Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 15:01
Static task
static1
Behavioral task
behavioral1
Sample
a1141ff100bf55cde4fb953df1302feb_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a1141ff100bf55cde4fb953df1302feb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a1141ff100bf55cde4fb953df1302feb_JaffaCakes118.html
-
Size
27KB
-
MD5
a1141ff100bf55cde4fb953df1302feb
-
SHA1
c270a89153865b6d802ed56146554a5cecd6f97c
-
SHA256
7fcec17b2e4d2a2c93700b36f744af50df4c3f16d6c67fa6f909191b5767a12d
-
SHA512
275dc452144e7699b8b1209f3e986a5fa06f158942705baf7929fd7ecba07d8db95a34e969dab96bf113b0d9a431b14444fb761bcdc0c7044bff1dde79f82815
-
SSDEEP
192:uwDsb5nu+nQjxn5Q/RnQiekNn2oxnQOkEntPLnQTbnxnQ9eKgm6lto6Ql7MBEqnB:7Q/4odvYbodSOZ0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A3818AB1-28CC-11EF-9ED8-52FE85537310} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424366353" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2508 3028 iexplore.exe 28 PID 3028 wrote to memory of 2508 3028 iexplore.exe 28 PID 3028 wrote to memory of 2508 3028 iexplore.exe 28 PID 3028 wrote to memory of 2508 3028 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a1141ff100bf55cde4fb953df1302feb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5268ac9cbc838f321eb21fd9d5b79dd13
SHA133544bf4799d259dfab6d006f5d26e3166680570
SHA2564705d9dcaac159c101ed87b6f95e8eb071bf5ce983c9a50cbe4debb8be931ddb
SHA5120dd40ff9e9ea50286fc05b147de4edb673a5a1ed0f90bacd64c35f3232196dd2c3247a571ae97cad2e666441db1df85c31d47cfa82a2220b25c4b2b2c3b95484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c037838e3c0e0bfbb9f7cd1e7d46316
SHA15927791e6c1d0c0f9c723a57e6c5c4e14a555b00
SHA256d51fea5b8c663197012051e3f292de045867de3225460cfb5dd92d499f1ef09d
SHA51228724a6d572ca5ea1d47b9c932c525c587198e5869d22c508b3be41652f1a75e3407d9e78114ae4aa3822e44a3b9af68ce8ae8cab002e4b517098b40270a5f67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5842395632aed2cc41e5a9a7ae7527791
SHA136c1ad16d624d1fcba2c64c27adca56caed3f787
SHA2568f7c7cdbfa1f68ff1d7b7de708beb63eb4ebe1c6e1efb96dfd1ad87fa397816f
SHA512178eb1cd01924f7162da9bd411f13c71262c43b4415a02e77ec3e6da6fb514c24dca1e5e83cf167da67305b560674c183cf09cc908ddfd0a97a7aae7c86eab61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3f4d0a810cebde1f13b6b2796104e64
SHA12367bbdf4dead972d4aef117b35f99abf8749483
SHA256511647a733223e9952dcf9e5cc462a73bf6c64f5ec26ea06dc0b70a1233e4283
SHA51215940a8993120a0555643f206c0ad39a83236e337d4748d26791170f0fe0d326c457fe29e9dc7be591bff9f0cac7d98a364eb122123d98709086a0571c250e1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b883ddafaffaf13e847683b88806f3a8
SHA1a5cb6db2a468bc22158c1185438e68cd4ceb8d6c
SHA256310f4c7a354f2b8e9e1a3cefb9afd2c4bb5ba6c4e59f1eb1079a6ef7a4a4d4d6
SHA512b15e83f9207b8bcacd69fa57795ef6df41304d86953c55bf3f6af9aa21fbde6e092fdf5a63e413405ddae6bd6ead27534887e9ac128e563e602bbd45446efcbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6bfc62e7c4b189c2c9df4bb52896b3a
SHA1226f6ae399576cf7510ff7349c128c471c7ef8f1
SHA2562c79dad8d7bb6c2da0d9d4641309abd28f97b863fdf62150e551c70bdb4f70b5
SHA512a4172fe3e02cdffa232bb28df9c1520fdb6d0c9ca04ebf1121c81e0a8eca0c11424e81503ab09c5d2859f709a470b804a6032cab8e062a6fca5ab8bad5c33fd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cce58e6b01461cc470a77a28721cdcb0
SHA1f4a730adb97c89656868e9a389d8dedeafb0fa0e
SHA2562d87cd17ddff6bc52fa514ce2c5a3e2bdbae8cfc602d49fdc05f708d6125e76f
SHA5129e0bccead9a374d2b8bc3f171096c7e423da838a24c96b278bd364ae26cfdcb94ef92fb935d8301030726d4d181903b480282f3c0defc753f66fdb760ac48504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581a9c05757115a086f423350afa50c62
SHA1124e637e6baa3fb30bdf47ca681fcfa89b28283a
SHA256feb7fe59a0c737d4a57ee92f2ed0aae1cd7c049ce9a88f60531376696fd44406
SHA51273d960050b5e9a2dab5b65f5e191e328ed1fdc2cc1c816458a86348d80d7985ebe7ffbf223a3625160811211fd84418931e11a88534fd8334954a16167311b79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5479c45aac643e5813e03a4a801283250
SHA174465a4992f2502a6213c5d64ff11e00e2734be9
SHA256eb5a211e7d9f3d6e52eb30867e6d3be04d04c6da5124fe6194ea7a445ea7ae0d
SHA5129649cf1d90e8370b9cdfd62b4d36b5a65658573e5a50015e954c69960d4c98cfd3c2a05fb14e2f1a8a235f267cba17a827a8e08f60431e7e3a5dd3bb999caea4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b