Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 13:55
Static task
static1
Behavioral task
behavioral1
Sample
9207ab3b35aa7a3405dc863ac3243a91_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9207ab3b35aa7a3405dc863ac3243a91_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9207ab3b35aa7a3405dc863ac3243a91_JaffaCakes118.html
-
Size
23KB
-
MD5
9207ab3b35aa7a3405dc863ac3243a91
-
SHA1
aedd946da26e23071a6adc6498425e827c4882a0
-
SHA256
eeb9964bb9d83767afa553ac73c2440c1daeab163c3acb7b3bed5276a29ac4dd
-
SHA512
ef24628bf727d25f41ba674e6e1b9d4ee8ad1daa57faf15efcdbdde0efd2b97eec4ee6994122468caf64293030def2548a0f909eb53b69430852d40e4ccc828e
-
SSDEEP
384:6RPQAFfY+fcF3Fxe/m65MgqQ/P+m5FAGxCgGWcLszbx0Q6glY47RPbX:6RPQAFfY+fcF3Fxe/m65Mg/+m5FAGxCc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FD943521-21B0-11EF-87AA-FA8378BF1C4A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423584820" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1688 iexplore.exe 1688 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2660 1688 iexplore.exe 28 PID 1688 wrote to memory of 2660 1688 iexplore.exe 28 PID 1688 wrote to memory of 2660 1688 iexplore.exe 28 PID 1688 wrote to memory of 2660 1688 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9207ab3b35aa7a3405dc863ac3243a91_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acc4ddb88943ef001c79e053f77b202b
SHA10f11aa94082cde5d230f494d5710954ca9fd0651
SHA25634a9e99be3ef9b81bcf1ed0ca607a83af7e8a061a653955b93888da143188f28
SHA512b8979320ef45dc3f34422461872b4be4a921568223c65f9934ba95ce811bbb938af719773a7311911df532cfef2e354b0307cc5d9030172ecd6b280c5cf64851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a8fa577a1abd2529483d22048bc7895
SHA11eed787ece6eaeee26f1ed5b1406d2081a4c0846
SHA256418b740dbe5ae81e314eccd07b7e595bcc4c14b8916023be818bfb2e5cfde877
SHA512ece9c2d157cddc05ed11a4be22673ab26ea9534763a5d68d2b1ab9f6ff4cfdfbf6f2523c92349a2e557b7bb8be11c791455231d5db1b019305a3d088a5d2e554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5646052907fa0f085e13ad32d00e5c51e
SHA14721f193bf51e4bf0c2aeac7a04f6d06ccc5fe7c
SHA256309cdf8d2c5c74493323f36efa0245db2c18ccb4e434c9d18d7f2f533e7f961d
SHA512bf160bc64741e3d4f8ab377d6f7d84db63dc1e95a14e407af963d24f44caf2ed49e06fddc5604b2166479e4f3390476db0d809736ee74490dec016e4783bc624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8e3bbc9ad615c06d2de273f977b6494
SHA1263c5816b7013a7e3a5d0d29f02d31902c163d0b
SHA256489e7f2a9a07a0a30af5a64ab6324197f6610fac33048a3d1101371e2de49d4b
SHA5120635e0d3793b4fd0205a7e58c20a1f823a901709902db21bbfad650548649c6bdf0b26adfbfa22281e77d57277e92b44f015fa2029f93b58bbdd75e156ca3af0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ace4359bfe6470d357be5bf77b34ef7
SHA1333bc0504008e5a17a3c074c379bc565e625b92a
SHA25633d4cdf7c6ccfecadec7111780154db681bbc090a6d4fc4c9a1def68f366e724
SHA5125c0decd288a036b334073c2a390efd5fcc18c6e61714aa20573540923e8a15b8a42568458be9f68b8c61b5f984bde9398be1c8636732acd7f2c5d28de8ce8f2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ec17aae1f55e67868c22fe64910fb06
SHA19bf85212de85afe4e446ddbf846ced75b63cf00e
SHA25657eaa4136e049a7fa0b854da93e3b8b05f862eda203c7b690dc96cd5f5592a73
SHA512c9b8668b333638f2e58b97f70e5b6722973c61d7f0698a5b66c1c92c827ea0ff21a0a39b65ae7c71c213eff01b1d29282582404aa10f3b9a737a0c5fc0184e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c4761128bc8b17499a8236fe3202106
SHA1248feb362970a8d86c431791e5cbebe7af2f2e6d
SHA256de9908744fdbe114c65fb5554604f7c6f4394a64a4650652968b50202e86944d
SHA512715e195c2adde68ec8aa2cbd39187807574d1450cd64dded3b61bd3be64884565285f0590dd66e21f19f16744eb03180657eebed88bf2d0ac0ae437efa60cd89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f63a25a2332d2e1a79da8950e4262b25
SHA17c67b539f49620cbd9ce33c352c7ba466d6ad526
SHA2562d447a4414b00f6b8b563f23be735b77cd34477fb62c38335deeed0b0825bd3c
SHA512d1c948a343cc18ae6f04ffabcd8e025f0c15ecc5f2062730f032290a21274d795a09350d29790e0d11fcbb33bc59b1794f0588f6830543dd3369fa56ed3a1054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e68b2503c240034ec0becb9dfc13343
SHA1aaf9f575474b25f11a451e1c0ece33f29a1eb369
SHA25686979d02760a1cc055b87374d400c9289b3a4fa32445fc3766d42777a4cb4f48
SHA512509a454d6a3fc1df5f4af287f46541d0a12b3387d3a04c0197eccdb11631bc931d8f287416f1b16e09545366e4c80257131630b02da3cf5b63ba7e82bba22523
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b