Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
4db29794f381fed2372f9ff8796e5871_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4db29794f381fed2372f9ff8796e5871_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4db29794f381fed2372f9ff8796e5871_JaffaCakes118.html
-
Size
18KB
-
MD5
4db29794f381fed2372f9ff8796e5871
-
SHA1
f8f12991829912ffad1a7bdf20e88902217a0308
-
SHA256
afd3c92074ec4716c79c0c25538373281535acd2c5e12d0034da2af64398594e
-
SHA512
d73ecf73b5a7c54d74948c0c78569e6272f2d59e4e4a7a73bdb364e3bcd6f693f194d632265944c6b9ad17d51c2a006992577270eab08a9e3f8c78c0c4f12883
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIG4QzUnjBh8m82qDB8:SIMd0I5nvHzsv8lxDB8
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422066483" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6C4DD51-13E1-11EF-9A38-7A58A1FDD547} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2956 2060 iexplore.exe 28 PID 2060 wrote to memory of 2956 2060 iexplore.exe 28 PID 2060 wrote to memory of 2956 2060 iexplore.exe 28 PID 2060 wrote to memory of 2956 2060 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4db29794f381fed2372f9ff8796e5871_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50de206605cc52b072cf5cb6f1600e02d
SHA1c0c7f0d4c4168a465446a17f53238f1dfff8635c
SHA2560bc2a9efd3e6bf0e2ac7a3d5d20737e4698ced9e1afddb78edbfa989767e84f9
SHA5124ba55d8b5e44e6f26c8720e509b3fc846b0d5eb71ce5d37ef114773bf400ce89d9c873c5c4a2267d4ec8f617189c9b008d2f1b9c87e9565c9bbf238e8fffdf97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc4d138442727377038782c6ece27e56
SHA10769650462304cd986ef94d3ea6c2f2477db5dd1
SHA256c19ef386f060120fd33c0f999d9fc02c191f0a13ca1bae0a4047d9e600639139
SHA512eb9de36f4bbb7b2eb9e3c3394c4df5e7c93b6db57982ff514ff496fc460474e73c4eaa5c91cdeee58f925a3d604b76843647c2cce3f847546564dc8004329108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5278e5e8301b3f8572b56c41604531d
SHA16a4b50eebce2b044fe082cc7aa00cdb2156e130f
SHA2568f2044051b84fdbb948bc8030a64cddf35faf12d1ac7cc4a3c92a6ff73ccbd80
SHA512c539ad1fff71de7004a4de2ee13f07ba1c27f8ffaf7d1b2227577af4a4d0afde18459b35c92710c01bc9f22ea8833ded595a6636b4c2c8163f5c749a26ba4faf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc7ecd2334f91d25d54e7bb5dd1b813b
SHA1ffcc89ca4c4efb09ec4eae53628c86d8d071d667
SHA256eb23d096d36a58f63cc63f29bb052e0e7040aa542576dc606fc9d78972febc5a
SHA512c396b759b8116fd7a843bee091cf0c43e58d0714371f4622a5c93b62e5b862afa69fe31bf26a94e2a2936a8c30eca78bfcf7b79c062dd21bf40af843ef46fca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d00057c3888b63dd839219263e476753
SHA16661ee66d260e11ccb5ba90737380033af4a99f0
SHA256f94b872363b3922de1a4058ac2680c46ed8d94d495b8faf02003ac21081f83bd
SHA512ed0d158edfffc7d580f450ff0217e3cb1e62d595c26cdd89d468866a190ef72420f11839806db21bbfca8413be38070ad6d9e263e7292513448a9f8f2c6feb25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58da93df8161afee5f8432c30f48e1686
SHA1b36f1c2cbc86f956f94a0f2b3a9933958b2acb48
SHA25662bf060bc6e88578bee8f91e3080db027ac8bed84efc7f0194c7d81f30dedd03
SHA5128ee112a3ef4264a5b11a2800baaa4892dad9012bf3d7d76c3483e90087b60a6ead69f26d6ddd919450ef1b9ff9573abfe8bdebd6c4838f0b20322125bf2d8881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540b97894e2f7c8f1e1ea7fb5d184bc48
SHA1eb61387ac37532f63c3065bdcf2ceea7eb797efd
SHA256c460a14081a9884b77740c7533a7cc72e0360e6f6b560267ab93ff5db4d5f51a
SHA512688f67b8cf4ce27f4bc6648a3ea4d4dad796bce88be963acf6a64e93bffaee9b5a9d8429dcab6d21437800a87dfaaf16a543f113fc492d3cce6dbd93d80993d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55374ff0fdc4955de12c4efe5958501e6
SHA175403eadc7c6b336655b64d36ae43b2dc1f9b32a
SHA2562800b99d1e7afb030df7f5494053e1ae4dda01f126c6dbdde9898495e5bc16fd
SHA512ef3d444cefc6a7b9482cea3a1cf2bdc6ac120fa2e09aba6ea6a1ef93beeafd407b9894e84141eef98ea565c079e9cb4239a9f5545c9156455674cfa08d06d233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb67c8612afe4a31f0e0c98a96b5f823
SHA119b4d7dbdbf4e4278cc3acb90df18bb0aa2a6ba6
SHA256d4ec13cf2973669c7a7c4b5a132fd35b7a16c92e5913366fbcf0412d4a366691
SHA51216969107bf545fad14d4145f5e0e5eadffe9f441d308ddef8c573dfbc617a66f7a041dcd600a8fb988a5d0d79084a24309fee552abfad637106b249a8424a950
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a