Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 17:14
Static task
static1
Behavioral task
behavioral1
Sample
2127ca3e2cbefb854156f32e0252c8cf_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2127ca3e2cbefb854156f32e0252c8cf_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
2127ca3e2cbefb854156f32e0252c8cf_JaffaCakes118.html
-
Size
19KB
-
MD5
2127ca3e2cbefb854156f32e0252c8cf
-
SHA1
80c744b40f842741e8b346ead11462bfe29d293b
-
SHA256
58f2c1754e8295622b1850c11f1fc4cc06c10e44da37895d850a3d221c79fc57
-
SHA512
a4742b7785cc0e71d4053f5fd4eb05d526c5ea67c767f327270c50c7959fd8308efad77dc14250fe6fbd86666cc10038fa5a77e01109e93c0002758f1dd28da3
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAI74BzUnjBhb982qDB8:SIMd0I5nvHdsvbmxDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421263964" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{53898AB1-0C95-11EF-972F-E61A8C993A67} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1940 iexplore.exe 1940 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2964 1940 iexplore.exe 28 PID 1940 wrote to memory of 2964 1940 iexplore.exe 28 PID 1940 wrote to memory of 2964 1940 iexplore.exe 28 PID 1940 wrote to memory of 2964 1940 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2127ca3e2cbefb854156f32e0252c8cf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5098fc7c6bc3c83edfe8c0edaf2678c6a
SHA125c2a309d733044d372995172c9d0103aee8e12e
SHA2562d3ec3ab3924610afabb583d203eb99b842d237442fd3436c4995c55a4ba644a
SHA512f78774aceb390671722a37af376f026076183d17e9e879dc99f43bb5c3280f6755668e74d8547e95d873692f15f98886106bebe5073c78735059eceedede2284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4330490db2f3195c9001904f980c01f
SHA1a30ca6bb8343dfca6087dce405774b8fa0274a92
SHA2565b59617e7208865361b7c0f0bb1f90d42e0572298e8dc31303a2f63e9a689871
SHA5125d879dd6bbfd27702e1f3a872e15f8d54bacce4e8266f14edeebbb37032d64b7e2a29fa25713942435ad6604c3e4cbd8f970ce1466115df7b99f219657826ea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5f586e17e43b9b4108cf028a8504ef4
SHA1cc34ec14e8442bb21c89cb40f432ce8d482da25c
SHA2564c08cb024fbd6ed74a6d4f34040b4a856c5a906b5d4913ca60373e909416b89b
SHA51218f94edc9a554465b46a49acc8cd360b44b834797839e3ceca39fe778bf39878bcae03cc50ae901dbf0a44809affb29e638283d793d1372f8eb368f079b24ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac39ee805748373ffad3da35a0234b1d
SHA1de8f5f878ce3a72014e901bbd22e13fbe961a6b8
SHA256a5b4afec30cb68ea1b14185c3431e680847b6299260ec9f70412f8ba64b9dde7
SHA5122566f30927efa2c6831a79d77c42a9a16ac6706d2bcd95d58569cd68c3326ef553ec5f0240aa2fd6de48e9f959c3bb02cc845a3950c7cae6085a0c3b8e213d26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a433b8e15c90527a74a0fbd773daaf2
SHA1a77b6ec49261e01b789f813a6391ba27cfaa02b4
SHA2567aed4f613dd53a18659d0dff346018ce41eb8e6c3f9ad187cf4776d526543cdf
SHA512688ba09939bc40d16c01ebbb749133e0759ee4f96d73aa849e9444f8feb2ed6aee24afeebf1fc1239e9081cd24770b205d98dfc9b4ab442db15cd3dbd748d949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad30292c483583de34b0ab577a4af6c0
SHA1d3a1dcb99b1c2d8231ff4e0635e2969ee84522da
SHA2562d67c101999517fdd455391b1daf9bf32d07c6d7b9eb5465cb0a1645db306aa8
SHA512df760e5fe57b4a711750be7132f01303d40630cf6d76de92c8bd68969e01e0d4244dda5319cf27c163e2985f83fe525da7147116b81ac36d1a93d5ebd70a9b43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a995fd30818e275a9edf97858aab651e
SHA1e3dce567cdc03fb824fcb6812097154dd5ae83b0
SHA256daa6bdbf6c5e218db3d9bd057e3be963d29e753614e16e48828b4f695456eb62
SHA5121ed2fd84ede388f4628861129c380511ffa69e331e9a969081cda44ff09dc5e9e73c30ea82248a30a25866da3aa80c7d89c2004b6d57e09fc6ccca32d0347285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9b211a19a4362dc65156e5071d7dace
SHA16920ed5e20664ecebf0a1af334252424ee694154
SHA256e53b6a3ebf849051250cc7351192e937f563718e4e75ef2886cb08a765f95819
SHA51205fbcf5fee588448a0361fbcf51d976cc3686913abe80a954409029d81974fe633d6e30c0c42bfc7e554833e71a3efa7a966887c1b73c5bcbbec9e4899ffdd64
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a