Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 20:11
Static task
static1
Behavioral task
behavioral1
Sample
7a5fcfbffe9b19e7cc359882d061e72b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7a5fcfbffe9b19e7cc359882d061e72b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7a5fcfbffe9b19e7cc359882d061e72b_JaffaCakes118.html
-
Size
18KB
-
MD5
7a5fcfbffe9b19e7cc359882d061e72b
-
SHA1
8b8e238beb36d21675790c80660bddb3ae4703fa
-
SHA256
d70c2287e0f6ad42b9eba57b62f72045461995531e7bce8644bd7f174ecef509
-
SHA512
fde56c88a513b8711851857b13d5996c5563388f8084408c3590086f098beefe16cd1217ff5a4c89a643f6ff52ccff1e55b793451e69c2d2a5ce48a2657ba5ff
-
SSDEEP
384:GczrqcOkutqDR1QPmNAydtqg8EtRm2vONaOtNcCX3L/Q1LXDN:vfOkTl+PE8f2vSNVKDN
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 702fb64172b0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C10C421-1C65-11EF-83C2-E25BC60B6402} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b2bde24c8f30647878926e5ba74528e00000000020000000000106600000001000020000000c5b1514336abf84fa33c23f33b2bdcae78031e40058b203eb6c5b3bdf1ff2842000000000e80000000020000200000004ea45206c0abcdf1ea3bf8b631a7074451b2ba36c827c003a02987b8d48acc0b20000000c265b9b0c5b6a2ca2dbf672be1ea621e4a671759fd6b73057a9b81a48334581a40000000ceb9d3057232321757f0d6dd0e3dbf74125c7bfd9d3d54061694fdf1ade80532125bf4d77211a3060f6ffa3d2f3e5b34c01e513dce6478f4a6efc35edc714e08 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423002588" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2308 2524 iexplore.exe 28 PID 2524 wrote to memory of 2308 2524 iexplore.exe 28 PID 2524 wrote to memory of 2308 2524 iexplore.exe 28 PID 2524 wrote to memory of 2308 2524 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7a5fcfbffe9b19e7cc359882d061e72b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eeb95b9ce693378b594a59e33776007d
SHA1694ed746467209590b3676427e2dbf672b53f622
SHA256c6ebf13342b17c92e4646ad822b6dc65b09943aee7947d6fb95b762604e247ec
SHA512a5231631e86ae2f926365aefa470c638a1e7a242b5695bf4ac6287e4e8d3c97843c67fc8ca2ac56fd85233fc2abe497644f3db36b8c6a4e5dbfce85322034b07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf6926f445f6a3a6fa7b839a2b376c9f
SHA1824c73c541c4015775b94a2c2d58bfbd8460c8e1
SHA2567830b74f0bab757db4a0e79b860ad4a48bbb599cfca4cbfea7c4ed11c6eb40e5
SHA512a393b28c0b9d9bdcc3094032d511dd0a9793ede454d4200340ca9557646ab0d0d6681c1dd5e336d1195908bdaca180dbf9475f65f4de0db106d8aa11dc1ebb58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e8c6dfd1291943d6655173ebff60ba4
SHA1af41b8aa0e51d11a7f9456307d86c7f514a5831f
SHA25636457273934a18323dc9be9a6f150a75f8e5bd25c1aa1a86e4d02adb780ac6c2
SHA5121ca96b8672e228d94e15970b9813e900fbe0beacb3d13b3e5ff873a2a17d7778942e5bbbbeb40f4a87855e5810a70431b368afa9bde5c15aa4f0e58512785708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b4cb8b5408922423de4b07fa928a98c
SHA1a07764df8ed465e9810fe9ac85d20dcfafd8a5ce
SHA256028be0bdc274f12211822434657e041fbd26a59c9c6a72f734d37f47558a1e4d
SHA5127903c2d7d0329cc167996f21be1e8432b8d046dfb024f7a9732c4a6d81235bcad84bd29138d7a0195000b23e03968ac32841da49bb9fd0cad40f6b41a8b0bfcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b0aa53911f3ce5f30b7561a8cf3e354
SHA1e0c4badbc5f90c227ee05635843ba0afee35b183
SHA256baf2a940fe9ccd7d8b4dc9980f25347e9cbe4a22d85d6b89f3b968cb5850281c
SHA5120b9cbd686351b624fa7373b00d86ab9ff1b561506bd84aa01ae774335f557ab841fd028a688b69b402c442673c86eb62675d271c1420c90ece47f3d980ee1f76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e9d758e47055bc77cd7770142e814ad
SHA1c33555f154728b26343d12e9758f96b56c2b2b43
SHA2569c97d40080b4810aee421d3012b1de5ddd909e2799c848ed81664a6ec870c6f2
SHA5122ab05c5af21872cae6d266de76476a65be590544658beffda49b046d468747a9c3b2586e9853b6b0e34ce16826ec4318b0d048b89a39c1561f5302175d276714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ba325873e6df21631c42ef4a4ffcf73
SHA14c5e95bee2e613daad7de120686f7d4ff68159df
SHA256db0b79b03eb808cd44de805267d6f9466fed157d508a17db19af6340a3394ebe
SHA5125e71f00ad328dc2f2c91aa80964893062b01102da7d4eaffb46327d74dcc54bb42d555a536e67c3409c6c7005a27957e92c5b519e0c0bd9b648b7619b55f0b95
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a