Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 19:23
Static task
static1
Behavioral task
behavioral1
Sample
73003b18d26c678d9d595b5ab39a8d5f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
73003b18d26c678d9d595b5ab39a8d5f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
73003b18d26c678d9d595b5ab39a8d5f_JaffaCakes118.html
-
Size
37KB
-
MD5
73003b18d26c678d9d595b5ab39a8d5f
-
SHA1
afe41cec5346c28d6d604c264465d07f649fa939
-
SHA256
00023750a8438c4fe46495350a1fefb88f03c9c5558c68feff0537d34317ce77
-
SHA512
4969146340ac437292ceabd395d75871092020d62e2dafd591eeb7204dd0430008377cc838fad53b4a1b68af5ce56ac797433b10385c106b7103ddfca1ff2131
-
SSDEEP
768:9RHoMHjIFZOsZumuxu5nKrXV8E2lxPO3fS:9RHoMHjIFZOsZumuxu5nKrXV8E2lxPOK
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4DC01051-1ACC-11EF-9F3E-D2EFD46A7D0E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422826894" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1664 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1664 iexplore.exe 1664 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1664 wrote to memory of 3024 1664 iexplore.exe 28 PID 1664 wrote to memory of 3024 1664 iexplore.exe 28 PID 1664 wrote to memory of 3024 1664 iexplore.exe 28 PID 1664 wrote to memory of 3024 1664 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\73003b18d26c678d9d595b5ab39a8d5f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1664 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a2abb33d7e9af0994798ea0818e7a13
SHA1413e94e2829361df8b0a5e2415f309f58388727d
SHA25653dc6a0ae6364b9cc9070e708fe7303b1d77ed63cf43b3242a8ec3b74e1b9d10
SHA51203a36be4db4db23cf62f9fcec987f391a9c287aa88b6d844174dd7076c5d8b396f1c113f9622981723c32547b35e7af6f22362893c22d12ece1812588e132747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dce17e3427e98d937dcd5b0adcdfc04
SHA1286b21f2c2b472e6e0378b6c748786b5d608345e
SHA25612e10f3bf341da769dd869c7ee20cf84cfa76206e3afc514af4096001aca5470
SHA512b16722c71e08152241544f556bbfab4560c03f63ee2ad4487ac8193b09fd0ebccf4bdd3e40fe2398c18cd734fa0dec3e1483d2407c9232f2ebffdb844e7ffb29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ff71b7c9dfb68d1181d205dd51b89ef
SHA1e3ccc300251852a455003a5804d49d259f5df533
SHA25603b384cb524ad0cbde96ce0f9e52550096102f8c7740ccfb5b1f76a3dbd99cad
SHA512a982ad769eb5a0e776e0affced7b466fab5d3433d5b8c4ef1999244834d5a95902815da55e51c9280f666dfd24982414bae2dd2923e9cef3bd3e3f1d4bc2466c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b751bfe6d825ad072c82714701d207e0
SHA19c8e302cf3236bc28b02ed3519914da7705afd6c
SHA256cdf42462f7e775cbf7fb5c744b8edaccc3de293ddd3392011e574fcd6ecf5436
SHA5129ae6f1089862c2175086ff7d7a4f6de83b4f42052774c196a74e0d48e0189ec6d07b9788b2cd81ecafe7d8dd053a28c1e43c5bc076ece43cbd65eae6236b8a72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51918a5ef661804538baab01c1bfb54ec
SHA11417fab3464b61fcb1d1e6eab31cd873adfd47b3
SHA2561b341e34fb795af46cbfabefedb0b0dc3fd47c5a3b2054f7408e6dcf384a5636
SHA51202723fae0c0853e8ae86b3b92d7388d9870d1e98bfdd71683c32577ba4ac2cd80f252438f3b5d22bbf019477ce3a625ce2b8b6e2325c968f0346b6e419aa194d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58566ccb4850519c197898fe8203a5f6a
SHA1506d3b873950f281ae9d7e2c08753c026a660184
SHA256000d4154cfb70394469cd4b68e3949d8772e18bf7102f2fb49b242e7c243bf38
SHA5124b93006a0d28b6ac75559aaf4fdb4cbe5a823a802260795f33332dfe9c3955e479bd5c98e492adfc1976f3fcf2ea14e4f8aaa6a4980e958632e932181108d6f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5755d996669743d8602905385a082b4f0
SHA16f5c40962bd7d2a5f51599223a0a02cae6c44abe
SHA256764b9ade50d4b44beca2b9c04970496bdaa80e78a80ddd09fd12d797d983d13b
SHA512d94b7d068039cb410eaa90dc397844b0c31a81c3ef68b9b03cfcb70f5c28219a7d2f0b481a04eb174f103a3cb3c63ef092c977fed1355f5739be8cf7a2b74a83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6030697c62b71fb756331d753e0d853
SHA10d0760399ceac996c14cf07ef1998a7606e101b5
SHA25638a8d1e4381a50fee85f308af83ee2e55bfe1d7f40e9caaec69a3e6edf9b1b47
SHA5126421d8ee3a74c979c582ec96a5403e9a1b0e7f8cc84834f28d39b714b20a1a9ba5176e22b111a0cb80ad201cf3fbb65edc1e8e93343258ef1b48859fd81377a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b913a3ba7ee71773432f7b66b1c998be
SHA17c0346c8b6e719f5414cd6ea80e8c1f0ec2d98db
SHA2563d4c0b228622d894fc768686960db1bc3db138f2307f7a38b089544a1ff957ab
SHA512f9fb89f25a3c2d169f6cb37c245e2f0d9d4517b542cee6b0b0a9f46f24ea1eae03086230ef418b37f64197ac9f6a60ba1c5cc1e03b18fb7f3190c9396690fdcb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a