Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 03:07
Static task
static1
Behavioral task
behavioral1
Sample
698aa31a152485dbf13bd367393703fa_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
698aa31a152485dbf13bd367393703fa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
698aa31a152485dbf13bd367393703fa_JaffaCakes118.html
-
Size
18KB
-
MD5
698aa31a152485dbf13bd367393703fa
-
SHA1
554092b9937dbae804fdcc7d33e069fc3763dab4
-
SHA256
69ce0c21f3f9fa9f3988b094648c082521d6a32b0d919a9d3cd3d7a9592ba23b
-
SHA512
074e1d359929b2fd2c78b621e86e6f2c5badb602c4686ec1e151d2d6a7fd8ad3c63c2bdca0dd8b8cae5cb75ae58df5016f0a0f7e30c4fad38e3bc7502d14ced0
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIe44zUnjBhkO82qDB8:SIMd0I5nvHHsvk9xDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422595543" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A6732241-18B1-11EF-9AB8-560090747152} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2824 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2824 iexplore.exe 2824 iexplore.exe 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 1336 2824 iexplore.exe 28 PID 2824 wrote to memory of 1336 2824 iexplore.exe 28 PID 2824 wrote to memory of 1336 2824 iexplore.exe 28 PID 2824 wrote to memory of 1336 2824 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\698aa31a152485dbf13bd367393703fa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556b7e440a79116694687ee705e34f81e
SHA16860724f15b128b337d988202007a70d53cbda45
SHA25609a0a7723950e3cc3617c1b69a18911e59c288dffb70bd72e37d0ed1b979896d
SHA512df474c433e6796bd2094109311c7b01edb21c873e108a8234367070acfe79c21dae932bef4eb7925154608c0ddda7dc7fd28002ab8735465c85104f850e1d074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d824528dc9992dc62faf16a4e4ec9e0
SHA10fe58932ccd326dd0d9d8a243dec94063337134d
SHA25651816372d8e2407c3766179853c6a15ba94f12ba0503015a01bb82b8588cf8a0
SHA512391f9605319f65e0195ccaff9ccde86c0330057591878fcc1d2479bb045d01678c41e9f0b05835993423b0c00a6542098fc025b9a7d27da58205f03247153170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5309c76e214ac466e5a82103c625b9c67
SHA1b7a310ac2ad8b8447208e218f9eb0eb80a506ac4
SHA2565a345d987595331fca6ab0a72612ebe16083116e0bc3c22c1941bf4c5c13356e
SHA51267c3d3e017aa5469a278ad8c77e66bafa13b54b825584110a1a50ffe52a4470e0f12463d44a30c1c64cf62e2b1f22434e588e2c745a7ababa4158783283db157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d28c910867c48dad126cc1628d201f3
SHA19479720ebe714e28717328c6c4ae00ceca16d906
SHA2564677b8edfdd671034656544aafaf047c62fc3b96855e87a67a66be890dd0b8f4
SHA51220d5702460f895f0f7fad8ec6904c9c1a26e96a94fe9ea0274de917cb5afe64b62f476d1118a65c0439145a203caddac3792ad2c1e743048108f0f24c8fd0367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580eeb7fa1344f9336cf9c3de6f9547c4
SHA1844f5d0655e05c9835b74b9abbad380aac92a480
SHA25676bdc49920d17bafa38e19008134f602afd5f41b3ddd71b9517260fb7f56fa69
SHA512c0b951a505f0d83871c7b22eb83338e206d8190884bcf326ee748163c041762d03e25a7eda3b94e1fb18d830bbbe208be0557238c4d80dd46532d40e99a2ea5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc0f7b2975f6ef791bdb0f14ce57d487
SHA1844d96771258ae05654a08bed56d8446d8bc957d
SHA256efbfdc0f535bd6c33975ea3793e0c76b72c98ef73f4a2008fd8ec1250d3db7dc
SHA5129b517fdf257ce3b67d0ab1d7f6100a3cc62cad24d2d28d0079deedf61ada4b9f206e616b58401b7140a48a9d82f5d6911f8e71678e81decee79c66a7556b18f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54093715e000d1c1e5f5eb9ddccc5ed29
SHA12b650843cea3e293180dab879876b0ceb8ab7127
SHA2567129c686ebd4a24775a432705a229ca240d5d331cfc9bf8ed4636677e9abb743
SHA512fc5a9e6a58aeef3b5ce4fd0e960cbb2e69b7a46c66e74e829752e7eb4fa31b1448b4415228e112bccbe11772dc43b576fe3fba406e7c6fa97b8388b3b306bbd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba26072569bb3e7ad92de741ce3d1add
SHA1b8e6dd97b25e0e62f76ef3c30114360fa896b17b
SHA2566a09ce38b8f625087244115f189049ab75d9e2411b6040a3b2f1901b4fcf83b5
SHA51259cc15f8ac459f7611050d15cdb9e5b11a5253d0eb5bf53a23af78e9f78df2d37650f8b980020d24da170c3b9932deb8a94a6b3bfd9f4ca83134c5ab91c0825a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5197b2313d67d99d87978983bcfde8e1b
SHA124719179d7cb1d66d1871d8a2f37bf1ad93c3e1c
SHA256891711be7d8512e862ae419644447cf7b77084da0f5326538a568d6910089f87
SHA512c7f679bf1457f293a8c20e6ebdc78389dbcad09f7e5084645bbee007a2241b39a28c048e5a31e7c94de338cd386478d5f14af67fff546f45aa52d8842220a661
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a