Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 20:09
Static task
static1
Behavioral task
behavioral1
Sample
2b7d76567a70ba19d6e40e21966ec862_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b7d76567a70ba19d6e40e21966ec862_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2b7d76567a70ba19d6e40e21966ec862_JaffaCakes118.html
-
Size
25KB
-
MD5
2b7d76567a70ba19d6e40e21966ec862
-
SHA1
68e8a349a64f8b208a75a9f4098e364d8f7ecb38
-
SHA256
60341827c5a45952523bdb2f6c59524295182f98b897fd4c803299396792d997
-
SHA512
bf432d6ebd5e4c8a82de13be8fc2353310d68c298ceb7f3b147cee5f253fe19bb1799d7babecde79965911c0bee5c9fe58ad3768646087c63e3673eceb355355
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIQ48zUnjBh0O82qDB8:SIMd0I5nvHxsv09xDB8
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{20A86791-0E40-11EF-9F3E-D2EFD46A7D0E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421447282" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2440 2204 iexplore.exe 28 PID 2204 wrote to memory of 2440 2204 iexplore.exe 28 PID 2204 wrote to memory of 2440 2204 iexplore.exe 28 PID 2204 wrote to memory of 2440 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b7d76567a70ba19d6e40e21966ec862_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ada22e6aab3cef69d09c187da263703d
SHA10e5392ad8d375e0f0366b193c21f51faf310683f
SHA2569a790ed29b7ff25f9e8fb8f6b4da5d925e77297515708a996d27e07b968f6e87
SHA512e0f070233342dd9b5f7cbed86ec8b611dcbd41fc98a4e20690b6604e2797bc1b663104706e1ae79bbda544de30121b34b236b55fdcd8138bf71d6e1f64095463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55372cddf6bc69983ed367c90f8df63aa
SHA1500e3bdae63641b06758defe252041017a158c92
SHA25674668aba4d42a4570c99a0b3d50c5cf23c172f2f7a3bde4849a5f948e27fdf5d
SHA5123bc4414102c7750cabb2dcef3a3b6085182f3965cf777e1f8b094501bc1e642a41210ba44271a6d9718d279d7d1244926b24810f3d51f07f92a35592af7f4758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55232b808974f8ead6789e1407fda95b6
SHA11c9d73c9e4659718779ba81e46705626ba284d40
SHA25627e0d3bd64a797d93a2a7c5c3e3b298322c59dc0ab0fed75b579854f2304da9e
SHA5128f381429b99ef744d46d7c0d8659b709cfd5bdb929b978288654ee5cd1e0e83da0f6476988a1843f302ad8749ad8bbd7e406afddec0f259c8cd34b91a56550f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5147c2e1c66a60ebd1beba166b33fa28d
SHA121073c75fad89763ee8402f386f286a09afc6b67
SHA256c767730ab6d21f5952847084b467bbaadd81829107a5b043a5c5dbd28f067141
SHA5123cf0fe63096c46e98011b423af19cd1ea745b38d365cc6f58fd0c2a70b1e6fee400e65c2eaa24534e7dad605cacabf90ca76b199868a2fcb0c5d9838ec0bf5f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5559ed2cc027f45a0a4a2dc5dbf731e16
SHA1ca2ef59bec61c8dddcedbf72b70a9121660617c5
SHA256c2388afcbf1d4ebd6369b8dbd97136345f0dc8b24d4b0cac1384ecfa1ab720ee
SHA5129b9877355f3f0888e863547213fe9a8ecf99bb125186909b8aa93b9dc4183e708a63a4f211416c175267e1b61e7f62d652d732d49196e756bb5937318387d24a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3b7b77d6615fb27c91197614b0b3076
SHA1b9ebbc87dcbddfad3b69846ea97b65292bdb5387
SHA256a20a1fcb748764858bfde228fc37f0dd624952305ed465f84bd67b68022f5f9e
SHA512f096c98a5db2d23bbb49a9c540144435ed2a959c65895f75f0a7cf8a9164b69c5842cf498b6278ddd568b6b750b877ea2051ecd380e10f63f4826176c40fd6e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ea846758aff7c6f76cfcfc4fc24556a
SHA1ebb819523172a872843a79fa7b0a78d8bc0ef21a
SHA2566130fd085d89b4ddb32598c32e60bee768253d1d4381685fba9111c1beae5812
SHA512b88d9da515a975c7ab0a1c42ea703cfcc39660cc909c4fc3bd08189d50fcf60c6e48987e4dc1898c75414bd7e21df54360ccd31bb787c0cf4287c855db9af7c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dfb96645a55034919546f43eaac2a07
SHA14f4bcb0a42a205c2bb0ef22e62263b664499b425
SHA2567dd03d5c85c11daeccd1c662013e9989f7c277725f37c1aca884b4a00a5ecb5d
SHA512f74e5d62189ae3e93a4a698ba90c04ee6c9e7a008fe18bcab6cc82bffb240f927ad5bcd6ae14fe8d1d9b97be4c5310b4abeb92fb41fe243a7a1d3df64c975755
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a