Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
81cf7488fac67047a8c2d0543b1f7973_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
81cf7488fac67047a8c2d0543b1f7973_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
81cf7488fac67047a8c2d0543b1f7973_JaffaCakes118.html
-
Size
141KB
-
MD5
81cf7488fac67047a8c2d0543b1f7973
-
SHA1
d0a52630ab073077bdd777e30873f73d28b22c6c
-
SHA256
b5d832d8c005eb897170e7860c323e58594c26d8ea1b920f8927bb4e58b0f1be
-
SHA512
14ef45be9b0214f243c54822ac2de8f9570c0b8efb3dd12e6526b1fccc3eb0d996d9e42a9feb3a0ff6ad1ba5f1b1905ed23c947033ccc673e4c9a56388f23c75
-
SSDEEP
3072:S15kAnjlAx7dyfkMY+BES09JXAnyrZalI+YQ:SVhAx7osMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A4C22D91-1DF9-11EF-9F3E-D2EFD46A7D0E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423176221" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1544 iexplore.exe 1544 iexplore.exe 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2856 1544 iexplore.exe 28 PID 1544 wrote to memory of 2856 1544 iexplore.exe 28 PID 1544 wrote to memory of 2856 1544 iexplore.exe 28 PID 1544 wrote to memory of 2856 1544 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81cf7488fac67047a8c2d0543b1f7973_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1544 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50140f9dd278b1c855cdd01eaedf6f1d7
SHA1e436a38f26cbba3735695718c1519ff1658d836a
SHA256cc54d83d7b58917c1f361b30f332d2239b52ca98129750d06bb4427ac31b738d
SHA51264457ac13388315dfae6d1123632c1d4783a755d683e398123098ab12afb86e8258f4ca68e072b34aaf981426a2ba6b839f9aaf142b738b07bfd006317c75f2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5741015d126b0a1de62841c16275bcdd2
SHA1a3e6be6620b66c4e98dba3ece0f937c1f738894a
SHA256973a05dcf4bcc0ac058ab519815982546b33a2633d71c3e19283bfb86149f94d
SHA512123f3489960bb2225bc9bf3de7edc5f58f2e08ad54c4bb649b2cc6a71021b4cb379b4126db723e0f5ebc6cd5b7181349972e38128d7aa111c6a5a145f257b3e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5710967b6beaf2953a0e750c56e644b51
SHA11d25468c3a48c5cb9b6d920b796a799a1f8a8d16
SHA256df578c9e3ef53f488655688041e85b83bb82e961415d9f9aa24d686138765673
SHA512752f6f424eef3bc045f8536e34741b5f14104f2dc9c4586969d495b7d2ab9ab6bda7952b06a0a4b1a034502f1534033395529a1e809e6e97d3784944dcd4d650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caf261888a9ee89601c6fe023aabb71c
SHA19ee4c49c5c295b85e05bfc335468fda5265f117a
SHA2569a426185c7bc65c98c969bcd31978791a0694e1efc9d5340996dadca47810921
SHA512ed873d6595bd755728af2aa18afac85dede1c6bfa8289c533dd97f486c21cf7e03314fd4d291fadd42173c448c0b47f0b4e5bb2304f6330d98c57462455032b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2ea1bcfb462f10cce79ef79b77b8f8f
SHA1a3473b7565f24c4dd4fbddc89d1f016362977ccb
SHA256a08ad86a32f99855b4a73d44ae0fa3dc8734253813f7de7c95b44884d633f131
SHA512e737ab1c53046e33683c4b65f9585a6e7c2dc12ade9979c0ad39202860552ea55f2b8d1c5b63abf73fe6d6054266287c3528719308799b670df5431ab3144acb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8f486347230651b037bac67e86eb762
SHA11cc5230444e5f114959499a0abb993d98731df15
SHA2564da1bb281e411d5885c7b4f91408b6c8457300e650e2bd87b28f312da79d53dc
SHA5123f94768173957586b909bf5f1c9a0822fdbc8978432e634241f795d3f520e9a10c1087a7811e84f9631cd5b6f8e0f6345c125333f3df6a5327fd57a1e9e06544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51871f3e6d56243ffc1a62ec2c3780b3e
SHA1d6167a04f61ec3d64df7dfd5fa12f39fcb84f547
SHA2564174ac4d9b48f4e217e5dd726507b161b439144edd9ddba8930c87ff8ab8216c
SHA512a364959e4d7cb0d5757e26715e6d135b68d979d0009dddbcfbbd973353e2dc762781dcb24e4ee9f7f1925ceda3e993d33ad7a0d75f8886e252e5498bfd3122fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b346e6ac8e36d0a13936799faf95f105
SHA109647092e4fbf5b27b85f92bd0bc475b84c1ba6b
SHA25650a04bec755b2a5c22940a6432ea158c681b23295b1809683019f2a1c3bbdda5
SHA512ebe9015b872a69bc19ef1b846d9eb2f85803fc110f77ae76c78fa48ccfb077f8b534f6ca2976f2b2bac04ad6a9afe068ad37bfeed97e65a51e2494225dc347c7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b