Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 19:24
Static task
static1
Behavioral task
behavioral1
Sample
8815ad7a67c632b6124f3eebe1c9270f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8815ad7a67c632b6124f3eebe1c9270f_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
8815ad7a67c632b6124f3eebe1c9270f_JaffaCakes118.html
-
Size
23KB
-
MD5
8815ad7a67c632b6124f3eebe1c9270f
-
SHA1
3ad427cab2fb3b642f3eecaa854072b61e689ca7
-
SHA256
2be8134379227fcabaf48bcf0adc9d79dbfe8e8f485bb2a79aa0c98e8631361f
-
SHA512
151c900338673679e28b71abc708dbd1d3524705d4d847d9c33803239e192eaacef5df26be51198eaa3d34d0be6a57cf1448d6b7c71b24f874251583fc028d76
-
SSDEEP
192:uWfob5nYGnQjxn5Q/PnQieONnGnQOkEntF1nQTbnZnQMCnQt0wMBuqnYnQ7tnSYS:VQ/ogf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67BFF181-1F83-11EF-91CF-DEECE6B0C1A4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423345339" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2412 iexplore.exe 2412 iexplore.exe 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 1704 2412 iexplore.exe 28 PID 2412 wrote to memory of 1704 2412 iexplore.exe 28 PID 2412 wrote to memory of 1704 2412 iexplore.exe 28 PID 2412 wrote to memory of 1704 2412 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8815ad7a67c632b6124f3eebe1c9270f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542da389197a69594d0057ff3b55fb3e2
SHA11f49eb22c525e7ad5704779d775f2342ebbac158
SHA25636f3d66de352e27e263ca6b9f0710e065c078d6b702e0037aa44e15dc4949450
SHA51220610df7d69b89aa129364c9bb180cc753746d854cb63468c3d7c8ad587b7f20eade78143e5493232c23b18fc21dd351e1b1df1eea91adcb8fc614fb4f7b1e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7b506b550597315481f460aa4bfc432
SHA18e432e9a5adeb0bfce0a1a9ced84792848946d4f
SHA2566f3a30488781b13c31e14b1063c9fdd8476d0f0d9c2b1bb1a0c07432d0beb22f
SHA512af174357433351b874323bdef703550289bbfb776a62272bbdf98a59a18f5cac624a11d77221e4a41341a506b3c9363b60a55bee763564ede87b03dd777b7de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ba0dcca113603f2b83a689313c0582c
SHA193a70716e1b84229aef37eeaef4d9b0091a02cf0
SHA2561fd72db612084f4e5459761d113849cd052df65e4a7787db91935748964137b5
SHA512e7c254a30070ac7ce541e0e682b4eb2bc23a7cf8cb8aba2b415b177a47acce36df9122c7b20bffdef5538a9c2d876468f7f6b8dac69bb5f5b0371c5d6686e199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b73d54e8c6a1142b30fb37286e7f1ba
SHA18fae2f147b75c7569f3821fb90dc64de46dfbf49
SHA25605de7e6ce148b1fa91d153594d9408cbef5dfa303dd73d56e46dc2d95bc029a5
SHA5122d712baa606063f1cae2883e9d857eaea44e08f1d5398d73e886311af575a140cbb46d4d125642e0866caba4f9695e4084f3e2f0be0896ebbfbc66a96463ee45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cf37a099341b78d37f73e218e8a25c5
SHA16e8de4c5fb34fa37507aea602a4db0865c68a88c
SHA2562c1aa77093170bd7e8e5acf03931477050c45a686cc3ae3446f8135b6b257d6b
SHA512c321a4a1ba9eb03f5fa85bcd68872c24f139f1bcd5cff0a39a0e55161bd4fa384ed6a63a442db3c13132f764ba9f967c91e309b21d3792d365994806e3a9bf0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e23ba71b3be51834cb69fb739c49bc7f
SHA1a0c69e37844eb613af1d0fed85d0d160c232d60c
SHA25638f296e044d00aeffdbf93f9c98248acc39bc1de09f5926be66ee1ee59e2e3dd
SHA512af75d12943feaa50fc67ed1db1b50bb62f257808c74c84b8b0e4f11a496cc08f8cd6016135e70d2fe7e5a67437a9812e4750aab23e869838af5c438533ae9224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f109928f06c7481ba63b09578b1a909c
SHA1407a19fef8fea17096af488934e01389bfdd9721
SHA256742237c371fb5fd90bd6d4b999e7583701b91abca3ad538dadac0e3393eb378c
SHA5125085bbc3a6db84aaf2d52d6f4694ed868dd432c8dab301999680b510ac6eedb7fc23f0f0ca5b29aa7dcf0f7878af5c2f4fa50eaea6a554c3728e91df500da88a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c535c2c3c0bfaee26bd4391a755842d
SHA106ec4b8adb31b18b22cdc8b670e6206a3bcd1fa2
SHA2569504b5d4f64e924e13d48a5bd5936898e535f0a0eb2e23eb7c268aa634504dce
SHA51270f36f49d02c877cb816dd82caf500850c4d18e15b70ea399cad822d8a0c796e32e0eebbf66754038c46425f2930d52cbbccf91f4965b3d4529d7f91025282ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531cb3c71961d3c6c445d23da24fb6dbb
SHA1f46071eb41b26c01c028c616408ef618d9f43a87
SHA256c4f11b6fc00accddffcfa90651f3cd413e42abbced548927d72497d3c1a56c86
SHA512194719817a2e0e33892b2c69ab1b0a998332b55cad6d6a12dbde1ced206051c539b9c412214a0f65abd0c987dde20daea5950949133add6d1ca1311da75d9dae
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b