Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 11:29
Static task
static1
Behavioral task
behavioral1
Sample
00aab55577298180d4da873a143d98ac_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
00aab55577298180d4da873a143d98ac_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
00aab55577298180d4da873a143d98ac_JaffaCakes118.html
-
Size
34KB
-
MD5
00aab55577298180d4da873a143d98ac
-
SHA1
8663c09ca3fcd23a63f2d886b7b58eff9f86d94f
-
SHA256
d8162bfe4d7289b6df9b512efb792f061d961f51b410641b554dfc3d898251c4
-
SHA512
7dc07dec69c0b9472bcb29986c1c7bd162f4250c12aa3b4b78b37408a6c38a964999ae76fb0cdfbbcf48a9a9779922095e4209bf06f3709d6f1dd7df854fac69
-
SSDEEP
768:e7EpFwSXe6eDewe7eIeygjI1gCJC3CNChCICrC/CvCPJExBq0Z24HLx8lF5Fn:ewpFwSuDqtClpjImEWmyP84yiJ4q0Z23
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420292821" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3536BA71-03C0-11EF-93E2-EEF45767FDFF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1580 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1580 iexplore.exe 1580 iexplore.exe 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2444 1580 iexplore.exe 28 PID 1580 wrote to memory of 2444 1580 iexplore.exe 28 PID 1580 wrote to memory of 2444 1580 iexplore.exe 28 PID 1580 wrote to memory of 2444 1580 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\00aab55577298180d4da873a143d98ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1580 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD563307d2835dde3b0eda63801d85243e1
SHA11969ba8e4b1cc1de2920d17a5e521369b1a847bc
SHA2563b485c0e64584e7e16364513b97e054ef96ace32630861470cb253836b302091
SHA51214615b247efb79c56ff90e189c01e38db377329be3598d9860e0984970bd2b8c0fa3c43cee04fa99460917f892b36bc10710aaae1ef9b4b63bc886aa4cfb6601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD575abcba0998133aa71c0e4a308b6d5ac
SHA1263dca95a56458c9f046a030f05e4e08fd99266f
SHA2562d93b3d7f856c6926540cc4a1adf83cc3958a9278d55b77719df6b09c33ba5b1
SHA5128eacdc99892fe71b7310c95ca13dd892f5e5f3a056be8f701e47e8dd2e40e387a720a586311ebaaba97d8b77215758dea07d6b7a947edb4bac10a645ef4eeb35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59328054f308782321f82be21b66e7916
SHA1a0479887c583bf69601245f5b280b693e5a72b03
SHA2569ec3b1e4d062a03cce6ad78063d60446ec51fa2e989738ec4cf7fab7093a322b
SHA512fa93bf63610d44cfd5e25b215ee0fe5756f8e7a420ad858a7f275486d269db57e427fd1ec6091c79c5f28fe5457f53e27d3c1d29bf99baa40873edf7dd0b6587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD570aa243cae164e6fb3129408e533519f
SHA187710b6be9d0e1ebcc5e8d6dc53a006f4e120929
SHA2566223561cc0353a19465ae0a4788d9b5a9ba86369dd3cdf9796fe41df2b5bcbad
SHA5128fb7b61f5f5edf5703d480e1b72f380e48e99ad8b07f6093ca70a5b794c94c6c500b887e6d9861ce669636c9b57808cf31d756f06701b5924359acf8265108e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD595e9777f3cf4932237e03bbb5cbd8d33
SHA11a9daa2ad737e7405bb266c4ae40f5af22ac73ee
SHA25640de6b90c1afd5f8c567664edd9b6f69f086890672bcb54b9ba4cef6bc71450a
SHA512e168fb1417fa61d297eaccf7732594962ae08d9ada4a8a12cd1f0e3f5d35e85c221b47c734c812d63f73fa6f2d87551abca5a9582010688310567bd90c2407e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0732357d77cf6b3cdbd74851f497d6d
SHA1dc0d8c5f1aa4c88530e2915032db4df46c435543
SHA256fb318f35765298444d0a07757ffe181d6b4d4c67d2a997ced9fd1f2effa1eb3c
SHA512f61479f25c2d3d1ae333dadcf69e8f95d588676665ce9af214350a996e24cfa9cc38584f7733b3882c6dd87d5f1b53a68adaf5a61955c77ba9735d64eacb28ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD572151ce22e0eb8f669a5e674aedecacc
SHA168597c4dd06d80455173d1276d0fe79a77f23950
SHA256e0b754c4ab3de6175aa074b288a2a197f0cba83d1e8b010cbdf3d396c5edae55
SHA51293f180627ccd2ae5571cf34c7f7a5724a7b8255be3eaf6dfe479ce957ace4038d4acc62c38a5d93b396cdadb6dacd125fecf30aa35a9b835ae6bc2a64657a20b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD575dc6f942e0461449bffde301a3c6acd
SHA1878fe21f17547b09272621feef7620ea60d1d2b8
SHA256f346a3e9ea79c6df7fe0f18ed90c9dca7fba1cfb56108e3a45e9ec7c2d02ae6d
SHA512a0240b5ed74249c7fec49f9cb6031086ae3068cd99164121a76a18d69df1e764f4e9b6a0d317d715cdda3096241089a9b805bcf002f49eb7e9684f88cf4d95cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51ba7266b9e5cb3ef214cc6d9a928ac3d
SHA1fe81a4d4bbbe8f9c699a5136898c6efadfdfd826
SHA256a2b2a5c29b336be7261aec79fed127568201196efdb85121e9c1126d3d9fe296
SHA512ed3eaa7038b6b10d3b638b314415d9df0c4e4ddaf2ac52a4715256d7fadec2ca15fff1371071bd21d59c7c6216d86b87b7ef0a1c9bad11e9348e506ffc2c033e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56f475fddba65017bffccc40d8160987c
SHA115ef657bde98578c9f0b195e680b5aa60f6c7de8
SHA25624336e17a7ec94f5d9706cd702a331467874dc07eea7ee379fe8d3516f26723b
SHA5126d509d05a7a35c22691e76780ed3f4a3a134506611a9caa925bcae2b49104669af6bf67d5abbeeabadda3a3e7dc81ef184aadda563ba9e6d88a8b2710465668a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD506926b8852a0ec06cdb1f54a591728bb
SHA1ca798deb320400f7bb35694950c0b57ac1ab38f2
SHA256135a161cabae981a6762866cd94571e0a95c6685aa07cb536fb718c956fc08ea
SHA5126fb036dea5a988ca2530dacdd719ff4038fba26af9a82bc043d938e4ff5001161ae745ff918c0d401f40dd26fcc8484bc18ca53d1f9b2072fd30c7e6464f90d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD52b8324a8e575cfe11db8576dfe0fd074
SHA17c92bac62298e0a015e81b9209016e6706b03e2e
SHA2564ae3254a356b6a410a046b6c300273c857353aec7b9e100346b6a034d5a01656
SHA5123463d9a0f286019e7f19c3e77127f82811ac06cece61f95c9a323b5a7974e04cce11651183a40cf095042cc25ef39cac0223957797afd7acda573b533e9ef7a4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a