Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
88s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 21:47
Static task
static1
Behavioral task
behavioral1
Sample
61874926fb97d71c8e3a7f5ee1c10399_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
61874926fb97d71c8e3a7f5ee1c10399_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
61874926fb97d71c8e3a7f5ee1c10399_JaffaCakes118.html
-
Size
11KB
-
MD5
61874926fb97d71c8e3a7f5ee1c10399
-
SHA1
77cc846b0f8bb8f711fffe08f0d6e7bff2117864
-
SHA256
43aa5d14b009fcd9a006e65b3ae84d86e48d36c5dbc98116cf88e51261961abf
-
SHA512
59952371cfff3d89f20c60f081fb58d6e537dd1d256347d99c7b64f6b76fc415421de8f3a99db01953abd2104721ade1e9be3e53fbedacbc685a862bc5ed2bcc
-
SSDEEP
192:2ValIsr0r57Mzx4T8t/w1wvqVkt11auBuLbdU8d:salIcIQzxn/g81aguLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6042cbbfbadbda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427761622" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D370AD51-47AD-11EF-B228-52723B22090D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000cb62105b44a7682ba9428f48c9289a65098d084cc8f19c536d09aa1343bb35b5000000000e8000000002000020000000b7bb4be021cf900b85876bb840bdc3e6ae41d99723eda4d48a1350ce165c1bfd200000003b47577b97bdbc375b8e53f47a15a4cf3881fa6db53b6ba977ffbf76eab404d240000000cab4546ed630ff241970d7da83497ade6cb39a4a222104e9844b659b34537ccfef6cb060e9956fd3e18e2f6871e8d1e7b5017721ebceab2f7d46d62caccff3e5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2832 3068 iexplore.exe 29 PID 3068 wrote to memory of 2832 3068 iexplore.exe 29 PID 3068 wrote to memory of 2832 3068 iexplore.exe 29 PID 3068 wrote to memory of 2832 3068 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\61874926fb97d71c8e3a7f5ee1c10399_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f61c5ae8be53452c9a386f17184904fc
SHA164e6c38d05abb2857c5064367acac30cbd3a54a1
SHA2561562232a3ff6adfea6d94c04a26895ff498ed1049d941254dd7f29511e4aa1c1
SHA512449cfbb167f82a615b2066998f9bc67641c7ca361aa542aea627c605553c820c740793103bbf207c15a64dbbf495aa9887c76b83028b69b167f93c3badcdd451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbb202a7397b5242cabeeec28ef32e80
SHA168152ced076b103621fc532f291d107fc3e22d9e
SHA2562425bb89360f8f46bbd05122c9813e8c821c58fd33172a708fc5da9383a47d30
SHA512bc1345a02f28c995939829f433bc49cc6a57ade51562086b829b8636fc919b31332c9d1dcebd74f61284cbfddc3f89e19134980aef00f37d9f01b7306f8d15d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfd7da11c40a1d3994aa6068cb3c43ef
SHA191425a5472448fcca495a143f3a99d38c4524c11
SHA25611bcd1cca286ccfbd73125753b80aea895697564518b19f0573ce94b6710a61e
SHA512bad613dc4f40ef1fe25596aaf8c76bd72a84b87cc4822a9174b599fcbb7c592de41da3abad273040f737794695268ac21affb22bae81ddafacf5b58dfb04df05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d834302ea4ac669ad5b2c6e68b4d9949
SHA17bc6df7003614661336f5ec57111b7ea7b6739ff
SHA2563f21a9fc74342b2235c105928b6e738692665db471c6e9f5360a4e5d4283a6c8
SHA512f275bbb377e1024e6bf8f3cb564d0c627a3e82a5f26d86fc8ab73f7abe400320671b940da56274c8852d24fbdea836be34319d4933cc20c6f0d57fbbdc683510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dde8e6a2870186b6356b2d182f7c775
SHA1bba35a717f4c125ec009ee3beee1cad1237a6678
SHA2568acfba409911e770e27c40869e4daea199413650c5b30a7aad5f8d4d25e64490
SHA5129e276fb00bb1650e338d395baab3beca4248b27a8de1b810658032c6f7ac752ac91aecbbf9e6c83e646cc11d5014c1aa27d90c3c94dfb0b3a350f657b62bacdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a29cf6705aae85b359f1f0e37c0f861a
SHA1ee44317858872e22f94da54604bee92617879e24
SHA256cdf20e209b0b73993c99d9e121f495ed5b6e181ace951223e77347a77623d6fc
SHA51202e35cdb02442c39485024f414385fb29986d9ccfdaad36bdc6ae0e88e82c78162c6c6b4d78fe4c4bf6b30af024cc125138eb095dca773c921f0599aba079fc9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b