Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
ac85e08e1b4c038fe1ee95f4f93dc12f_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ac85e08e1b4c038fe1ee95f4f93dc12f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
ac85e08e1b4c038fe1ee95f4f93dc12f_JaffaCakes118.html
-
Size
349KB
-
MD5
ac85e08e1b4c038fe1ee95f4f93dc12f
-
SHA1
e76a613836accf7305d3ea2c1f2d17471acb618c
-
SHA256
511315f8470d9f1659d2e10ee4cead0d5ce66e9a78c3074bf54c059540ce168c
-
SHA512
78f6862c0926169bef591d486900fc7c969550d0d3c81c72fbfbbf497d81af863e75b414e0fe900890eee4939bb08b5795999b218853cc49c9bd8ddada79e5c4
-
SSDEEP
6144:tsMYod+X3oI+YwXG7hOsMYod+X3oI+YosMYod+X3oI+YQ:55d+X32XiM5d+X3s5d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a039050000000002000000000010660000000100002000000092cd941ee4c962b962644dc9d0801fb3dc0cce83893ec55e0bc64abf34cd5095000000000e8000000002000020000000780b7c9a93acc55613d7a67d8084254a95e86f2fa48f7b4a08c712b2e23f94002000000078e0b92e929eb5f59d40fcdd2a9d5319f6238b9582a41f9e55c0e57085177e5b400000008f77f5493f31866836ffd86b97d56fd8062a984df34790191010ba292b5c2fc9556765745e08ea7249beb710c81f27bcf784eac7c9e84088afbfadbb1ab89a20 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30488b02c8beda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424578746" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2792CDB1-2ABB-11EF-A490-4A2B752F9250} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2108 iexplore.exe 2108 iexplore.exe 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1720 2108 iexplore.exe 28 PID 2108 wrote to memory of 1720 2108 iexplore.exe 28 PID 2108 wrote to memory of 1720 2108 iexplore.exe 28 PID 2108 wrote to memory of 1720 2108 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ac85e08e1b4c038fe1ee95f4f93dc12f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577ad65c5d37cc8b0e602d1ce91dfddb8
SHA10ddbffbe481167465e272a67ff4b7e5d782e3034
SHA25650ff8df5cc2ce0895df68c55fb8a3be4826962625e025100817d6aac80e471c8
SHA512bd632124f30faed9b9d514659b23b9efa04241e28f355210c95c67fb6a226735ca9deed43cee8b85d0992a7fd3a94c447915c3876a6d8d3f1adfbbe97ad7ac3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5f8710cfabeb15ee6c37269499a4c97
SHA1c56632e157454d07702583d745de75b83c3ad325
SHA2564047b5de662397ebfc2dcebc82aaaf49c5e20af2ef97a1707f88d0c9f2b35c14
SHA512f21c231dc838200ae6f1f72d9ed5b3bfbd3ad73eda86ce8b7a5f0a19a4c5712752d3d408b5a0376f2fa96faa81d7ab26f2604d82429766433d984bdae6b094d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1ef55a22033e0efe3946da3756732fe
SHA168fafe69b1d527e1536af68c9cca85d6ebdef6ac
SHA256ff389b490fa80d7e6974be2bb46b355dbb0010757a997903c62856879b11d87c
SHA512b25fcec87f859d116ca8c97d42391ede872df2c388e3ea40adb43c5ea68ec4312e5a54c8f466def73b1d55f149da08632f8fc7220c5969a5c6d6ed03f857507b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccda2917d984d346fac27c131144cf4e
SHA1fa568654b5bfca626d03d00ff1674d484d64bf0a
SHA256bcc5ac33416d26b115b7407dffc77d8b8e9cdcc93d99acba05fce13986649465
SHA51298187730b55d5176d0409c3d4464b48a4ec82d02bb5f6f73d193ae94aa16f79554ee68005eff85c29ea34ff0995a1af3ba74fdcd048b617e5c6e3a28b40523b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a85666c3cfa557b82ad7be0034d6d8f4
SHA15488c8b1e33fbe9958447c5b225b22ed4cd49e4b
SHA256366c50269ac3dee13c2dc459de5e8b959404bc2ef7435db7e23a1127ddc40d15
SHA5120fe59001157b890bd60648c71edc79f4b160e628378bda84e3b8f5ed530680303a4f7e3e2a3bca19da029279b216e1da3a7af7e18aa0c9d558d0242fe6f57644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ff62ba10bb0ae0ac9e7d241c8890f33
SHA18171becf89a36fe445ff476d2a4e480e18d413c7
SHA256c86bc1f2f6c5871df0a420bfad80ab36569b01767cea0f7b95400790aeaaa41c
SHA512ee897cc80d95100d087b4c317f4a847edded483d2c03c94dc1a89c9305c9a48b8208c17d2410738dd3bb0788418e570413772d688a354bc8cf32d5dcac5e3e50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592b271c96c4652b1458b7cb95580adfe
SHA13bd76b75dff20ff8fc4aba1b1052c845fa3f543e
SHA256c330188aa8c2f68f34cb3e4537973575382429e302c31c17324523e3136c6a74
SHA512be05525092b6cd133b2076001a917529c07b75cd8e419fd96d992a48f443428265bdddc922d8e2b616b9a0a4e5f6d6df4747f1a2282d378fb34dd0d6c9ffb313
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58793bb5be7d6ef578014da1564be78c5
SHA1afe879adf8d6377bbb851d4602845e02c044a0e0
SHA2566a380bcb6cf052643bdee91d478218af7e66707c6b4ecdcd99423efa141c62d6
SHA5127605d21e636c38d0f1171b1c01b543ab42c89419200a916dad65acbbed3aada3e566033bdc4dc565376e5282e22a69475221651fd8650ef80e88cb525a118b78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a0a90d86704d28e74c1d854605eb466
SHA16e3dd8f3667b89aecdb4369ccd582f0f3a293038
SHA256e26732c20f20c981b8540ab17f3bf2ef116b06c854f46158d9b92e6d18f6c0ac
SHA51280b51bd77ad1d0e4afebbb31d73acce365615e0fb678ee153db8fbc6d0bca10db87abf7aee4adf82d090552d8d4699a70ad8af664aee59853028a3710ca2fd1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fb04e353a47631dc2c35a658b14c02a
SHA1bb4fdc77bba261605128e1d8da73bd8a36cc5198
SHA256a1b6f036779d96dc14a36d31b1ac4a09981fdcdfe217c58d5cab27c90bc22e73
SHA512ec9def86abc71e1ee14829f3ff45052d8c9ae1b85d02a96aea8bcff806ca5d47b9cea19a5e693bca6ae5b5b926721e22ba12e2d7a30c5f304aa9a032fb047fe4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b