Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
9bb1d803b5b20e7a68c248a2585ce597_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9bb1d803b5b20e7a68c248a2585ce597_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9bb1d803b5b20e7a68c248a2585ce597_JaffaCakes118.html
-
Size
27KB
-
MD5
9bb1d803b5b20e7a68c248a2585ce597
-
SHA1
623e287448845cef81c151b9378ef5b253f1ab68
-
SHA256
b7377cec58a610d00bc5997d190f5cfc9524fef692ad56faa67db436fa44bce3
-
SHA512
30f95f1233a8a993246d4aee05d4030c05b882c1dfa02a33d2d308d0ff1d269ac4ff44204c3dce6dd1ecfc7f5bdc50ae8f84a93e11cad9976db54dcd2425e369
-
SSDEEP
768:cW+nZQ7PYT2iaufQTheD/ovhqiDZA4NaDqcbfEZ8Q8NKWg/Ah4bLmi7MmvBvrgfP:cW+nZQ7PYT2iaufQTheD/ovhqiDZA4NO
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424208355" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4A503F1-275C-11EF-8698-5E73522EB9B5} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2812 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2812 iexplore.exe 2812 iexplore.exe 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2204 2812 iexplore.exe 28 PID 2812 wrote to memory of 2204 2812 iexplore.exe 28 PID 2812 wrote to memory of 2204 2812 iexplore.exe 28 PID 2812 wrote to memory of 2204 2812 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9bb1d803b5b20e7a68c248a2585ce597_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2812 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54770af44df9e47df37cef9d5375b3658
SHA1d4e6bfb504b8e0456ccd549da5c7b2dd49012aa7
SHA256c476ff998050708e1f2ae96d6165efaf7cf63911eed6386a08035d5ba1dbf848
SHA512d2a37c36c94df44073d86ad7438edee7716e39317e2182b83423faa58c18384e814488dd37d9610009920e8a325fec7b74629bf44be94d1fe672dced57baaf2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1262b2bc4709057951f735d0147541d
SHA1d35c6a3f1819bc144586d180cffa039968c51642
SHA256231eb0926a186301e1d70c2e071525f2736e21ad933cef09ca1698c74bac07b5
SHA512dc713559cd5c6a5cbff3c5a0873c3477b3f6ce7900d635b9d07fa1ce531435f0e9fa55bffc81618b89d04d379d20ad8920e18bf7d5078de1006a10564f9160e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585b22578be113200d97deca0fb774814
SHA1d7c11dcb9da308d2fa8870faa3936ab4f20cd49e
SHA256541dd83f3b17c35233a3fb1731785608da4caa8218f995585a15db8b43646734
SHA5120a653ca270654551d2bf694578d11063aaa950e3daf8d4ff40e6640ec4915b4fbfc8a62f6905d9a08b039700d9e25eaade0a2e466e861209b95308cc103f0ecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55afc934ed4a294c32b5adf0d5ab6da3d
SHA1f6a82c6257c68552400559aa20fa235d060a8e63
SHA256d420ebcbdba65d5eb1e206466f1f1474fd7585a34d5f10f0672b8da32431104d
SHA512cfe5c0d491a11b628bcdbd07b7ff3ee24d0446b42ee41a042ba0d0ebfde9fefe40d2b4802eced87afd686f8e1554682b699c0577de6277f69663d2cef48c891d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edcc638f81fe8605734fe806462d7e1c
SHA1c7bcec3729acdaa9c08586e04d6fa4a9022e44d5
SHA256f1497b20bd888f856bc4829868a9d3e908aaf6067ba796f01be319d357a47996
SHA512956ded8c07540647a65829c0668a1c1486a4d4c9c27101482a510eee540941d24d08ab24e13a67b5b792ef65ec95a2d13fe65ec362c7925de3a1126e00a85b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5758cb7155dab3dbd05ba35b3119888d8
SHA1db74fafbb3bb9205a4f0a3fa6659205adb10677a
SHA256d4dec54360d4e9f3f9546e65e56e7912131808843cf82a2774c0ea26940891e1
SHA51225d884176d8ff13bf22e8cc301d2d18ba08a8b4b1e57b0abd04058151ecab9a41f401ff882bc58846c396aa2e8b5f415f23056cc21b611765918fc61360433f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513eadc98ffd9cefbb62893a4ba2bb20c
SHA16cc9a73c7cd262c2feefcb453c971ed739acf6d8
SHA256f79659f37a21d9bd84565e0e288d401cf1aa2af8ae34175e9900d510e6b8ad4e
SHA512ce27703b6d9b37e61cebac2603992fc3eea1e5f36c1db6e4072e0ef177dda43e610b1d51aa29e0857281ba9af63103113ca343c89b67973d823eb09b1e67fe30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a40315f6ab506388471551e760745a4f
SHA18af95e94b24c158483baf16de343a1f822f4002b
SHA2562a65e1ee7165467e0b1c39b0efc43187ae452ee76aa91d8dc041ba97be03f0df
SHA5129798343199136ee6b96e3785f5345eb237d84a79ac772886a8f0a11f58ecc293370adfde7e4f0d22345b63384184e4f034c8e76c5d62a7e55ef2ea87a39122ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50811f34fa267e598d4282c5c3db4cc2f
SHA1ebdc5192758ec77540c7b75622dac6c88762b54b
SHA2562f814fde5a7b4707aba046720552bda60ce6929af5eae7b0721b468bcf9da4ff
SHA5129ded13868cad0d0427e5f1174504f0138cab9a64aa34339b362b1321297c75a05445cba56e2bc7c12b32ee7e445d19a68ca56fa78e641eae7a0d72e62d02a315
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b