Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
8fc8987ed52a28aa4b76ebbe1a47107d_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8fc8987ed52a28aa4b76ebbe1a47107d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8fc8987ed52a28aa4b76ebbe1a47107d_JaffaCakes118.html
-
Size
34KB
-
MD5
8fc8987ed52a28aa4b76ebbe1a47107d
-
SHA1
211d926b20d653e5f52c6ea91f5fe05013def888
-
SHA256
1cd7e9ef21f11bc08102286eb68a9308b9c9529c34fc2d3508c7ab8419666133
-
SHA512
63eac79021e8b1176dac22b11b5e1ce1a1ddf45145b87495d7eed0d5bd14c3a2b08b5560cb2e3ea39cfd5036ec3d2feec49bc91cd7a46535202798ad4951a33c
-
SSDEEP
192:uwnab5nuHGnQjxn5Q/VnQie4Nn3nQOkEnt3HnQTbnxnQOg9cwqYscwqYocwqYQyf:NQ/ilc+5yEgDwantZTik
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77BBF521-2136-11EF-882F-5E44E0CFDD1C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423532197" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2136 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2136 iexplore.exe 2136 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2788 2136 iexplore.exe 28 PID 2136 wrote to memory of 2788 2136 iexplore.exe 28 PID 2136 wrote to memory of 2788 2136 iexplore.exe 28 PID 2136 wrote to memory of 2788 2136 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8fc8987ed52a28aa4b76ebbe1a47107d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54130c0d8281ee127d563ed619238aed8
SHA15dcbe432ee6aa18dce55d22506558e7f27a2291c
SHA25681da013e2cb0478968541e09d19a521dc4e1777e9fe2cc6be95f27c54cec553a
SHA5122fae3810b6f14b2fd7157711588879071a4aeb5403e82281747ec77397f65e8f4a99da4cc936fb2aaf8a114b9eb3e8708b68034335263c58134e0442f32cd05a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b22745136510e2977d6f31552767246f
SHA1a2f77c9293d3cbac5fec958dda2dab5182aefba5
SHA25614d6ac8485dc213a36497480426a0744398b6290f40743b3e3e429819f19f290
SHA512a58fdad8ec116b95200fc88720c151d968e4f7c6d9e7a9b2e09205848d60e7ae081efb88be40c89339ad9eef797c6e775f91ebcac3ba8567f79ffdb45ae7becb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b154790d6cd7a0bf104bd5d41d7ea78
SHA187d19799c1e2079a33460c8a5883f8f64f4c6e49
SHA256819133f36a2e52a9c133e299641e2641a9149b77a1474258d23a91f04324a19b
SHA512cc24696581e48a0adb5e6728cc6d59c6b1db392965484cdcdc3a56f659a301e72e3c18ae2c675d527b7dfcc8b82e0404b27e8a81600e86afd6eb22ee728dea81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc7427a3d32053dd5230c2623a175f12
SHA1960550fc81a0bed93ef46683420ac0ff54ba726c
SHA2560425be78e90ae5fc2c0cbc6b051d73cb04aa4f8c5728aaa1ad752bc5d867adaf
SHA512b759d4a874903e18d62d658bdd2532c11f3fee92b26553eb9e332d790c95b5d6fb8f66c14755b0c11351dee8ca00a4ebbb13c683128026277b219120dc457575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5195a605bc1ab952d716d422360908554
SHA1d3e6c4c330dc11f3b4e192ed6e7eddb4d4fb81f6
SHA256af823bbc5fc9c2b078fc15848e5d9b6af82f6a647664bbe151f996434e9c3afc
SHA512e2e238ce076af81828deee61367c56e550e9f5ba4102cbe438e5e2176081a72ebb7312ac724d6076ed90afd061e6311a1466bc75ea38f0a08d61fe11f87fb5a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536a112488f27e0073a316408eee66d88
SHA12f959e71969016b1a099c04e9657d33cf91c3cd3
SHA256d83ff29dda6fb55a74e0c779b6142f4e16245e74e4d1813876bdce74e3357ffd
SHA5126f0b8ba60ac799aaa44468bd04f25af2207aab200faf94a0cf843954dc23849747b2435062c6c0f1f502ca99483f519c032df1596ed2ea4c052de40e9f9895b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575c67c1c23b4732599b7daf0995f7ecf
SHA1cb4ce643f7e94d3a95d28ad29860b0dc6fae9634
SHA256f0415cc2a6c34ba35a9e4ded6dcbf78a437f4d0b58a0c03b03a0501e6b317f74
SHA5121b85475e70a3e7c087a3da2595bd58c619bde12904451c89e778c087abfcc7ff1e279226a4fbb9d2428fde09506ec754c9fadeae5c83341c3c85ee1cac79a383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53200e8ccda5175a0a8b02fe148a13875
SHA1d32a93322e7c6d5a5f6f556661cb7874aea5fc9a
SHA256af776ef28614595626a169ae10a895e79351d55d03d4982c196481c1119deb23
SHA5126a42a42370897f1b41d59859ab008163de23547c4d40132e101eb278b1aceb23b3f829d52fc9c84831e8bb7004acfb2206f4d5c5c7b7419f317c25c7582e372e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2be2fca2ebc4d42e4f7469679994bf9
SHA18add28f0e02eac37e0c2c2a48fb23995b82741a4
SHA2564f5381eb77ab6a6023d0cb4d8ff80732a496c21f5abb1dc1688d5db43c091ffc
SHA51242a303fb42158b051ffaea37f4a96120b165769a87b3a2d2c7168152234f7068f20dec3de73bd6dc3be2fd2d6d5fd181e584a18c376ca6b8fe4f374d6cf58e87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5085c3a02b37c6e5d6cc7e0d9a9e9fedd
SHA167c8f2a7c7cceb62124e2f067af2645ca9550ab1
SHA256889909c2a5847a5362db23ea3d9a7ab0b13f272edb6b6835705ef5691b9bda1b
SHA512daf650fb9dff07910582e02952a62d0ceb6aa5bb3d0c0af6990f1fcdec642dd41d236d0baa55f507631a411eda320458241c53ae9abb90fe61e34cecce9c4dd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD52bd6e369f14ca2e89bf0852451ef886e
SHA1b4a541d396837dfcd3990e123daca4e86feb4833
SHA256eff522241ec369ef22ec319f8cf05a49cb4c0f4513a39f2cb091070c340ed752
SHA5128e6e36d9dd169d4e5b97f5c327c332ecaf034905349bc4bc890e06a80dac941ee3aa5b1f5c37da62413f9ef63bb8139d72cfa68529dd02f673bd8b48e1e58269
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b