Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 10:32
Static task
static1
Behavioral task
behavioral1
Sample
94817958159c00c89456e24b37aca52c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
94817958159c00c89456e24b37aca52c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
94817958159c00c89456e24b37aca52c_JaffaCakes118.html
-
Size
41KB
-
MD5
94817958159c00c89456e24b37aca52c
-
SHA1
f31c8705942782ca773f03064874b54566dec34d
-
SHA256
6976305fe5538d074ebf3b4ff7ac7482e52c882171c7c1306117ea13e80148f9
-
SHA512
a10251a6b77207b1827af1830b6e29e773b253e290fd63d72ddb6f9c20d54c5364556bc078b526512bcc761110fe63aa5b9fe4cb5d33d1d91f93a0cc886314eb
-
SSDEEP
768:ThEKb1LEfijjpi1LEL7xXoEwoWMEmTbOZIi:TDZLEqj+LERX+oWMEmPIF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C45A2641-225D-11EF-9966-EA483E0BCDAF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423659027" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2480 2156 iexplore.exe 28 PID 2156 wrote to memory of 2480 2156 iexplore.exe 28 PID 2156 wrote to memory of 2480 2156 iexplore.exe 28 PID 2156 wrote to memory of 2480 2156 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\94817958159c00c89456e24b37aca52c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7a6603aa079b8a3bd40f905db29f33c
SHA16f0a204b361087d08e5bab94ffed3a3aed3904e9
SHA256ffeaaef7e985eba277b5bed87bfcac66e4ce8f182c02e586a9fc54924e117d3e
SHA512da4f701bdf740373a26df248344e6b2ee9e390b78bf43c273231204ea0a3d2d470c77f7720c69f612ad426891b471dd2e2e63b27b89e0355bef5103a4e8200d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521cadd65916dd30507438cd7ec7f20df
SHA13594dd6977b30ef1c490c943c9fec57cee5a5bfa
SHA256ae114ba043eda52accb5542b044d34ad60e20e770aaab8d02b8e075b559d1a46
SHA5129719a241af56fc39f711974ae027b0d18d810efbb7e26675957c7474e5515a467c5f2713f20b2df52774e53f93b8fecda0c5369766e7bc77bf2fd388cc5dcb18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555245a2a730d77deafa949aa8517ae73
SHA156c9ad03d87b9e5e5753ceaf0a0f9c2fd8c43d83
SHA256bef94aa7e2f9475b8b659ff474bc139371108fca4df79d1f1025b1b79c4996d3
SHA51222945a12fc7df8ea20df9322a61cf3ba9224245d36d015d3f57bf04f8a91cb81c3714dbbbd82562c1b38e0fdba79c38f9adcc5390f16f2ce27bd9ea5a14426b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5362f655282fbb1181627340547086b66
SHA1801e4864d9ef985a238cefb4de80085329793e9b
SHA256cc1961b736f1236fb72a5ded94c55e9384a46cb042b94f27012fd84e1788470e
SHA51248133a51d15695cab4fe93f850cbee224061d9f6ac5dbf458debbaa5b5857229d11ed567c083c437a852afdcc84dfd226644e3a68eda540a9bc3a2906665b86c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524710458e35b641f59456f50e2beb4f8
SHA1f1c420cba0d3d9194d5b25d48e0e0d41fa3faa4e
SHA256ae41ab7bea69e92525dad9548f4d77bb867fbd55f921a1f4ba423a5682cd53a7
SHA512781476cf86857ded3e18dcb0377846d09c115e168fd75d62a3fe246f20310d8f4eb39a3068a08f4f2103ec0e89657bdf57423856201af3530037a6c2e8125f8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57932f3ce12ba63c3d8ccc80162a87b71
SHA1afa0a55f1ebb5fa8a090383e1fd838426beacb44
SHA256a09e957d3f860315a4057ac6f74fbf7e36fae905245a280eb3412035fe0ffc68
SHA51262ff2147cc58cf6ae3ee835e4b8bab24d268e732e3b86d079ab16d1468a5dd1e534987325172ccc0de81fc42a5ccef38025a65987efce36516bf5d9f65281192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bebacbf8d3eca752022b11ae8bcb146
SHA1dd044b88e2d72ac9ec6571db299b60f18b54815a
SHA2568317647ca2d1b6e2efd8ccadc297bfcdbc41969fc0fb71dddf187fd5b84d30f2
SHA512b8294334b881296f9ca90c94976d8a01c954bc26be263a3ae74817a2880e807c3bc7f1de9f9666c6664132fc27c5097a68eb1dff64d3cc3cb37910f871cc6db4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edfb6c8fb52d8f0e99f4d8cbed0d8807
SHA11d3e001e108c888cddf5ebf5a9149c3b27d92317
SHA25648071fa3dc9118e1fab48bfc7c0355500515ef700f8aa3dea8e6d24d24fe3570
SHA5123cddf2f85e6e61da7f6204dc8ab94e327faab88e26bd2b2db35f52a63e53f0d30d4ca8eae4d9f504c2f4005d3416cc31f174d5cd57be88bb160984280e07d4be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5140a47448280e10ec61fc5a649e51ecd
SHA1c71e0a2a70c0630b88347def972b8d234d1fc8ea
SHA2561925c87fd5ab077d1f374257745c82c4e867028b655207b72ccf066f29d0c792
SHA5129de13b82c1ac4b06ecfac721b7101e95d5d1a1bf894d259c9fbf0c47828b0d14fc88d6a2b46792262b8cd6f08161e7b5f71df0d6097b641b82ebd3452e5af2e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9ee4784c315cc18c7e08ba65170b270
SHA15eacc41906b9e85e4a83f197ad6ba9f50b32bbf4
SHA256c66e7dd91217f13bb80947db7988ea40ad972f5afcee0e041a70d886abd0ff69
SHA512a6246a323838ec3e4749d10e01703b448d66e532d70077839a3378b310f7057760e143b3d7b7a44fe2eb34e145eba13b33913c4df7691b59770852db71ba2021
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b