Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 01:35
Static task
static1
Behavioral task
behavioral1
Sample
96e972f3286b00cd098d4328942ad257_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
96e972f3286b00cd098d4328942ad257_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
96e972f3286b00cd098d4328942ad257_JaffaCakes118.html
-
Size
41KB
-
MD5
96e972f3286b00cd098d4328942ad257
-
SHA1
6c7541f8b0d1f6f9bf1cf172894c7b898f7ff076
-
SHA256
352eb008b6ace6df71dcbfee93dc36800404bd05e48f29ce251fdb6a110b5d12
-
SHA512
422f3727c10b2658c9d0b739d8f600039b7f77bd75198e44eda1648c1f661fce2a41080bbe3be2f856464c885067d320dbf0b7a9d9c4eee7f94feebf7606c477
-
SSDEEP
384:wvRYk51c2ZFV7ZipHMsBx9KQ/v+IowlUCfSdyhx4yhaTuxFUDpUPfZRqiweJPUGX:sk1kFh/X2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423713191" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E13C0CF1-22DB-11EF-89B4-66A5A0AB388F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2960 iexplore.exe 2960 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2184 2960 iexplore.exe 28 PID 2960 wrote to memory of 2184 2960 iexplore.exe 28 PID 2960 wrote to memory of 2184 2960 iexplore.exe 28 PID 2960 wrote to memory of 2184 2960 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\96e972f3286b00cd098d4328942ad257_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2960 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590c5928ff6127e1987919a3fc63c1b60
SHA190063457aa1fd604f2856387c479978165130efb
SHA256e5f1d243c5e2794dcbe9605a5e1a24d66ebb5e3cdb3d391305942d25c65e9ce2
SHA5126de63861cfd6fd7d778495035066254424fcc45229625d8ca53286e45859c8f15e87433976a243ac132e050855090c737da7c58a67d550c47b2ad6fa62b3a164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573757222dde88c442a8f5cc26da8bb91
SHA10e7fa441fd7c323519bf66c290332503a73d62d8
SHA256a3c86efec8acbcac46f80ffb710e33980aa48a7602e733ba88e5371ecf197e1c
SHA5128716a603f4fc6bac809fecfa6b150a49bcf3651afcf2f12e0ed2f2275a83773df423cdbe24f933054be4c131a88aec4becef0dfee534405e658ef3896f01d9f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d26a3b3eb145e6a47a865dd6049bdae
SHA169616926d4944411bdbf172a380cc6172d8fa361
SHA256ee2c1927c05271d2461d6a8c1c288483bb721986f44c25db5c8f7c10cf3f3c2c
SHA512333b88a206cf2c9fe0a3108144a6300c087f1364fd295c3207c4c3676b5854b8c9548e652e794c2ae854e60a2293b59ac8c6f41501464400107da3318bb31904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cefadadf25529589820f97c9f8347659
SHA17e935fdcdefd17eed27b28c7d2dec4913cf2f11c
SHA2560472fb1c4d805766eccc5578c87a7239ec26f5b9a32e007f76487ee7aea0fcc3
SHA512feb5051a6abd34fac37fa581b6a2c948c8ca84b387844537215074909e34c63917ab10cc8349d7be30e1b280fe5e6fb965a3be2aafc363fe6fec41e516fb974a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5154b76300c11284a8ca5c5ef2f775669
SHA11d1188228f4e86233974a4ad11732b2328b18b41
SHA2563baf703e50d8501cf1b28ce44dd6ca650354561dd46d3076510350b67ef351c6
SHA512334881e1dba5a51a07f9a94273aca5fc77b3f2d05fc69f5a0ff439dec941a08bd90e6267bc75c0107f20f50b1a6bd110f79b87a1d99e271692516d86a8cd5ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5175c1596747f582ce2f597906e7237c6
SHA10e87b8f1aa2788515db43cdfb14ec9243821da68
SHA256f7ee8e5e09737ac391c3134a6dc5e7100003aa9e59ab0f9b6c080128e05faae5
SHA5128afbebd87539155e4206b3f942f9e51d2421411950e51e1111e847ab0e1ce4ac9159d5e70b911201fabb8c394f6f28440e8963875ab9341b258fa1794cfa22b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579c6887ca3f42315bebcd61ccf637fb2
SHA1f73fa96a450fd4f5f707e49fd26bbd375fe9f93e
SHA25621df3af70d5b86228ed31fab6c35fd2fb64513eb66b2190d66e86027ff5d058e
SHA51288e2ef971c26df340570c2a062776a81c24f375b0e34d895dac644ce6c2451fb4306a557368dbba769428b1e1dec2726a3b96a7767de0e11b6b21bbec4396051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554522e8a6dfc45c19a2fe9007d7c61a9
SHA14c51120383f215836c11dcc7a0923e6ed0093d9d
SHA256712e1ac34f63521fdeb4b18dd4a9954473df2aad51b56b4e70ab8314af3519cf
SHA51233f62564eb48e4abf123e2df5db4789f69c7bb9c7d728e83ef876b0ecdc985e048f50e81c1eb3707dc5f4afc301f6f3e24b381e49b6d12a722e4b7abb31e10c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4f9ea150793e5111a9cb267bf83693d
SHA1e1632ed7434271430a42e8009167b65277f6db8a
SHA2567edbd981b2e7246befbece73c269e7d781d06f28abba8bdfc41f771a4b232b2e
SHA512a9ec03123c5b59f66d4b5cfcfb6480b9bcb7f1d13a0dc5e3c1be8fbd4af9a33fe14d31a29622b919dbc606d9e92d7f6fd903b9153abd25f7e9d938a797dfd41a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b