Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/12/2024, 13:29
Static task
static1
Behavioral task
behavioral1
Sample
e1ae373da2732694406b748b4757d2a3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1ae373da2732694406b748b4757d2a3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
e1ae373da2732694406b748b4757d2a3_JaffaCakes118.html
-
Size
45KB
-
MD5
e1ae373da2732694406b748b4757d2a3
-
SHA1
c0351a1effb83c04422eb914132cd2b4ec6dcd6f
-
SHA256
531dd1eeb1e0b1eb09f2e1504417b2e9eb28b5098c05291805edf1c38908f9cb
-
SHA512
4a1ef86f33191784d770cf428789ead4893d3bc2838b260fe5e5b9e328feed2028ae2461f792ab6b554979549feb6f67d15dec41287c2ce768030d3dc44ae173
-
SSDEEP
768:/qpUDklKTpTfiNaIAmJJ168jJyKIMzLUf0Sg404Id6OaVBAEJc2S/In:/q0JMzwMSg45LFAEJB
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440085642" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5E49A01-B7C3-11EF-8CD4-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2676 iexplore.exe 2676 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2724 2676 iexplore.exe 30 PID 2676 wrote to memory of 2724 2676 iexplore.exe 30 PID 2676 wrote to memory of 2724 2676 iexplore.exe 30 PID 2676 wrote to memory of 2724 2676 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1ae373da2732694406b748b4757d2a3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD59a43a6e17c1cbaa38c3f0c2d4284b747
SHA167a0f07978f89a31f99fa0e8ed5410e5d748e39c
SHA2560b80f559ee5e985534bc6aa6172258f2a112e3caa1093a923ea7f9060e9a0693
SHA512d69f69b021b7e8c28f038e0ab8f5ee7601f11afec97c877c877d8202f48978998ae99f9ac9d23e4726ff04444550ba4e3244b82493a3960d28f699bea8a4c9a9
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_86F2A83F54EA52E2D59C5D2EE00149B8
Filesize471B
MD575de656defd632840ee6280b13d5ed66
SHA17d5df0a1f158fbdf43a19e767707acc86466b367
SHA25605984f0b5fc82e4ae6ec1f40cc3085d7258959abd51f707b1ff340086dd7d6ce
SHA512bc2aba609ac0a4a774bdb071fa3814a0ebfa364399fbabb352c26e09b40c05782c769f01c46ab354a6db11960d7137bbb5e69d100401b0e6668ee237e6812f1b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD57839f76d9d283328f2e047d35ae6d949
SHA1b7b7e4bb3fcf0ff681710e6ed9edbbaf1306a0f5
SHA256444ed3306e77c06fc436267c5122ec955a23c69d7f9bf0fc61d0952fdd832e36
SHA512cda7ff97b5c8e23beee69807981482cdca6bc0cca9606436823a3678042e9e0fdf629a4805a3b5f6d816895638240bf7250959a82c7c95214a67360cdbeb247c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD54e9ec10fc657c7b5c780d2cd7a56c2ed
SHA10f9aee241d8ab5cab32728a2069694aa234e9c96
SHA2565702d2ae0ab7beb46f09e9b699f759dbe59e3fed9fa5e8c4148e5ec5d711a96c
SHA512a30f789525624ea75c00e6a23240525eb82d31296ea90bcb8929f879074c4a64670742377210746d737480d47f3c8a2284dde447e7ebd8ff477a972e99a6876d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5846e9f3d219bf26de7c916efeebf8094
SHA1fc1913760e397a025f3184fa06e0087c70c6cbe7
SHA2566a0409b8bcf23a0093b43f33f95af85decadae81297b200794073a9ccf177bae
SHA51225e6daf8d826b736b12143e7ae37b3711d586087236b8843073fdc031cef6ace9bac3fbd41f27ad5121194e73763c9073eb35c62560925c1103b5b9215c89e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d79c7769a394f31970242e6f631987e9
SHA1da51a6c811314d203faac14357db897ab14ce6ab
SHA2566ddc996fe72c9e07a509249cc701b872f72a5ca8e4d02299c2183bfee84581c6
SHA512aa7651c0cbffda4e9f6c744efdd68901a8f8d2b07c4a3f9dd75654a5f6101decf0c3a6470b82623391154bca8257b353123ee9dcd128524c8f819c1f6c347e4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500b4281c263f74816dd9e2883dd44e9b
SHA1904166adc1458b5f2a4cc1cee1021f1eda40293b
SHA256b7299acfca3683cf1c8a40b6a4462f6a0537919ee0c020f5c778db0459cd27de
SHA512ef34f20ee819c1d2460ca7af16cedc60ff2fb9bb3e4357762130699b8b5aa50ab710c5db3f88d48b44ea304cc75783869eaf024ee6a3ca84965e38e28e8fd2b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9781df18b51e26833b3fb3b7ac75b58
SHA15a7c93cf6255cac0597750a13b1fbbb5dfc3c2d6
SHA2569ea36c836213da0b3cff75d8d5c3cf6e61283502b80eaf9d8887ec88d3ccd0ca
SHA512ffc23e6b9c1b805a3fcb4fa05753dd5b6c92ad5bad77a361e87e107d45a7e6a4daf1c4854ac9002d3b94ae239ac4151f2587f6c31f8943aae874d0da3b3a32fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b479b6fc1fa1cf6c6b2d95313056bc22
SHA1c9835f06e6384952e0274a7e5c7280b789ec153e
SHA25629c7a86334772092d00ea3630b81c3330602b2b6804af914137b44ae97065a01
SHA512f3a74f2e1919e9f8fa8a66ceaaf357bbb4150327aa2355f5ee94771462cb8532f86408c8c97ef99163baf716a37b42ae5985e8eaf9ed5d3200f09b70ca3be76d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5296bfec03c75ce232c540ee7af71f08f
SHA1ba01e5d21f2ced6575d6924c8219308d935c2643
SHA256fb0c353a1cd8546388f4697a2e6163e215c66748927a852f1a208e2e161216d6
SHA512fca9e3a4cf68c6f113d6e2ada7eca6438c3f9b30e4469a624b59e7ea17aa4a6fabc40ede8c60d3058d2253f7fc286730e5cef0dabebf61ec1688c9e9d61ffdf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527f7458365786db3b6d1d71d042f99e0
SHA16f02fc161cde38f9cf29d28b7ec9acecda227d92
SHA256188fe1d64f776487dffdfc127fcd357852c2466c904333fae1e164a6710c0bd2
SHA512105a354585c2a59fc620ef5578d805cf7ca5ccddb7712f62945c81cc8485eb6a9d1eef78fbcb08901cfcba6b143d1c4aef1e57fa2623327e19f282122adb6db4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad4630788a7fe7e1ed02d41e5cc4ea72
SHA13b5f0a6da4dc44981abf2f9b8533df8325a7919e
SHA256d12248c36a9225a5c1ef76b442597e3e43d6580f594e6910235a29d1afaa1fe2
SHA51248713679999441ba809ff3deb36657407b3e42dbf179d758edce534b06fb305bb70768449a8641547ad474a4d8cc1760102d1cbe3af26da6d3b2213ebe3bf824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e021b29ee6b3fd5556ec883e54ceabb2
SHA16beb8898d1e4d4b7e0f4d92caaa0f6529c0a16bb
SHA2563d8a122302296c508f06d077aac25a7eb88ea8f2758c3163f798ed097a499345
SHA5125b33b1b44261424c0ce1227f10930ded7a1b4059db17d909f3b007ffcaa8d9e58fae87dcc4874e1a098e737b92b454021f9d00ab855c9d06b6a71ce2b7832623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a13819cef75d0710bf5b1de462870a6
SHA1ea9ab86dca40fee41b8d7e63e39cdc90029ae37e
SHA25613cb8440a0c52a49299d6eacb1173d01cd0209c942a33cfd1f91d857036ae685
SHA512995d5294e6edc9f187dc9850f38832a30c4f9593f6dd0a791ff016fe146f790836ac17beecdd2f1c092edb4bff13c4a6ab6eac3b2ec2748f621316f1f0cdfaff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a6cf4afdcf2f4fc2200aa3038056168
SHA1b27e7411a76c1470aa0d825942b70dc8d43a9415
SHA256022bf853cabd48b37fb9811cb6aee2dd0ef01face65a1fe680fc3b144d6db643
SHA5126bea78aa08251b11797d7a6e76381e25eb90093e0d3b1cd490fe9e5c7a9f14d17c633edf6c5f0ff705172508e07502b77a76b65a40d00585e984f9b4126a1f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513e7058e697270bece5a2e9c36f8634e
SHA1079e788459881fc5bab221be46b679043cf3939c
SHA256da721eaeadc816289e4ff4e4e8f6d628c511548d8a11c40071293a5fcf3edee3
SHA512dff4adc936a1d5fffaa2b5b18c598ac3df62fd4f8f9e52712c7325451891816fc91e871fcbf19cc4464f6e85f28f2ccf99a0d2b49609414f34d4aa8b19037855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560c354d35e6332162ed078db764e228b
SHA1c5876a0e75b20df0811f4371d0c5b1e14b2a01bc
SHA25643642dc9b81579a606a05282350aa44616dfcee8a8bf1a73b030a2e140cdaae1
SHA51246a5d7d0fdd72543684c6e2953074422c0de8b59a2320b6a14cb87323e77e2cb2cb66e3ea42427c0cb1e61740d3143e9ec9ad7134fb192e05dd00263b33e9bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6f660955c592b55bf8b85ff9a9ca914
SHA167137dab436c44928df9c577fcc8f7424c6f807b
SHA256b6de084e2ba909d31c0c485a4ae61c9571cc87ba5d900683e7524ba46d80d21f
SHA512687b6da60ee96afc70f3d721e671b38c17025a92414cb9ed422053e9b50e8143f5f32b17994688778f706bf39cf0fdf796861c50edfcb6d6adeb9cf892e897f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD57c0cc1d9cbf9d6f7c83e374cb20a50aa
SHA1522d3619286e8f7d1217dd73340f1aa51abae737
SHA25640e0995bdd71f989c9b37613b2f4de9a2230e38ba807dbed0f4e8512e1f9e251
SHA5125bca73a5fe62fb4ae7cc42089988df36219ed8c885d77b7b258a481754156035a90cf2dbff4296be027829d7074fe72651fa1566f423bb503f8559c33bb9aac0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b