Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 05:53
Static task
static1
Behavioral task
behavioral1
Sample
0b3342fb2e8ccf5e3adc00eb8cb5084a_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0b3342fb2e8ccf5e3adc00eb8cb5084a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0b3342fb2e8ccf5e3adc00eb8cb5084a_JaffaCakes118.html
-
Size
103KB
-
MD5
0b3342fb2e8ccf5e3adc00eb8cb5084a
-
SHA1
9c32452340f587764caa96f7228445852c56b865
-
SHA256
92eeb4eac0e771f84622959af0528894843a7908c7845d6603a74cb786d46151
-
SHA512
a9f7bcca990953fcad5b743599e24b4b4b4ccce9065aa6df6273ad7ae08a5797de9b127c8abc06792a159feb76dfa55265edd52eef4e5db977dd512036cb515f
-
SSDEEP
1536:OP0NCT8xaEIm1C/lQjHG0RlgEx3A7XaqhKzCxS9AUNrWvHeUshLEYnW:TCQx51bBR9zUfsJEJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420704659" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17CC0B81-077F-11EF-B73D-E693E3B3207D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2500 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2500 iexplore.exe 2500 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2928 2500 iexplore.exe 28 PID 2500 wrote to memory of 2928 2500 iexplore.exe 28 PID 2500 wrote to memory of 2928 2500 iexplore.exe 28 PID 2500 wrote to memory of 2928 2500 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b3342fb2e8ccf5e3adc00eb8cb5084a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538f87146296f8e678ac335d34b51aeb6
SHA1b069e4e06d9aba28a432d160b44119f2b354dfb2
SHA25673d3a51c9a191a0470133b6c67cc3343bad1d07759cb5990acd33ef8453deb47
SHA51221e9a1ce141398cbe93c381727cc6696f273638151f85990a8200d562c7b04a4b6e98091762b909c7befc819a639ecc701a6fd868d34ddd2b3ec0a05cb7173f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a106b6b3b8b822c2f3d56089e0e9ebbd
SHA16f9048c13232de53eded5f7043b97943b3f7a5e3
SHA256b8c5fdc807b234c32f1002b477f7a1e2d2b063141d809c381877b658a8ab7f2f
SHA5122fb94d6054503120f4c193899f6e2d03b76f3ebf455e9397966a32173cb135d2729b6f7ba68ba1d14333c200bd0c5f09cb91656dfb9d3572f87052efa327b133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fd670d60da11702b5d85456eca79397
SHA13c1dd583c3cbf7bb68ec68accfc2ab327d7250bb
SHA256f5256ad20890a2bbeca562120822f9c4015dc19478b570f3394178e89dde12f2
SHA5128d8a42d4253341847e66ff6e62ace4c80ccba13cfab4a4054abcddcf1d354a390577706a6b249d462119c5330193583a6d71abc749bed4f3e9d3e77681344e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f0dd2fe73386a19daec5fd5dcf4d905
SHA15a3d2a1a29e9f40d6355e0c3d0a4a4ba3a850513
SHA2560cfbcf15295d53016b29296d8a6ef2f3aa1cebd044430508d6a08a0b73973b52
SHA51207f6a58128c25a39418021a9b5b7903ceb18d8ea997474e8360ca9b785530b9d7a84973609d018cfb19286569cc50f0fc6d1b6b6f3d2950380c1fc67e4afe48a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55164c8dd7c8f6b699f77659707274a60
SHA11e4d8b1bf557e1b17e5a413ca1d44d55fccec8a0
SHA25604e0b20be52216fd1a4a3c79b6b1b0256e993c623f25d9813ac42b7e8df7c477
SHA51262f7ba3715b1de572ea9116c40f639439a541cd88e25f87cffb3a3725525b381189bdd1e3664b482648f73974203b83549a8e395b5f883571fb1f42433c6bf72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb7fb035bc8408809b088c6ba3645a95
SHA169e24aa79fd210e2b3604ee3c60757f14f645bf5
SHA25665510857cb05e55236c83faf042c1dec9631a432811939f8d80b7fb28e97e419
SHA512797db3bb7e46a907bf4eee55c5084bc7c6b95530d2c6294a99f21970d3197f6b1bdfafc013be955f54d9ecc84b94a4bdbe0f2312c48ac93d30c99ec584ece60e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5246955fc3687491bcc246e7c0ce1e32a
SHA1e662314f2d9ded4dc043bd6fab29617fdbac229b
SHA2565a0f288e080f13273bf56f24acedf2ed5e5fa18ae401c38ff1b2f0c4b8f5ea86
SHA512190b63c776f8270531555347cc087bc76022c35f0b832c60a632816b4e11eea0de155d995c0dc9b7cfa6d0371f45a137915df4fbd4cc20c10e696e846d62e526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f64921fe4cbf3b31bdd96c30f2dfe1f
SHA19bde368664404feb36fc40ff9971e2f18b614625
SHA2562e3119203d3e9285e9021cf9a8e6f35e86ad8d502a0b2901c1a2208d8fd550c2
SHA512dd467c586ab6c39db9508837253af024de072cac2c94d9ee25503670db2dc3521f689a4f98b016404cdcff201e14cfa2fe70a79cc6103994df466c6b5ae2d1ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5716079f55e83c84a91229f2a8310cc52
SHA17bb908a76886d066978fdc982a264d6fc357e2f8
SHA256454af994bd82f66ea6e114302b539412363917d927a374864ee07bfab69602f3
SHA51211b74f83a23b0ea657c98c03d3f566f3e1001fc572c1ed4ccac556deea070e6a0b966654a121f1a48138851416770989a7759d03863a1d507ea470198f2e59f0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a