Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
abc35370ae60cca455972cad554e787c_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
abc35370ae60cca455972cad554e787c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
abc35370ae60cca455972cad554e787c_JaffaCakes118.html
-
Size
31KB
-
MD5
abc35370ae60cca455972cad554e787c
-
SHA1
a39f3549b02e091af0a680ba8011eee228f8bc97
-
SHA256
93e79c782e96aed675813766801187af4b6f1bbb8c0c6a41b3e84b6cc7bebb1c
-
SHA512
43f50ad1b1d5730160245335778ce055a84c0c0063f44e1f1d225a154a9b4779504e709a85662336b9dbcc8da149312551e60a5b96dd137fa57b685bedbf95c3
-
SSDEEP
192:VWCk3GDG7GSFGNGeWqGUpGtqhyz8b5nB2jUnQjxn5Q/FnQiegNnNnQOkEntPrnQi:ACk3GDG7GaGNG9qG8GtfQ/IWSdEQ/jv+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424565950" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C7813A1-2A9D-11EF-B489-E681C831DA43} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1560 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1560 iexplore.exe 1560 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1560 wrote to memory of 3008 1560 iexplore.exe 28 PID 1560 wrote to memory of 3008 1560 iexplore.exe 28 PID 1560 wrote to memory of 3008 1560 iexplore.exe 28 PID 1560 wrote to memory of 3008 1560 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\abc35370ae60cca455972cad554e787c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cc7437bc83afe2bed1174ddb37f203a
SHA10c64547a7840417e58db8b8488b76981374f4286
SHA2560c5cbe570356f14b034c75e4034fe660707b5f48c658ba7d34d17ddcb13e31f6
SHA512e5766c37faaea0be846e8c6fa436fe4177cdf6a7a082bb85dc08402bc7ceff7a37043dce1769cff322845e4705af31079eaf34352440bbbed073dce319304287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddf2cd14abd4e85862a22e2bb9286553
SHA16bf71b05d61f4abbdccc1ddc50075d9cd7987d7f
SHA256fb346ff523f95a864388eb582ca6032e758195695d6206f92f1b36b9a473eb1b
SHA51265d376c687925aa1b37e872e8471384d77a1333c95b86b80f4dff300c0a75b01df7eae41563bfb4990a5bb7d5b30f57bb291b3c1558d5f3fa8b59103915a00d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da5689a2631fa528e517b55ef902e9f4
SHA14d079bba7aea7bc2eb82cc540bf7ebdf33932142
SHA25672da60a3a10f6c112828e9a036bf0b577e7f5f3819397fcce5885a5d1f5d3741
SHA5129cb7397f87aea8cbddbc9c3d80401a24c7d41bb3e01069f9880e7d9555bbdb526ba1ad74ca5a303de20081555214db72e9eba5748cbb5a4f153f1cabf2ceb84f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59426b84a84d97de69492e1fe7e092bdd
SHA19b6d6760e0b2e12db8e64c30845dfbf77875db63
SHA2564f1595310034fc5bb326592f78bf213f9f30cc8d5da6e2262ead945882d4500b
SHA5125a98672fe54c83ce1adb1c77d239f9383b8a78e91e6cbed7ebe81f127c321f92e054ad391252ee731fac46ead2b492c6afe5faad3f0fa3572e16d9933870bcba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53498bfdb96643245dc827736abe066c6
SHA1d66801a1d96b8e240fe93bf4c913ca867342e334
SHA256ed2533467f5f56038ed4c0380970f4d1a1b346863e6dd84cc574f97eef6781fe
SHA512057079a445e433fccd1e89b3e8ef20b1ed18ac7785179bdcc3db1a18bfa18a7e8ee8ac73f1fc8c0399392662ce0a5fa90babfef967b5ef904ad2a2ff9cc35952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56527a10f260fe41fe15b061fe84f6b19
SHA177e86ecc710e671f24d8bf475a8e8aa7fabe5ebb
SHA256483c6de1ca2a4df06a2137aa1c9bf0d43530f58a8bd580fda70ce75f54b77f8c
SHA5125c80ebd2b869cecd6c12ceb1eaa700ac871681a4518bb4b33eda41b268360493d38241c0ff04cad73322e28ccf70afa2a01810f0e80283188d3c514a5adb5a7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5671dbeb58a6cdf99404daa3fd0447f27
SHA1527737ceb389078b2e4fcbac72c87d3d102335b0
SHA256f3930526c826ba944ad52cbb3ab46c1ea20941d7671229aadb1d963c7aee9d11
SHA512935793c8a9e0e46ea9c4ffe12a3f514b30df163059bc55c002dabd0502edf6a1f93cc3467e92c3941a3377f57e257e160994c852e544903a772e4ad42f6cbec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e653a18f7c4a776e4337dad6ce26e10
SHA1d19ff96cf368de525cefa36791349661794460ee
SHA256e2e3399294d17dd5cfed9f9fc84ed4c7758731dfac85bf420f51eb6c989dae25
SHA5123094a59f0d77d723425725b829ce07200534301961280a202437912bc6a0577b708379e9c47551992cb9cf3ec2a4011c079017de3358138d66fca0a380dbb1bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57de5ddf0812468e67aeb18f9cacb302b
SHA18950e88e9dc8905b04159b894196a7f0b89abc46
SHA25628e96c3181767f27d95a3a9ac4b4625c417ffbddf6c9d786a99ecd42097402bd
SHA5123df0b6a89c9dd449caaaf1b3e9555fd2788a503f824665cad9aceb806e8fdcd046fa1e443dd86621fadebaec1b6955ab7a84b723bbfb5af257142f2fa49facd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c0aedd4b7cbb012e7b76c19cf83a514
SHA1c67852e3d486dad252e06704b73a5e7612aa8513
SHA256a5f0fc7c2bbb35dc2bca630035139937df6d1aa9f07638dcbeb1091ee0f07539
SHA5123985d4a3907471b5d2da664ba4ed3abfdf8bcc10b1aeba53bcb0a602cc9aa6ebf631006190eefe840c9cc3236c35e80cee4a2b9a783f211a7eba4b72b6ef8d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e8418cdd5996067a837bf2e31bd0c57
SHA12191fe257ee491d4cc8dc5a5a382d6e192bb7498
SHA2567c8938d7bffbe9106df1554379fd6676dc2399d6f3014293e89e54f3a0ee42bf
SHA5122790a66af1805e6c35b14390e3a4b98677c987768b26959e24460ee8dc36ee4b6c40b4068bf9b3a0d0a64825706b6137877bf0bae3b687374bef85a36e837383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593bfdae09b7f49c88ddc9286fa280b93
SHA1a053501b2b8ab63c14e91b41bcb504fe316a407c
SHA256d11703308c6d65cfedd1dec2e73559d3419183e0815e0cca1a19f1b716628cb5
SHA5122029b61610ab9a16eee1494904493799064bb3b3584c7fa76523db2f9411f3158cace9ac8e4610ca25547c098010271aa9a2dfc3326c5e619a4fe469352d7215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51066c71b0173363e9ac8befac32273c2
SHA150be6e87609c44de71ac3fc9edebeee6ad8dff2a
SHA25653fb449ba71a83bc8366e09a8f9e8a93b6e961851eb0dc21d06ecf99973c0281
SHA5128d933e018b43007a1c6d4305ab7cf86803c70fa5f2ef43cc76c5bbd3d611e2814c321f958998d9a5f401464e5efd83cb3ef3c57c549a0e4012ebdbd630ff5cef
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b