Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 08:00
Static task
static1
Behavioral task
behavioral1
Sample
978e8325623df5eda52d28a819122614_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
978e8325623df5eda52d28a819122614_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
978e8325623df5eda52d28a819122614_JaffaCakes118.html
-
Size
23KB
-
MD5
978e8325623df5eda52d28a819122614
-
SHA1
d46d395d0865a468b7dd424de4aa5f254dc4681b
-
SHA256
e116b2f26c5b1f080ecec6530f99aced0b489b130dea9beb6d94940dab50db60
-
SHA512
c68a2e7cfb28f4680cddc8e6bb259512d7f9dd3a40c34cb3ecbad90e19a20acc94acb248549c0b744fa39b05e1902e6f084c5b201f6763207e90bef061794184
-
SSDEEP
192:uWf8b5ncqnQjxn5Q/vnQie+Nn2ePnQOkEntpBnQTbnFnQoCnQtUwMBeqnYnQ7tnV:hQ/0eZ8mRp
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A2B95D81-2311-11EF-A585-5A451966104F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423736279" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2568 2296 iexplore.exe 28 PID 2296 wrote to memory of 2568 2296 iexplore.exe 28 PID 2296 wrote to memory of 2568 2296 iexplore.exe 28 PID 2296 wrote to memory of 2568 2296 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\978e8325623df5eda52d28a819122614_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdc7fcdad88c62eb5a522f9d140ec399
SHA1f0c822b53d6d9f7fd21daa0d413a380a7ed62c69
SHA2568725ff6779adc1ec417edc87e904c1f5dcb7d085e94f4c9e92b80fba18879d55
SHA512f65ad038103483755b5626f44503fd99823862294302c76928b48a96c58af91296b707cbd5fb6dff7149257642fb9cee9836a83cfad5970909189f048273d404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d48e291969fbbf405fa751b421dc894
SHA1de03ae0a4ea106d13d7924ff8bef87dad3e0f73c
SHA2565601beca56d51b5d3957abb5cadb7da1da5440130c517ee0bf788217cb1a5730
SHA512672fec2dabd0a822e43d2a6b20685883b98150290782d3cb87fca70cf3ba34b70f3999b4b976eb31c7556fc4d8e932f5bcaa141de32a1bc30d53552d62f73622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5316cb717a91756a7d6783975b3a26887
SHA111f120899dd52cc869482a8fb3c2cf221d3f4d41
SHA256d090d07b8d91733dfde8efd63793ba2bf1a96eb37ae41d5b23b8dd50c389dd15
SHA5123b9030fda1a2c7047e1a4bbf06ecf351ce674d303c0cb8a8cbdc0d5cebd991decb5ce1f8f2b39597d0e2b23cf9eed1fccfff711c25cbb323d6be31387195579e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a16a452d82142b270f7cff418416c0b
SHA10f9e8bfacb5a65b3fc11ed3b16fc9dbfce04a272
SHA256d6783eeb3d2a314242d36e0500f420f5ee7252e9af6fec6b80de0222c4fa2535
SHA51216bf595c92503866cc44aad1295756337476848f6077babfd6a27c0eacf146e0c41f53d817cccba6dc9c1f7e9854f97384228dba152d133109204938be013467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baf3a9a455a1c2096aa8562b007ffadf
SHA1ad75734a08811ddcb49fd42a9081f19279d4f2d4
SHA25691e89577fe726d135f82d16b0c50a4b6b1f5942a6b1fdbfb0c472c869e52af9b
SHA5126f155ba517308b26f1e8b6265dfa223908bd49ee5e585ac574982e24a3625366f08d3004a0bbeca885c93d5925bd5663e6021301f2a10f080c4395d63bd8e106
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579645e0d34f8b50628b6f241ab25b61b
SHA15475446be9d86dbeff98388335f91da82847424a
SHA256ec103e9b840c3e8e9aa3edca8adef72c289d1b51149ebf3f506f26d3933e2620
SHA512cd88af3f61a52db65ebb62a87da2b1a8af514ef90bae73b4f551ab16bdc50f427f5ca1db4b8e1d05e4183e0e27af2622cc4f86906763d80f655c41eaea60914c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c7ae4ed5b942b6a87b5c900c64d5c8c
SHA1a9ca9dee6b17a0b8130db82239b139db77697ea4
SHA2564f8c742cd59dfda7667f9ac9aaeb1fce4b857bc6c919f6381be9cd9c437b7a8f
SHA512023636ae801e8ed101bccb29a9b95b95b5c3075e594e6e76d99ca6de865359c5cd5277216988a7ba1d8ceb23ad01e615dbadb3aa12b4237e6c2f9bec4d0a3b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545169b1ddf63ab0b28844f241010fe6b
SHA15a08d1404492035e976e9fe8dd646643ea2b06b3
SHA25671f63f882b389906f1c95166f57ed25af793c269408e6c671a264d25db4ee5f9
SHA5120d0eef4611404f13c44fc7003e160f6389a248fcebacc47c0adcddd6514451ea598a692a28606f1d5e91695548edbc7ec24440420bb52b725ebdeb2ebe5816d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5318cbe67211fcb1dff1b9ac2944a9f7b
SHA1c767070415675a59710b6e867ce5f30b6abd8580
SHA25645d1c126381832d22173fae0442c688cd6dcb928eef34d4fc193e001e89b2fde
SHA51220ffab2822c1c7e907b95c78dd70678559809cb4851152f7a296ffdc32e733ada307ea99c9b8d9c28302dd424ca41a5ebf1eecd370c3f072b60739f7c58c83b8
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b