Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 09:08
Static task
static1
Behavioral task
behavioral1
Sample
7c6c935a6a673f03c5acd8ed833a307f_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7c6c935a6a673f03c5acd8ed833a307f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7c6c935a6a673f03c5acd8ed833a307f_JaffaCakes118.html
-
Size
144KB
-
MD5
7c6c935a6a673f03c5acd8ed833a307f
-
SHA1
415f374486d216b017ee423ce876b1ab3cde8740
-
SHA256
b1f3d246daf85ee2c4c13f30f123e4c01d16ce4f8806df47df8507e5e3c6cea0
-
SHA512
8486c23e8cc025352bce908bf3cffe01b036c7a11a05ed7f1199e741645cd56976a56a2232e2ad839e6ae1794f652c741be552ca6b4b09f11d4110996b5fe514
-
SSDEEP
3072:S5zKGUx7dyfkMY+BES09JXAnyrZalI+YQ:S5zox7osMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423049179" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DA98DB41-1CD1-11EF-831B-46E11F8BECEB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3040 iexplore.exe 3040 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2884 3040 iexplore.exe 28 PID 3040 wrote to memory of 2884 3040 iexplore.exe 28 PID 3040 wrote to memory of 2884 3040 iexplore.exe 28 PID 3040 wrote to memory of 2884 3040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7c6c935a6a673f03c5acd8ed833a307f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f32aea0f29bbe2f222f64f61a514604
SHA11d51e89aa3d5db1a823eb698fb9d248733a412f3
SHA2569592f2405a08b9c1c0b98db244eb757a9bf26654d5940b08c25aa03dc03c8487
SHA512647ba2aef3d9ac4571564244ecb97bf635e05423a7e3012cb6ba466afa33bde657ac41dd937d2925ece5762b85daee0cea454b75699c6d1e788fad2c0e175890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6b7f29c199b59cc3004fd7222369e47
SHA177f777acaa31cdd60a267d18543eb78179b07ac0
SHA25675ca836fa9c86e7acaff8f23234c4f11e0bad248a1121afdcda5e9ded465b085
SHA512decfcec28cd3421834d68c3c6430ea61684331b69a98a3c791cd760d47dd5b88a7d76f706a3f1c65d0ef8cd97fde8bd969835185044751d87f89dba04459cfdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547832ceeb95d1fa650cf0eda818d5715
SHA167c3b1419a45efe25f5b6df2cb272ae0a70e1e46
SHA2565b99ce81ecf599917bf82fe6847b6d3b426b56867d7f519a140eaad4a62106c2
SHA512f7032b8ffc37a5d4c674aeca606f6a6c67849643581705478f58ac720118eaf67338a9d748ea8e116141bf976cad859e9b56b3fcc1a832f5f2c3f0d3dd011cc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa749b42a25ac71be8ecfb053d2423d8
SHA1a61445f45f6099c21ffb26a1ccd1f033e862b059
SHA256f65546437a9fed2c909376ae59b1be766b560c42a38a85b41ba839c50df30b6b
SHA512d7551c3e4cee24b4d9d2082fcd7305f1038e32fdb29336959cb4cf0d0c0413c5a5f2955e13c2e630fe6218f3e69a494c66cc8c0e970e4800652c12aa7d9814a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac07cb2b8a0f91f4e7e2956143ebf466
SHA1ce3b769effb83465ee7bcc98082d7b735d968a57
SHA256e6b456da438675e99fc07d0462822f1e01f0871fcceeed53021bb778ed6bbfa9
SHA51286cf3592928d34c7684c4938b69b1e87934c55c47ea006c14465aa5552852fefc8691a61f61d069f83189ed5c321313735077045898828c37adc38720bf9ca02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fef6afab9fa5d6028220040b2a8a78f
SHA116e93900d022ab3a2edb17cbd26a94389f652c5f
SHA256f6c82615c2fc462e34dc469ef77c7a798c76052e4945909dd22f41c218d9ff34
SHA5127ee2837fa7718440ddd8d889f33cab20762c5bad3416d3bae77cf1ba630ab4b5812634d444bf31cbfeee4c74d3c718ccf643bfea7a3a0aa72ceabf919a958ce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556118c6d52b4ce90f2c10107a1628ee2
SHA180ad0adff6958c5dd2e29c4fc8ed086d53de94e8
SHA256acd61c4bb9dcbd86f5c12415dc0fa0640c9ce89c5bd5234a62bd4614b333a23a
SHA5123c4a01d9624d69e6b4b32c1dc87cb9b41b5cd538971cca82b6a539e05c62883aaf9b279ecb649dc6d771e5de745a7f499f7a45a4973ca4ae4aae91a216f3367c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8c025dee26e8e1c974078cba16c07cb
SHA1b61f5e7a92ff71ec460e4b32ceee493525e524fb
SHA256ab4a7fb0e24ee00a4442d8b9122898d7cccdd74b1ad559c495ae63effd9465c0
SHA512b0b765254136202bb046ae45cf887a9bb7ebde3fc112a6fc2661f52626b77148f734ba58e0a0e0250d115645011ec592e765550564e3a9e04da7548831a4b98b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a