Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 15:57
Static task
static1
Behavioral task
behavioral1
Sample
760189bb5cffcabffbf11ce40813c49e_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
760189bb5cffcabffbf11ce40813c49e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
760189bb5cffcabffbf11ce40813c49e_JaffaCakes118.html
-
Size
42KB
-
MD5
760189bb5cffcabffbf11ce40813c49e
-
SHA1
025831cc904939d30ec37bf5f36678c7a8d5501a
-
SHA256
c8efe4165f803b3a2200663337f4f482f99fbaec200139e0e636d2f85e3f8af8
-
SHA512
85c09b0511250996725512110205b1746fb8f9023e037b77dd761a848229c81a0ca9a17b4c39577e050b34c779c4f8e0fbc65bfe76ce2c1e61b9e3a18aa7970e
-
SSDEEP
768:SuAb0BRuGdPjse/uIxzX36YAbjZ/3iOw2CfpwJ:SFbCRuGdjh/uczn6DbF/3iO/Cfu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422900922" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB2EB871-1B78-11EF-B837-5AD7C7D11D06} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2440 iexplore.exe 2440 iexplore.exe 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 1676 2440 iexplore.exe 28 PID 2440 wrote to memory of 1676 2440 iexplore.exe 28 PID 2440 wrote to memory of 1676 2440 iexplore.exe 28 PID 2440 wrote to memory of 1676 2440 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\760189bb5cffcabffbf11ce40813c49e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5560b0c235d795b06a50bfb91c0067a37
SHA1d3a41a567a33ec4e3c2c42d7e35898fad7b638ce
SHA256d71c4d48f56526d8ad6edd87fb22e2a7850265885e2d8cd8f5748e84024cc31c
SHA512d7fec7ed57406399a06a254e5310d89ecdc9894c871c0908e7280c0124c7ec3f857152ac718814e1338dc087e017659742992818bebbf4e6feb0c771eedba1b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580223d787468557b34206b57af82524b
SHA1f45fff2e22be02a02c50bf30765b08b7542fe877
SHA256f5a1ddabc913f393426838a8d8b969c714432956a5a0a89e8f33ee09ec25c721
SHA51294150c04b40850c772f15ad062fca63656e843a77bdc3189e9375b9c2d35e9d68132088dd324ecf1171597eff1640fd1685ea0ce6e56d7a297195ab6ed698b38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5344f4eef6f06df5842ee9beeeeaff119
SHA133b8cf24da26d21f0fe53cfdb47cb42aa1479313
SHA25695eba10b65638ec8b91117d9abf119754d72b14e4b6e6872267984493c3cca38
SHA51238e59faedb0c1447dd9ef2c3c4ac078ee3cc3a3d192be60e117d511d35637898477066b5536d4213d17350555b5c0c8012055a0a310ee0853cca1125aaf67811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5329901e05fa2a23ce930eb3ab17c71a9
SHA1adb25934aae0276c51ca36faf8597d8ecdf76f86
SHA256628c1a5137064627564181df5b6bfe46d1decfb1f43d19b83d280e5dca328db4
SHA51251bfd2ecfd9ce4a9cb4b5b0967ba713e550e7d40332874650b0b5a4f71ba1239b0a3c8fef7f8a4becf8e8c587b9a236ae48e317a40234bfdcf4ac313699ffd65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd3201c10cd2f0afd31b7641205b3638
SHA1f509379e7f4ba441a7285af1935c924c8e423ac9
SHA256661c510f64b9dad1685f3cfa25b142531240185d3bc85559fbcc45443b976fcb
SHA5125b3215bfbfbf3251b7866d8f2dbfb426489ed434f9ae693fa02c9be92033b9eb4434113705b1b4530c3e5e5596224e772e747bfc8713d20045da9e85c198dcdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad5e201a78fc81395c26d78a22f6b460
SHA144624d74d307afd8416e466eac218e15eab67813
SHA2567e8d35216d2f32d9ae7b69c378d019d740599fb03bd8a1a33bf8ceadcdb9b1c8
SHA512fb3b1643b837458c4233f90db823695a300538fe7303af3e49397a81cb3772fd6f1ac1415ab0b33fac4857bbf2ddbdd0e65545ea06a33452b3833779f8e74a6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d40fb505ab1c2b03550915e4aa67a4b8
SHA1ecfcf02afbda357ecace8383eeb4a8d5b3f29bbe
SHA25628363b21e56c9afc9554eca628d409021066d97709ca922951f97bf51816ea27
SHA512f5b12be7bf09a0a6be18c2b6fc1b6768679cd77f5bf0ef17422ae72c99012c41a9f6393bae4c333eed1e6c167b1fdea2d19927af5ddb36c704d550c5b9cb7a9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c27e555043e6dc54059a5163e576a8df
SHA1d5b6d726499683b6d8f6ed44427e44f0c4109b7a
SHA2560576f0d125b940062088c997f50cc5a375f9c3df5f16b040c188a47b72e3492f
SHA512641753a82265e9398e67590a2442b2e1ab8d7f25ded4e2c8382d52fb6bb6f87482dfe334afd63c820a5d88f5f5efdbab771719ab52648c99ce4f6d2821fd971a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56600caa2e095d3498843c81d15aef207
SHA15af1db170b27cde8b86891c78dd8d3433a41e717
SHA256e7c0ab14f1989c7058fc6689d6987c8b8a5df79ac0216f10baa933a96f33f1ae
SHA512281dfda49921e85ca4db559b9863e3fd780078074003ee49091b5f3c21f3afac899bbe3f6fd7d6efe2455843f9a47293a10defbfd05f947f166d78f9f92d7fd6
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a