Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 13:20
Static task
static1
Behavioral task
behavioral1
Sample
8a928ccac7707901492e894684d7b343_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8a928ccac7707901492e894684d7b343_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8a928ccac7707901492e894684d7b343_JaffaCakes118.html
-
Size
34KB
-
MD5
8a928ccac7707901492e894684d7b343
-
SHA1
3043a8cb6e621debb5d48d27f4b358620cbb58d8
-
SHA256
17c2b759b689f1f36dc2a019002836c49b45fbba7f56b4569bd16742996efa4b
-
SHA512
a7cb734e27c525ea78bafa979d3aab3646e27612bcac7943788220bf85992b2a605832a9942f9d724ee0b5ea1daef927869a361a04bbe42426b6ae5796f9f097
-
SSDEEP
192:uwXxb5n3nunQjxn5Q/mnQieVNninQOkEntWUnQTbnRnQOgAcwqYBcwqYlcwqYQNT:LfQ/vQhj5Nr/C3tyQ03fJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423409908" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BE73EBD1-2019-11EF-B04F-52AF0AAB4D51} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1904 iexplore.exe 1904 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1904 wrote to memory of 3040 1904 iexplore.exe 28 PID 1904 wrote to memory of 3040 1904 iexplore.exe 28 PID 1904 wrote to memory of 3040 1904 iexplore.exe 28 PID 1904 wrote to memory of 3040 1904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8a928ccac7707901492e894684d7b343_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9204748bf0993a0d9232f082b8b35d0
SHA1bfb4918570fdad03890f5b81f22ea29cc357a239
SHA256156df48dc27a628cac7096d78618a72b34fb6cd0bef4ca1e41505d0b4790acec
SHA512f41dd2570e135c58f8d9d2bbd9c790343accaada050ee7b5fde29b728983bed35ce07f18fcd740a888dcd53f53082d8f7deb4641a9b38309dcc35b1d71920194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500849b033602e44346c2051a8de82078
SHA18118377cea582d8a6e04b8ea5909dcbdb501cdf6
SHA256935eef74dd433222baa6d678771805a42b92d657e15a6eb922ec8d95bfdc6b7d
SHA5122df6c17886092b79dccf53ae6c949881e1f461579700eec761466c0c50d35c5f62ac38fd1fd44496d7dd3f1c0597a48483702a6155976067594f405842b552b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5463a4025013b569cccef72beb836fa4f
SHA1bcfc89a2f6b2af56bf4b26329a553357a3f18c4a
SHA2561a4506c486aea798ab8045c5b1128f65e9b92b68050585b87f712970fd456688
SHA5125dc2fc0ae7fed91b015d891efaa8976df6084ad97bfe053b3872bb4022c1d4c365f9eb79a85fa0662338b10de8f72d76dcd64da51ba08c306b5bfcf45365dc0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503d27d6dafbcc038d485f11e7f5e6ecf
SHA1592645fbdfbe8b8cd121057a7f5ec5abd2aa7417
SHA256133c265470b30153ce10166bf0c7e5ac12342ae29231d3e1e50a3b45e5d2ae80
SHA512b80606f2cb53632ad862cdacabc63606605805241016efea0eadec65d80e8ec6fba2e71a22729187d6748b327a550511bc3a71b86fb0ed2aaa5c8455d9fbbe16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a630ef4bad6d4c3874cd12e67669a85
SHA1a345f409cd2ad32b5d81ab1fb19494d91300d4f4
SHA256ce0059cf071b1804e2f3c2716d824f153c3a777a2429fdda46e93080d2eea4a5
SHA51237ecde916a2795d87375021b9726d632fc6172e5658802fbe00efc5bd2585b15f1f4d70b71a6c6b30cbfd9d85ff77097a228c01d23bb52891faffc88b1f78b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522e94118b91d4f26162673b669e74000
SHA1e37a1d08d10f4d1cbaa50870dc84265635404cb1
SHA256165ebd691438a3b555316ecc706ce32bf6eeb7ee66982ecaa38ea55d0f8e1312
SHA5124dcecc3a037c53de54a390bec666616ceffc2c50ca2c6d4df8a726a764ce4f2d4ce0bf998154efa85f1c406a4df299fa6d9668fa2d12705c81073d688c9e6e10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a59c0a6eb586e5309685b905a95152de
SHA19f94461ef3207a8ffe6b07d31c3d41bbab102191
SHA2564d7ddfed192148b38e7e001ecf90eb052ea10efbca45fcfa40c9de19c5e1056c
SHA512915451de3a5858e8907db985e449d7d57cba866c5c8dfb8fdf021428377f5db3f54487c71bdc651aa94dac475ba26a931de12b79892f6e7e89c5e3e0c959d2c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556c7b1277ac6311f93c53a986328ccde
SHA10fb255d2cfbbe3a36baf122ec1ce498a0946c014
SHA2563412f60810f7ef7b06d9dd6817d4dcb07022a1730adf35b581a15afeba41f163
SHA5126f4ee904d0ccc39e41056323d4b9b92d615edc55cf6a0330d6c403c5be9a75c263e9333db6ca6dea171a5ba3a152ab108755a031de261b77f9de356cad900dc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e1c11c87648bd3d523bffc26722f5c4
SHA1ffb58e79980238565f3d3bafea6b72930134cf7f
SHA25666eda9d2243b81eb2632e7dbb0871c865d6ab784617a0b1d41d250a282bce061
SHA5124f6f170723312b9e3a3ce097a2bd6ec61db1f39e4ee3d0baa21600ca26fe067e8e2b2897f6546be5c69219e8ee1cd4e65728174a72bd2a20e7599270bde0def2
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b