Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 08:39
Static task
static1
Behavioral task
behavioral1
Sample
8399c98b069f92806b33a1aaaa104da6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8399c98b069f92806b33a1aaaa104da6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8399c98b069f92806b33a1aaaa104da6_JaffaCakes118.html
-
Size
154KB
-
MD5
8399c98b069f92806b33a1aaaa104da6
-
SHA1
618175661fad645fb7ec0b111a1bc3d442d5fa88
-
SHA256
a99ec48da5ea6c795f1013cc619b19a091fd0044469a2b53ebf82ee9d36b6812
-
SHA512
90edd91d6e29a91e2dfe92232985570b4c652410a91a0ef7424413a21937c99e7e991509c4a51ac1ba73d8193811c3a5b396235605e4b66ac08f3c886c6eb9ab
-
SSDEEP
3072:8cu5w5wi06zxpOOJQvXR5g2vakhVVkjPyb:A2zXKvXkwakrVkjPyb
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423220224" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{196035A1-1E60-11EF-8DE7-EEF45767FDFF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6071e5ed6cb2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000097d6e6ce08c068428f83b1855873525a000000000200000000001066000000010000200000004a1248cfedea9b9f90a9ed9732f705847f62099fc8a030d81b6dfaa3f0c96ffc000000000e80000000020000200000006ef4d65baf9a151fd3a909dce979c0e632f1df17dd3c5b3e9f360c6d43387d7320000000a579bccc6057b3aa379118b029af656a2c7c49eb2dfff95b2e871458d15bc0f540000000df3d63390de2208e1873e8cf5ad1c89822444a441484e9378a6e1964e2cd6379a8b7acdc939054dd91b93645202e58c031872581c5401803f97e56c764cc533c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2476 2184 iexplore.exe 28 PID 2184 wrote to memory of 2476 2184 iexplore.exe 28 PID 2184 wrote to memory of 2476 2184 iexplore.exe 28 PID 2184 wrote to memory of 2476 2184 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8399c98b069f92806b33a1aaaa104da6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582bbdcb8a1b68dbe3175fc7a9caa186a
SHA1f4748158094b582820669c3f6961fedd2ca9b272
SHA256658467d40b5d515762b5191249316ee670002f50d0774f6be10101bb624c6cce
SHA5120e3dd9c5dfc29c5b8a7ad128299344629d6905b7180354a11c177268bc6e79bd59abbd66e91dab6c8bb83c734470b93e5bfdd51fd8a63e23dd27e12c889cb6b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564f91c9818583e5b5f226336a0ef4612
SHA1c89c8373f857bc781d1112fe57b1d45f98af39fa
SHA25647b96e2fff8de478d61bd9311349af65a6471db32c9107765db617c4965a3613
SHA512b9005cb79f5bdc159726c8d03890e7162fde85dbe4daea4d4d225863a9264f2ba249b87885e0bc12fd5977768e760b44ef24e5454d888d36e8a19184dd6de867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db8484a2221e0fcdf39b9cb8c81e7759
SHA1dab801ec599502c099d12a4838c4a2f78c0e084a
SHA256c71345a123721448ab4dde16852a43fb763d7390afbb93d843aa0a6401a6856f
SHA512a132be22f35d48d26dce7c0c5ba0b578e175579baef27511326ad6d4a6ebb3ba6ee2582be989791ed028a5dd2703b4739b7d2f8f0474896a1a39115b5fdb5feb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f48eb5e8710c70b62cd80221172fb2a
SHA16a27fb45fdfeda8fc07edf8bcc6f0c170136a9ff
SHA256dbab3ad723599abb0e9bdc3465d357ad4d2c975cae9f3260fb7aeb7efa070b36
SHA5123a2b288162e62b43225eec64c8a3b1fe45e1cdcd56c7b19f9b4d0d9b2c4bbf6af65481558f9b45997b664c5a713df94a53c3b9844a18983954a985d9f55ea8da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504f564d5f756846bb1ca393cc9f3a8b4
SHA1f503d9172d83194d9f3183413bdcdf9f456cc556
SHA25636d1ee8d07f6062d977cbf9a38f340bcf3ed639e67dc43cd4d37cc5c840b6be3
SHA512b314e79f06853704e67eca2a45632b49d1c9efd92aea57b684aab2ac4e08fe64ee12380f860e450915924b107caeb50d3d637220c383440e09cab61ebc5e3d08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526ba3b744342cd207d0ac5936fc31ac6
SHA17936f9f3bcaa4dfd1acf23c60bd98786099e6f13
SHA2568c407914106fb6c81321c671b89838dc66c52538fb4dd3ad0b3b4c522da731bd
SHA5129247bd9ebe8074de1ec1279365a728d9e4218c42baa088ac7c514bda2cf6f5b348c25e1d2dcbba99d74fb405732a82eb2161125b8767a099e9637e4c31d68092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2ecd976a6ed6954ff5c53b1288dc128
SHA1ad432471bf49e4d79afb0f1cde68c5ac0520fe36
SHA256b918b8008e82246b946e5e51757fa78f9a81baa72ef2c9fce510a140e2a83944
SHA5126dbbc506b366d988217b559d7b19991bed76e4de23a9e816506e01c7b32fae430925588616a80ed2d8b55c2dfc700c0c3cd469360413ec1d0a8d3ac601474d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4939ee744452705172e1935162d5262
SHA1b402a0bc469a18a5d1c9ac71d19bf7b1734eca8d
SHA256ae155cc642443e7413834f5dfeda4c23d6e22692b593afd0b8bbdd15ee792854
SHA51269475b40d2ae53b8b348dcbb75b987dce69a47547971122ab32d59017e364af6fc8805eb48ed3f0292618bcd0cfe1273930374e890715e77eebf6176fd97943c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6ab8eb5be5221e2a66113535a0cf545
SHA1fb06f34872a1d7fe8fbf384e7d63a61853fbd2da
SHA256a69864d18fa09e84913642753923ba913d87c4da39dd13a91fa44b2cf4bde469
SHA5128d63875b1b23a3589c576151d9dfa2d1958c5f6e13fced2cfc7df1ad9b3c2547af5cf5ed66a1289c146de03d67eed8fb2146de59e895d721f2939c38373bec5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cc29a4f6ded149e769b4bf217df7fe5
SHA15608f08aa4ff4c6de0d407ede57804a7051560a3
SHA256c1d7fc7e7aae30b16cbc15fe67c3d197c2e0361005ca16d02c8e3976435a9a9c
SHA512e25aaf4c599bfc89c8db3cc8856063689514b3f9c2abad9f4ac1b6e1796ab07ca97d57fca66e27f0039cb01451e2cdbc10c825e87ef92337ae0045c5f7cecc5d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b