Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/06/2024, 23:44
Static task
static1
Behavioral task
behavioral1
Sample
9a4a3ef6a3962aa56df5c6d7cfb558d2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9a4a3ef6a3962aa56df5c6d7cfb558d2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9a4a3ef6a3962aa56df5c6d7cfb558d2_JaffaCakes118.html
-
Size
23KB
-
MD5
9a4a3ef6a3962aa56df5c6d7cfb558d2
-
SHA1
30d03fa579a4b03a38b960328992d3a7904810d4
-
SHA256
111fd24a7a060427c4f9074a8c4dc1daff6837f8045ebdde9a6ee424b8543ff0
-
SHA512
712164f458bcbe4708e29ae2845f611c91745620ee8977c65ae2df93de1561edd39bda47dbf4be038b5a4e990bfbc1f2b7ba29efa39be7ffb6d71c33965fece5
-
SSDEEP
192:N2Soehrb5nEnQjLntQ/TnQienn0nQOkrntFenQTbnKnQJxanQtoMNnFnQ7XnhnQE:kSosRQ/StKHyi
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{368FF7C1-26BA-11EF-8AAC-6EAD7206CC74} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424138537" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2736 2324 iexplore.exe 28 PID 2324 wrote to memory of 2736 2324 iexplore.exe 28 PID 2324 wrote to memory of 2736 2324 iexplore.exe 28 PID 2324 wrote to memory of 2736 2324 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9a4a3ef6a3962aa56df5c6d7cfb558d2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5634e7b9e41905b264e20bdad5a1e9659
SHA102097d5c8458bdb3f22f9bb17133531ac4e4b4e9
SHA25687fa1b079bc26706b5942ce9b92a71b3fb837a5902e6c288c0be08590d4a6bad
SHA512aeaae363f1a3f10864c364e8d2e0f9cd00feb7c1ba92a518e04b847a563f2409b27c20e852adde0e58d5e4cce4a6b692fa72d7795bdf776da832fa526cd66335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a82481aaf98197092e240bb1392d1f12
SHA1a5ed66ee053f3094086a4790d7ff8b0d599cf11f
SHA256aa6eaeab11261fd24db00125d0b4a35fd19e92c5bb8e7a95618e33ac65165842
SHA51295055d02124ddb4234d6e119a96aa6ecb729330c67d75386e0346e6baa4447411e0baa41fbc3ef0b593b8e2793c3fcaa24ecb49fd9faf097fea9b4cb8a9b02eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfae0816ae89734bb6a449fd27ff89f8
SHA11d4d0c6f92d6f97fbd329390ffe63c7533ab20a1
SHA256d207c9981de6febfb64c947232d69aa9bd2c86e7d27e81fc401a6da16f2a1835
SHA51289ffeac5f1f2baa5a1949454711890043658682f7b8ef70cc2ae7978f61883ab9305f9cad21951268a39cee1bc01a7a78e56c9b536a69c3cb0562c49a138a21d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5341214b5c03b7be61fbe5b8072711cc6
SHA110635d0d3dcce899ed5420fb4971dd2bc40b2ae2
SHA25624b98665307e34838fef09c0188abf9510dcd817d57286e62ff23909cfe29ae1
SHA51285bbb9f07b89c5ae4bfb3a7adbb5e2d7e05b6e45ab6e778f45fd5fd2c5c66de280ef0ac6631cc27db0646c9b875a4dac8c6671d2071291bd015e7d4c6120d026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52836887131939831a9b998e26ad5b8e8
SHA12d33a5edeab0215d5e5ab9b942bc56da6f905c4b
SHA256853b1055e01b8b6e3f1a42dadc8d9bbf9a598e58a34ebf92143d2038bb8c1a36
SHA512f0ee3fa991a89729a858a350fb207b36708a72bac2d15d9b5598ef629f32b111d79961fece5303e67566a892a65769cce445f26d05f5771fff94369920593054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5697affd399f86dd694bce6f4a5add5a3
SHA1e7aae5383fca6cb1eeb21a266ae325bb5c634ca2
SHA25603d77f30aa1b80443e15e17fdc2c95992139455766796ae553859178bd190669
SHA512ad5c84c50d0a0b0b66a493f415ab1d14b8f4c767f43ebba7359586acf295c411fd9332a7bb74d5069321c446748e2d7ccde4338cbaa04883074823f444c06729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cab54037ce6b748ea4fec19bc419c3a
SHA1cad224dcf9b6db5d413bf9fd6415b0efd41e1c70
SHA2560e2b50618db4ec9039da057ea32846c15ce1382166b5a34686401817a6e1c881
SHA5123892d67f619935c525b6b4296fa76666c9f0393ba84d09da82d28971e6648520e21c9c0585e2e97fda9bb94b0b6b48ee239d50ba7ee0502c504ef10110787821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e883976fdbbf46036c4aa4c7a6a75bdb
SHA12fecedc13ddb5392d88fee457a8f186f3af6f157
SHA25677e45a851caabd6269255d988c04a9658be5105ac62c11de1fb5fc4626e8ca24
SHA512899c6f7cd95b9778114797fff3467045544bd7a1a80ede542e4d9f7c3c50e446a74ac1c1fb269c24251832ee623f7e8ec9e13fb8c8232c6496386857872a7ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b10993df3e6d9e37c113b7840f15d683
SHA16ef925c4abe671ee155435264a2e9aa0cf423818
SHA256526e22b120877dda60bd55817cad77571f63b5d77e94492bf6c70d892fb9a68e
SHA51257e1acfcd4016651b5ed28c4ae752a84d6e871f0b94832f97ed38ad522b7ee3d7554252afa30225ea7dc364020c6a8f36ed8fd12ae3f950ee11016708dd80e79
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b