Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 21:15
Static task
static1
Behavioral task
behavioral1
Sample
7346615ebe9c0fd7b41a83298932488e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7346615ebe9c0fd7b41a83298932488e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7346615ebe9c0fd7b41a83298932488e_JaffaCakes118.html
-
Size
27KB
-
MD5
7346615ebe9c0fd7b41a83298932488e
-
SHA1
1bfa1b30a336212de1a9874ce346efdddcb28e0f
-
SHA256
b05ae98de73b256f73fc49aacb8513be4f99af596cd85e8b53e07339dbb122ca
-
SHA512
f9e60ec0b9253da481e6ee516b7093d73dac2b568295ca4256287a67792b0b9990d90c149ee81430ccfe2ef893c78ab2ecd15768d46b9838b95630232400fc6f
-
SSDEEP
192:uwfIb5n3OnQjxn5Q/mnQieFNninQOkEntesnQTbnxnQ9epBm6uDTUKglGQl7MBl4:OQ/AkrqTsS/YDX
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422833606" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF17EF91-1ADB-11EF-970D-EE42DE2196AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1992 iexplore.exe 1992 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 3044 1992 iexplore.exe 28 PID 1992 wrote to memory of 3044 1992 iexplore.exe 28 PID 1992 wrote to memory of 3044 1992 iexplore.exe 28 PID 1992 wrote to memory of 3044 1992 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7346615ebe9c0fd7b41a83298932488e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ce69ae6210017ba2c6cadb87660bb01
SHA1c4fb3d7d7dda5d43a22ebb62d3d18fe42c1f5eb4
SHA25696612048c697f8b13ad6f515373fb9205e0a78b50817a93cf9bb728825959765
SHA5126d915cf011d02a78d7c156ea4e1b983ecf9ddf92c3c1dfd38e6a86e14eace22097d87084cb7e327c9aa22558a23456d7b1ea5efcb10fecc56518a73b6d52051b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ba34572e8a1167bc228c9d5f58fb721
SHA1c279cf7a2efcae56c3c895ab4772ab36bf4e5156
SHA2565665939c0a6a44570fa37ba836f693dcc870bcc0aff6c6ddb4d8a7b4a773ee51
SHA5121f2ee3955583e14d7b7d3c0fe32bda2dccaa815d98dfe22e30f9ec53305908f98b93f6088c484999d4aa6b3174b221dcf42837b111e2f9c7235783e450e83446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571d46a2b82250339985afa11fea6ea1d
SHA17705dcd5c3817b653555dd91142e57dc08a2937a
SHA256b4b9cfee9ccc9b44d566202295f28ba482e9added31cde61a57b11d1c08ba87b
SHA512059c9789f979444d9567b3b23d997d773f8f73e8b0a523262896919496dbdec7e63c792a715a2af42270309e392963569e336e5c95813e35f0de7f299873ae33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5636d6b8df86257dde08332766a2e5484
SHA1ae3875d6bbac3c920fc2e054bb8d1dbade5b1ba9
SHA256e5b589bd54d9b1e17ae019e422e7da58f6df263fb7850bab455fbaab1d7e4996
SHA512a93b00ac5458a46b73452d323f9a584a1f45784556f833335f56caa15dc8a63b8dcbf580c9e560683114bbdd266cf17bb5a6e600f1d3740ddb476e5db8e1834b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e33fce1c97daa3a4be0d85cff085ecf
SHA13fdb9c5e9d525f6346854795d9100e6c4d80d477
SHA256e50c63e75ba846fbc464cb52b0a37408e83749e1f4598ad600a184b1dae4df57
SHA512f870fd3cdeaeadd82e7f054426031ac404ad686ea1597c426cb59b1ec037f75a9fda3a1e58a66af92dc86da0bcac45ab36f0a6e6b9350b305e0aa64936f9422a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50149d6590a7fc8ab4d8dc6826ce722a5
SHA1cb1722bc511dbd1bc989983f511e58756cedfc1c
SHA2560527408d24fd389c276d17cb1ac669efc38e09c4c58646f58f00b1f3772161a2
SHA5127b8d9aa9f70c2dc22f97dae006773f51d664edb5d9e548f4455fd39b735eef17a7da4d0291416ff93daa3c26ffd051fa58805deaeefe36e518b10794f6fa9ce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a77590c02c9edff6cb484ca28aa0c065
SHA1e5e70b758b7f722148165e06d64068f856cd88f5
SHA256fe1cbde5a36e2ad356c30963c9f405604174c5ddd6d2b982f8875fd7c456cf13
SHA512b4e3e58d0f05533a42a7dcb63d2e19d238f68127ce1b463e581689f250a0ea5f30db584d67bd0ec70df4e819891d47dcd7a3e2ba564f00cee8531afd8db91929
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a