Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 12:52
Static task
static1
Behavioral task
behavioral1
Sample
a9c57e253d415196f8fa2c2d37d2427a_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a9c57e253d415196f8fa2c2d37d2427a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a9c57e253d415196f8fa2c2d37d2427a_JaffaCakes118.html
-
Size
22KB
-
MD5
a9c57e253d415196f8fa2c2d37d2427a
-
SHA1
ba8d09d2f6f2b6c1e00e442148a6ec33f863be43
-
SHA256
e441941215bfb9c2bd16fc5b0072d66973f95468332fba9542ff184c260785f2
-
SHA512
e6c57db576d60bfc031c22ccd983316f99091197b8b35881758baed9cc6b1921bd984108ec233794e36078115d64c76d0f945ccabee9052682103d1cca751fb9
-
SSDEEP
192:uWXf6b5nGnQjxn5Q/VpnQie+NnknQOkEntb1JnQTbndnQxCnQtMwMBeqnYnQ7tn3:6Q/VQc90Vi
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{01CAFF81-2A4D-11EF-9E46-6ACBDECABE1A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424531439" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 840 iexplore.exe 840 iexplore.exe 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 840 wrote to memory of 1336 840 iexplore.exe 28 PID 840 wrote to memory of 1336 840 iexplore.exe 28 PID 840 wrote to memory of 1336 840 iexplore.exe 28 PID 840 wrote to memory of 1336 840 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a9c57e253d415196f8fa2c2d37d2427a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:840 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55459c265057255691d53b9ab887d8c8a
SHA1b51ea9577790ea7064ac1b4db23eb1932e9b151c
SHA256ba2a090550d8fc60cfaced3aaaa73c031a52a218cc127e5368282dc6d81a8c85
SHA512d4e973df2a086c9b2b8f591b9d3052f8657c55a91ffa267f75211f1f6c2a6ee934c4331edf64a2c54963c6187959e76049ac4b77d9a207022e3e2a1fabbcc7f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4943d8a906ba736a717b2ffa15778a2
SHA1ec6e22af93e03508692a15aa602548ffcd68bca8
SHA256480553324db61ac3ebdb3c7a9e1b72d038669b49f6d6c34ced5e7cc079fa97c7
SHA512cbc13b27a88ff5188c8c81c49fdc01268d0e9c320fff98a77fc1025eac966da41b6ccb8a99a5ad1ce80edac70fcd6054df15b6255d2b90b2eeaeb27f0f733379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52979548581d276e27d2dfc0f46375e58
SHA173f2b9f15132701c7d8dd97a133fb074e42cb170
SHA256ca7c24fbc004ea772e8afb66a0e7e20a9232f1c2a4f40d76943a46ebcc3dfd4b
SHA512a4d11d575d899b92f47baf410c835f2db9d8295692d2bf2ad5ab7207c09374010c768269fa6afc6c554bdc51610ce3b910f6245202e7181fd0e96bbdf3adcf95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e7e94437846262159d30940bccf478e
SHA184625f44f051bb7f08fd3dccf21e710f5e7334a5
SHA2566143e3fcc4464932c20287630a8410a2744df02288b047a1cb39cf4fe4062c54
SHA5125faf6b459b278ace5fff522a3b7f0e3b0066b47d603fd343be32acc77c9dedd98016c5e99971c9b1f97ee0a3c654041b2ceeb3070d61596e7214d75aca818bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cabd322271a978796a78d330c21ce47
SHA1c49355d7cf7253f502bd1a26662d31b6253557be
SHA256e0216a6cd4c405865a6cc2519720c2f7e47acb2ee4f46aa464417f0c27a82ceb
SHA512baee77376f62e14587c0664e9cb4fb0ba2a0954689599633fbeb24e24b42d81823c4592bcf8ff18ff3b1b31ca9df66f952851a021ab885e976950ffa8cda980d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cece36a13249dfd11f72429fba4fcc3e
SHA1b7b2a7e06e84bb412dd846eb8858e06d95ce8a3e
SHA256942ae5a7a239b895454985cb94a17fa689ae685a3735243b765febd353609ffd
SHA51278a179b1870ec7b5ee86129221f9edeead579bc5cc557e073975698a2842a5fc40e56e69ceff542bc8fa1c48cf9e45245bb6bca5af2461d4d2dfd4b129945188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b35887e3def2e1925f2010dfa6f31e4
SHA161d5c0c3735bea208124c4674a97ce818743b2e1
SHA25631ef65813cedf432a5af4e072c5d0e00ee6e6c1bc46f04a5f220810fe4af4e95
SHA51247385ba040541204d928f95f9c1680c06238dba293623d885bf346112861ff20f80f95df2ff167949aba7c466423484c1d043d47dfb7547223998d402c96222a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a236a3fe9691c6acece1daff47b180b0
SHA13f2ce4d0ccd8050d8232b1c0fb90673a2e91f23b
SHA2569a6050071a7ff5f1f739c86c96cb8786084f5634b5ea2ace73ec1b91efa81e23
SHA51248f94c261dff981272ee2e56af2bd98bcd70d74464b0488ecc804f34dc8b3853e52b372d07fa0fdf908b70c02577fc918227052e32f35c7d7c5ed3a13f418768
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b