Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
b2a72e624a63d4a13c860bc05a70597c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b2a72e624a63d4a13c860bc05a70597c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b2a72e624a63d4a13c860bc05a70597c_JaffaCakes118.html
-
Size
17KB
-
MD5
b2a72e624a63d4a13c860bc05a70597c
-
SHA1
11a2dc8267925cbd881cc02de13c8db1a056070c
-
SHA256
e38ec23f84686a6753f8d266e51a53e820d80bf4f571e6ccac1d6ffe7594e9ff
-
SHA512
29f1ca57828115e7d60c6851dde192be758b9c2fce59bb3a0c0741f9a8f4c6e049ad07a9e8c4c60bcccf128cb8abb3afed7209bf73a792f1825664adc84e1b66
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIJ4HzUnjBhJT82qDB8:SIMd0I5nvHFsvJIxDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424689730" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8F31F561-2BBD-11EF-A564-5267BFD3BAD1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1220 iexplore.exe 1220 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2092 1220 iexplore.exe 28 PID 1220 wrote to memory of 2092 1220 iexplore.exe 28 PID 1220 wrote to memory of 2092 1220 iexplore.exe 28 PID 1220 wrote to memory of 2092 1220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b2a72e624a63d4a13c860bc05a70597c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581ba7bdc10d481e298ed207d8cd44a59
SHA1f1ad18688bb7e1821953ced82573dc6604bb94d3
SHA2567a656137f6d25272a3e821f3ab796d60e2dbf3189f8e521e3c10efe5ea568043
SHA5123da1dff72fadd1c522c5ad107106f5b6410f485f4de3e896b374044fd4d0be6624f4801259177acb180aaf2ce1831f456a3b89074ddd5e5455895eb849add19a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5709b4801cdfd6abb12cf3d35b6fbb90d
SHA1aefa809cc327c591bda29ea34d8de1f7636b34c5
SHA25608135bf6261364a6767d41809a779426137b2a9a057ecfcbc813051bd80d027b
SHA512577e51d1c195bc6877e97661d50e7cd87805c80ae400d5f6420d8779bdb7f18d58b31b3461b0d79e1801a4bda950510a955ded9d43a6d7c34a93f1fd2bddaf13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54856997459306ac2d8ddee8c024e555c
SHA11efdeeb8b33f198cdbd81fa00c9a9d4ca7f56b1c
SHA25655ff03b55495624437153d6031b4bcbebc95f75484012b8aa8c0bd63fc2c9d78
SHA512caeccc1db4b3075753008a3f0eb28827186cfa1de1837320afbe867688e8daac1caa70dfa099504bd7a86a8b5026fe3251d7fadde57bb4697ce840f55fdbea0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7c65c5964b6f63cd32e66e2738fd238
SHA15897d72d5aafc7b930b9d0bce3eaf5d19d963222
SHA256a1a5ef140e45a958556d836d9ece2f5d2a0e041ed6ad76bf4b10988dd19734e4
SHA5126087c7fdc66b9e8eb052dfe44376ca422d402ce73642ddcd76a94d79623a05cae890ea197000616da263eacde192e2cc8e362e567fca10a36493b79c4da87da0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e28ccd961f8b8a862c927a821372d091
SHA16ad1c1b8d75d5aa403de3d9a40a697d14b1b2c9d
SHA2560d68fb4a441e7797c281576eeaf63f56703c3988f294ae1e497d64b39e1ae3eb
SHA5129d7f2c455d00802ec2912a15d402519b20652cdc857ccc8e2a7ded613a8e668802395689626600f1894d5bdf3b80cc0cf18a09a9acf6a09a922fcd230da20c46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557124757569911b2ec14b2aafb54ecbd
SHA100dbf5c5440b38940a266a7e9f00d1f6ac601ac6
SHA25633fa69f3313f250c9ff487ced4ba584c62a2fe8114e4a2009f8bf2241292d1e3
SHA51211675a0f4f7f1b4a647ce415a43be5dba04e044033ce3696003e62c7122de0d7810837c5431944427bf959d08f66ceeff6474f3fb23772ec9dd7a08f25fa0a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509beaebc8346d600a859aadfb2a391b0
SHA1ab49d951e62692e2e8db822367140ce36e656961
SHA256133712b7a08398d115379640fdd2ed2f7f5e0cfb871f81f792f04c8f86867372
SHA512f415e17d47aba5b2c9afea623407fd6f41e2e57d2426daf5f83aae5ed2824f52fa5843a09afb90952e5c318f0616cd43815aca3c292b959b7bd707ce742204a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55850010fc20006977238f303aa45f49d
SHA13929e4ed8d571def1ad7b21830bc3492cce8a990
SHA256cd018e961500e0ae755609db9935920fc427e7b5f8c1d5ecf434aafd85796863
SHA5127c235bb55622e94e5279e4858b4151b4cce62c2d5f40bd1cd36d9975ca9e41da45a77ecc62afda1738f51276cd2628f73bff83cdf58339fba755f0b05821bcde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f83465ac5de1ccf8084d45e594be080
SHA167a8c56f1ba7166adb3ebb1816fc20b3da127045
SHA256ed3b60206cfbd43504adb1c55fef69d8215fbeb59093451e197443d8b02bc3ce
SHA512432baa497415303e77419398fa997b6a7b8b271447782d9276d6c0c892cf90227b85d6b27833abe7adfc4366618514c61752836df1eb495171e967a02c73b888
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b