Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 19:22
Static task
static1
Behavioral task
behavioral1
Sample
31a84538a37c8bee08fc5a6bd039dda8_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
31a84538a37c8bee08fc5a6bd039dda8_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
31a84538a37c8bee08fc5a6bd039dda8_JaffaCakes118.html
-
Size
6KB
-
MD5
31a84538a37c8bee08fc5a6bd039dda8
-
SHA1
0584f969cc4147a0c69d558b71e53571f66e1398
-
SHA256
1c87d75283cb70ef13c1760f8a8084dccda88108c0f5d2ce0142e16b31381366
-
SHA512
f5c5269a5c2a4453cec094af8e4efeda9a62148a17f2da8010ff7c595c2804f9a7ba78289386a6f2558af029aaad45633176829f8582105d18c20e4f41b3cc3e
-
SSDEEP
96:uzVs+ux7hpLLY1k9o84d12ef7CSTUap/6/NcEZ7ru7f:csz7hpAYS/p4Nb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0d3de853ad2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{96A96121-3E2D-11EF-9403-6ED7993C8D5B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000865f204047a0f0247c6db1bbece3e01fbacf3509ed70416b3465ec47481a5653000000000e8000000002000020000000cbcce2d21b7b9932b8705ed4d7f2cf395307120575f5d946ea2d812cdce2c5442000000079f9107cec1cad7eec6041125b29796991d90440f5c7a8584046b0202f077ce640000000d8e3c0f0747db06aba143efe02bedc27d84dc0e1f96341695a477715b5819e92590d13453a3e09e74eb558345656bdcb84bc1dce6d6e3648760a8e51711c4f17 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426716967" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000001c167e3f484733a981ec99ab1445f56afb2c78589b6dddd36204ad3681c37c9b000000000e800000000200002000000090b7fc0900e67e00e4765873dcb05af961e73d1d2509f69764a863de58e153d3900000008eb78116eccac9bfc0d3db44b02d5ca25b7467ec5b5c0c8fd2a6544fefd7f2a5f1238c76f2ad1e81eaf50a3d8860cc5426a8ca8818f7a57c46cb0f35d34e5c03f072db644bd2d29b877b16d5672cebdd620cda077ac74da879a3d28bf84370ead437057d213ddd55fd9549864ecde34d41c3e32814918a6454db9f78089c2aac875237d6f04b90f168a6aa9119affdd340000000538fc922902190dede012c4c36e3cbc4a6c8b00e1e01ba01ba2632bd9f642fe954cc3243c1d76fd0c0f2e8f7faa902486bcadd8eed2704d28fbdb7c5ec2169b5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2056 iexplore.exe 2056 iexplore.exe 696 IEXPLORE.EXE 696 IEXPLORE.EXE 696 IEXPLORE.EXE 696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 696 2056 iexplore.exe 30 PID 2056 wrote to memory of 696 2056 iexplore.exe 30 PID 2056 wrote to memory of 696 2056 iexplore.exe 30 PID 2056 wrote to memory of 696 2056 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\31a84538a37c8bee08fc5a6bd039dda8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a23debd62b870ae5a1292626a125c154
SHA17f34f1c566b7b56a909de209abc0ab5c2fd73cfe
SHA256e490e067f573a19603dfc4df838f0aa5911dccbcd4103e23871551819efcfcbb
SHA5121a5d9864152d5fcd3971102b58aca162818092806811af19edf53de19b496324420ee9e93924e1d60e61093cb1d8c4f2b7e01ede6d9a4b157511114ba07acba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3e5783794114b0604144917b8220c61
SHA1dee1b99ec5ff8345d33382b91aba6cc9d4d8aeeb
SHA256d6a9afbe12a836ebca28fde55ae24e51583eba753e1162bd57ffc1034ad6cb78
SHA512d094411b72eb40652481d5cb156f77858e5adc96611ce551326ef9fa63b302cd987fe298493b36ca589657d839a93c8a8e1aa94a62b1c6250d01aafb03bd76c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b18e9a02e78c729bfd14902cd25a4e9a
SHA1ea89303e2e4d2f04c2e98e696f6800d4cc7f7e97
SHA25666915dea16e7677c473b9bd8ab3d4db56a4448ba5c9e28ebc3801ee0d9810465
SHA51299cd03dda4cd991e1e99cb5e9140191a650b7dcc341885fa482108338d20d5ec6fac501cc0788062fa1f24e26ad39643e5c2b84990f60e1305f1138669cf5acb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b2be910068c951cbf9c00ac28a428f1
SHA18c5658919d17828192948de67802ba8dd5b5b38c
SHA256d0ba05b5a6fd8ac4277301a5d5c00935a1f68cbd942fe21c6bbb4e58b01c914a
SHA51228a5e1e4faa9c46c1829ba587623c6cde92e68ed0f3ed1da0f94ac425b4d76842b59bc4918d539d899f69e98c971e149706fd8c95dad65524077327d0fe18ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57352f02f3573d67ecdebaeff7b662f16
SHA1e4727c199cd0b7e82f6ed0b77b7dd08ab38c8144
SHA256a9e86cf189b43b05fedd2fedeec984df434ba92f3e46bde40578af0d1489cde5
SHA51210baad1019ddfb915e02a52e65f397c2479718e8c3ca7549650310031e13a5c0bb32b7b1b1f9a3d6e8d57336f35d39ef64f5bb799dd08c63de917001423f2f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d14b030b6dde8863f08f6d7f4ed297ab
SHA1716fd57a65be868550dbf8d55b79cae00f4282be
SHA2565651f35d66733045bf74207d367f809d33ec69530264a6c325cdc993f3943c1b
SHA5124d194bb3e87ab1f89496b4593ccc00d0e2fc92531b179d8c596d0c382af4f2367d5c6a0155f2a63ebcf28b8fd289dca291c7d87e9838dffe7fbb93b4261b1fcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c06cfd02540c5b22f04efd25ba258b2
SHA1fa8f15befcde0ce0bae7938b597b1c420578fe7e
SHA2564ce56ab381283e7215e320618f09db5e8d3cd482d0f50656362d210485dc6e3d
SHA51254acef581a7d531e3e896b1818c3ab666d5cd6761a4210406e513c27dcbf07ed13bb1df409ffbb749044f0fedb7677e97ad6972ae23445f4b5fe76fb6e287c8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554995d670fe625b3d4395bcedf81524d
SHA1879a6402034f3dba7b7bee12a7595a0db8f435cf
SHA256e4058d646de54af12e5a9ab424c134b4a6aae5310cae7805569299039765cf3f
SHA512694b66b085c5a00eabb55832f3350ae57b5508853773588e390cc6102730574fdc962473b427dc1f331809ed2f7cd73568510299ce384160388ee5c1ebeefcfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd7821e073ab23f30cd1903b6be469a7
SHA18daa340a48e5755ca5d73c9c489c439a56179e72
SHA256cf9c55285794346fe4a3ad8b8bda6737e9b7d2dc75be26c88c5e04c1e591c498
SHA512da078ecf233de8ea817d55d88923f3ba6b76955a7aec0e77052ddf1123756163fc3915482ce5a9de09c573cce15528839fc92a1ffa4238f0f385b2c37ab7dc7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dde7b86557bfa88066429ba5beecb9c
SHA1cde9540a1444d277e9ef250aea27ed11490a867a
SHA256680e4a4f312d6a1e38b329c573ed0165d0bfc50001386a53ff332f0573105be1
SHA512a50fcc1ec5dd66ef147d1ba581d0d406593554e080c73145c8395708db0b5f45f8c5a0b7b9b006667c2777c52dc2686fcea4d759b60b3be4aaca04b6e20eb2e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55342de20272173ff60a0e21f845ad954
SHA1022efe16333cbb492ba7ff5cea97c7ffaeadc941
SHA25695e1955003549872398e06c3364e8b1c1fc4290171571b1229a66b48fab1cfbe
SHA51211cb2fdb59ca5b56bdae889dcb57f1643ad7b450cddcce36afdd35c1655247b2918cb69cf0c24b438f90915e356cf40f208dac52425e22f3e128ff04fd260f04
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b