Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 11:17
Static task
static1
Behavioral task
behavioral1
Sample
a078bc08efe5278e9efe322d2fce28c5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a078bc08efe5278e9efe322d2fce28c5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a078bc08efe5278e9efe322d2fce28c5_JaffaCakes118.html
-
Size
308KB
-
MD5
a078bc08efe5278e9efe322d2fce28c5
-
SHA1
8d92ed70d3d283fb711dda63c96ce8af20e0d8ad
-
SHA256
a4845f34488144bb8798f6eb61fd1f9e49995b0431e2e21006ca793979e8993c
-
SHA512
f39cf91b997cfc066b80f6b92a1bd745915f154a41e27a503cb8720a2ea6ed2c3c53adbb6f97d787ac7d174d9112ebe8338d37308e4366755039204cde9ceda0
-
SSDEEP
3072:i42AqIrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJ/:2Qz9VxLY7iAVLTBQJl/
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424352944" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6B1CFD91-28AD-11EF-8442-DE62917EBCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 1296 2088 iexplore.exe 28 PID 2088 wrote to memory of 1296 2088 iexplore.exe 28 PID 2088 wrote to memory of 1296 2088 iexplore.exe 28 PID 2088 wrote to memory of 1296 2088 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a078bc08efe5278e9efe322d2fce28c5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_786387CC77858B88BA3234B304062475
Filesize500B
MD5262db281b33f4f8e13499affac200899
SHA1d1ea958f54a731e7e5c316c7935572d088870606
SHA2560410022981e59e0426fbecf4b05d0b9da23b25c831a5f12f3585b7ed17c83540
SHA512aa949f66ed664184fb0abf9cf8bc185d9908abba3cba6438a8ef68ac96131cd6bd6e43383ad81a12d6b94b9a742702413257321b4c947d44f29d6e5244ca6b1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD543936083ce20d710f402886516305c09
SHA166dd63ca00007f8c27acddfe458c2bdfec9eb89d
SHA256f071e298d4d4c29e3561dfbb4fd81e880f4bd28ae167d044bde45372ccb0f5c2
SHA512c82f8bc0b06dc4facff9a1e7d7e064cc488ce4af882e8ae05148dee0d486a98527e141db4faf6d1ccbb522202d5504bf1c8cab23a927ddaa93a3efefe36ef897
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5427e1cf7ed65ce0bab6b17d0344d9594
SHA1baaf529b06beebe268b31cf00fd8679a9bf1947f
SHA256b69abd4aa2b15e6eb965a38840d8f3c778b2a7b15eca75221f0da285caf6e357
SHA51236817f0e6a216c3bb2f37d0591fe36654e1398924fc43cc39fa025d1fe16f2cbf1afbd9c41a095b3561a3680c9b8ca19e9e1b118875885a4b5f7694db5d2c69f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3ec01d764911c0eb9a7aee8f5d55376
SHA11a6415ebf3ce15e6fb6e5118e2dffe65d55ddab6
SHA256a0a1682e8aab86856f8468ceb3f1a25268ef56b522b880d584e01717a2717033
SHA512ea475d7eb4992959cc3f0a8159eb94d199bff18e71aa6a9eec583bbfc8a9a641d212fe837af01bb6605de038583cb46ec2ef475cf5687b487d62bca75ab9b18e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555b5737ebd8c60ef910d8be8b3cc3d39
SHA1382eaf55520b02465443e31340b7b349d73b692e
SHA2562e6c324dd05a52588bf5a1f271285b3b0eaab52fcdbbd5b6257a0118eac7b2b1
SHA5124192f6352037e50009fb72d0872058af9dd0c9c41721a1110464c9e65c1ecd44c06ef2186590c953948f856a0b5a0dffebff438cc96acf9b046b2a99119a0904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2537d8f5c1710f7ab7cde77c77cc3e1
SHA161432c55ec3bd77784de042870f34c1c6c3a5edb
SHA2563e299d64e8e3a5cb41a9827ba8a1ae60eb64136f54247a7a1a0ced7c69ff4aed
SHA512a5cbe2ae7fd1630fea43c8d97e16699cc9d636ed89027720d05a5857df5635ddb5a626a8087741908288b5b5ccb20d5e523f7dccabd21d8625215b761b25fabd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeef031af840d165337dcee36081fb00
SHA1c445dea2fdc7f5e68806c4102121f2580a064c42
SHA256d2a8f3bd62834a8f11d7cc590989fd9743cac371d72f3de087aad1cc9526964f
SHA51214f93f15fb2700b6d47996aef212f9ceb7e789791dd2a90b7e72b4caa2caa9b76e3c298fbcb79a9c880ecd6ac8d9c1de3db4e9f315dea3c9f9def2dd3638954b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9d04b9c0c33af0dd846140b78c7ae20
SHA12ecafdf18629e5d4f43c839d1b1ce9b552bd2422
SHA25628abee3cb8bedbaee575c63673c18e07bbe4803d4b15b4d9874d4dfd2b08fb21
SHA512c857c2b23aa1fec20e0edd52b8cb1c3adf66fd33608374027af28fccaa42d901dc0ffb640be9e64bc8065e3b1cd44cb683655c2434ccfae0629ec384efdec6a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d404ea94fe37b960e3b4c1e1cad6ba1
SHA1bcb5469278778df104c519badbea54981521a6aa
SHA2565d5ad8833b54c35b87d35a1a4497b3dc9df0f6037833435b5efd539ef2be211e
SHA5129d195bb7ac6fa873123d0598ca5c2e908b8c91dd1b2a3798f5309f66b7794dbbfc3b159e5039d68ab51b06dc7bb51a67b853a310b19a5948f0988d145b30ef0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5166975c09cca9b6c17f0da2c5e6a6e30
SHA1065141f20c72e14e1386d6b46d00a116446bc024
SHA256169a47144c57547f02c8109c986970ce3c313ac5f4a1cb9b9a6eb1eb0bec8f19
SHA512eedee6db2743150e315ebfe7d81e8c726546c6f8ea320560919107b5e7f7e87374f64cd4dc3b5f5a38e37f2a3a3bc66d134fd27bbe0e3d2167c8ee868f2ed268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57471a00e8812a0646f7d90e1731f82ca
SHA1ae16b1b10338fba21b4a9bb2e07a8449df915fc3
SHA256458cc6fd3fe5fdee5c7f6846b2c35169df4cb0db9375534814aabbf5cc2d4b95
SHA512bbab577bef7f7f0f7f84edc118416acad157604cba57bfbc6919766cc09164715f66a3eac1ede04f717a0cd07ab9acdbc41a011155d6281d44252d36315cebf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51a7f422366880a0e1e7e2b5068f12c5f
SHA12409d1ae00d7aab11dc86cec2b78446aa9ea9eae
SHA2564921baf5223e1e093881bc5f81422b3f87f508c05421d0fcc8ecdf3c9fde187b
SHA512d9026375041e10227d58539bd0d652f34558111f2fbab4798c26a078c3a8962cd25a1b7721c1abbcd9452f8fab816f93364924a0cd5bcef6920daa4c9da8eb69
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b