Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 14:11
Static task
static1
Behavioral task
behavioral1
Sample
06b3cbd52d502c676db8b42001d38692_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
06b3cbd52d502c676db8b42001d38692_JaffaCakes118.exe
-
Size
36KB
-
MD5
06b3cbd52d502c676db8b42001d38692
-
SHA1
8446de8b07fcb8e4ec24d895fda2c2c33f5ce7d8
-
SHA256
343fae5e5bf25b278a74c8dc57d672ffd7cf5f54a3d061d651b385df2c900c7e
-
SHA512
4ba9a94a839e4c21b2317343d1df704524922d85bf1832dda2f7f1cfcff9cf11ae745de0387adef7e0e05fbd77618c2040dacae518a89943b55e9e7144e8505b
-
SSDEEP
384:YS4D6rHawTTpfxMaMM/NJE5NQ4b9GeQCLOl/UNZLWndnDdyEyLxr6r:g6vTpJMaMcvUNQ8tQCLOazOJsT96
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000033d6e87c3cf75952b28c2cfe1f52a1bfb5effa948770728d6ee813b0497f231b000000000e8000000002000020000000a8d2de636ac3d3fbc0923d058885459e877ae087eb31a12a3ea71381f4a25e682000000072ccdc5ecac9e8b3449f90a6cea8fa1c1df617eea5e1f51caa8db1d6ff8018bb400000003cea2ea763b1717ad0331cb9a97c5e059c25b3c98566088e55257bffd0f69e643cacaf2c43efa5758936a3aebfaffb34ead11da448a8d7d5d775dacfb79d6fe7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3005bed31bc3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425054537" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F273FCF1-2F0E-11EF-A0CE-F6A29408B575} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2944 06b3cbd52d502c676db8b42001d38692_JaffaCakes118.exe 2696 iexplore.exe 2696 iexplore.exe 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2612 2696 iexplore.exe 30 PID 2696 wrote to memory of 2612 2696 iexplore.exe 30 PID 2696 wrote to memory of 2612 2696 iexplore.exe 30 PID 2696 wrote to memory of 2612 2696 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\06b3cbd52d502c676db8b42001d38692_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\06b3cbd52d502c676db8b42001d38692_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:2944
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225B
MD5c1ce83d6584eb85aa83c830ac48eb78f
SHA12d34a78e2a246e6ecbd869008f77d7a07d091eba
SHA25660757f3f6250f5c83776578c6649082973f0691724db1e9a6daddad5ed0210d1
SHA512f318b03cf11296124fa9ea02c28745ef674a3c759f3962ed47a459ca8d3a2c64e0ea1774463f2e046656df9975c64e1e4fe57e32e8cd24d491f0ad4fb8dbf422