Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
9ab0b66d4e9713e4088a35f7c552416b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9ab0b66d4e9713e4088a35f7c552416b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9ab0b66d4e9713e4088a35f7c552416b_JaffaCakes118.html
-
Size
23KB
-
MD5
9ab0b66d4e9713e4088a35f7c552416b
-
SHA1
2253b83d760f44df39d1b9f4c7bc908e0f3899a0
-
SHA256
ac31cb64e42ff090aee8fc3a55cfbb8a4e3b4b2780deb51e7ad062d068c15184
-
SHA512
a4080885d0073313477048c81a686c5d3c0f9b968703cfbc67d771ca2661a3c31016f091d5d7c3b541783daf5f629261c854937db6631ceed948c9f8bc1d9160
-
SSDEEP
192:uwjMb5nlOnQjxn5Q/QnQierNnenQOkEntE+nQTbnJnQKdjLvMBLqnYnQ7tngYun9:IQ/vE1T
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424184899" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{276892E1-2726-11EF-A564-5267BFD3BAD1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1220 iexplore.exe 1220 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2092 1220 iexplore.exe 28 PID 1220 wrote to memory of 2092 1220 iexplore.exe 28 PID 1220 wrote to memory of 2092 1220 iexplore.exe 28 PID 1220 wrote to memory of 2092 1220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9ab0b66d4e9713e4088a35f7c552416b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdd0efd2791551cbc767fc7fde38a007
SHA170c62ec2c4552684eee9f027c307368b9764784a
SHA256d0fa09b4b4da124405c6ae5f50042b6bc9f9fc44d4b8a0be7fe08e34a3b9c01e
SHA51265e4319534e6bf217ba9e9bc75463be411d5010c969e28f6a368f5973d7c977aa572d0ab680b494e2204bb25d4605e10400e8d473d1e7c29efc24ec3b5db88dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd4ad4ca6c54638247bb0abcdf812012
SHA16a711333c6d9395b42eb6bef350128d19f6eefb6
SHA2560933cf1f3cee7d752dc4d7a38d1c45e23423a3f977ef632e051399f08297adfa
SHA51213d34318706960ca33bbffe0d509a6216ef74085f384f579a2c4b043a074dc56af3e28341811d82d228bd1318d18c00103dab08cca90c1ea95c74a6988f7e650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f07b1f09c05b495170fdc896d561bcc
SHA1145ba0266fac2ce94d9c037645bf33296653b057
SHA25665e3966092e963895a9345a47e363cc5b308f20123829eb5cd7f4a091e1f39bc
SHA5126be955000dd4e6f80663d19a8a9757f3e6f9183bcf590417a618eba451faf4cec13b29b18da79d6aa8ba8773faaf51a164a5e54153eeb94d0530b89e2497e839
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5902a82796e4452e5f1504646d8665a80
SHA16670c889c77f7e9232e21e050b23e1058b5ee48b
SHA256ecb88bf00fcc3b17196db79886302635398b4340b87b947945d0acbc3ee6e3fd
SHA512a939bfed077710c801b061053eaa5e115870e885bc38532f130cbd808dc5d247c4875823a2ab5fa74435ace9f56090f000a7648e2d7ebb72ee869752480b77b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527a49c1f2330bdbf448d620dc639a9d6
SHA12093e411edbb93587cc0ea56ce795bbbbbeedec5
SHA25609ee62bda76dd718ac025aea0b4c2916bbcf7416682ba4cb5cdb659317fcb088
SHA51248eeda9410c20641d6e34908a994a7597dbc1e00c25ca0df3977924c5f93b56c7f58addfd08faa14545c7b273d71d1f0e9048bfc1e2d879c1953c6e0b1722d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b7e9e74ca13ddf5ff9f1a9fafb8049b
SHA1e49e6e3166f570e8f8371c1609e24142dddf692f
SHA256ffbb145a1587dba7ac212c453b6cc063fe4df88bf5d93127802851aab3203885
SHA512ca1eb3451cf3f72eb08a112d6a4dd5e8cdffa2c162d0e18ee0eb140bdb6d63eb66fddb3803220a2325ae440bf2fa551f9659294ca7396b179fa7d1babba36ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b260007c118bb9d5ce745e5323c6848
SHA17cca1dc9d464ad51660f0d59f18d5050d6b6a750
SHA256d817ca20601fe70801c7835d9b59e4e199a175729dbe65c7f5b791779987c1f4
SHA5120979e433d6fab675447b54767bd1e187f23056b48a53e3df61c96314bd4f5c120f159eb644dc0831b203ebc6182c42fccad0737404074288fb8a63e489a69b21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f92de35167f1be8a4fc1b795028b1a7
SHA110bc0f999fb697b1a3f6a9ed59353056c768e222
SHA25628634078ac33c1642bab66dcecc4527a03f3b5b0b5f7bff295c99afb779501fd
SHA512bed2e30e1907fd30654abab3ea50e8cdba33fbf8e31455c03a0a3e2c7d085a1280ee61c0d54411818182a0ccf5aa891bff00b5f40c7653773aab275ed969ed5a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b