Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 18:05
Static task
static1
Behavioral task
behavioral1
Sample
0c7971d888c2fb9ff1f4e866da23958a_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0c7971d888c2fb9ff1f4e866da23958a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0c7971d888c2fb9ff1f4e866da23958a_JaffaCakes118.html
-
Size
19KB
-
MD5
0c7971d888c2fb9ff1f4e866da23958a
-
SHA1
08c93cae2c6e1c9e8c4594b479af4fa679a04142
-
SHA256
39c0b11df2c89df38c51f7a5dac7247675e1cd9f8bdfa40c4a394528f718c40b
-
SHA512
b6b2c484418b9c6a51034ed925a7627d7e878c3433c13b1f250c515e29b3366c217a7dbffb97142d03d3b2a8e4bed830a374196e30432252c943c3cfd9761b1e
-
SSDEEP
384:09jiOTCiTH/jIB9gfOoLLHmDE+S/pJh2G2MswYBo2Ns7YlRS+a28+Im63HrhKqk:0JzjIPg/uf+v+Ir3HrhKqk
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{556607F1-07E5-11EF-9A67-52FD63057C4C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420748574" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2484 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2484 iexplore.exe 2484 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 3044 2484 iexplore.exe 28 PID 2484 wrote to memory of 3044 2484 iexplore.exe 28 PID 2484 wrote to memory of 3044 2484 iexplore.exe 28 PID 2484 wrote to memory of 3044 2484 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0c7971d888c2fb9ff1f4e866da23958a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5565f3e16a2b9c32cf6e8a274eeff5348
SHA15bc8b0f98a277880cdb43d92cd8d04255ba4136f
SHA2561f5f3b0288bb2cee620ce024104cf0bc3b1f67930c9aef276d97491bafeef3c0
SHA512b5391da49ac1a196a228ef76d2a806df9e3582f647f05d951350e5a08c11b67f2e67c0ed313a0d744e1b4482dbb593644abc128fde0a9aa85014cf4efa9eec31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b013d8778b96584413713695e68998f
SHA18d6b94981a1131c2caaf28bbaeff99df26000758
SHA25675ca85d00a906f70b5470ea56b04b16e0792a9ef50775deb5e43698a134b464a
SHA51248ebe8e21fbd2f201674f0478af34932ced45cbd3d4a388c4b1b4731d624efe8cf19d7efa9f7dcbce2f3e87954b4bd5e32bec312171f129305a9053ff308949d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a86f470d98012959eee10a7e9dc35790
SHA1cb81ed428680f5ce8eca4a5d5e6524994d20bc63
SHA256b102c53e0ff7ad5915bd758fd12abc885f01392c93b50696184a780fe158fa7e
SHA51252fe3961a469ed4113b8d016fe6eb2e685848e1eedcdca8d8d4baa08483d9ac3cbd8d92e7c4ae108d593d60ab872e99e5b3cfba852557711220eb7b547750b5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519f9e50aab1fa84a5a2a273c1c5239b2
SHA1e6af8ada3e967caae0ea65400d0e70f26cf0c46b
SHA256df644ac9e020251e8c864f9d330e0f0ee92039c29173e3835d7521f16e45c93c
SHA512384534a42337c0795da359a290a1bf072eadb77d4f377184a840f8455add10c08418def443c196f9f65f682eb0d86034540ffd6388dea1d5fe4e0e6c7ac262b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50596bdbc3f6fd734dba064e28d591b49
SHA163b9249dea25dc9fb039e10992fbe960860e89ef
SHA256434f338e76985c36ff115123556541317832ca90fc1ccfc13cc8b360c17177bf
SHA5126b6e8ac065ff37c1f3f8cc87e9062fbaa716be8814610e25fc82cb64ad5fd4de573b4e116c96d7e6f996e38c4e7624f5436c92a4ea4e7d6e600091573f9ff3a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd8c6e9f650d1cb366a011fffad79899
SHA1d4aeeb4aa594563c229402c506d373e4dc257999
SHA256dbce957da0fef47386b55ee62fcd8e7389491c74a94b005d841191ed9a40da9b
SHA5123901ce85500c2943eb174005e1d708549b8f5e774e6a4cb1913cae8921346722e6cc7127256a3a9112e916eb78cd88fc74e8292aa6ac5f13bc8078c8bb93662c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a