Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 08:33
Static task
static1
Behavioral task
behavioral1
Sample
11e8b818d577a33fae48f02c277455fc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
11e8b818d577a33fae48f02c277455fc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
11e8b818d577a33fae48f02c277455fc_JaffaCakes118.html
-
Size
437B
-
MD5
11e8b818d577a33fae48f02c277455fc
-
SHA1
4bc0aa2b3aef679f84f927a1c675d4ab8fa93be6
-
SHA256
732889819b832435bd3b5518ed58ff5e0446e92be15811c1b3209e5b373ea984
-
SHA512
d823caebf7a79acd3003b1b4eda193b514dec275c8acb1c75a3de299af63e14998870ba50c44cc9bc795c63510e8eb0b0cb94d134185730160f7511877292101
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420973465" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 309bacc9fd9dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F53D8F21-09F0-11EF-9C17-5E73522EB9B5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000033ad7816eeb12a1162f73a97e86a826407bfa7dfa8ae14ea3efa4ce35249eb22000000000e8000000002000020000000f0b9731b69879ffff08e93e9cba9626e6f2a1691b6d191dd5b42bdd7e052633020000000e1eba10e8ae88a11a40a495d4fdf69a527ba609556a737fe7d3aafdfe604ab3c40000000ac36767c2e349abd7aacd310f635a3ab145382d3848830a7ec331301d8b2e7f3ba6e35ecd6398700828ad0d49c8340fe28db5ea7b4227dcbc3906140a026feb1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2272 2096 iexplore.exe 28 PID 2096 wrote to memory of 2272 2096 iexplore.exe 28 PID 2096 wrote to memory of 2272 2096 iexplore.exe 28 PID 2096 wrote to memory of 2272 2096 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\11e8b818d577a33fae48f02c277455fc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff45a73a356734d75cfe6a3919a02109
SHA1ab0c9044dbc36f698b56ec93acec2e3ad7b3e6b4
SHA256dc328e492e7d17ebacdd361ce39321a1b7cb905aac6378df58fd373685735876
SHA51250862e57000a37898beca07bd9a0590b762ff5fb6344df725ee5a1e05b6c8fff2dd5e0b9798e28da34f5409ba01765093296b18d0b1b164b42887a68e5d92140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533b828f93d916002407ae5761358e0ac
SHA1b5b06559a071102f0fed4fd1f90ca7cbbad1f995
SHA256032dfb61b175ed1826667fef97731336483d54be8ead138f4b3dda78388a61b0
SHA5121e7f857263aad7211faa4f8c5c481b64b366a33142e8f284d328976e5127a45c61ae14cf01627131b1a985234a717e3e3609ed99ded52a52c92f3da3e5b0621c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd4db758c068756e53e4492a31919885
SHA102aa8e702da8c7a0f72624e2d83a2100d556e4e2
SHA25603e522909f44472367e4b8e2f9dc23908c0b4fcdef53a5c38f5c8ae4f44f8c9e
SHA512a92919893efd876bb577f4b4d4d7aea8bfba12178a0ed89e14f3733acf1d36737d2e340cea70d4d3f2d7423917f7130837e1fc4ccf40631d4eba0b2712139de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a426548a13768327ab6c1868ddb6c27
SHA16c5bb267800939f3264e1099b605bf4eed88c75e
SHA25693a5ddd11f1d98dceeabba3799854d0c0da9965ec3eef7c358fa91d016a29308
SHA51230649780047d8e33264be6b18954665202ead2fb86127e34c0069367bbd3df42b710ed8ae09e3b45f7bb38636d372dbe6a563f77aa24eab47393d66996250d48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512c5d8b49855ac48a4db8c93371d9bc4
SHA109afb387fb8dfa9d122f2fbd79e0de86c20fc52c
SHA256d545472fe29743570cc3421ce965878f449f90e232d513f33ad7dc331cdec085
SHA5125d39a5d2f1e31ae8bc2e279058539719477ba543ad6de26aa7466b3cade7bbf3f4021a7d852419cd54717c2d37cd269c8fa6cc84fc7a97bf292e936e241e9c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f663d886a620a30fd831782202d98a9
SHA19fe33f4d67ab9fdb1731e58b72a7948fd490f27d
SHA256464ea45a3b6a922a1c3bf41f6ce2550e6390b79ef04f5f60a4db77f05aa94924
SHA51261fec65de9a7bac05d002ac9ac26e623e300915cba08611ad87def826fe704296ba395efe5095feabf169c9380f1c5538c8effb290207bbb67ef04283b810deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e07727866c95da2165e9d20f75b93ed4
SHA13f3d0d34dbc47243a786b6d7233ea75b7b152e39
SHA2560bddc6dfed6e7fb9de3ad1291aa56dbd12650d54018e6ad9ee478fa55cff883e
SHA51256450b1247c8b1a9c846da808b0858b3cac25e7df14c4d8400312ed1c968310155c28e479d6284a601aeaab83f4b6848756b1286ae041942aca68e04a7b107aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5818c3b6a4d617a6eeac51e7275a6df23
SHA15382509b8a3d410b842be305043d3a8e5d16075e
SHA25679d533cae15acba0c763a87d658cbe992632ef1758e9a1f68d8ad09904ac43da
SHA51202dde72db2513478c0187c67258e9cb8d23807c5dd5ba3b94a803b0c1bed1471d9923a2fcc5eb435001cb4f40acea3376d74cf25a546960c2413713418b6a415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2062546792b6e0d5f8e288ff30bed81
SHA1bacde45adef848fe4613531aeca2a154e1708cb1
SHA25608e1e9ba6ba6ab0ed7c9618ff69db8a064aad932fd1c2d692b6567719b56752e
SHA512e83bf9af74eda05622facab45febb5de95f53fa934973990f0e5ba531db07c93327e6794f41e404e4cf097b6d8746b5fbcce1a49880a56d007a56dcc75a1ab98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526cd427fa8bf9d6f257813d5867410c5
SHA14e0e8a2c999e0ec2ecab4a1f722aabd025b112a1
SHA256a050d231b5ee0b1936d09a37b99b0c76d032c59991e5dee80760a7c82247c581
SHA5123c62c9c2a206c2f4473902e60bc860cb77595e56affcda1851e7047aa30ede345bd5a79cd01bf99e63feceb95bbad32b065aed6407b78607b2517cd5a7f1ad57
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a