Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
8906daf8fd69d64011720bf7429a0c68_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8906daf8fd69d64011720bf7429a0c68_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8906daf8fd69d64011720bf7429a0c68_JaffaCakes118.html
-
Size
258KB
-
MD5
8906daf8fd69d64011720bf7429a0c68
-
SHA1
2d82d913865a5e971738a83c37859ef3e57901ca
-
SHA256
d11331acdf885e047f1b4e9f9bdd915077310e6fece20a2b1eafea40a496da3c
-
SHA512
e16d1a3c184d3400f086848fbb5e4f3ad2374597abaaac8ba569460855404260c1c210a8c0f51424a42dbdb6e09c971e8c402253587f609362c591f6efdce16a
-
SSDEEP
3072:OKySUvAg4rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJ/:6SCgz9VxLY7iAVLTBQJl/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423368259" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C527E3C1-1FB8-11EF-822E-56D57A935C49} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1676 iexplore.exe 1676 iexplore.exe 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1676 wrote to memory of 2344 1676 iexplore.exe 28 PID 1676 wrote to memory of 2344 1676 iexplore.exe 28 PID 1676 wrote to memory of 2344 1676 iexplore.exe 28 PID 1676 wrote to memory of 2344 1676 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8906daf8fd69d64011720bf7429a0c68_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1676 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ac9a8ef5fb1826a5c91023ba5d13f7e8
SHA16130ea089d2519ba663bf337108b40206eb7276b
SHA25641f658f9737a6aa71bceb183218454b08ec471b5f525189b33c9ee371b60a29f
SHA512f9d22553214bce38f9fd23568e1ba7e91dda55407be0813810a33077ea1de9c14f903a9d78a6d3f83fdbbf3568a901c4d7a06b93b07ad62e7456108a7ab872b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db2f23623c8bf84424d57a80ca7dc0db
SHA198a66fd73c0aa579253a5656caf9d0fd21dd8a7a
SHA25669e73451b6c0ec2da7140b81bfe163d60788a20e1ce38a38e78a3ed7524af2ea
SHA512fb4bd1a5f479cd692fa56fa28397cfccaf0b9f41a099b586b465f81044d8cf7e39076031a75340193f5806ceab8acc5f7c4b351012fafb85c7f2df8009786258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efd664e068ee23d997b0b93715b6137e
SHA1bd82d420aa42ee6c9907b266afd67ce219866196
SHA256a0f4f5cb44a7d913afc1cd38450172bbebe5f006970db0b6e24f65232665a014
SHA512cca72a6d2f23be2a81ae51847e46857b28c01bf473887eeb0d1ff89399a94dfc53e556fd729cbed146bdc19a3f9b0d4e4a1dbd55a8ded6f875fc9cea775eb48e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582ffcbda3bad53aee40468386cedbbfe
SHA1bf4994dafe97d18aff28a36e803c74b336dc1f55
SHA256f8660e8dbcb550ba8675b45d30767676b5da987e5e83045a4a0037ac30948d20
SHA51276adb802242a3eb48589c413365834c96ebd035de61ea46b3537b824b8b743a3449c4a567f5f33847070b474567842cb6bf36252ce45b8bd666cce51932abba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b31f189642970e1cdeb12b67b11f1039
SHA1b43000dc7854aab2f6565766b39d3fb75ca56d69
SHA256aea83d5d382f69bf1ba6f562b8e1b508abe7c7a031603fe957ab285ae34db99a
SHA512fd15a57a6850b284abdf958e8e3bd101eba94430861affe3b16e2acda75e00a7a43f1016919f7ced6a579679d00b0dc7331a6132273ae9e8e86ffed142af0b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b01600191659364759dcb59634dfbbf8
SHA1fec6ebbcf73fb6ae4b2036e4196c832a4f9a23de
SHA256776a49f3016566960f884e7f2870b621c021cd2cd0a37bea3a3dff45b2da946f
SHA51245252179528eea5be2228f3da100aa06f60e63fff8ea7db7ff83a3eb5f6affe887f2ca2851ba81ab2cb883fcb8634d7af13c8b333cc22497dad9d3ba5e1a40db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f61c013bfaad5cdfb6102479373776d2
SHA11023195a2653021e7b186fb47342a06401226f13
SHA2568f5058b71410d1d50d1d44f00dc770b0ed75f895805e467a574470074662b592
SHA51214f4b7e960ec000f41ac344ffc677253b664f95118f67a801a5a18a501ae045f258fd326a32e1caff6e6c78f107bb2ea8142bf19a6f605d6db2f55062d00bfc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feb1a1fd076c5f18813ef48596095c4f
SHA106023c83b3320c51195d4ee3548e2cd1bc585f6c
SHA256a242347743f3325944f63ccafe8d0a362227aa7e9ea130f63e05fb7d3672b321
SHA512fc3287f3ab4ca8576713c008e2c5a4dd052d5c153d9b20034fe723b187cb6f66f2a7a9b170e06f563fed58a7e6e40703903f1bd8bce6af47b3523a56b2902b42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5183be9f13c5cf0936c996608c9de5bc5
SHA1a53bb99901c66bda522e1038df377f266dc60e91
SHA256207dbe94253d1ea672acdc087d43315c3ed8226677da77bf0db6c49db8d15ffe
SHA512b2d6df2580969e65d4de10b48b9f65d66902ce3933828864cfcc26329f4ca1e030a4e42ba73adacb2ab809349d8af6a1ff984e5726ea5a70e5c79dce39571928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8297af30b457c822c9db009b8c59710
SHA1c6a1afcb502d0501d7ade9139ef94fd7c703658c
SHA25646fa5e5dd8af0059c3037490d33bf5bfaada9b3a6eb522d28089ee52f5fade43
SHA51252cce443563627552132082fe59f08b58ab65ab41e3e944fdf01a22ef41bc5d7c81d1339e43c0ed4cde6014606b0dcb3b674aef595694ad3758679610e3fe40e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d3106d1779b506ddcd164f3cca1c76b
SHA1d8758c8b4457362840184d95d48a4cfc62eac0d6
SHA256f110f4c8066a57d9a8b0a2c520c9f2981e749d77ccaca6411096fad8aa34cb0a
SHA512bd50fbf511c3480f56f93ce7baa899aaafebb2e159ab893454813216c3c27d6dcf54778687f383dc9a63da7dc9b61b6a98de536aa2c652d525f560a70b522e2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD553da0447aac55ef55fbc792126c91bd6
SHA15a6b590dbf733d8805b8cc418b1293677cb6fdce
SHA2563fb5d8fcde66224c0b98cb2de7c8c124810113b86cdf019a8d6af08a13bcceda
SHA51239d6dfb087f66a77b1894bb2cddd44a18a46ec61dbaf81f425070b691a07a4a8af6fae8239929b5b5b2e8af3c19da1dd15625920ec51e4c8679b85595e51f2a5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b