Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 09:15
Static task
static1
Behavioral task
behavioral1
Sample
a027c994b9b02b4c1b054ff4571a8d96_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a027c994b9b02b4c1b054ff4571a8d96_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a027c994b9b02b4c1b054ff4571a8d96_JaffaCakes118.html
-
Size
34KB
-
MD5
a027c994b9b02b4c1b054ff4571a8d96
-
SHA1
ad592d8858800ca70f95cdaafe1eb21ebebcdbb1
-
SHA256
7e9accf86f449bc37e53153ebcdc23d78a0a3d2f3a1a39884815bd3b0319d982
-
SHA512
0abd68fe18a90d78a47f334fecce09840d5f1324245b31171c2761b53ba2e715212af9a8cd13cc93271b05d8169e0258dffcd5c62e39cd14546f4eac5a2c52ba
-
SSDEEP
192:uwDgb5nAM1nQjxn5Q/DnQieaNnOnQOkEntJdnQTbnRnQOgJcwqYscwqYAcwqYQco:KeQ/xxkm5ckyzcSf9p/Ejut8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424345577" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{44072981-289C-11EF-B1CF-5A791E92BC44} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1724 2156 iexplore.exe 28 PID 2156 wrote to memory of 1724 2156 iexplore.exe 28 PID 2156 wrote to memory of 1724 2156 iexplore.exe 28 PID 2156 wrote to memory of 1724 2156 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a027c994b9b02b4c1b054ff4571a8d96_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5766bb9563ecbc82af248517016f3e439
SHA1e9f3ca448e7810e5e6e9841e2655bcb329c92c55
SHA2568758160eb1a6d2b868f8059f8864e44cf9da456c823d03fb2be84863b7682928
SHA512556af07a6cd70ac0a11da7fac227fbdf33cf72bc414d1b1dc4e2e70a96d09a003f714354c74af3792667f22612616863182faedcfe89be295e14632635ccd96e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3682a8732afa2d40345b4b9f546d01b
SHA104b63edf1ac157506e890a6d4e11016ea0333068
SHA25624d5b90d04e2a97e90f9c05cf4c85906c064ee08e07307620926b47e3e454d67
SHA51200e8606f6e739e8c351a591026151eb2d400f9e045adb476f9150fe96512044d74ee2ff0925e94b91f39f6198f8221c6eb61140e0d6f9e7264a113d2884d12bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fde309aedbc42beab5199ef75ce1a3c9
SHA134db3b5b86cf1df3fa0ca7dc016c9bcacb7ad8e5
SHA256c61fc347f296f77d0bbefb637182e3cd8325e40d456d5d8a53219f7c6c474521
SHA51266f8b155f23e36be5195b853d4079451dffc0d4f4905f1f0ab8440f4e004ab1140c979010bbcf5e45213655ab08d4616ccd6f3e629fb36441c47ca72fbe330fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589d7cf0f5f315ba4d1c2aac35d5c40ca
SHA15c44688f39a9b3309b03d405fd197687923a573f
SHA2562bf99772b718a347fd8c7df711a91f086762c92218f77191fb567ef8218d001c
SHA51269e170f53e403ccd5a91b560d1b576dbecc849522f9cca3e7f42f08b8b2513d87a5ed2a5739668490e2f098237d09c8a5f92f986d3054bdcba311cade38b687b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd9df6e7845176f732d4ea675755ca84
SHA1e72714aa4e7b5348402903457ce65353abf4453a
SHA256d0c197de70a014397ae5779b97c463db9c87e3888d1735cf7120f7c985cd10b0
SHA51254fb23db83dcfc5de68a3247909a512d0d2d3703a1b9fe1295aaf3973b492ad55c6439ae69e7a517efe5f1e954df3aacb3d74601fda853755abe2673782c60c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586d5e61f02d4581b7f1b82e18268e674
SHA160e2b394344b3c4eb7caad53ad9b6cc3e10b04b1
SHA256683c67fa6ca14566624556863e85044af8f623dda06b20b8fe39e3fe451428f4
SHA512fb15030127e2bd4cc2b7daf0d84d86301cca9226f9f3e87bd0dfd6e04a55f3a92f536f1a151c5adeb55ecdcf60f4b6c84ac0efdf1aeab0625bc64603b9b2bf98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503f3a8c7cf13fc24faa726969628e077
SHA1cc0a45857a527347c1e63704800e4e817c531141
SHA256dd6b0df9955e04f9a011e586907d28824634ea1c017702d42e6ce05610f6bce0
SHA512552c779b667c4ec9473daf8b7f9464ef964ffb53f743a76660696edc34a3157e6dc765a16d14ef683e8c72cd5b4d14dba7600030acaadebc275ddd9c8a3a3cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510bf9d9da04338539645f8a4f7908216
SHA1b4c6ebe26d15c131e0a049bafcee4ff89a254bec
SHA256da79c14206c8835aa7e7cc97a51b7ea38351978c2e971adee8cc8de5bbd86433
SHA512454db91c9c4653881091bbf80d79f47dd07f3764a0c45f0b1a02ff3207007f65121495946aeeea8cce1dd6a4dc88bc30a1d2f2ed0cc5851cb3b6fe8b9ed9e709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c85311869e11d1490fdb6d92f825c4cf
SHA1749ee848f8a7ec359ee1ddb8c553accf07f63972
SHA256147c75e4fac937ad3cb4e6394731f61f48abd331e549e18febc7c886abfd0cf1
SHA51214be83efc84661397ad32bf2b6f12eebfc041748dd7313b689c4f0a349d587804b7ef36d703e5e4291850adbd0c1199f998c390270e767d46fb223cf56b5be0c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b