Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 20:28
Static task
static1
Behavioral task
behavioral1
Sample
992a5946bc191f166b0d21ae117508c0_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
992a5946bc191f166b0d21ae117508c0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
992a5946bc191f166b0d21ae117508c0_JaffaCakes118.html
-
Size
28KB
-
MD5
992a5946bc191f166b0d21ae117508c0
-
SHA1
9fcd921d0f5286833114e45b63ebd0c9ca7d445d
-
SHA256
4213241f209a130732b3dfa6c822d496d151a229237789c81a9dfd9d58495f15
-
SHA512
3ffa9e2f2988c22ec8ae6d6d1785eb6d3fd9589ab66a4bd5bd8b008d89edcac9d50db0f8d895f5f2ec5b8f177d1f1a8e73cf7c885fda23c894122abe003b3fa8
-
SSDEEP
192:uWn9Lb5n+RWnQjxn5Q/snQieXNninQOkEntAGnQTbnVnQDXCFAiaEsWcwqHA9uQT:KQ/K6o2VZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{37FCFE21-237A-11EF-8FD2-F6A6C85E5F4F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423781198" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2112 2924 iexplore.exe 28 PID 2924 wrote to memory of 2112 2924 iexplore.exe 28 PID 2924 wrote to memory of 2112 2924 iexplore.exe 28 PID 2924 wrote to memory of 2112 2924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\992a5946bc191f166b0d21ae117508c0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d87303d21644b758d42767f42ac4f4ff
SHA18877f073527344493e3fb0cd05daa448d5de7543
SHA25647e70003670238eea8d92e96abc2c04dee83110a2e6d8121994961f2865b67e8
SHA51285c70af81528085973361319d5efa62032cd124e7f62f7e4fd0c2b3038222cff660cf00ac125baa6bf46e002d296435eaa1a9e84f18a886ec0eda6c18bd51b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acc1df6b2f86780f03a19f660bca3452
SHA15136425e4e49cc340899c85037ed26d3964c91be
SHA256da9c9d2170b0462858c30f988c6581f97bbf7cae99e42177b151e3a6362ea5a8
SHA5127c3a8fc5648fbc89c06686a826e5147fc88efdd26f4e8676841f0b53ca852244063e481b516c0120808f4f66ef3dd9b5b9fdd37b451f66fd94c4e0a5ee57a1af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560ef64bacd8746244749598a9c0de9db
SHA18cde1e123c6e6fd89c34da6de997d67ac45f7ee5
SHA256945d4793c36342b4b5a8f58c8e0f01344dbb43a9d176e13f0ebff0580815d243
SHA512490e5d3b145932ef96bd54813f63b1f96839f687b2e349a4ad7e4fdad4f2000d29a7c4621c36b414f0dbf819d1b8c4bbf6ae07a54ebc078d39eecd27456bb7aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f59c54fd922f1c97c6711c2d2c0d6dd3
SHA163810fde46ace7f844c1b51d09613ecf2ac7a292
SHA256ed6f9fa8eb2a1d48dc72941f6ae22ff47b9e60fa082ad30a5f94e323b4869b6d
SHA51268b02151f68e2071504bf3fd368cf9c3582ffca1c317e75e5d03a1149647b296f2bad27b2d10a91ef21aef8925358b93197b24885c9ac8959360d1e080e844d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540b7fc82c14e149cf40b98e0129087f6
SHA1b9a53a0a64c1ef869685d84a4c3befe72d23f41b
SHA2568fc593e50a1d12a54c13eebbaeeb73e9592c41c2af693ce679ec195a751a7502
SHA512d392216bc5ba1c0f801e4d6e621ce720ac6b61486a6cf582a6d6b61aa56be3f6e8caf369ab4b8d60102461673bca0380ae005220872d0723906b6c847e865c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1d3d73bb457a5ea7f0be34576868f61
SHA1c040502ecfb9bc31079a48f7c52b843b6c7d7426
SHA2563818d46a57cc36e6931a161a7f7329a47facd2d46c649fc56806808b146196df
SHA512fff35f26bbe31848afe3a8a5d9d9b6e0d56eca216e92fb6ff3b5982c6d957458ed8b0d0abbe28bcf53efc9259e2a204dab25cb2d64b8e8098aa52c8bd2658776
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51103ec8484c40f98a80bea9d55eb71c4
SHA19702cf5b3408c7883db8cc175999269f5e132187
SHA2562975d6b1fdab2d92f60a886afc3bf187e401c012d5e838cf2012c94ae2c90eeb
SHA512deea5d610dc24ee1db982c10d6e33e1c944a0b7493526c151187177d37702cfeca43b7452e65dde16928984d1565e8e18e45419ee27b67a878e40fdf0e95dd2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5257965da6f6464bf5e8953c05bfa735d
SHA124ce2fe8158ebbd6c73684b7607cbfd34b8b5ef1
SHA256f5772456ecf20c1eac2cf6d8134643d2035d6060a5c6c4698034d5f3e7bc1e0a
SHA5124e239d386ece8bc43eeb88e619655a830d55b1323c840c85696e80b2f5fcef59f398c0c202fba1b60ac8401f0713c5aa73457778de16a706075ac8fefd9edcbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583066a7877ca60abb8b6c3e513874c3e
SHA1583ba069b5576695231da2a77a43644e98811645
SHA256d1da7f39ba27fb967f81188a6bc7df5182796429aa6c63059eb3dd96ca61b0d5
SHA5128887dda2e3b1685713003c95ccb3a6627cdb22f6e90e06f27109559c5bedc8fe6f61e0fe038eced3ed6bac146bd18c94f86749dbc2576478b3443ea44cadbb8f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b