Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 17:37
Static task
static1
Behavioral task
behavioral1
Sample
92a22e092289041eb0f93d3e36c0e943_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
92a22e092289041eb0f93d3e36c0e943_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
92a22e092289041eb0f93d3e36c0e943_JaffaCakes118.html
-
Size
27KB
-
MD5
92a22e092289041eb0f93d3e36c0e943
-
SHA1
ab746ce968feffbc6e14e3f4bb68ee9cff0283d6
-
SHA256
333412e574e8cd8885746ae9a1ab0b567bf1b79848d6504f63ed0639fbde5cb7
-
SHA512
d8e30869fbe8d7100907b953a1485530494e544580701baadd06b9dd3bd6a39d2f77a29048c47f0d337f57b401cdce50fa457e67690519f9aa560393e925323b
-
SSDEEP
192:uw70b5nRinQjxn5Q/QnQieTNnWnQOkEnt4inQTbnFnQ9ejHm6uvlnQl7MBzqnYnf:IQ/wO5+lWSJ2q
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{046BD281-21D0-11EF-A596-F62ADD16694A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423598146" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2616 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2616 iexplore.exe 2616 iexplore.exe 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2652 2616 iexplore.exe 28 PID 2616 wrote to memory of 2652 2616 iexplore.exe 28 PID 2616 wrote to memory of 2652 2616 iexplore.exe 28 PID 2616 wrote to memory of 2652 2616 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\92a22e092289041eb0f93d3e36c0e943_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2616 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583c8fb00f00dd61ef2ddf3566fadef96
SHA1a56eb4bcd5ec9f3819226462b1364738ed37201e
SHA2562e3537933666086af3866f12d4b3ac0b37488502dfe8d8099cf52e612fa057fd
SHA5121121c7475260785cf754fe88d4af0eef947d24855c29f84bba367d098f876a161601eab20c87a28b88afb637b6748e2fbe9e792253261fc5e7d9b998b4205f06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cccc8e9895932ef5bfba7597e61e902
SHA152c54bd3253aeb8d336c3a72b334bba7411116c5
SHA256e8fb57f03baaf8d5af9e77fbd523b406190e0f7d999ed531232c4cd71a86bc05
SHA5126c54fb77d9b2fb5ca8afb77ec57d58ca40140ef1cfa52128ed35c2a6e0db06e59cf628f9af0e41445da66640f5acf61e9b12f1da4ac63822495f90d3e3c66988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5638a9d7868febda88c93fe5a0f034ab4
SHA14ede32b0b2cebab16f04959edb194ab2ac908ac7
SHA25603f6abb44723d0bef89acbf28a63dd12111f6399fd26c81dba11d04dd8d3f185
SHA512415f4d6c54b29bd069d1089c5459e6f48f36de36202a5fa6586a508e21686b63990b9ea014f25392be3050bb9ed8d45a6a7f2514ef47c1cd654270c5047e7eb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595c927406cc13d5cf5ba77f1ffcb7b64
SHA168ce4d65f19cdeb3a61f9ab1046bf882f8aef70c
SHA2565185a455087571cbf1a75198df60bd489555a4eb452fcbe3024c6f4f6e4b7c0f
SHA51236454e8b6bda57479fb3f46762e6782c2c843d290317e268329b1859e895c0cf87c4a760e42b523fb719d479de437b91eadb4c8d04c450dafd5b3cdc1999ea7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d86ddfa931385419fb9d60c9e8fae4cb
SHA136fed6f47c6adf6515bdf86167cc8cc175370794
SHA25679193a0877e2c9360b5c12e4bb8a9b1c570a2edd0daf49c2bf7d37088c9e13e8
SHA512df8259fc9b755609b8ff8199130c670e435989492fce6214f1183574cfd28766e971144118f45c1472cdf955dbad1673849e856576f14b5c8932fcfeb340d65f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50730b7e4b2706b8c5e54cc6916d16917
SHA1a5f3d19a44ee1745136db95db0b2b5f813cee476
SHA256bd1f697324e12217eb43b06c9c581be2d5d46453e3af685e6e7560367d9b9c4f
SHA512b15c66ea3183473ad7ba66fa35825b419c460c1946a536fa950de116002f1773939ad819037225bd40773e58ad5dc3731f835264adcd12978b5325d12fd882d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e39bd961a18e45b0a2c2ad30417da8e6
SHA1f86c470c1e5301860693288e0e5870fb37736063
SHA256484b4cd61e4f39fd8de69d6f5b7f35dd870ccb5743dda341e80972efc76e05d4
SHA51233292962fcceaea39efc2c60ac92df302bd03bef393e72d80dc4334f37ecd68d8a3448361f9d3ed9129fe1c72c40c7ce973ff35cf8f13db174e1eae21f339946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52020d9d50e65fc753fa9aa13a5d75ef0
SHA1a9486b1c494e593a0f10dd752c62c3cbedf82606
SHA256822e12cd5b44fa391f693fe28c5c1b3fcb4406a24889055d908d0ef30459e814
SHA5126db8e0d65deb697a1b52e5a7dbf65dea08334141fcae7725440bf67eddb69888d4546d66503e5cfa54455301368a0ebeca01db6c1af5cbbd9d1d7960167c4eae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a5618b5d8acb745ba5e315bbbde3e61
SHA195d15b2a4644cc36db596c70e7b6d3272feeb387
SHA2562d5894140a8304252a4a00dc6aa9131dc9d3c6ddbc4dd9d685d3da8901b89cbf
SHA51244517cebfbfaccd32ee4494e2837c832bf6206f7fb47a94128dbe3e91ae2a109d58b0850b5274b3065fa47f428dd176abc87085d2b3e0cdc05e06b6ae2af0c5e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b