Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 19:20
Static task
static1
Behavioral task
behavioral1
Sample
81a00441f1da1333b473a8c38dbe27fa_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
81a00441f1da1333b473a8c38dbe27fa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
81a00441f1da1333b473a8c38dbe27fa_JaffaCakes118.html
-
Size
19KB
-
MD5
81a00441f1da1333b473a8c38dbe27fa
-
SHA1
b3fe79a8676a9f6c83cd923c6417a741293621d6
-
SHA256
daa71f72c5ebbbb881971baeaca0177db6dab3e150def63ce9d9fd94ebd83f97
-
SHA512
1335137e573bef7450773ce7169a5bec95787aa02fedb4de2d66d1e2681f244a6d68bcfe2d397e5844116be5e7ca9b72805206a9907af9475bba0c901134a7e9
-
SSDEEP
192:uw1F5ukbysmmgb5nMKBdRZmllOwEG6onQjxn5Q/GsnQieazNnjK3nQOkEntIu3T9:0Q/bqmwJ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8FC585D1-1DF0-11EF-B393-E64BF8A7A69F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423172318" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2936 iexplore.exe 2936 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2936 wrote to memory of 3000 2936 iexplore.exe 28 PID 2936 wrote to memory of 3000 2936 iexplore.exe 28 PID 2936 wrote to memory of 3000 2936 iexplore.exe 28 PID 2936 wrote to memory of 3000 2936 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81a00441f1da1333b473a8c38dbe27fa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567bb545713fb88b79aacc6114f70809b
SHA1ff9a8c83a76d3fd0fcd5c907c2333370da253e59
SHA256498b7a976c672c01bf172b079e9bcaa236628b5550c1b331fcff131250829191
SHA512db47d3cb1d4286dc4343595ea699664964ec1dccd99665f6a3a16c9a751fa8a539f3e7fdbd20cd30039a33792d40175a5b72b21a5e07e106dbba284462541a3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58be6da5b4c7813133ec9046098e0729a
SHA123a2e3a04053e38855b99406a6bbc170ba996a97
SHA256ef2c1d993f7448fb6737c35ede5bee877c8f9f2f0a3fe89417d7815fa80058a7
SHA5124e9583d0bba18230721e2fa19fc21a526d5a57afa9381b1039c0e5ae09460e63242b995e4a5e64f7f1c653ccdbecc5e1f6dc4cef1db35d11b4ddf8717ba2f213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fd85c6af69a735eaa152792559ced00
SHA133281a9c2a04537278e3e68e40af4770e999af85
SHA25645fc3876cf4df01244f33b1703589e32d5aae620dcbac14c8adbef5ebeff089b
SHA51272fd6dc62be175c37e2b6628a371963a20c53a0c3b335d05f2f37f207352977aec6ed9faafff836197b507a9b4920b533b41d3283dff84007c5f61441d3c15f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f572a8fba9a8c8ecd8e37879c01876d1
SHA143ab30f48fd6638b69f97db7f0f1bdb79ce09ae7
SHA256adf3763b2cc3dee9321533c9e9b5f378331e33209aa80a165862d08dd76a3bd8
SHA512b916ea556ffeca77f09f893cc769779fb9eeb778da64a89cfba5c65f27eb2b4b41928c6e0bd31b4249c249ea0af7dcecd9a7c3162c87c58943e6451662624cad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592de846b66ea0f064644a283c0fc2712
SHA1ffebf69bdc84d7854e3f5b92b8adb1d812c037ac
SHA256a890d968f77b879131df0b7bb5b6e37451515d3288ab010d2c797a3c0a1a47ff
SHA51273cdbe4fab78b015616d18e094a09b75b8287e264e57d773dfe2c5ab1e01670dadf6ce3ac37f22d2d5d113bd9bcd80051fd1d498cae7583f18eaf1ffbaff2ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf071f9faf243ce48a1d1c73c5e6f38d
SHA1f71e11e1ca43868a964eb668be5102d901154946
SHA25637af6d86befc097bdc40650bd530cd68e5ba887e8bb98d81cc35fb6903b950ff
SHA512250b8038d6e325c59c040ec2aa4feb5e4d9ee7beafefec357232ceb0e860a4a3313ae004ef11734e8dbc646c897ddde3924ed368d855120ebdf50335ca7af15a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590a918daaf51d778a6c4c63aa18cea9a
SHA1c4b3031c91054ad39a695b01b36db7f5c465c008
SHA25605988782bb4f77e214ae4314ccca2ab9f595e4888ee74a36e9962bc0c287230e
SHA5124179ac8613292b9836f3eacb13a59f0b072cacc6b2c7183176b6176c81ee6e5fbde5c4da3e121c5a757a959d564f9be427bdf4b1d41243c6812984d4e5fa960b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501e5527ec3c1af0267edaae20abe93bd
SHA11a044ca8a45730132f156a543b8a7ba864409f6a
SHA256495839440d561be3033d538d244dd83ce975f175d4ddd9dacc7cc53ac621057e
SHA512c246ba9f07732698ffdb3369c1d80c052993df1ac85aa82424a0073c0eccb55a01099ec76dc2493a7d65ccd6fe9d99922bc19d1d1d0497e1f90bf8be24a771a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5785466b996f56c2e1e5a2e1d99677c1a
SHA17c77b1fd23229dbd492a96497545550e3d491320
SHA256ae46b24fb71b595eff1a5e33894a207c94db030539879a5c7eebfce7afbb6679
SHA5121ec2667171fb60b2432e5a8cb3ac4749c2c29792b7f59343096585dbc6db3ea2494a2fd5005edad78a9deded9a12800ef11380727b9442d9bf914735f5da1efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594665c5d7181dfd539ba245c392db309
SHA1c21160b07ac762430f796d21f61a1da2cc452335
SHA256a34abf3e982c655cbe8c65fcb14bd2e87d5187754f99a7812063037372d7ebca
SHA512aae0211d6eb8f5308f6132f42ec84e9f0fc45754415a1c554e7db1c490995d836d0326703b0f31cf78a66c9f697157fca7f35cf5c6d7d5cd1fa440dcd9d9248b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b