Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 02:39
Static task
static1
Behavioral task
behavioral1
Sample
49227a10ceeae5cf7d911db12ce623d1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
49227a10ceeae5cf7d911db12ce623d1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
49227a10ceeae5cf7d911db12ce623d1_JaffaCakes118.html
-
Size
28KB
-
MD5
49227a10ceeae5cf7d911db12ce623d1
-
SHA1
5be715f76b668e35fd10b6ff18026ff80a153c8a
-
SHA256
d45db9df3555c4f5be5a55ea28c3cb50ee58f3b8bcaad5a3fb5c6ddc3e145e43
-
SHA512
ed516ea3efe36636b0c0a342a82c29f42b654fdd2e0f1d2ae00440794f3e556d27170cfc648a6e71af1f4a46f22eacddcebe920f0a317f9a6a101b832f147770
-
SSDEEP
384:CyivjE2CpfZ3BA5x9LohME/EGEeE/pyEHE7E3EeEDEcP1P:Cyi7E9fZxELohy2P1P
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000008713ab982879242ca16f0c6684663d8e5e86e969858486c2febca39d80eb2bfc000000000e800000000200002000000011b8b9a95bfff3b7bb35d88586f4598d70a6350eae73f596d2a8f3e8688074ef20000000ff6479106040e8ce6d8b536485750ac4ef00e0653362dfb933f6884e17b2930440000000f292e0ae5d21188d3c1c8609122d0fe12eb6cd247e4d8b540220d6e1258c96c8265f1d4991a9fa5d4fc4b641f599559dbaab86e2c3e611a473b93e34dde91e66 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77A15AB1-132D-11EF-A002-FED6C5E8D4AB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421989015" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000001eff8d4f7c736f3d0d0764a4ee0725274c21a81b8248d6d16c3cb7ae2d8d0385000000000e80000000020000200000008e1de28c1499a597ca3506a4e70176522e54a02f7821045681066454d5d9673490000000bc4a67a86243bbe430686e809eddd2f49259e505c7aa09a31e2d9353cb4443368e99c926b4e7aae0c76ac22aadd79677091cec46222d79f509a27ca3954cfc2780362db1d6f37d699f3a94b2e9f3aece40809cae1c90fbcd1952487417fbeeae8a4b9c5f427a564ba81df646abd924fd880b4f395c685668a2d4e98a35c64eeb942af547f29618d30dbb69ce0087fcb240000000693310aa12cbb0f8d3771f05a512ff4f14c4f747751af632ffa52dcc04ccf6fd768f1f776fed75f1d2e7361572a9ed4cbb111ae518f7c98c958340e9924d7fd6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90b8aa533aa7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1148 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 1148 IEXPLORE.EXE 1148 IEXPLORE.EXE 1148 IEXPLORE.EXE 1148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1148 2348 iexplore.exe 28 PID 2348 wrote to memory of 1148 2348 iexplore.exe 28 PID 2348 wrote to memory of 1148 2348 iexplore.exe 28 PID 2348 wrote to memory of 1148 2348 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\49227a10ceeae5cf7d911db12ce623d1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5699fd5a3fe046112d315744f7e19ddab
SHA1f1c0ea2262fb74c76dfc18294ead7fa83a474fb7
SHA25673a56e7ba4beb8286dbe09b60e61f08afb77b61fb0a8998f88858c79ce86b81b
SHA512667e116ad95a951eafedd3013cfd48fd5cb1e513cd61ecb04152741d603fb5c071ea124990c26d77acf14b33151a975ae9250b26ac0f3ed6adbc6146963d78d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8ff0930231fafdb1ae7d027a4e6d7ca
SHA1026adeb1aa7e7a8595eea2b5700465983856c185
SHA25625701c021290201494bf2bcd2ce987f76e830650b1713dbb7cf387f24a711729
SHA51256aa82c764114bdc0cc7a2a0b2e764ecf7b10a643e5ab09723998de46504869b27fd06adf614ffd5fd0ba02b63f9f19362630cf47f8820bf73ab71ffb8e3bade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cf1ff2de8db2c549c0b123f95cd907c
SHA139152ed45319111bf877a483a9ff2078e281d8ba
SHA256282d0d8bc86c8780ccd1591be6423e702ba2601c2d68cbf669535b94e9bb9a2f
SHA512cf094c72071a48c495f096e5d167f0ee9832a89516fa09da932c740ddb2798738198495dfbd01c9264293f4a44644411c6f36947885b626c69406446fadacf1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1558f56cc93462b89665f7163bacf6b
SHA1354ba97da151fd94c903117b0f19005ea9750f8f
SHA2566759a2313f54701b8028845e86090afc1cf8615dc17d779c11bd179ddadad7d2
SHA512c3517487ea6d923005b91ba6dcca9a6694d10c34adcd5641e7e4287ec35c92c918ac216a720721a3bf79f0e5dd8334836998c74af61a01f904a0cc9dab5b83fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5143f219f94ffe153f7596e7ceb89fb1b
SHA1e1b8d3881a63dfaf7148e898b6e2ce36078bd561
SHA2564f8fe4c4b36929f7f6ac607fc7ca03eec4467be1fa314d2682c8162fff9b52f1
SHA512a8dad8c56e56aea6a31d3432b552da5ce8c9976dd00d15bcd63f746979fc3ef373ef017432824ed77e15e650d3a7a032b084cb7a8cbb02a92a08cf02a5b34d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575272cb967325e151a1fa98ade17ff85
SHA11f55232e8eaee69cffd2aacb8cf7770c7c653b8c
SHA256083a1b4103ed9ff3d039bcc51ec77f2b77ae9e6f738a65122325635961d53bce
SHA51203ce21e01c3d851a21404d1a3cc037a9bf4a4bc180bbd9d18641cfc672163c67e04256a55def4bedf40162553c0509d4fc7ba380a845e5cdad28a5371a982a60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ef0551c57f74e83818ca50063ce5011
SHA11486b1f4a6aa86f5d0c4ce54e56be28fb563f796
SHA2564d34a3e2659215ae68e3858847d47541d83c0017f4a1772b46daace8194f5299
SHA512e5ecfa922d69efa52ac9e57230d18439c40def2f00d71a0462f23e298f98fec48281030d3fd03eef52a9cd8d0fe896af065454d6f40d59ec68354db265ef6b54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a38ebdd22d78c9dd7108d3a85e0a470
SHA113434c2696eb5cebe2cc9766ba2d645fb5c6b5c3
SHA2563bd16eac45610c0c6afc3ba4259a6d275dfc264835cd6d24d2bc66cb1ed26295
SHA512ffc254a1200bd2bb93b8f034f76a0df08f41f424cc2a4147168ae1e300f27a315b404a7a9db5aba3f9f8444b112fd0674de98da02b958a864e36d831671f18f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dde525e513dc226a133b8e4752e519ab
SHA1eaabea03052f8226f2c727cebd0881992e3cda8a
SHA256370bdfc3b37ee2d1eadcd04b71eb645d21f2341248e1f66ebb7c9a06d61b13b7
SHA51282807456d56d628dabee25c6408b8c305ea71b08cf6dae224959e6acbeff8c5b281cbe5b778ab23fe5545427dcfea32a5ed56be3f0d7b0018a1852a7aa5fd40f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55aa8e70637a777ed221fd01b06b4ef18
SHA18fcafbbf4a309200bea68c0ad2b45d8544111755
SHA2560c50492d8261f2fd33563e91e7ebf43469109ff0c8d6a292fa2fdaf62d921615
SHA51267e64a4763e8ecb104649c8aa1e88c92f13e1bfeed042fbe1f44e1e6d255dc6af1057564cf30d0b683fa24cb90648afa7a93388d982fcd20751fa5d89cfc8f9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a38f24d6e06b1f501cb09c614d64c05
SHA18a5f0ef09fc3a4e32075dbb97cb0793b82471c42
SHA256b39ae2c88fa68f5819c524eac3ef8483df6f527e0ff93d98cab9ffb180010b82
SHA512562c308142817125c7f1b870dfee001a303aac037fcc83a9938d67fc277ca620f90d22a49aed43921ec1b67c67acb4db0c22a89a59ba8a8fa1b2b65fb26729f7
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a