Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 14:15
Static task
static1
Behavioral task
behavioral1
Sample
9213c4376a17328385af87762a95e503_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9213c4376a17328385af87762a95e503_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9213c4376a17328385af87762a95e503_JaffaCakes118.html
-
Size
203KB
-
MD5
9213c4376a17328385af87762a95e503
-
SHA1
e42bcb0c485420ce749a74d0f7eb16a2279421b5
-
SHA256
6572ded85df84c7154a3b1dbdc211eadc82c24c398e4508033d0a1ca51990ecd
-
SHA512
ba0552666d2b7f428cdf88875402265506e95a054b8741a28cc9c42bd038d0ebd174d8bccf700ee60bdd09be3ca7bbb494658dc9e5edd1ffb850a0682041d737
-
SSDEEP
3072:eGDHRHm1r8TcJsKCUGocyGmfeaOvzDt4a0:eGDM1r8TCszU1c/mWa4zDua0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423585972" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC257FC1-21B3-11EF-A1DE-66A5A0AB388F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2844 iexplore.exe 2844 iexplore.exe 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2460 2844 iexplore.exe 28 PID 2844 wrote to memory of 2460 2844 iexplore.exe 28 PID 2844 wrote to memory of 2460 2844 iexplore.exe 28 PID 2844 wrote to memory of 2460 2844 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9213c4376a17328385af87762a95e503_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd441e0a8a4c14e9f0105b8b466b0c32
SHA1a4e346389bc07f886af0d3abee33b829a935163a
SHA2566b4bd23460cd726ac6dbfb6347d60046a162904e5e61750a0f8a6226e48a5ca4
SHA512d6351168a8aa36f485cccc79d951d6c3daade17e0b3068cf57c7c3558376d130b45f70222ab724b414721780319d2b20baa071cfef57b8b2e901d77fb419940d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e705aee84fbc8b022ce7e9add7f2230a
SHA1cb4713af9d198fcf29f4012771994b164173943f
SHA256e1a445f115c027712058e9198a7a5913c4d411856c364b2a1606f3da42f9d08e
SHA51253fc02e7de5035a632923bc03f012e4a9f60fe4b6384ac72762b7707aa8cce91cb3f7707f9cec33f929e6d7bcfc696eb5f7689ad564ccfce6191b5311e6cd5ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581f10260555b82e158d7b363f7642ba1
SHA19a27ca965283777762d9e20e9bbd40a0f209cd30
SHA2564d4b76fa86af37759a0569f5553a6751ef24d1ddfa7f7c91beb0740786cfee30
SHA5122143e4fcdfe322474ce68696fa6eefb4a18ebf6f520a8cef5b8c8f3ed624e648d8966d18288f676fb3e69a5c88f8c9e23b9f0b338d9fbbca1153b7afb5f65fcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd25639d114cad776749f6e637a2f93
SHA104bb44b6ad8198586637816b20d57902eab49a04
SHA256d88573c67dcc497dec38db95a320eabc154f3338735eda0db31253fa0ebee04a
SHA5120c5074a4d950ebbac01d16e7c8ce5effa0cdf2982a02d32f2a8db766c98c3ca2277ba751d3f33d4287de0b5683bf140a5c18dc118ddf5c7436e2a1b36708cfd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594efbbae8fee1c28e4271d180f95bc66
SHA13d67d9caa790a827b71a46ebc6ed9d0bfd18981e
SHA256f2bb8abd02ed270a9288e2b0df6cc2cbe8eb16cff819cdf26bb10266150a8be7
SHA512715c5ee10520ffbe42d72ede0b5d574b9ce83b73bf4243b48959131d3adec713bffd8c5dc65121d29b7b7753773782f174d95ba867505f66dacaab5bc830bed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f012112bb73d3dc5134fef6a5fa33d28
SHA169ff2872d3fa8525194aebd9fc71c58a44413d10
SHA25607e16c4cd36b2f081ed2c7663fa228af8e0a5cbbd2f089ed5b5b4846e0bd61f2
SHA51287507f3ad73de59d8f5a2b59db4e23305fce4526fd57343546451af72296d2aaf09c0628683dfcba4b04ccbef73b20ca5423bc4bf37672cb8987edf61f2253f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af4f9cb3b09da734bcfeb28e160f53cc
SHA135a2c971a7b0e8d6ecf3c874f34aab81e6d192eb
SHA256d82bd270d7721df28c933a9fa10b2899d42442d8a5386e6b4eb93ff0acaac605
SHA5128ba72291581053085839b611c2e29889a0c75d6db81be6237e3db35e6fc225fb3e2db8dd9f29886c264671ba1ba2d288ddafa6fef6306e691f9e3a2de496c335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5913f9cafed2780cec96e3e67dfc557b1
SHA14599f91560eeaa0f0746008f600bdd9285dd38ce
SHA2560fd0e5c57c8bf7072e907cc3dd966df5cad9ae6d4cbc9f6f7ec9127f6eae9b3b
SHA512b92b8cfcb9d923b14cb3fb20e6d5a17de65c5acece6ec3eb11106246e59c7b3d0f1a847c1535409f0a1a9ab4597c1331cb04baf8aa77597594d6eed54c375b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dbbcf6fc87444dbab1d57ffa51e7415
SHA185d5e1b1d9532f8598420e95034abb2356b989b3
SHA25647ea64583dae5563a1e27aaec67fb94b6ef873162c966d5584d969c779ccfdc6
SHA5124e5edcb225b6c3484099eeeb245b526f5abbda388ce5a3c032348108ad0e14bf5a25017e53220eb2206544af6c8d182db0183a218cba0ce878a36eaf077e304e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae0fa696167c64ab4cd2602b638047de
SHA1e976844d14f34d5af32177fc676d6c950d3aef12
SHA256863666b67db300fc914f8d90f59dad9ca991d297c0e672760a78077308015a1d
SHA5122baf844f3e023ec4485a45fc0d484195365f92c6746f3c6bdcb502fa46fa69761028db33bcd82c3bb05149e35c51d364dbb90de6f2ed94b09ba620d3781553c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3253f082ecb2f41912dec3124a2f728
SHA1e194d7a8746097605d446b99cb4558d17651c00d
SHA25602d28cf6a9327559e2fa83dc64dd29e607aa3eaf51a5e6e9988e5de5ee2224c4
SHA512199749b831525d18cefdc00f60dc153ebc24d6a8bc3c641c249f72e24d592121e4ceb426741be73e4619443fa2d8b26282790362ff7fa3fca2476fecb6b8c9f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0705204139733783a9f645fb337915d
SHA176a9f315624233aa6fc93766582e6fe299f58b00
SHA25688c7ecf96b6c7adfd58cf6b878cf3e2ce9c52f3ac207746cbe55e0eff693f071
SHA512bcc6a91a9782aae172abe9e927040411377dac00b049bd27fc3d3ed3e78eb903617be4211b50bd3ac417cca89a47ea296e1b0a01053ddf38316077ed3eb44a07
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b