Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
9a7831987442d3304e5956ebb3c644fc_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9a7831987442d3304e5956ebb3c644fc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9a7831987442d3304e5956ebb3c644fc_JaffaCakes118.html
-
Size
18KB
-
MD5
9a7831987442d3304e5956ebb3c644fc
-
SHA1
a6c79a2b81ecbf8f3428be85b806276727f54df9
-
SHA256
aabee8a3adac4b232d75ed80bc8745a979dd0409ecc30efeadadcce12597d59c
-
SHA512
116a1e484d2d892ea9e87a00ce16e7a3e710b23b8cb4327686047b08f2826a42c228f0bb4d072665581375ddbefc050dea079af877dce189ac6897b1c7bef2ea
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAk94lzUnjBhHJ82qDB8:SIMd0I5nvHjsvHixDB8
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{50AC62F1-2715-11EF-8A73-D2C28B9FE739} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424177666" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2956 iexplore.exe 2956 iexplore.exe 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2032 2956 iexplore.exe 28 PID 2956 wrote to memory of 2032 2956 iexplore.exe 28 PID 2956 wrote to memory of 2032 2956 iexplore.exe 28 PID 2956 wrote to memory of 2032 2956 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9a7831987442d3304e5956ebb3c644fc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD53e6c0ec2717ce07cee7bcba47da1d8c1
SHA1dcb7a5ff42f6e4ba40aebcab91d7102c437b78d6
SHA25601ea325c6e4dcaa2b6abb0d3dddb528ffb5aedaf67a3e5d8466a6d8055e1424a
SHA512900e190c14495b012e437d47ca570ef605496e6faf1b967060e5a3f1505514efa570deba549764e6ee4f7dc4d1a6fea97ec4967ab31528bec12bdc621587bce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed561cf9f041abbb44fbfa65bbda9aa1
SHA1eca12eb335fd6c927e1346aa74ff31a41fd66106
SHA256482d40218797acae6e04b78353dfbe1e97b571a3481403ff9d6dd3920647f50a
SHA512e0daf8dc1be21149763896beed99365b4f8f96d65658d57326798d99659c55ea2b9a1c953cb5f5b2c6149cfe6e8b93839460d8bddb9f0290193cb81492e24418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4d0cddc31c3c3f68c12d6b9a3bcc848
SHA1a387a38ddc0b7eef0844b410cc87abdcf3eb9150
SHA256dd006a0fe96f75abcfcc6d7d431707048cd2e51b56185f4cc5f2df3ca733438a
SHA5126b4c7a702921d97ec0e7f2c56389ce73d93e115e207b0512e28897ed4a68743fa3a13ffa63d3f9aad07ce3142260d5ac26cdf172dd8f9f76827bd48e99b3b0ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51343fe6486468d988cfadfea5e6f846b
SHA13f1aeaa2e9fcd1613e9d3dfb9fcaa98eed5505ce
SHA2565d5ec8277d08bae2da276d7aca10cbfc3f8b5c13a1bed353362715440468e063
SHA512d87357b11725803045f43bb80754560bc633656b0edcc1fbba07ba613771ca2cb1abef8346cc7afb305dfa55c4109506bfe8da26eaf574debf2e9950324f7de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5504b48422141d644aa9d973adc6b734d
SHA16efca5a8b282b9aed94af8c00598834084b1f5df
SHA256dbba10fc4217d15b4dfd77752a41a64e2a1333c0cbf0068bdcfc1f86014d5652
SHA51239b98fec652d7b2275f5b563b4da9361691893345d76e0349b1b5318b816788f9d00991c1036e01ff43a2a005ce7b58c0f21a8d6f00b3847eef0aaed4d35d92c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d8ed2d194e82475b7d7125b348b018e
SHA1b393f6c0365b228db5e799f4e0cd71598b34ba18
SHA2563742e9803d0c0dfac6413cd3ae7400243c0a9e616a162c351bb8bf5ac6b1b6c8
SHA512fa4aa07f0084f5cba6fd036482b96912933ac13cd99f94fa0803329f6d19a1b68c0756764cd7fe8e830ee73e983c736a4138e15cc0e5426560c24243a26926ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c397f2b730d7bc50a082b92c47d755f
SHA1919c84346a037f2a1e0bb1db7d079c6773effd63
SHA2569dcb5e7f87b10ad39b2d04b932dc8a8eda359f28d9f6ccc8d4ad0a5f4b84681c
SHA512274089879081339b68c5badf030f506df1e7c4e00504f8478c01dd2dde5e15f5db21104035db317586c4d691a05dac94b03767a0d353c8fabf0fb4998d6a4247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c0edc156645b3003b561a05498d6523
SHA172c89c17168d180c48950fa803a7f37d6a138efc
SHA256dc1fba2938893a127c78fe2a7feda316de5fd443c9e40b6c24bb98e75be06a45
SHA51210efef820a11b5a30384fe9fbf70b87d92d8acaae6efbfd43f0437e980f42c965ed8fa5b07ee49a78b375a73fa0ed55b38cc03918284693fd2b97ccac40b243d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505298b23f17d8a7d5de587ec42ae6334
SHA1bf3eed60c3e5bd960374296cafd111d830a3cfd8
SHA25673fe0784cd16677031e18e64a70881302a00b3946790577a672239d238cb5e9c
SHA51270b47dc5ffc214a71146251bcf0b2681fb9f2195145cd51c4f5b4c50137928784ab901fd84487f2f8876cc8f0207a2558e969284a413b0fb7fbf31be1a44c464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f74c33c814bf9e3bb2169dea3b5045b
SHA1cd3198bd58ef35f6777f4541f4ee3abd9d0bd656
SHA256feedf07e68abd4396585dc04258d25ca9eb2aa0eb20ea08eb2f6df8d59f4784b
SHA512597aeba37bcb23ccdaee05d720ca2e8a53e7eabbbbe618173211cc5fb4503f4d99c3f8a41ca5c3758c7b3e0aa5eb5707de91f98e877c0ad8037ceefb57aaed32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56369ba905a7bcdd4e2ac03f5b9e3d426
SHA1f093c1161ea3a091f98e80edf18fdb4e3709e78f
SHA25642741d115275e104d59f6e3ba760568a95783ef1aa663492f7fd515f08aef556
SHA51238ea5ee809fc2b4081982b28393cf63d715aec74b0d9d9a1ff9ee40c9f764aefa1b8bfa2c502506da672a54ab79ab77190d37763d9243d23d53db5d5241a4303
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b