Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/01/2025, 17:46
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_93229fb83fe400f64ee66dd46ee94172.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_93229fb83fe400f64ee66dd46ee94172.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_93229fb83fe400f64ee66dd46ee94172.html
-
Size
36KB
-
MD5
93229fb83fe400f64ee66dd46ee94172
-
SHA1
f107e48a32abb6fc06cb6f063496e9f6da647524
-
SHA256
4cc9d96a16985e7b4dbacfd7c8b5f69b8b109149df965873a3e26fc35f55dd34
-
SHA512
43ba2227b0357c5381aa76d919fbdff53e2f52fdd3af3173c7ff4ed4623835ced8f81b641a8a2e841d55e97e766e88c6ab38f03cdd31303f526f0aebb1dedb2c
-
SSDEEP
384:SiJ+9DxVkCYqaq+GOW2QZhX68SloGhDm6Pl7n/VL+BawoKoQcCFx0JV9dkc:SiJSSCYqUnLaGhS6P5/kBzR70JV9dkc
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443297841" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F10F1241-D4FA-11EF-91D0-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1980 iexplore.exe 1980 iexplore.exe 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1980 wrote to memory of 2264 1980 iexplore.exe 28 PID 1980 wrote to memory of 2264 1980 iexplore.exe 28 PID 1980 wrote to memory of 2264 1980 iexplore.exe 28 PID 1980 wrote to memory of 2264 1980 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93229fb83fe400f64ee66dd46ee94172.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD52c86ea034cc9343c25ca37be93f399f4
SHA17599afc0867d7c77d62c1a698f0fc9c8a18e1b66
SHA256cc2db32ad3d9f0c2f53409cd1a231e39b5d83e2b1048bb486e0bf39b93b8ebe4
SHA5120c42c4dbd263db5ca6d874ca7990e01508d19c25b425746938d53ca277f359d18b7d1d7968c1389c602f0daa3fb85ac990e3064721845eb282d723af1eb3d6de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bf401be574cd6f5a1dd56e1ea2d54b7
SHA12be3d4b1450b768d43b5f8b507b04139d676fb0e
SHA256aae5de8f7cf6b0ebc42e0fe6954f27e808f6c9fed90bdec6a3d6af8d4d4acbf1
SHA512da075519210ff0fe6d4002fc7c86c2c59d18f59fee1bfcc596657522bf24401b737dc77e7f3168d7a0e224d861995ea3a1f837a00e6fa0aeea77543cbb6da513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7c5b133f6b05e73a9cb05640a45e539
SHA13cba88b06e2f3ceb5118f4498b44b34b46b58067
SHA256ecda1b30acf0c588a050b4d623a0b8a4e48f3a4ab25c01d1fb19e3f7f839d9ce
SHA512a4e6f99d533072ffb5e79b6e0465838a88ff9325d15b49759d1a82834534c9852e879dece4c1501f54a76629ff9c0ffd92931fc3a0df363771ef68d0a66d7bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585358605fea6dff13f60dbe670a0e50e
SHA17a84b6f1c6e45cbe4aaed6196a2084b3f9e06420
SHA256f5cb346eebd954138d6ab523dc3c9d05d4897286b9c55c2f42f8e0c82481e37a
SHA512638cc96dfb799232cac8820d4981a758e93fb5321cbee296bc59ae029999709c6837e16ec0d33c43b318bd371e4d33b31a65afb8d95574a71d38e1b0f272f7f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5291da06167c21e1e6ed39a4ecda1ff00
SHA1a6e792add0ec04893e4052b988decc373e8bbbf1
SHA2564dac4e0741dcc2ef3152c7d09f2c457510a1a65f2eb2d00c074c13363c5a3f54
SHA512c659ba5b0d6a2050e627ebd0c812b09f6e5e6fdce081d0a371f82573e212d604c7019412ba36ab8cf7643428b22f578fd4608ab5275bb28751523b9ded1708e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bf275981dc842b1b3d169be6e5010a0
SHA102a1624e173b3b10bcd7f17038050b9cbd1ba323
SHA2562779f93124474d932ea826a524b4f8c359099cb09a2ec9eb7b4d86098788f850
SHA5120c46fff49695ce1c81784c1e4f8f9606ed20ad307ed10d345ceaeef9a4d8ab31ca7088052fc76d80c29acd0cea77fbbe385d37a7c392356b0ea0d98baef9b0ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5648b0f77420d6e300b9577ee33cc25c6
SHA10ed5b5cb076a3d088141739a8da6452d7e97d10a
SHA2564ccf415429b0019de0e76de3ef1ca92c880a6089e480590b48a543c1b4f41b38
SHA5128229cba838c6e241a016beeea87a4b5b453757d2c7ac24db793f7f382b8b0bc980958887fd9a5ed2e47c823bb54ed64d99dd75022573aedc9ae58b5c0e7cf543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584c4f1945f31d44197179e941496bd6f
SHA1e4e6bac88fbb8e839a5cbe0c7195c3916ef94363
SHA256525eb045f7623b0ab8323401f1f9abeeb0535f6f969d046d2761c62e43f1a8f5
SHA5128ec203ca7cb09af38b1d935e827adb4f2f2310ec5a59d552c2340cd97299730641d9477c9516fb9200871674e2b3c1480b309b92240378a45e027bcad7638429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c6219fab244496d3147ed323268f63e
SHA1e1a6763423cceaa4cfea30dd0729dfcbc13869c9
SHA256ce2d309bd0bceb8d94902dd1ffd61295e2bfa9615132b0d8b952635e9de82b5d
SHA51230485592b929bce581c31fec904a85e0cfab8b31d769ef2acdc0aa226f84c1cd04b1b5196931939c5f1b2438b75f65f2a4feed3ea0e9845d49145bc14638ae5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5241ba954352de166862808b3531cddfc
SHA1e8c70ca7c008bdf4a0f7f0fa7675ba88a68a0110
SHA2564f3075370e7f2355294bda4c00fd035bd89df3e68da1dbbcf38d78dc8b0cf3c0
SHA5120338be969c386e0051a9b92a67e393f85130d1b0ce517d2ae9b324828dc23008ec05b708c3b37b0f9bee8a6021d5d5d5876834bcf89b02f230e9d209004110a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1e2983d00747c1faa2fabcd7ef818c5
SHA160c8816dcce30f024cb0aaa0e0441bb90b7b39b8
SHA256cbcfc9e042b4bc2a858ceb34699129c2b767b605d517eae20c61f76f9eaa29f5
SHA5127c4399ad42119f38c5081ebcd0e6a560a3c8a11df625437fe31d138a766594d478ec25e6cddcd8ee46dbe246c9bd1fbd37b522097a39b9fa70e919b7197df199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52483849f60ae709895d28cd64295cf7c
SHA1d2f6d099fd1890b5663ffc3d8c1871ef52cb1b3e
SHA256dfa8883bdfb27ad26ec954e0a88ef1d2026d8edba087dcf13d779bced2093ad9
SHA512c78e990e991f78f15087f9811f43fa30da4eb9d51fff4870b17f567c97891ae93b846c375c5fcb259a74ac3bc0026ed3aebd133ec4aaf732acf850d66ae4fa5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5293a207cbaefb0d86dbeaaf27bf45ea9
SHA1f4ac02df23ca1efabc1b64847666d438ae8bb8b0
SHA2563ced207d66c07eaa9805a8c81cb4904e42ab5b2fb518cf24a5854927a1cb74ff
SHA5121011f4901fdfbca982fb6aa9e09673e592f489bd8b4419c09c1704252af5dc67c6f392cce85bd30e369f22c028a742cf01bc08ca0052d030d6a29a357bb2b23b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de4bb7f5f153df6f4988f9b1f97bc954
SHA1d19240f95ca99aa952115bb57d265f1f6ef050f1
SHA256b5ddb3e083a22d2edca48d5e94d78ed86e564f07e91e75a2b527d28148fdb2ab
SHA512e4b4680cd97796a7ec3c6a9fbcb9c1ca4863974a7edbba25ddf9ffc8f609f2a6f9a49115c998987a4f3229f060bbaece6c9de2892c40fc7583f5bb65060c6201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a26925fe8b99a3279645b3ba23b85a9c
SHA1a9d64ee87d45abed5d512b10c098cdad8636ac19
SHA2565f2382bc75f23b10f7e7197658809124fcb0266ff92071550e44478a568e7baa
SHA5127c0393a1c8f9257525a31ebcdda72a667d037a6c7fde3d080d5d1d1a57b2e5c6bb55ff753ed8cb8595f6f6ff3607621ea42e209e206558ec083ab225c743db44
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8452S9S3\f[1].txt
Filesize44KB
MD5c13f830098765896e6b479da9d5bccbe
SHA1db432ad58c9ebc9a94f3abc743be624bffbc7406
SHA2560533920372800e5822b153d3365ec5dfff49a68390ab6480dd8c569d7d259c92
SHA51248d86b2d0a3f519372e3d839fceacc0e0e6e70f402295452d70c40230b9f0eb0bddc553434643a05b8825c0a9d290d00f7d5462bf537fad668e5e99b7daed512
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b