Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 16:53
Static task
static1
Behavioral task
behavioral1
Sample
7dafeb4e33a649fdc1953b6ad0bdbec5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7dafeb4e33a649fdc1953b6ad0bdbec5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7dafeb4e33a649fdc1953b6ad0bdbec5_JaffaCakes118.html
-
Size
133KB
-
MD5
7dafeb4e33a649fdc1953b6ad0bdbec5
-
SHA1
23f30672afdaa2e767f68e748e82ea00355773e3
-
SHA256
c2cd2d67d83db176b41a68deac1ebded77b1f68d7fb7439c1d1036547dfcf8fa
-
SHA512
9e85641863cffedda9cc31c7ce1a4029095d4b483b3284379115328a147e87fd7da20cd2e1c3fb2b4dc66d0b02c21a395dad7bc9d36e56909bc3caa810ac2aa5
-
SSDEEP
3072:OncNMohCq0Opx/1zjk/TyfkMY+BES09JXAnyrZalI+YQ:g4sMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423077088" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D526D721-1D12-11EF-B1D1-D2EFD46A7D0E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 1852 3048 iexplore.exe 28 PID 3048 wrote to memory of 1852 3048 iexplore.exe 28 PID 3048 wrote to memory of 1852 3048 iexplore.exe 28 PID 3048 wrote to memory of 1852 3048 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7dafeb4e33a649fdc1953b6ad0bdbec5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578e2d4d7345cc630233bb1d1222da292
SHA1af14c5fd315d27d80be809e2c83b08332e931ba0
SHA256f1cc7fd57f2cbff1d5fd099812eb322bbea154b59418d2fe892468bfa6c39c74
SHA5129a02aff4fbfe5bf086d1113923874615a9416dd7994d80b2f240b789608fc6d550923a70c03d36a19ef7295d2b2a208e6ed617f4662bffe7a7d60c6dcd568ccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c91413e9dfdd103dbaa0f9ef0ea6c24
SHA1f4780ee81f0684d6978da818730b81d77b74979b
SHA256a11c7be5e5e39bf536b63b2034641d1aad559236cdaedaab9e1d5804a9e2bd20
SHA5121fa033a8dd1ca07495d501cd10e31768b9da6a6785fa1c769ee99dca3bb0ee072cbf9bab8c25e64b4d168ab825dda640f984a84c15841f36dc524cdda8e255ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adb13f15d2ee98c09a004b71c161280a
SHA11c47ae4cad46e2429ee8d7776e9f53008893f82c
SHA256b8275edd9878178ef69de8a0e6f522d5c8ff367e2f3e3f0148a618279144e1c7
SHA5120b496dc797334e2247882ca97a2fbdcf34f54834d223b20efde9999d7b8129a0918f3167d728064b10dcdf32d81d30abd18fdf8d7b0a0098c8e79958c819f23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca350a85a2dd757e2c9c0f0e77b66e89
SHA1ab371f6f381ac723cd888d12589c8aee10d22152
SHA256853e2a780036261fe21383cfb2458dcb3f0d1c0c00237b4b5d6961c5de1bf00f
SHA51208230d1c9d63548e3a847a6fc921c8991e73e7adf582c2d44476c2c995a0e88525f82cbbe6a3e181be43564bc9c4d482d0cd4eed758e732d3b7b4b734636e4ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edd1d57df7c35d7697ea6147f0e8029b
SHA165653209befdf35763e22414a8ff7e8fc0006a52
SHA25682e60271e6449cbd4e4739ada796a5f04b6b58198d38181f7799a9f798a6424b
SHA512f09cfd54a2b2ca8a3889eb0f4b7dfe86c28e97e87efdea053360ced29a57fc3a239cafdfd22c75cdf5ca92bb8192db0def01f41d34edd0a7518e19c473a67dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b2edb24f4646dc76d013891f8468288
SHA1bb233a15ce25458532554ddec9bd754ec5797807
SHA2560447b29100a44aee86699cbb1d8b25975da09c5e6f972da621effb1eda0562c2
SHA512f9d663b457a34ffea41ec9ad1db0e11c8922cbcc5d9f58c634c98455c4933f7f5a91fe135fe4206dc512b02817eb12dbaf737275e6df2401fa1b42ef833fbdc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb98f174ec0ab002b413a71a42d39694
SHA17a60d05950a8f4aa090c84566ba9d2058813662e
SHA256b54b2376e158a47ef8de56a8c3492fb2f13b935ff07377cfcda8e6305137671a
SHA512ec3f58ad035d6335b5a8fa02f5974f52024d857c219909b1c110cf562a1854b2ca1436a8276b7e04641794222927a557b0579a081fca65cab0a9ce0fa07a4fff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5360d5ee850bde4637afe27038d8ff3fa
SHA1d10be91e40975d7256cc52ba43e66f337ca87409
SHA2562e137878e4299640360bf5675ee0ee4cabbb9694f3f8fd61c273def267df44ef
SHA5127b7b21ad5566a8c03f3073b850fe145d22cccaaddb0aef454556217f366ca711d2b15bef2660e9e7df70d4541961838226beb714cb7b722ed7db24e472d8825b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5530532086f4552ddb5655d01ab930d46
SHA1178f6ac4a9d5657e5250c972bb7a3a1b3ece0fef
SHA2566002e8bcd397e24ccf091b6b9efe27149322324b0ac6967ad1f6b8af0310cd97
SHA5125be0d74269ae6ba4131a8c55b5d19ecd8f142b8c9f25d6b428125fad2cb6f1cd17e6d21580e55d435231a7c146c20c0f3baf1e9fe19e80ba7f916ca00cfaded4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a