Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 21:59
Static task
static1
Behavioral task
behavioral1
Sample
76eb56b761b276e899865bf31f23e25a_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
76eb56b761b276e899865bf31f23e25a_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
76eb56b761b276e899865bf31f23e25a_JaffaCakes118.html
-
Size
27KB
-
MD5
76eb56b761b276e899865bf31f23e25a
-
SHA1
1db8b09f7316142161fe44e1bfa8387dfcfe512e
-
SHA256
e2f254d217435584a391fcfde45b038e38193646efc92d653264002e7eb1539c
-
SHA512
ea9bd5da028052b5879c35566649acd7312684c536593f958fb3ac18ce5fce770dc4d394d286a45f0c9db29b8981ab389e2a7e1fcb6585d2709ad7ce8bd9334f
-
SSDEEP
192:uwkS6jGa8fLqb5nX3yGeK7PU3NaHbunQjxn5Q/h+nQieFhNnvponQOkEntDIWJnr:0Q/MSpGV+Sx9
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422922612" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2ACAAD51-1BAB-11EF-8ECF-42D431E39B11} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1660 iexplore.exe 1660 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1660 wrote to memory of 3004 1660 iexplore.exe 28 PID 1660 wrote to memory of 3004 1660 iexplore.exe 28 PID 1660 wrote to memory of 3004 1660 iexplore.exe 28 PID 1660 wrote to memory of 3004 1660 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\76eb56b761b276e899865bf31f23e25a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1660 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa60b6cfdf187271350c87100fc3da8c
SHA1bbcbf92e5a89ff3ea72edefa06948248697dcb52
SHA25642476b6abeb8985113b493c3f38cf3930672df16e86b7e4c2bfe89dc3d456f17
SHA512c0549069cf713d0d4251633b2d4a2e1bc1ba34519e5af16f1e1d9f1de8d8d6da13ede170123f67a10ad05ceed70b83c97e24cca8a33b10af418974be3fbe49a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50567303b02a781dfca4894e5a5778e82
SHA1663e570b5b265734ff1283f847f9ffe8174aa4d4
SHA2566b1d1360aec40421825c3d2055451c8dde1256fdb323a9069f52eeabcadf5fe7
SHA512e20228e242699209a84fb761f21b9382ab97d6fc369982d494d39774cb91c6f053704e99cb2d91cba2dbedaf37d23bbfcda00b2c739f6ab4e71b593f520e1209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c8e8b979c1d4088e68748c1da9c8004
SHA1151c424a1ebf2b868f3d09a31bb3f34861d5ecaa
SHA25608f346f3d821b9052a8fc21cd663c3cb0a9787ee9fa6da98037eb45ae28fbd08
SHA51221a19e2827eaeb6ac5f4d8ad29a6223fc7f725bcd9778141f6f1de08987e92ec27198cbca40c08bd77273b513c0b36b222e1d5f68126c4d9be4f467c346fe477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c48babefed1e4b545f8342b1d73ca79
SHA180e273555d840f6a5f35a5412931c46cf9af51ed
SHA2560b3b0740374fa71cba7f0be33f2bd0effbecf76a6dd4aecd3ce830aab6c29761
SHA512541c17a310ce2c3dadb5c5fb88b0a1325fe7a948a00e548ced3da02900dd6d2b1425d04dc8b45607b8db1a23afbc4f0eed1b7c043701f370de13c4fbaacd495c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cf8129638d36790e175cd0bfbbeffeb
SHA1902cc1799f1457a9ab71f52c848e9f17aa6cc63b
SHA2569b27a2300d4151125f0ca64d45b252b1d560d6baf82806f869f061c3bdd55205
SHA51204445157515ae60c1b618b98c36d9c7b169d99af7e77aa16259ca0936a44b3bcba40fb2bd28544c56cc618b82f1c2587f484928070ac1cdc50e57ed08bc97e3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fb3d1adb2dfae3163c38663a31ab32a
SHA1552a85097f74d7fe72a794bbc0cdfb674d269b2a
SHA2563d98082daad657b35d1b07dbc9ca1a2ac0cfa3ffd6fdec5ebcf94b81b911a785
SHA5128e9f49216770285a26385b5adc5d9ff57acbb72ce8aa26efaf2229ec492a9b211e1482aa54c4999cfb8630599cce3d653ee09531e6a3e60aa36d1f6cbb52762b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b5e5bf09d1bbfdf6bfcc6b7a33d21f1
SHA11dafe9fa50216b91f1da930245f586dbfe8cb2d3
SHA2568cdac0ba7de040002ba14c235f6ac939dea4996584e90fe0663150c76f9efc7b
SHA512a85e25a70b634a244042413f4c6de1f7f46c6de0ed0c78181d13c7e90b5269c9e317504f88463efc7611e9b0a6b840471164e610dde7bd2e3a68e791bd7af7ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c830618e7a8af85a90bac86be77f9fa7
SHA187aa5aa7acd1dd0b4cde8f0e5257ad9f980dc6d0
SHA2566945d6a4957ec88f13cac5ae781f96b914314eb90340a45e517e31f3bcd9845d
SHA51260c390419ed1deeadc1551d2220633056a81c69b57407478e60a14211e0b03e96c2527abda32e6b084dae372a343f7f1d91d53eff0208812e30b9dcb78f26e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd3b77e95b216065a079a52124bc3925
SHA16090c880676416f467c1131e4b6d3c4c4a7dfd44
SHA256400213eb8794dff828ee94804bbd564a8b07a5c0d3f89b3374f65471d6162cb6
SHA5122b8c5cf57ea000fffe65106c8d1f7904ae2f4f9330ddb1e93afce702df84a0edb3560c4a64e5c72284e350c9d474202d750e6072ba5e4831b3fca85338a1d2da
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a