Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 20:02
Static task
static1
Behavioral task
behavioral1
Sample
42d618217e9efd66676756d2e480c9e1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
42d618217e9efd66676756d2e480c9e1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
42d618217e9efd66676756d2e480c9e1_JaffaCakes118.html
-
Size
72KB
-
MD5
42d618217e9efd66676756d2e480c9e1
-
SHA1
b79fe1d8033aedfdd54088245a3c556c0c4182ed
-
SHA256
8b2dea66b630c24f8a764d068bdc8ef1a58cb38f731d88e66ca6c879baf32ee4
-
SHA512
6cb536b7066f088b5c557df7798e45443f9ba4e8307a79420d16aa0476da543b2796cd64f161f1962a45c8b5a31247004947c853f3a569b02255b09e3852aa0c
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sU6Ew58cx8IiuBSoTyS1wCZkoTyMdtbBnfBgN8/lboii:J3hT9TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421878822" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E6EA52C1-122C-11EF-91CF-DEECE6B0C1A4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000029255c600097e72533b933846dd437a4c7889ea2f47bcf57dc239a4ad302daaa000000000e80000000020000200000008e7a0b3cdf6170605918a67bafff8ba3a4b411fd8fb38aa48853e5aa4ad0221d20000000d50524e6e9a83bf41cf67a87041a16f0933e76192362e5729b13bd766a690f8b40000000b03e3091f6b0e99cde2ac69d9833ce3a40014a82c5396e6a9dbe560e0781424e76baa2a1953822976f8e44f6713afdf6165a19c2168fad1550ec26171d7c5be6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ab9dbb39a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1424 iexplore.exe 1424 iexplore.exe 2000 IEXPLORE.EXE 2000 IEXPLORE.EXE 2000 IEXPLORE.EXE 2000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1424 wrote to memory of 2000 1424 iexplore.exe 28 PID 1424 wrote to memory of 2000 1424 iexplore.exe 28 PID 1424 wrote to memory of 2000 1424 iexplore.exe 28 PID 1424 wrote to memory of 2000 1424 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\42d618217e9efd66676756d2e480c9e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507cb4f8160d2f69467fe70e93dedebdc
SHA1aa7b9d597f6946bac29e88cf4f795acd7a3dbf7d
SHA256824ecbb55470579238bcb3a671bf2c38427f45bc7b29b0f34987a5f789c5fc5d
SHA512aad9bdcafe2c00f0cea9c919b8fb8fe172276808b2f958452022687ee60c6fdfad3344f9b2baf2bee7b17d5402e0019a299acf5041d3603482bb1699487bde7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512a0a00822526b71caf32651a37f3ac1
SHA1dd75f75d30aa7fd8d91cfda37a9035e629d870dc
SHA256f9713efa7b623e3d59f5c0cf000ca4ecb1e5f2587423c0184861deaa35705112
SHA512144aece4a71e7a22d334ae82bdd5cb622ffbfdb434ce84e2440b99c0db13c6c7364fdcb2dfb8d3eff410da719318e1944e83ad9c0102dceb43f359da48b2633c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e81a74dc3028d4a148b87175872d2bc
SHA12a54abf529382f137e958e2afd46c40e681586d5
SHA25630d60e5aae2950aab65ce6074c9f58bf96948d146451432d62171a07dca6e521
SHA51206b32d0f6e679b2c05159e17901b4d17ed9fac6e1fd2fa5a680dc2395b2737837f2f1d6aafb7d63d6c65f790a61e03559dab7891b5a40d017f6d1794931cb8fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5535ad5de55db30dbbb618fa212130d6d
SHA10c136adbc2f22762c1be37acb229c3c3c9c6a4df
SHA256c63f88f1293028f15aa264d9c777d384d9cd046282614f3be7bcb4ad5c967a85
SHA51295fc007740eab6a27bd3ceea2de0e86486f0837290af78caae8a733aa453228286005b9c2ba21bc3ca26c857aabc7d7da94d106ac0d7a7a4f3495654c6372974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b706f39d411866e7c2f524cfc6fe5fe
SHA1e9990d261a2708ed9f978761768c9b57e929dedc
SHA256e5985d4ca7af504654550e71d340842295cf16dad09f0a633dcbfe290850e11c
SHA512c85896913346af59bc8c06cbbbf464b4d52cd6e06ddd656bd5f49969f5f190284c945cf19c92ff04b8e7bc4d74c3a652296b0355389b8a7e156adeed74ecc09a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504aef22d4f91c4f74135ca68469342a2
SHA1a7901ad9a87b0d3e0cb354ac9dfe78703b7581c1
SHA2561832bdfa878f65c6700128c4a5902bc74b27d683ac4fd2e3e0fbe8fd410fe972
SHA5126e36a79ba900c1d07e24a66d7f966130b2659535795410ab9cc90141c41b783958284f8bb647c871c860386bc5689bcc82c50f6c2b5d50174aa17ff7f6b0dc55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb99bc69a6a2d29b17cf241a483c7707
SHA1ab4b6b6c10d42b193d36a91704a3aafecbfbe4a6
SHA25651cc0c894df8f98f3784c35800fd06c41ae807a5b7696573f5f47ecce9fc8b25
SHA512c10c9b7a0abe3c06a83bc63e0c4fc0745fe6084836b2f58338c57418c1a91567c91f06379f2dfea9046101606f53920a5baf54bae5624155599ce9715477dc09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fecebbd6000d3bf30c44db017f33f75d
SHA1c565a195d36fff4c7241df013a4b8b7daf679a98
SHA25681710f3ed3f07530c7232fe18eabc49245caec9e645548890bde708e7411c461
SHA512d5d14ff59dc4e82d44c675f5bb0d48c3e4458c19cb21f9c4aa42a012373986b652b065ebb6089cfebba632f7013bcfedb477a7f9651ae04c3d06775f927849de
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a