Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 21:21
Static task
static1
Behavioral task
behavioral1
Sample
26cc140af4d323b5e94067b7c2155336_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
26cc140af4d323b5e94067b7c2155336_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
26cc140af4d323b5e94067b7c2155336_JaffaCakes118.html
-
Size
68KB
-
MD5
26cc140af4d323b5e94067b7c2155336
-
SHA1
d47d5bc250c4fd496be532734ad622f577e3d970
-
SHA256
3dad9075a147f64b5c6d611733586250b4410b7cc0fcfcb093ec5c87259270dd
-
SHA512
391db2c9482c2adf82695b4b6b1e66b8e836e7d256a970e33112cbbe88f66d9b2a707fde10dc224bd555ba59e5e88202caf7f3e96e53baa6b8d1127ac31e6c3f
-
SSDEEP
768:JiugcMiR3sI2PDDnX0g65G7iAYiyoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JSvEqTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0287dc78da1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000c3a50df24bdea4e0cf30ebba1b8b7260477c654604c134c6f44a9be3239c56b6000000000e8000000002000020000000ecf158ba44204e55567f076280c288639bbe4798c08f12b21a8987c66efa710820000000a57efbc5f85a874ac44ec2b573bc33400d2725c0aef70ffaf57c347b3404b5fa40000000397781ef35224828723d055190ff42951f1e9e35b7f8c265a3ff9fb798fc20c2df097bd80901af4821ef13975edf759c5304ad552f477bb8a29245ceb0ac70f7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2E5D411-0D80-11EF-BA8B-4EB079F7C2BA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421365168" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2264 2236 iexplore.exe 28 PID 2236 wrote to memory of 2264 2236 iexplore.exe 28 PID 2236 wrote to memory of 2264 2236 iexplore.exe 28 PID 2236 wrote to memory of 2264 2236 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\26cc140af4d323b5e94067b7c2155336_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4a2d6b2028960ff402ea5198c435d9e
SHA127449ad9b53634e6a216c517e1cd5d28f6d9cba5
SHA25615f54ba6b01354d354b1f3c19a130581b007bd712adb65a06215bd77290b1801
SHA512ec13aa10918c22215a6ad8264e5c8552fdc5fa685da7c1da383a6a56d82c38f00e0d48a59a4e81287ceb2593996efd13baa6bbe7c17099707b43cab7935d0a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d17817267daca067df575ce0cdf3e7b
SHA1f0e70ac9cc315fc51647cc1ec4e9fb7f82e56908
SHA2565b8829a642e855bd024de148656d67f29a7de14e1e1ddaea9e742720c9222360
SHA512bcd69dd851c781feb5231dfe3be01499003ef47b695e891f0d0cdf8e89a301991b0f3fdb55b63739bff6ef28cc0027c648ea2798fd5ba97b3502b3413c26a82b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6e2cfee662021de2da83c45e53b7a95
SHA15d6f84f35c78489348f1af61e4c5aee5bfde7242
SHA2562009528b18bd8120e37fea75d512107b684d5f0ddff0ba88157b13feb64d41b4
SHA51234c6ce6f8530528b75933fd8f641dc61888e12277a3f5ccd48531412e0382e1257582914cfcc3fe7ef82d85eb3beaa14c1fc982489931f237b5316ed82748183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51110b247d98d2bf92d17a8a61f65b743
SHA121f3a657c85a3747c7b851338b6ac0b3ac154e1c
SHA256776cdc226eaf9ced8bc3d57aa66eb90522187fd605cee7a596cab367dddd12a0
SHA51256456c66fe844169bb4dc2c153f14145ca41dae95e8ac949fad98191fa05725744706078580b81364cbed99eba5afea5a6d2d60fc12a71b1f36ae31acb047ebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fed84605512c8eebbc30708705701dca
SHA1eea3a9f1e5505922254c67da5aca7af996021dc5
SHA256a5aae710b900d2099dbd97ce36e600885a0dccfe761f09b7ca44a1a56264d3c1
SHA512da16af59a22f7b78a64c265df3b872ec6a1196d9970198fed8658fc4d507cbb60a166dbd7736995a7afe37fb93297d3df3e65e4b320f8b15f54cb5651ec95d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6982fca971076fdfb0b58f149cc9e3f
SHA155f5a16348324b33251ba29c96ce31be1d4f54a5
SHA256b09c9ce23a1db5c0ab7cee2edecb4455d83daa5e0ee379771ea942d3738e1f33
SHA512232352042158011ebd1c48e430025f746ace9c20e91600442ba9ec0f6e9451226e92e44b59d984e67c6ef7b7f598167bd65276064918eafa4135fa3c9f3bd110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d670fee413d0114f23eaff7e5b2520d
SHA16b5c94c84ee64b11b8b79cd425f1758c0d21f3f2
SHA256986d70e34e1c701fc1ce7c23603732b046a0fad606bf597b446e1e89fc197593
SHA512fe6d7a22b2af74afed0fbe386d6512fb02d74c65573d978471b5bd5ff6ec7432603058f6aff2e5e9473d22cc5ae998e17bae17dfac68d5b7f6abe5d08fa2b964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2af4ef309e0bfb6e56365405199c33e
SHA16979751d269971c0a2a81ae3a3995dcbb9d42c1c
SHA25647482db911cce567cfdc05abbb9685e0f85834f25f46b8e5a8525e799ae18752
SHA51276297f22566cf0866a823152193c22dbbaf1ef5f6697da645feaba8dad89fad7d414d69edddb492e0442e33361be5ba71be6491a62cf8b468e94d0f3fbe7b0d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0fe945887d98f906edfdd7931fad757
SHA1c3dced6f479d7bb7e6614a185f6967a335f31618
SHA256f1831fecfca9ab3eec88286fab0b66bc8e7bc8a0fffb20d0e51a71ed99181bd6
SHA51244c319b961aad912a44cb84cbcd391197e351a60bce79453f78868eb04c9f41086d304ed1ea69d86d8e48513b43d637cf6c515866f037c887c6bf1e27f59cce8
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a