Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 16:53
Static task
static1
Behavioral task
behavioral1
Sample
67f18cf8a49e025d3c958bde792b31db_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
67f18cf8a49e025d3c958bde792b31db_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
67f18cf8a49e025d3c958bde792b31db_JaffaCakes118.html
-
Size
136KB
-
MD5
67f18cf8a49e025d3c958bde792b31db
-
SHA1
6ac43028166c6e503a4946b9d0536be35b678c1f
-
SHA256
0746052635725586ab8aef724d21f37ee43d7baf5d93c2f14aa524431957ea16
-
SHA512
6b37dca1cec2bd7c7c30968d6f9565140fded72e8f47fe71123220b2e47244b98dc9067437a3ca06df1daff4e64f7a67a6a64882b0cf61d7871bd2624b966ec0
-
SSDEEP
3072:AaWz06cYv91G/kwV+0MHQVMExk+kXgRhNkfkK4:wcYF1nwVqHG
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422558679" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CF7245F1-185B-11EF-AE27-76C100907C10} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000297be4c89c4a5cd9cf182b2043e26389dbaefc345d4543ac8deb5fff1ecddf6c000000000e800000000200002000000051894248f9cd44eefc4fcd7482243069d1110a162f2f04284a9d09aec07b44aa9000000066e4d925caf8c9002a140a6a8ba0e51965af34dff72f50a00797776a95bdb694c4259769c6ad3c9fc9d394d5a429477cff15a928c663e442a23953c552cd63a2897067a30e9f9f1b622b85b84864011e0163cb989c1b71835eb395e951600b6079a99709a2b34f2fc8e40f93432d3dabfa377147378e4cf724df2eccc32bcb33949a95f1af512822bff51ed195c1f60e4000000016c9a46e3004a4c6d57bcb9e69f00680dfb032c4b81597e0a965d96fba3bd8dc15d7c303df575873789ab1043cb9aaa6402ef6a8c07d9934f9ed65ce5500c859 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000002e0bffe62480e745f5c9514ace2e808dc2b4778d3f7142942a290fbff4ee4521000000000e80000000020000200000003c426511a13adf528f5cfbd8d0dda0dccb3fba7d857157f4dedb30879ed1112f2000000004f7c30c3355a13ef5d6d628f960c5385cb56acdb2000ce46c498374a16b5ec340000000cefb36144feda36297d004d9e1c8bf0ba5a09557d3498143b9ea4ba51ac2a4d51985bd6f1084d8e0940f59c69e214e20c8a8b482df90cadaaca5bc19c14844f7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3073dbd068acda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1800 2052 iexplore.exe 28 PID 2052 wrote to memory of 1800 2052 iexplore.exe 28 PID 2052 wrote to memory of 1800 2052 iexplore.exe 28 PID 2052 wrote to memory of 1800 2052 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\67f18cf8a49e025d3c958bde792b31db_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD532a04dc78b34a0c3b77cbcfc698827c0
SHA18e9eb54e04541b1b860bcc7cace7d3ba7fdc72e5
SHA2568c846b4d3cb69d29346843f1fd55e6b68946ec73218380a88d04b32f315516fa
SHA512000eeca5a606e1f432348dc54f3979422702632446b720c433fc8ca1716f832057bbde71786acfb82bb590c9ee5dbd19442c295ecff0fa941da38212ef36ddc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcada4b4021ce8ad5689cb6f442edfdd
SHA1c87e2734fcf46b7b1a74cec756b9d8f73226fc51
SHA2569dd9c1dcd36e0a4c093703f4ba2c7726c0738d5e8a40cc7a8be4481a01661ce7
SHA5127a163a5f9f1c64af79abb7f82236e7ba165cc5bf0b97141d460a9bfedc02cdfe5cd7c9651dbee865baafb9980a50c002abe80cee52d97a4626cd78802cd5caa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502c9bef0cfa0b0d4000e1e47331a71ca
SHA18786e7a182f4a0193a63d895d20aeef6a3ef6826
SHA2563025b662ec20b05589c5dfad8a52623833cce5434d41e3f9c410166f5bac467d
SHA512de2326f048671cb34e9ad26677ad736e00cf1ba5dcd8266c67ce093717d4a34f6a2a9666ea6f2a803653f11a95231ff611801f53b1a567a1bde0aed9e95b43a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520ec790d2ef06b4d05a0d0cc09233f72
SHA14b1a1a2627738258e79a4c9aec2b5717fb9c8a69
SHA2564accf580841c097c521231d84205e0876151e76170532bf5adecd7eb6e468532
SHA51262a9a68af7c2b51865fae4d15010ee3ab41d6cc88250cb526a26d49dad8d3939fdffbc806de07c4394f4e4a6bb0a9d005f04fcf9ce242bcbd86cc258072a7b01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5009cc13c3ebba32d4b6691e9d0e9622f
SHA11a7ccbad9b141059d590cd0a030c4d672528a71e
SHA256b4a04095a3c1e6c3e8480fbff6a7a870d9527b5ee7ef0b211fd41534f1b11950
SHA512245fb7952a9176ffe05d3ca95cf5c5ca4f6ad68fd5da2e6297a957ca33da8db337a5b1fbbc056a0b9d93489fadc56468abca05cafa778dd4e0f6ca2edcd112d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD57e8439cb678ee77343adbe361d082850
SHA1c0eefb06f92cdfefecc63497dceda2e820c55446
SHA2560bdcdbaa832f7dd66d442f645d89c7fed47fe4b6f8e7336b184f40af51d98c2f
SHA51296d25fde46898fa9d21c1517fc3459097e39cffd2289aef4fc5597987b2b4972114aaa7739b7ab438373287cb3e8ad79a24eb76925752849a10e24a1d4f10eee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KRMHFE1W\recaptcha__en[1].js
Filesize522KB
MD54668e74b2b2a58381399e91a61b6d63d
SHA189ebf54e996e46f4b1e26f6dcda93bad74fc0a1c
SHA256b0e3acc54460721385d2e472dda7288382f2766a06b38d2e732d034619f9b929
SHA512b2ead3410dea89b658bfb0ce67842569641cd6c29889ecfb223a83637600b82b0d2e55cec26750593359663a22896f5da91d3df9f085c204803cd646a7cabc28
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OV51DDG5\style[1].htm
Filesize167B
MD50104c301c5e02bd6148b8703d19b3a73
SHA17436e0b4b1f8c222c38069890b75fa2baf9ca620
SHA256446a6087825fa73eadb045e5a2e9e2adf7df241b571228187728191d961dda1f
SHA51284427b656a6234a651a6d8285c103645b861a18a6c5af4abb5cb4f3beb5a4f0df4a74603a0896c7608790fbb886dc40508e92d5709f44dca05dd46c8316d15bf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PH7CXNA3\font-awesome.min[1].css
Filesize21KB
MD5feda974a77ea5783b8be673f142b7c88
SHA1b71d1c7c315b67c614563382d1c2a868ac14d729
SHA2560fb1bbca73646e8e2b93c82e8d8b219647b13d4b440c48e338290b9a685b8de1
SHA512e64cd0c0ff8d301c0f6bd9fe60934362dce7be85af57c9c3e1c719e42f8784cf707bc9025b58fd1f341a6deeb27490e3fa8164aed9cc76605323a602544c8220
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a