Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 10:15
Static task
static1
Behavioral task
behavioral1
Sample
399635bd7e47d8eb7109d8b7b637cb45_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
399635bd7e47d8eb7109d8b7b637cb45_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
399635bd7e47d8eb7109d8b7b637cb45_JaffaCakes118.html
-
Size
67KB
-
MD5
399635bd7e47d8eb7109d8b7b637cb45
-
SHA1
19068aefed0b42b9738a77d93d4ab9ef944815d2
-
SHA256
32f37df957e054337664c92e42e2f17d8fcb0ff34e9a0d396b13aa1f1e20e69e
-
SHA512
ef93a080e95aed1fa49f12d5078181d4bd4fc96b796d377ebd6e4d9e97441bd96eb441e819e7d9bf07b078111052f0ad5005a8f96765e2046e1af0cfbfdfd11c
-
SSDEEP
768:Ji/gcMiR3sI2PDDnX0g67M6vDoTyUZwCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:JdnTbZen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0b7e56555a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000238a1699e88177c844f75f170ada1b66b7fe9f297e49a75746d6332c888256a4000000000e8000000002000020000000c4d36f86522f4853ddb68bed3b928612b520a130f51e51c756d1f2bbea1dbe3220000000766eeaa9013c5be408a734fd5ca1e644317a5848d0c0cd3161de603223f2acf7400000000a09a9a1aefc519d50b2e69927f2e868606d342cd37c6b196d5c288416c7f795aef531f6d739064de53001b6129c2ca05815d341ef2988c7b528d535186bfd64 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9147D3A1-1048-11EF-ACD5-4635F953E0C8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421670801" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2136 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2136 iexplore.exe 2136 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2924 2136 iexplore.exe 29 PID 2136 wrote to memory of 2924 2136 iexplore.exe 29 PID 2136 wrote to memory of 2924 2136 iexplore.exe 29 PID 2136 wrote to memory of 2924 2136 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\399635bd7e47d8eb7109d8b7b637cb45_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6cc20f75e27665e353529595eb0ee32
SHA1a81881b083a1df87536e5e069b9b56a36618a7f6
SHA2567dc556e0a8032132c74b13c92755f07fdfb32a7a02888d6e04002094e3d970cf
SHA512b2fa51b25dacea56cd2c146413f3edb9faf7ccb7193af4f57032105bd4769c1b6b8bb72c435d940ff1949c41805f189850820a1bc93d85be4d47ad930441b15f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a7117c1b152ea72684d4cf691dc16ff
SHA12e10cc5bb41712c38acb128ed3d89df725affa02
SHA256fa33573e788afdae36381dd67aaa89818d3c9e85dfe2e1065b3829194b888dd5
SHA512cfddfee51b581720685532666761ab95cfa2531527f0784291b5704f20c811ce66bba10db5fd8da6ac8173a026b44901dc0e05d1c5ff5697c158e76a79c1cf25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a4617b96329976e8894764b3cced87a
SHA14848197c2ad8a55fb2ec4215fb9e90dddcfddbba
SHA2568490f755d713f2468cd9d56bdb78660711854d435481de98a7534735ce00355a
SHA512127c7080dfb39bbce817f780e3bacc52f2fb0920131551a03a30531bb6f7ef16f8bc1b45cd65efe97797ee06c543b58c8f1bbe23f13d00194eb80936603efffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5bfa59db2e50e14d38aa7433796f651
SHA1bdf823cf24e8b22bd3712be4d78b024aabe9e2da
SHA256c93c93c2a51503dda4affad8d881e69b97adc84e0b704d2170d8979bf012f77e
SHA5120cf0fae300d22909e39e4f3bf195cd4d58668a8391322fdf1a3acd82923c9ba27e88e6825b31a9e8858ea5374326ed77ee6ccd7a5d2be4d7cd57e39b6b78c8b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d81a4812e1b11e07389c0ebc85bfa908
SHA16a2b49232aaa0a8a7530844198616bd6ae072514
SHA256b15cdbb2116a9f642e13fa10d71d53eea9eb4f87d5a36760ecee76e077480738
SHA512305c813c270bbda4c99cf2a6c3e1b4e7a6a814fab85802ad62d61d3926ce9e05ed34feab4e7f4834d01b5eb2adc666a5553785a081fb069dde8866081ffb5e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e57c437dfecd08708384d4dc7aadf1ea
SHA136024cdf0ba4a7afd6c01c6c49e32886431ea96c
SHA256cec5602c8cff8b9264728d3c3f0ac31e92fe0b646618c78a69e1635fb4819858
SHA512394aeb2ca2ad21eab128d391fb67e18b96274f46b3c72f0f44a79a6562daad79d825ecda58f2992e7a7cc0d271986403436f5ebb1e9455ea715b6f843bced67e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6a48d61a6d4da9f0f0ec24b532ba922
SHA11da776702594b05855ac10b905f81d0b8695d9f3
SHA256c4f9d640df235067757dc491b434a9cc37b897da2c43052184caa72f5731fff5
SHA51210da551b6464e25384a6264966d2b944007e64fb66d00e6813df5bc891834eb01833c677538c3ebec8f9d171ef5d33e44190d6cf04d973b8803fc4d052a3502e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5667ed2155c1320ab384be128ca408940
SHA19220b90dc7bd51c50ffae55c33cc708083c72c08
SHA256820b9f488529b43ac9b98627ac5ebfa234caa075a8fea4ead175276192bb4548
SHA5127ca1589441f41aac9fda9523ac35514777f6c7c3d358eccd7c14b889ac7d81522414132a48da81747f00dadded0af69cf1aa570178c2421e1c6232c726dd9d7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5104f6d90a5607a42ed9c5e64c40abe63
SHA1f21b465c610181413df77068a3630f6cdc00c54a
SHA256a6d6e3fe265ce4c1ee92c8b7a08b679ac234a013714d46b4cc9daa1081390999
SHA5122b3cba53f26f1e54c6d43a3215e73ab36d001dd5148a07103b11946c3d3a6bbd3f3d21ae8a7dd0dfd43d3cd94f3cde636afb355423a61c114cc24455fe4ef7b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec8ea34e190ae468540a74a1ae81c11e
SHA1fcb50d31403c0dd92e0a85df6d8cabb24bb63ce9
SHA256f234d8213ab4b6ed6679816d70246893c906a24296cd63bc5655a1f544f4b0bc
SHA512bb35836e55d56ded49ca9d0f5bed29677f9a06fb52a041a54fba9dd3f7443a3a4be5be85725db8fe73824fc62f3ba7689b8679b5decd4035d1666565e1c8af70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbfa97cacfe3bae35d818178c7468f1d
SHA16640560665dab669473cfa0032741c0049696a41
SHA2560c115fe0d163cb2b5d3ffb81a2b36ecde7b811682608d8a5b460def89b839254
SHA51277501a617505e47f4bdeaf974d908a94b0f22d02b3a7be253b033d0dfe659004ae652a525ca821eff8fd627cb91918a978cbfa40cbb18798eefce7133e5057bb
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a