Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 10:12
Static task
static1
Behavioral task
behavioral1
Sample
719c961592e94388de9a7099acf751f2_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
719c961592e94388de9a7099acf751f2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
719c961592e94388de9a7099acf751f2_JaffaCakes118.html
-
Size
23KB
-
MD5
719c961592e94388de9a7099acf751f2
-
SHA1
65dd8363b2b8a225488956f2d00ebd0a41f1dc98
-
SHA256
ab7f76786748b66fcdfdaf5bb2ecb3ff59d8cbcdaac3c0d96fedc795c2e6932c
-
SHA512
8a30f801342b5189746367987b67d78dbb207bd5af9949533215e7368237755f9c94e5a31f238d63a9e840d32b30685d9c579e941c8fc6b0c0530c2d26ee9b9e
-
SSDEEP
192:uWTgb5ndR0nQjxn5Q/wnQieDNnGnQOkEntkmnQTbn5nQNCnQtrwMBjqnYnQ7tnAm:k5Q/6dc7
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{56565D21-1A7F-11EF-A346-76B743CBA6BC} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422793835" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1764 iexplore.exe 1764 iexplore.exe 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1764 wrote to memory of 1872 1764 iexplore.exe 28 PID 1764 wrote to memory of 1872 1764 iexplore.exe 28 PID 1764 wrote to memory of 1872 1764 iexplore.exe 28 PID 1764 wrote to memory of 1872 1764 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\719c961592e94388de9a7099acf751f2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1764 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518158dfc064340ffc8715aa89ab852ab
SHA14724c852bee54c6a02a44c29ee1a53b46502fc70
SHA25664a6aa75c9811f736895331d3cf7670865d9a7eb532dbf812442ceb1d358f077
SHA5121ca406ed84ac537b4025afdf8b7186a99e8dff67b399b6f12119ebaf4819ac2ec9cab56499c9da0e855aed96516f260d3a3f6e3b871e4a84dc3f59a8fc50ab9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51617a193b02cd8c6c3aa7ff633fa8e85
SHA14f397aed33033033d9221330493053810e9af5ba
SHA256a0c29b6f830fd79f991d79c3b102b24ce9f015ed8149a0124d0a65680d0b0661
SHA512ce5938cb883f97d28bc0de073f1f831750d6438e68cb0b5bde35c4eb166d1ca6cba8f4d8b62b51c002702a3b0c43ab885f4a788afbc562ea1e3553842b40b5dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529e5da309c7e03118726267550149235
SHA12e63e8fb339c8f29cf5b0a1800bf0ff1119d4e79
SHA256114e93a2d66ed3e2b863b6e7d0975f84d37b40f0d2080417fb33bae8cae8b020
SHA5128e2d967b6c60e80131dc5bd03c2bcec0f1589b3ba9dfc0eda30e339ee6b273a25d92e29bae29aa6fc6841e4fb19a1709b4aa81e55acd9b8d2b6e2a8328a104c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e909b59d588b4e707ad3e989a576679
SHA1e8f9ea86a4c158ab6bcd2d09a82e307b8c71c009
SHA2569e5bb0f3402bccb4f7b71896080b63ba52841225534ed7744adcf3ba9355c6b1
SHA512f5f71a0fb3f41feba7da2ea7d288c6422ab62fa56fb394956463f666867074ea6f74f4979de397f86cb80eede58b4b9e7b24e458f89258f258886cf151592e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b1946b8372599e6e0b927c3f2b0f2ac
SHA150d089512488b5d731c7e0baf934cd0c3ac3ac33
SHA256da08e9ea2171ca49ae9e4e7424eaaa3884d095e9401541d897181a21c2c0025b
SHA512e3b4e14e180e006e51d2b833976bdbb84703254b4eb29ea8d8888e10bae3df9bf11cbb621c8d1fc748161f6ccb83a7c7f23845dc4bfbf4031a088c2327e0e7ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fb81d96924354d88e9a3ec48bff2e3b
SHA198f0af6ff5d80c8f880aaa61f21109ee6877b1d3
SHA2564ed45d007b19450ed1c0ad4a8e2ee98d8baa26a0fca00c8f5dd37857b1eefbce
SHA5127bbb9ba4031112ea551d22c41c25c7ae4e528788aef82f540cd77da91ff511a21be712f6d9bdace9bbf7a9ddab343c093dfa8f68cd83a5e6b6dee324b5af5f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c1657fb9c990e1fe4b8257a7c6884e1
SHA1cb9a23f3af23b5d5c0682d60dd77fc5062d917dc
SHA2567c4db7fdc32ce2738eea43e08c549352dcf68330c3a4cbb7b962c50f36d47e6d
SHA512cb8c3c1a31dd82c0450459fc52d5403c8ff82651177a62aedfd1262c060fa03de8e52d720e7cd1c2dd02566ebf1706c2e1f9e0cc2bd7ac817c229e1253b2fe58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aba788d4ad2855b44f6ca03f0590dcdb
SHA1d4c6b43e1db5c22c85b0c838a9a3147dca7ef82c
SHA25644eb882692fc6537494da6f58380441c89c87d38f8ae7e5257019e147504d7a6
SHA512e2f1d7824495ffc5e6ae1a98ee5fdcec8b1e6dc1fab6404041d9d118cd8bc5faff34c4b5dc73f839c57892e6bff880e64889a36be33a18604f26224ec4763e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d343f961292907bbfd9cb8d13480ff8
SHA1ca5056608d7b93418e60a9ab1a54d0f8e0d04998
SHA2561d1a981ef8bc772b6b9d3d4606caf5cf193c6150aaefd9b6bb7c970b13bdd950
SHA512955f6c39c4f48fef2e84daed402d96fcbbf90d0bcaa47f8a3ac6c6c0d3bb4833e2469127a5d25abf5b5ff9192642b28341ec94e80e932343f3295a31865ecded
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a