ecc10338bbe2ee7d3e598635188000000000e8000000002000020000000f81d9f0f3864700b8fa169f0ab5822cae29bdd3ddc8a59d9257ae7305d1ebd63200000003cb01866bbbcfae5d60606fcc835cd227ca6728adcbc2e9fc5bbeb3311efb5334000000053c0a1b8ac63474ac0242b7fc3db5f9000cd8dfbde75423f943c1ee794d2e0cf8f036b75ecddaac5b917e3531cd65dd72b7c18ce05ff8be2bbcc33d52ca052ef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0e8beff751edb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435098841" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2328 iexplore.exe 2328 iexplore.exe 1484 IEXPLORE.EXE 1484 IEXPLORE.EXE 1484 IEXPLORE.EXE 1484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 1484 2328 iexplore.exe 31 PID 2328 wrote to memory of 1484 2328 iexplore.exe 31 PID 2328 wrote to memory of 1484 2328 iexplore.exe 31 PID 2328 wrote to memory of 1484 2328 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43ff933d93d874a553d66bb0a61ea16b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520fdc2783cabbb1d129f98d0f8cdebb9
SHA173ba386b57a731660014b288310772cbcb2b7a5e
SHA256994045951f8c26a0d49078838eb38d829d9d782de2a8cea5e371d0fd9f00ca91
SHA51245cfa6b8febe282a1065f55b55bf00c2e02bf3188ed33eb49acc7c1e73228d71600c40e2ff231c55c7eba064fb180b8847dea4e05b7ed8941d820342685bdec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558463bebaafe7be05024530f59a82d78
SHA11fff99769dde7cec5f58b6ce217fcdc72516dd9e
SHA2568d396709e6d908ce7ac8741659eb3a154226bd50224c677cca3c16d982e121e6
SHA512daf89ee3905fc14bc2fd5e4a934fc2f4a5ae6451aa53243e0644f7db4294cc63186fd5490833742c7f39e050ad2bc9c0f97e7e0b23c5f755f470d4c3e25289e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50067cdc24aee2c36a3de8fbb436a7255
SHA12cb82eca3a849ba6546ddd46f5ba0915be99cc79
SHA25643dc0bfb41ff719b8a8ac8eae8900b86c958cd73fe7a87bd6c118437eaef27ef
SHA5122a77845d17443c55b462ad9b487adf814935051ce6b49c84ecfc149ccb5e07ed321a70576be680ec4834d455adc049ae91a32bb82e81d4fca69b8b59bc16ec94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517169249f57b2ebe9f79dbf1cbacb695
SHA1101aa9ae9248faf085c93067ffd9fb205246614a
SHA256a1eaf9cae935a23761b10b0f3188dc71cecada9c19e083f7b14382f824df67df
SHA512bf1d4d00411fef915b8e3d564ab9bb0b5647d608c6b06d08b5652a9178d1dcdae22980fa8f80329dd63b249c877ae12c9e3ea81f3bd5c65f2696010e9e1f0954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebe14c93b7fb085a86269257f6b842a9
SHA1efd3d8baffd1cea834645e0846bc461ded02798b
SHA256c8160273b3aea13c8bcf271ab409fc44cff80d26608810642feb37d127d97ae4
SHA5129c0a8e0847aaea7bcdc972daee21cbab1073974d288b230391d60dd9993d79c82f9162ec0c09366797e4701ac9471202aafcd6d671961682ca65b5682377cfcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e4730695b63405eb1e053b69dd00582
SHA1fa00499a8c7267295a17815fe5992b476a25611f
SHA25628705a258c4481d75688e8a8a2c5b8ece47fdb378471740aa56b8aae65f8db5b
SHA512f5a5659a1fec5194b3ca6fea676e70063df94fe925713fcc0ae80a760a56bb425e886ddbcc6791175e6bcbb8a4535bc1ac60e2a1676591ab1e8fff86a942dc3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2e9ff5eca689d08896cebe704cbc571
SHA184c76d17e084c2df26dee04ac1e511256f202e11
SHA2564c16f205d79eee738b02aa7a65f28145999bde2a80a6b6fe7b35c33324ec1796
SHA512ace4d40ec1c11f8275e3fb8558e927cfe220401fb7f41451cf9dab9448421e0e719c0c430edab8020e7974466c3478848f7d5f1284854d3d301cce2cae8b8a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58239b19e0d9bf14ea74790118bb698ba
SHA17665dbb0a995bb26e4f9da72a0c694622cae7876
SHA256dc831a9cc62861f72a62a281f95cbf8a69758e80703f649ae89c48267714b761
SHA512ad6a8ae0256d5a06a5db41bf9fd4b74a75263e9c43320bbe346a5476106469c0f3569bb1b7cbd2ec9134d60c434869a18a912407827adc3a0d9dbd931983a9d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b318edadfe86133d648e656774d12b7c
SHA1bae9f2946360e3e9807c9bb1f80fe92c59dfa7d3
SHA256f8ec2eee0f4c4e2088242592612479de5ed1a7f6ac39a406096ef188de93073e
SHA5123f55a74a302da972155d427e08e9e153485cbc1be84821755cec7be3ba1ec0b293659fbaaae3c11fce27cd751f6632928e44cbdfd8f2d715b0bf1f05bb390022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f24e63575a70a12918fb938be74bbba
SHA12fee7d94b155e0ece76815006fe7e441b56aaa9e
SHA256dcb705742d4e6a65e1aeac022ea1d6b5b916dc2bedc564699fe40ce9a1555837
SHA512ec43f4109615bef13c5a4dfce8f9238b3c08d78ad4d3e9269f8a4740d5ad86a0043fd86987a24dca444fdd5da247d4011385c7d86cfc6c7eeae2349ee3acd262
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b