Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 16:27
Static task
static1
Behavioral task
behavioral1
Sample
ffb39346d128f25308bbc544a5644d6e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ffb39346d128f25308bbc544a5644d6e_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
ffb39346d128f25308bbc544a5644d6e_JaffaCakes118.html
-
Size
4KB
-
MD5
ffb39346d128f25308bbc544a5644d6e
-
SHA1
9e47df27187d6c6da4a40b280755a7b83f863d81
-
SHA256
68bbc9b04cd25f20bbfe0f645354649b28c36f793d4524318552941177602490
-
SHA512
f2079a856cee3bf7b3253b1e12e12a7f4478049babe34a4d7fbb8fd88a6a98bb480a0a7e04c13f76d1dd6cefa6b4a58fd4e79f270adb09f8e6ef283a4062b7bd
-
SSDEEP
96:2avJRmele4b9oGaVzpRPk34000diFk3yzpEa4000Da4VnrVqVuU5:2avJRzLb9oGaVdF000diZdo000U
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419878748" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{19AD8DF1-FFFC-11EE-BAF4-4AADDC6219DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e05d19ee0894da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000d040cc29adca2a1c8db9cc206f25ffa6238ac6ff6fb3a916a8b48939d7f51648000000000e80000000020000200000005b609863ec15b2eb26eb6e49bc16d84ba0b40cb6c4a023c30fc0bf1c3c0254ec20000000a53fabca6d339f5610061ad6d74b29246054d3f1f001d9afe97ba3365bc2fb7740000000e44cef0b9ecfd8ef4d808a23c14335ab9561a947005b35ce05f7416e4722669ba90dc7142071c8bff5c97179dbe286eaceb03647ab49b4a343ae0d1c635d8735 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 3012 2860 iexplore.exe 28 PID 2860 wrote to memory of 3012 2860 iexplore.exe 28 PID 2860 wrote to memory of 3012 2860 iexplore.exe 28 PID 2860 wrote to memory of 3012 2860 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ffb39346d128f25308bbc544a5644d6e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cae75b6c39eeafb37000e1118124212e
SHA16aaff1d8942db58046994e6f762119a05ff0a6f0
SHA25697d049a5a3cb4d6f22b54058fc3a1832f561f41c71aef92f04367045de46303b
SHA512405c0809f44c842f6a21f13391d816b5d048937281119e406ce9ec1b24028dc0817e1b54473b21a5dbf4016d9d622f61b3dab282907b7b69f30e94c2f891bf4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b37297daf324367a7a053a8bb740993
SHA1b0f53530290122cc24125992f437bb4354d4035e
SHA2561d7eb229182be7fb9123a73f355eacb1177aecc11d67ea67b40bc110598993ed
SHA5124fc9838aa0ded0748eb9f73aae6073c6a63bb512ceefe1591fbf7f57dd72d3adf8986b3bc9f1f819815fcf87a58922cfb55360628221f59d5cbfc6d08335975b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5343279ac47d881b159df0d1673197b87
SHA1069dc1bf348a4b5323c1f43b60f6cb43b8f4db4f
SHA2566ecfb147e10dc23d6a0bd771f858493e9a4f7a07142733b37e00f1fb06d179b4
SHA5126330100a555d323e4d0f0039077210541bee005f80da1488bea6c3e456b655f6ae8261513902a13b510dc3fccd258d2e8211ca3f8317941231d7e4cb02753da9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1d7eead73046a98dc147929eabe9cd9
SHA14e85392f1cc7c87d3b8a0f8a587788becdc63432
SHA256063b8e241278609c4b024bc5fa1b8354e1857945f039d3d42997de4f9a4878fb
SHA51233438c299a7d14e44dcd25c840a4f7fccc8f4eec5f728026d3c10bdde276a992c2ce8c0047359456c28b4b51ec8d6230b4f675a2541d6594d4ce3be51e4e7258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500a0a0193562923546c866275f6a4547
SHA154b80f779728f34268be26825c0adeff11cbc3f7
SHA256b70c2a0b972b513c715b84da815519b4684fbdedfbef45317ed3c9a6748f909b
SHA512c4473eab680724490be1e7c22a42fc365ec8d68ef8ecaffcb8c2f8b02b468f797a22fa033b953d09747371e6a748ae18cb33178560ea050b72f0ede9b5223fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53960a7eab59ecc034eb0326dc66185b5
SHA1995ac928ed0d2da6b609cbf9e98aff2ff32d1b64
SHA25663cd827e10910382a7884032cc8d0718f93afbf9f480d6256ffc7805e029c685
SHA51284abbe0c6130de1288675ed4c9d8a653b1380592bddf6649cf7ad7ef76ea05ec07d549b0b0aaad986338f93ebfb9298c4603e728a6dbdb42cc4b967d984fffee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4b51ad67963ff0108e284bd3e1840e0
SHA11356f7ba97f4ee6ab2bb2c351f2dd2ee8a7864d5
SHA256eb95b96965a5234a61a1f14a254a336ed5b414ce06ee3c4371a9ba0b5207701d
SHA512a3798d73e11e32eb9f5a5d2dd040ae5451a9ce312f158f269912fc84df1261bb76f3672f81fe41795586c00832a9e7b8f2d60e6aaaf162ab57e335879b838bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a45daf1738e187e20436c5c62aec8aa2
SHA113a84ba628540157d45ef741303ff19e591686c1
SHA256ad38c594695a9bffb6c522b520a827eecab12b3e0754540907ec07f7fef2a3c9
SHA51284d83482100bd4c1873bb14e7720c04de5c93caca214bba6b6bb554c380c4f6bb057e948756ea548e7a64ff8d4901438629391f0eb7fba7a201730ab729dac89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57be7b5ebee52d44b68ce6a42cad30839
SHA153a49a8baea1a62bf3bdbea0d88e341161fefd6d
SHA2569fc846182984a6e54387553ce783750fcfe4a3f80d70c2d68648fcc4c79faec1
SHA512cf6c3243d8504823c9c567fcc3b563fd39ddde42f059d028ea7e371ac196caea976ceafb0ebf34ea25e6717b94af5401147e38f88c28c76b82d552bb73f14af9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a