Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/06/2024, 02:50
Static task
static1
Behavioral task
behavioral1
Sample
99d512e882de5fa5df48e61a0ea9e37e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
99d512e882de5fa5df48e61a0ea9e37e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
99d512e882de5fa5df48e61a0ea9e37e_JaffaCakes118.html
-
Size
31KB
-
MD5
99d512e882de5fa5df48e61a0ea9e37e
-
SHA1
715f6d831ae716917675de8ea5ad128864dad8cf
-
SHA256
115b8c631a74de84b87fcae146781b799388cb1dd88caa8a2e084a7b5edfcd8e
-
SHA512
6f12b53e7e79e3e058886de682052b24294f10d31f656df00c3016a912cd6391210f0d6b449d57af79d523f5e76b1d46cf1346d0849357b11e8e50f1dd0b2fbb
-
SSDEEP
192:VWCk3GDG7GSFGNGeWqGUpGtqhyHBb5nf2nQjxn5Q/OnQietNnrenQOkEntKgnQTP:ACk3GDG7GaGNG9qG8GthQ/mWSsSQ/jfP
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD0B9B51-23B0-11EF-8AAC-6EAD7206CC74} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423804587" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2736 2324 iexplore.exe 28 PID 2324 wrote to memory of 2736 2324 iexplore.exe 28 PID 2324 wrote to memory of 2736 2324 iexplore.exe 28 PID 2324 wrote to memory of 2736 2324 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\99d512e882de5fa5df48e61a0ea9e37e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ae18b14677d274e6328d7e360c3f217
SHA17fdf790c357e590ec5651e92ca5a419cd411b156
SHA256414394477095bfc319148491739d605e7c7dd27593aef6fe5e0f30e6ab589253
SHA5127b03fa9f7dc2c4a1a0cb43e379f7db2bc59eb0b0cf9e4cee125282a361390e6220760df7a77752f2829cc5195e7e803a8769a7299cd2ddef3bc0a84404d9ecf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c5f637086c52459b7acad10127dd9f4
SHA1707eeb1ed514eb1b9ace3c84771a9ac63be3a5a8
SHA256f30b95460c7321935fddf1d9e4dde881d1c65f7ff645cc238efb27972f8d35be
SHA512f873e7c70505a69475a67003d5fa9870329961784a1cff5ee912417ffb0fc9d2e6c696f84c16935355a2eae281d10a2eb91895f837a7e4241a8a9e98190f6555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfbb6472389b1535f12596250fb9b6d0
SHA1a9d64ec3c3b636634c73b8aac56e5540145eda02
SHA256f2e5c4177ba9e8004790e5b9e71ee73db468021f7f47a2d26ba491c000bacb7f
SHA512194cf3ade5ef355d13a79005a5690b921446b14a7688cc69aeda9a42aad1ae12543f8f3ec7956ce52ec5ddfc010121d1b5d949d4fd67c3574b6aaac07c7259f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddf537a98e8078e5cce267915c380a5f
SHA1645ed3d9cf7b902bd7841868fc55d4ea98facd62
SHA25628ef3939e2df1698b9ffcbb9388e256c15075b1d3b7524e489a3a30499dbfc47
SHA5122c8359d096f8920bbfbe9da03b9e966a972023e5490a9404b4ffb4b6b2cd9ebfca603d0674b0a9ba19b137095f89bdc16e5cf235a2be63d936d58da679de0035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9ce8eb967b637bd3d9a510ccce35424
SHA12b1a50b07e6a0bc6774c0d6a180286b9db27e7a1
SHA256d7745b2a8eaa0692cdadcd25389a41df611a4f6151ff368320730fced895cf4c
SHA5129b3b954464d1c694a92063f01a468af1dc4a2d4f2de231fe184ee063103773d397300760ca6ffe735d71ef71a2325860c831756114e1e27ab7d68b2cb22de571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f77c44f7c62cd225ae1e14cd77813dc9
SHA14dfb7ffa8fa798779ad8d0c9a69b4433741ccc99
SHA256bc86e7617d144c2e7e1a70fdf8674e20e6bc8b9c87edcf5284d0799355f18f21
SHA512f2e36689534b69cec69d211bff93d58ede39b8e2301ba732ba22f8b18f1555ea78013ad3c5e127a2753d4a5a6711bd318aa58012ef7176f5dc0efa43af7a9746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547ae7fa4fba3609f2232d3a6361c0514
SHA1b4bc8b42d5d9b6854b4326984d0bdbb89b5bbb38
SHA256e8cb4468d0a56f4f06e37e662b942546b7adcd4681a1a00972e54ef6bf329ca1
SHA5126363ee044490584a0e3cbb4c7dd356cdef6c10d0739a1c1030423f5f873c757635a570ffc9ccf419cf67db0d6ef2c12389897c5ecabfa6cec5bcd24460a266af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559e96d6b4f93550fb156be841067bf1f
SHA18aacbe85d76c8051d02a441876e041c0423fe798
SHA256dae2db9f7763960c367bc2e993689e9919b81bf71365932994c50ffbce998a83
SHA512ca841598ba739b6b47f62f49dd15b74f731f5d5aec50f4bca4f40c9bfc2ae31c6be576a203976cc99eaef96900a146e4e88406d3ac1bd02abd752c981395be2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd007a89182732a173aa9c10fe012c8d
SHA1a73e6bc2782b35c0aa353193eed33a9f7c40d012
SHA256fafce598f829ce097d09766d4b6088387d3d85544437c35edf8deecf5d168968
SHA512f83ed2cf9c31c9ab2fc1589b32139bdee1c937e58f03c85a84a31f33392a43b2bf23be4a468ef011c5676b1c8948b430b04cc7f106655f0cb7b312ac95863ba7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b