Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 14:03
Static task
static1
Behavioral task
behavioral1
Sample
8e549070143a86fa94e77eca0c287f47_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8e549070143a86fa94e77eca0c287f47_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8e549070143a86fa94e77eca0c287f47_JaffaCakes118.html
-
Size
28KB
-
MD5
8e549070143a86fa94e77eca0c287f47
-
SHA1
96b2563eb47963a65cb12d466386adeb0596e09f
-
SHA256
14e1eaa11824fb1458c810b00dee96ce9f777d800f4bf37077e37f4e2aeecb36
-
SHA512
df69b06f34045805bcee8c5b1f54a20ad55ef7819409a011799e63cf9044ef8120521505ac1b42b02e18fb7315814b3fc72db35fc0279e8efd0747bd3d1fdbee
-
SSDEEP
192:uwvob5nitsynQjxn5Q/knQieHNnCnQOkEntkynQTbnpnQ9eb/m6sHHOwhQl7MBne:CQ/o6h2HO1S5k
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423498892" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB3F6A71-20E8-11EF-B781-461900256DFE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2556 3028 iexplore.exe 28 PID 3028 wrote to memory of 2556 3028 iexplore.exe 28 PID 3028 wrote to memory of 2556 3028 iexplore.exe 28 PID 3028 wrote to memory of 2556 3028 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8e549070143a86fa94e77eca0c287f47_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d43eb54868f69c7631150de6a1008e8
SHA1249e145b5f289ba9a15a76d8d55b726e21d20e00
SHA256a0ff4dd71fb2e3a77ab99e475ef46a3d0ba4efbeb697d82ed61743f75b3da435
SHA512380b14e8d50f4a9b73c16f715cdd36cf18894dddb6ea5a5696a3a8ae5aef96fd80f65583127cf7cee3f18898dc1778b70a165f4bde7fef2934c483b5bf79cd57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5332c8c4bb9622e564a1c172df41e6746
SHA18d377b7eb1dc1191c1cfd914d511ecb984d152cc
SHA2562f3ef2e9b2198b90894b99cefbf92c3ed74200ae2ef8cd6044d0d8c26f340008
SHA512622586675f20f17f4b793d12757f6248120a84a8d8687d357510f3867207406df9c134b4b1b881b174644298a6d867a393381a6e2b1a0c9fbf41461fdf5753ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dac94d6cf7235a0a7935aa7211b1e6d
SHA1c288effe38b8b0c6b068f6ed01a54d416786ef07
SHA256bb2a494d74230556596d7a21027cea3beaf3793c49f93b9ba23cd5a2a6ac033a
SHA51211db730044aec784fa3fc23ba6c12b431bf0c0d4f9ac8b1953203bdec9bb0d53d8361588ba421f487e49d6e7700561c44f3c335e23ac14b733bf3d1c14bd920a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0e9f6cdc60f92076edd5cef700adc13
SHA1d3b8dec962705921bcb07f275318dcb0987754cc
SHA256d58ee118b9a8849dea00bd61b6698245e24cd52451e7e92026ed9692a65486b0
SHA512871abbe41178f280611977f585b3f6978e873e7d99df3a770f19e095b8c011f0126299a45cf7a8f5af5a6dbb731e46f63154346a7350ed1421ef047a4ec061c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d577175a06150365eda8ee72500ef8b
SHA1c65feaf9ee3855c3b65d854140a9eda0563d76a4
SHA2566b5197b85f4ae99eea9236a058f93b05df77ee1838e02d2053b294d0fd4265a4
SHA5120d6f49827f4911e7a310e31645265dc41f6eb613f537effb16bbfee5897c25466fb7ea216ca6c0fd79c56f393acbfec61791d7bb82a6a9ab8a5ad7291e1080b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3048afaa7a75043971b69bffc6c36c5
SHA1222eac14f40f47e23dbe27b8a5befd87dbb54764
SHA2564fc97c43086d5a19ffe7646523cc1ced80a6be77f68f904d38eb205a59833957
SHA512b895cb22ac75ef4f31213be2054e08894ffa1002bb814a69a5057c183151f229aea0c40e8bfc483c77b8cf06830478950eb8189f54e83a9adda8752894f21ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5342a789ff26aec1661697f5c83122b4f
SHA11b57f1256a2f24076bf3461240a270d6f9ab9539
SHA256d4754c57ce89b0c335ab5f08da06d9b8c4ea223c278cab6a495b94ade11db60f
SHA512efdbfd70a9883fda0b6ae5762b3307fc2388886ea42d68898db08f471069be606fb3a8b69594e5ab80717dbeea90e38a7b3906c71d6f9d26d728d6041a9d3d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5756f091270cde95eec06a798789ca806
SHA1e15b8fee809f31f678133c975d6694a8a25dce27
SHA25673b41cca7fddb463e3f4429d04fa89a6b25e6d72af97f3cbbc00f972273b9aa7
SHA5128ef312e6bcdb30c6cfa2adf00654f97f06bd1e4583a5a50a3c4c95233a4b78093523ce7a6ff35f8cc1662e1b7709612de4f74917e5cef00b312925c2c2f798cd
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b