Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
6b2fbef5059dd7f19b648a8f679130e0_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6b2fbef5059dd7f19b648a8f679130e0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6b2fbef5059dd7f19b648a8f679130e0_JaffaCakes118.html
-
Size
41KB
-
MD5
6b2fbef5059dd7f19b648a8f679130e0
-
SHA1
8eca8bfa7f43867ec7cd15ac4e85a4655766de6b
-
SHA256
08e60fa8a39c014610cafbc79ef443e6015c82edfd86317d7de53a61ab028826
-
SHA512
fba4a84859c2d4e2cf3460427fcc6a61790d53f293dbb88466e36c023f0e763606192b1ed5a32e22175cff692eab2a2161d4168a940764731405f3d5d01e130a
-
SSDEEP
768:2FDIYjGHgeT3PBjWvlogDvn1eVC7CO4WFGxKIQLkZ8fk60Vs7CEqMABGctBWwD5v:2FDIYjGHgeT3PBjWvlogDvn1eVC7CO4t
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422635150" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE124FD1-190D-11EF-A57D-4637C9E50E53} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2772 2420 iexplore.exe 28 PID 2420 wrote to memory of 2772 2420 iexplore.exe 28 PID 2420 wrote to memory of 2772 2420 iexplore.exe 28 PID 2420 wrote to memory of 2772 2420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6b2fbef5059dd7f19b648a8f679130e0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ae2ad801b4822f0af1036e8fcc45d0f
SHA1d1ac34a494eacaf278fe6704dbb952cb05f20077
SHA25631bd0a3e295a43069ab23f3f6acc6ce03e28b47d6b50be3d801357e41fcaa051
SHA512a7d40f56d6e88dad77b94051e5cf3d75ed53b254dc0600f51047d2e73574ed4ac3a5926241f6bf44a2a219ebc5433c080237b22c1dd6a25c2f7a093062d4e758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bfc2b07637aec2357174c8079935aee
SHA1366c1013673715f48ac5781ecc47ad25f26b52cc
SHA25654a98810ab5ac3d17cec5c4380bded0b2b14a222c3d140433f1fd7235d6f38ee
SHA512acd3b6b3bf4f339027f6caa5a48f8e72cb934cf4e892b2d3bee3e963174bba9c6a2b1885e99753c37f4d6081445cb76a13342fae9b48a57e85c3682846cb388e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c08bb92dca1e2ef6a34e91182c6ae88a
SHA13b9b99753930a8ddd4705f37328bfa17affd6a7e
SHA25673854d893b842dc3b7f515e7c41f400cc57b9ac685c3b3d31c3af0da3ac9acc2
SHA5122cf00faa9674f776a8dc869ea223ecefc2dc8df9f1fd1210dcbc5497f42cce2e2f40c6e22bb95c58e605ccf0ec9c92841b6e8e316a2534e5f38ac6b64dc529a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a83d34e6e34a366bd95396627b7475b
SHA164e869de5450ede1e6a3dba49f3dd122ea903b1b
SHA2562f6885e6e779b137373195c96af4ecd5810d6c7bd41249ac8bd6bb7f0e238947
SHA51223433e465a0726e5484bca3d6726f3a075a292bba8167c01396d08920c22cc658e3eb09654b53fcf2dc4e42cc97b8526175942c4124a894e6218e9e435125029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c8ad158605daae7d467d63baff0642f
SHA1f0b9f38ffbf289ff5a1a81a7e3c40729a02624dd
SHA2567f3bf01ef8265a1f6e9c154f1a19d5d1451d61bc219113354f15b9c5079254bb
SHA512dca36d3ba3d5454dfecd4fa204be2b51c1f47dfb5bdfa9843aadd196d13196eaae711cbd963d177ac62e2a5975cfa1d1150d2944e873bf2cbbc5de264c81dcf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5191c4b0681eb60f0a47239f65263ab
SHA1f2a3c4a6d270bcfc7815076dea66c6aef2e17866
SHA2560f04f097c86d499a99e2f88d514b17938eec85875b6a2bcce5b24189983fa338
SHA51230ad489c6186bc021fab1a09cb1041301a0441aaedd4cc896809f477f9fa44407c666b3e54b9e383d4e463e706174291385be27188fc00215c49f671a143e464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e14a92ec95563668d9ea23f8661d0a23
SHA140051097e5a46aa05d1d599b5dfa655357e45d65
SHA25699349fe033a2e3270b178be218ed53a4fbf02469996450fa27a5664fcb7d8e36
SHA5128459911956b519dfb5c7a8958831761ec21a90897722e1b5f57cd933f0428fe433c9593f93c26648c9d5b73df75ca27b6be01a06ede17275c1d3f9edf367c00c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e319f4d9cc71dc6dac129433d412f46
SHA1ee74bb21fe84bfe872b2c3e569b5534643f832a5
SHA256912da2dca80a039081156ee122c310616c19141972de8f5a4c7c197d7f6f1e8b
SHA5121918d00757c0ab0c0168e2db80574cae9a1831b15919e9a6c5a73da6176c5fcda562d1e1cb3ed6b47f6cc886b64697cbc09b5d24a11a36fb3d85290dfcaf9d6a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a