Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 09:52
Static task
static1
Behavioral task
behavioral1
Sample
5e6fb50160947466f5aaf34912a8281f_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5e6fb50160947466f5aaf34912a8281f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5e6fb50160947466f5aaf34912a8281f_JaffaCakes118.html
-
Size
18KB
-
MD5
5e6fb50160947466f5aaf34912a8281f
-
SHA1
66e0eb27fc43904d6d6763a591990c061ed0cab2
-
SHA256
8a8eac84ff8f3e5ce86f8acc507d3820140246bdb9f8a6c5c8ec3b7b3f6e21ae
-
SHA512
bbd6572cb2674f06184f3e19c2789b46f1d2281531c98e58c56f5fee73edbdce1b1e1cfb3cffbc5b93a2a5c179e902ea01ec890a8142ccae32cd0f65f73867f8
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAI/4zzUnjBhxb82qDB8:SIMd0I5nO9H5svxAxDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422360617" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ABAB3CE1-168E-11EF-9911-62ABD1C114F0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2748 iexplore.exe 2748 iexplore.exe 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2076 2748 iexplore.exe 28 PID 2748 wrote to memory of 2076 2748 iexplore.exe 28 PID 2748 wrote to memory of 2076 2748 iexplore.exe 28 PID 2748 wrote to memory of 2076 2748 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5e6fb50160947466f5aaf34912a8281f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2748 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD53ff6d27b36e6cab22267419a500236bc
SHA13073bd61876702e3ec86cc4e58df647a313453bb
SHA256ac36a84dbce0ee6c2c6797cecd05dce3a1c5520410f76c2dfe0aeea531bcf24b
SHA512343c4920196db5e595e068230ef6daaa1f4808df7df30520c592f5e552473a8dfe1f262772415e41c82956b86f8968caedc9177b52793e67d0d99f28153d0c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f369f86d7ec92addd6f39af2642d81e
SHA1d002ab34eda09dad81b6cd71712fb0b3473ddebe
SHA256b29d8a02dbeff925a17c0cb55fa5c4d8180ba4ed161c1dbe8161d826ff32f862
SHA5120baaed957597f4542a7f33e52c7e63406cc5516fdbb87af0b19bb68a56f89a0afeee85531d77726cae50b33d8addf0d3e1c26c1ec4eb57a4ca4cc299884a0f62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509413c748f07995754a0829713b4c9f6
SHA17deb14a5e4db2bf343e1712f7d734fa1c5bdf812
SHA256aca2bc0ce7763bf0b3e8df92eade9f70e7c59fdac09e835027fb67dd117f62af
SHA5120a8e25ce6aa9d944614293b0c4dc907d2967c31cac28212f471957e894eb990ba7bb947ffaaebab2616f73ac3bdf6935d6235abe25e9c57867e7a4b4d87424d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbc80c247ebb43defc06cec718707a64
SHA1814dc3fb8fe93c9743bc59f2acc50f62d7bba242
SHA25625552df12e415417ac6eaddac3e61b4703ae18f7ad44ce5c6ded18d597bd399e
SHA512d195ad52b19e2f1664907ce4d75b4e8e7c4268baf672d6c0d8533cfd684f6e5596c1515047437d792e18c5e70d692489e175bd13af7238479cca64e3c1d02588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5084a6ae32a6d8988abdd5f58ddc4bfbf
SHA14c26d637ed2a03cb9546639b098a6d34e3148536
SHA25610803152a41f1b93a611e13e491287db2949707c3e3cb07f1a639c844a39bab7
SHA512880be619e3ac76245251d7b5f5477f11def91ed9b86f37c63868be6a17d307f35632cf105bf6581de5a735f31666e2a397599f1ba71c4b2a688ade30f7f1c28a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550c05858fc4cbce9baa80ca9142e9a11
SHA1478fba369246b97d158fa351d66322caf91aba80
SHA256b834c797cad7def0c0f58b2fb60a2900e9a40949b79c294546d21e1f74e6587a
SHA512461db688bcff2004e95adf39d78134898df548d804c04685a400f116125ae8c6d21ed74bb1f3749ac61aba1070332abf39bd85f46a2c2157718bd62d3f9b66fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5044742f0ff16405f79c5262325d8eb87
SHA1c1663a97b100c2dea719a5379e82dd741563c59e
SHA256da49ab1bdc555bb89281c74b8d7c467fba67b312f6559b1413ef3ed242b1043d
SHA51277c573a66b887e40582fadaf51d2b9d9450bc72dbf3967eab526c60eaa1f83b5c4a78e1e4e2c8708f7d401944c688327399df9ea9feb1d3e242f62da2e29d1fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c02d8a08be4807edd6819eacd1e1f896
SHA17b65a678949489b2042c21e884914098e967ccbf
SHA256455f3f9a364770c229fc934b93fc4b08437cae100630f56976551c1d3626d57f
SHA5123aea43597e574eb1615a18e4ceaefb2232c89d5b2d8b0a9615272715f7ec07e85826892c3de5f688c2968f79a1290b6aac49d1f0e7b1a3b9b21656e23f15cab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58862554139ac8eb870f0e0dfe5dc65eb
SHA1d362019b3bbbc33aeed290e2fa2d4ff7c76ad5c4
SHA25678f2a1b6f1f07712722bcb78f37a1ff7d6555a9ccecea4440a6cbeca2ac61675
SHA51256b933f42253bd459afbd31ca4b488fdf456428a16c754c9280bf00a33effc633ac58d7ec3355e0cad3b80e88934a06043c6b0786c11df879fe1d5fed52b684d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e7a901802e012daccb0f9d037847f6f
SHA1cb4cb63544c31dd576e6de0e60d0ef40e86fb857
SHA256ecffb4758371ff84ccb450bf070c05ddd8c329fbd235f9ab75cc8565a05557a7
SHA5123e9202515ccb68823957b08f179f232598e52fb85b4dea4405ac1678c43754db7a649132f442a47b9b5a290e55138abeea54e82584a190fa1d5eb143736226a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD523bde0f2b286246163d0a121c163bf74
SHA158952a9909d8bc22a1fec11e4096f4311d790ffb
SHA2568808d5c5b18d5e51cfcef88cd3c74159ace51ff28807bb9b5fd8fad2337954d5
SHA5129efae5ae37d410a95b25c588d52b86ebf0163c0c905e061581c4a00d9c72d94f59b84f467c3476411c2c3f2a3886354ca3073c6bf2302866eeb88eb9db361a57
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a