Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 23:26
Static task
static1
Behavioral task
behavioral1
Sample
5437cc54089027522bce8cd4a4f89a1d_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5437cc54089027522bce8cd4a4f89a1d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5437cc54089027522bce8cd4a4f89a1d_JaffaCakes118.html
-
Size
20KB
-
MD5
5437cc54089027522bce8cd4a4f89a1d
-
SHA1
75c2d7c9997b1d6cc144894d07613977c035158f
-
SHA256
ab9fa61bbc53a658232889e4729b233166782cdbbfa30134722ce78a39459d31
-
SHA512
55fb8debb63f4698bc8a35c7f59ce24e977e9f22bd694758a173e1d6fff7509838141922b2a33d1264d8dddfc81db3c06fe903cbdbc0a09475d439562bcd9c23
-
SSDEEP
384:bylIc+t4E4/LWsGTH0LVeYRiR3+50jN6Z8rdNU/gb1AguLZ:LI8ughAxLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5711D1E1-8CDF-11EF-80AB-7A300BFEC721} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435369502" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2044 iexplore.exe 2044 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2600 2044 iexplore.exe 30 PID 2044 wrote to memory of 2600 2044 iexplore.exe 30 PID 2044 wrote to memory of 2600 2044 iexplore.exe 30 PID 2044 wrote to memory of 2600 2044 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5437cc54089027522bce8cd4a4f89a1d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c69aaf54c0e1237c708bd63dffcb3c04
SHA155433a5915503f269135f36c6e6c90f53c76e499
SHA2563fc4b3450e258bbb1048aa0f773bcff88c028ea630e395036b1a017b92342b80
SHA512083a6de7d7f8e5d80b774e3f0933499354e8fabc72f701a6dbd1787ae1d50fb41a3683462b8eea86e9fad510f3d3c077b6dc9f64c9f30cdf991fa6883462f827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3442739cc9abde5b941ff97d2118267
SHA11e2c9757c90ce22dd93e925852c7d43accf34972
SHA2560492518e78b9dddc9919e99c73eed7aa406a84fbb85e0422746f5bb4438a0a83
SHA5120f6d1a067f1727ec254ebca702ee7b2141fcf51986f0eedb2498077e522589f3fddbc158342abc6ebe4abb69e3ec0b0308c9f03c13634a73290e10ca7ba93a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf0f6f20802a00a12da2987ec87e9f5f
SHA1914ff43cc65bcd186e78e9454ce29b4afb40dee7
SHA256b9fc01556b4f0656c71556155976c1243b2f61669a9bfc64b6719cfa1ce5315d
SHA512602ba9545db8230f135d98e18e173d8efb5bff538647541692fbf3f20afa809b5aa130a9db5405860fa9fe1a337fefa7eacb50323a63c1b633760afbff89487a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59327015472632d047f56d38a66715ece
SHA1d92f47758fe8e20c3782053beecb546da92473c6
SHA256b1de1e9beb84c2d35f343f4e7b551e4fbbed9598b81d451f91f2948c907ad042
SHA512054e6339bec9fceec3b14a0e73d5d26ee132da26f292eed1b4ff81572525a969b87877c81c7364dffa5536377d1875e9924c5576ab9e926c55731f50d07c6f5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdbb0e258e030b9065d364910b416328
SHA1027acc320dbd2f4c3ac201b054c4de45eb213639
SHA25635914ab92317f9bcf298e2eaf63252884f6f1cd3b1477d256c15d37950e8c6ae
SHA5124e3ff84f98d6af5c92ab451594721d4058bae099055a422dc7446d571685b5be521acf29acbf223e1182ebea4adb0272b4aaf3e47f221de2dd0a32d10c46f55c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7a8a7b39d33ecd48c7b6912dbf6ca24
SHA1da23f4fe2ac3adc2ff687dd98ab4f911aed9c3ed
SHA2562a644baceab13bf1cff8cb1cfd8075b752a705435434ceef36d1a7b16308d741
SHA512dcc58f372566d26a3eae26621a646b6f1576e3e09172e57c540b7a18c01f9fa34e1342bd41141cfe47a3ccd666fa6c5fbe41bb78c670d1df68d3f7c1606a4940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567302e772361e1624a3218a4cd47e235
SHA190631f3a1f3b030dbaaa084360a7296fb44f9de2
SHA256b3b359b7a9d0d62520b7c7acb047f62ac24040741f580d996e95ffc8ecd3d9c7
SHA5128055d3fdbd48579918c729ab3cc233e12245b05d8eef57994c56a44cb7618989fa28c6af31b94fdb9f51a6a71099b915c70cab352beede671e672946137d196b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b140a11beaf8b9b98427f7f4f511f168
SHA1b1ad71db31192015f51706a32916d6be9c38dcb9
SHA2568331366247875febd4b239f8636894afd4099cc153ed11c9eb8b4250a58a6e85
SHA512baeed06fa603275d33b0c7e428a044a620ae87b9fac190dcb0ff5bcbbb764c90bfbbae8d8fa722e72398110fca9ef234a49b843fe37880e4e01d516335f9660a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589525b35a4abf0ad21098c6e8baa4b10
SHA10ad5aa64ad3cf053ea06ec2bfc3d95bfdc50b170
SHA2568d8c481328152941aaddc11965187780e088c80b8633ebf5b226c26f5f47494a
SHA512ec653b39b99fafbba2f7f7f94c07d00346b8dbeb4097dd7150270f60d869e0e5c03136f07e45c6026df0d8109f6f3ccd0f1884919bd70ad1593b3f8dd960f21a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b