Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
9eed70344427533bdcc512bfe7055e69_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9eed70344427533bdcc512bfe7055e69_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9eed70344427533bdcc512bfe7055e69_JaffaCakes118.html
-
Size
18KB
-
MD5
9eed70344427533bdcc512bfe7055e69
-
SHA1
d0fa813f2583a661073708c2efc6638202f1be14
-
SHA256
311540e4ff6b1e2c8ada2a7f9f1c4e624a9f21c1d63b4afc30856dd9fcedacec
-
SHA512
97c729d0a4c7d133079b30c7916fc5c85d3b71bcb525c46ddd0277acbcac8374405e8687fe7a35c394a60966ffa95e2d1a83f2888a54f2855ecc54e1e07ec80e
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIf4zzUnjBhR782qDB8:SIMd0I5nO9HJsvRgxDB8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4D9D2FD1-2815-11EF-B6F2-56A5B28DE56C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424287611" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1288 iexplore.exe 1288 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2720 1288 iexplore.exe 28 PID 1288 wrote to memory of 2720 1288 iexplore.exe 28 PID 1288 wrote to memory of 2720 1288 iexplore.exe 28 PID 1288 wrote to memory of 2720 1288 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9eed70344427533bdcc512bfe7055e69_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5627decff8730a02d1fd173eef8d67c76
SHA1c62b37a307e490a5fdae44014c34c4b380d773ce
SHA256dbbf35c22c7c0427f0ca704fd54850d4360299953f329a085a225fed960db914
SHA512f27f57aabe304d0bb0a77cb2edc7979b7c7f0c83471720870c19e9ea97d2618e02af578aa6288fa2970da6e17d7c38051765cc49c11c87775ad347231c25b005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f26baf31b2177df0f7bcfac4b1617b0f
SHA18b621a9e762ce27f09214ae672c1bc8f67b7905e
SHA256494f8dd887f0f529493f06b2e400f29108d9ea1d06d4ff243d87af36a5700ba8
SHA512c966b5bc7975accc2e862afdd485acf791be938c5b8d76886b340bcc09b009f39ccbb279d49bc249f165a7bbca4a67a97dfb0151045d712fcb7007f1063cf70f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fae683a6e0d7232e6a8571028b21137
SHA11b118510a95427397196122ba21e517cf778e319
SHA256e65e836f18cf189f5e51162871ca430ccef2cba52cc92b85c12a4d5bfd68323d
SHA512fb98bd98a11d46ee4dacc2fd8597689e369da2a8eb315a31d74af4268e5b4d95d6f3d89f4260e469f417fb94dd891e98b57c047124c8e085207d3d7a1cd7c4f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eaa87b12c87829ce885b4c51e58275b
SHA1c05617489763867ba3f9e0bb6df308ab2f02032c
SHA256ead35f4c795e6ff46f5d8702ee0709ac1897ca86833599cfcd14a13a1bbd39a9
SHA51249a9af07fbe05925ad32960389dda12677c3f2af579eaa8586d27ed930bf17448659ebe0d239749ad686e483d58f5eed6868bcf3a6adb08bd29fd2888b297798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df32080859260b0b6f322ca2417d307a
SHA1e55de21bd558a57f748971162659ae5d9c7b2be7
SHA256791662eec9c3588189a35c4a1556048be49ea5a1ffcc14491ae29a925805b0d5
SHA5128229e383439170f184354c5a64dea64e856a86787564cb852a6d315cfc1d59c34a2ad0c93c01c09958c81b65fd86e9774697b3a59a8be748429f160914ebf210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f210895145f527bb2eafa9c6ea24292
SHA158fb020d91577ee5133822c2c7ec3260e363ed68
SHA256993b930ee1773ff5ded3273ae3a1145ff64cfae852262c8f32f434c7f6324eed
SHA512987b6237107526adb83bd47e862b1364a1ffda7329456c8f348099ee31da477d7f082531ac71cd9970b55abbdc62d7742f518d4b0a88d61b532dc3ef75a7e080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d2f035f5822a839ad54f524d88d9e50
SHA15f80ea67892623c36107f6e7042fc40f5db71a74
SHA256cd79e4f3333f1930b806cb0f3e457de0a88ace5355aa50d15cd05063af3d744f
SHA5120aa629432c6f1205f5bf21d2ecbd8c5e0ebd1a70ae6a5b600fc9321651a23581d9bab96a34847c5536aaadc6fa4a585c1fbba96c7621b40ac3adf7a6ce493576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5504448d257f3ea22053e6e1bb5d9612a
SHA12f03b0210c81f4a8ae9acc55c09907c977b1afcf
SHA2560ab2c7ed5eada7c03c338498ba6656261b25d831840869ce9c3177c28f094459
SHA512ed51d33db8012ca221fe202ec5459bf8d3824fb16d6f8a2fb424d16ce086b8af2d8d2036f63246252ab02fc238cab9c6c4dfc6c1fe2067371c21fb531d49fb7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536c205853e439307e6ad433de77c6b5b
SHA1f7967d83f6ebcc6044789a6f2bd975caa8af0628
SHA256992ce82b323cfb8b2173777babbee99368d1de0a9071fbc5996624beef37207a
SHA512c6395dd63933c0a39e3b587197774b591b6f237240572daa30b19a6f6052efa81ae1012e4e13a1029fed58aff32b422418e80bf17b7db29336dd8f2a7f1f8203
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b